DOE R&D Accomplishments Database
Hecker, S. S.
1988-04-01
The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.
Bi, Jingran; Li, Yao; Wang, Haitao; Song, Yukun; Cong, Shuang; Yu, Chenxu; Zhu, Bei-Wei; Tan, Mingqian
2018-03-21
Foodborne nanostructures have gained more and more attention in recent years. In this paper, the presence and physicochemical properties of carbonaceous nanostructures (CNSs) from roasted pike eel ( Muraenesox cinereus) were reported. The monodispersed CNSs are strongly photoluminescent under the illustration of ultraviolet (UV) light, with a fluorescent quantum yield of 80.16%, and display excitation-dependent emission behavior. The formation of CNSs is believed to go through a process of morphology evolution, including polymerization, pyrolysis, nucleation, growth, emergence, and blossom. The optical properties of the CNSs were shown to be affected by the roasting temperature. Furthermore, cellular uptake of the CNSs was investigated, and it is shown that the CNSs were clearly absorbed into live cells and were mainly distributed within the cell cytoplasm and not in the cell nucleus. This work is among the very first reports on CNSs present in roasted fish, providing valuable insights into the formation mechanism of such nanostructures and showcasing the biodistribution of these food-originated CNSs in live cells.
Evidence of function for conserved noncoding sequences in Arabidopsis thaliana.
Spangler, Jacob B; Subramaniam, Sabarinath; Freeling, Michael; Feltus, F Alex
2012-01-01
• Whole genome duplication events provide a lineage with a large reservoir of genes that can be molded by evolutionary forces into phenotypes that fit alternative environments. A well-studied whole genome duplication, the α-event, occurred in an ancestor of the model plant Arabidopsis thaliana. Retained segments of the α-event have been defined in recent years in the form of duplicate protein coding sequences (α-pairs) and associated conserved noncoding DNA sequences (CNSs). Our aim was to identify any association between CNSs and α-pair co-functionality at the gene expression level. • Here, we tested for correlation between CNS counts and α-pair co-expression and expression intensity across nine expression datasets: aerial tissue, flowers, leaves, roots, rosettes, seedlings, seeds, shoots and whole plants. • We provide evidence for a putative regulatory role of the CNSs. The association of CNSs with α-pair co-expression and expression intensity varied by gene function, subgene position and the presence of transcription factor binding motifs. A range of possible CNS regulatory mechanisms, including intron-mediated enhancement, messenger RNA fold stability and transcriptional regulation, are discussed. • This study provides a framework to understand how CNS motifs are involved in the maintenance of gene expression after a whole genome duplication event. © 2011 The Authors. New Phytologist © 2011 New Phytologist Trust.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garrity, P.J.
1993-07-01
This report summarizes the main findings of a Center for National Security Studies (CNSS) project that examined how a number of nations other than the United States have reacted to the course and outcome of the Persian Gulf War of 1991. The project was built around studies of key countries on which the Gulf War might reasonably be expected to have had a significant impact: Argentina, the ASEAN states, Brazil, China, Cuba, Egypt, France, Germany, India, Iran, Iraq, Israel, Italy, Japan, Jordan, Libya, North Korea, Russia, Saudi Arabia, South Korea, Spain, Syria, Taiwan, the United Kingdom, Vietnam, and the statesmore » of the former Yugoslavia. These country studies were written by well-recognized independent experts following a common set of guidelines provided by CNSS. When the country studies were completed, they were reviewed and supplemented through a series of peer assessments and workshops. The report represents a synthesis of material generated through this process, and is intended to stimulate thought and further analysis on the critical topics discussed herein.« less
Qu, Jiao; Zhang, Qian; Xia, Yunsheng; Cong, Qiao; Luo, Chunqiu
2015-01-01
This paper focuses on the synthesis of carbon nanospheres (CNSs) using fallen willow leaves as a low-cost precursor. The scanning electron microscopy (SEM) image and transmission electron microscopy (TEM) image demonstrated that the structure of synthesized CNSs was spherical, with a diameter of 100 nm. The crystal structure and chemical information were characterized by Raman spectrum and energy-dispersive spectrum (EDS), respectively. BET results showed that the CNSs had a larger specific surface area of 294.32 m(2) g(-1), which makes it a potentially superior adsorbent. Rh-B and heavy metal ions such as Cu(2+), Zn(2+), and Cr(6+) were used as targets to investigate the adsorption capacity of the CNSs. The effects of adsorption parameters such as adsorption equilibrium time, dose of CNSs, adsorption kinetics, and effect factors were also studied. These findings not only established a cost-effective method of synthesizing CNSs using fallen willow leaves but also broadened the potential application range of these CNSs.
Freeling, Michael; Rapaka, Lakshmi; Lyons, Eric; Pedersen, Brent; Thomas, Brian C.
2007-01-01
A tetraploidy left Arabidopsis thaliana with 6358 pairs of homoeologs that, when aligned, generated 14,944 intragenomic conserved noncoding sequences (CNSs). Our previous work assembled these phylogenetic footprints into a database. We show that known transcription factor (TF) binding motifs, including the G-box, are overrepresented in these CNSs. A total of 254 genes spanning long lengths of CNS-rich chromosomes (Bigfoot) dominate this database. Therefore, we made subdatabases: one containing Bigfoot genes and the other containing genes with three to five CNSs (Smallfoot). Bigfoot genes are generally TFs that respond to signals, with their modal CNS positioned 3.1 kb 5′ from the ATG. Smallfoot genes encode components of signal transduction machinery, the cytoskeleton, or involve transcription. We queried each subdatabase with each possible 7-nucleotide sequence. Among hundreds of hits, most were purified from CNSs, and almost all of those significantly enriched in CNSs had no experimental history. The 7-mers in CNSs are not 5′- to 3′-oriented in Bigfoot genes but are often oriented in Smallfoot genes. CNSs with one G-box tend to have two G-boxes. CNSs were shared with the homoeolog only and with no other gene, suggesting that binding site turnover impedes detection. Bigfoot genes may function in adaptation to environmental change. PMID:17496117
Freeling, Michael; Rapaka, Lakshmi; Lyons, Eric; Pedersen, Brent; Thomas, Brian C
2007-05-01
A tetraploidy left Arabidopsis thaliana with 6358 pairs of homoeologs that, when aligned, generated 14,944 intragenomic conserved noncoding sequences (CNSs). Our previous work assembled these phylogenetic footprints into a database. We show that known transcription factor (TF) binding motifs, including the G-box, are overrepresented in these CNSs. A total of 254 genes spanning long lengths of CNS-rich chromosomes (Bigfoot) dominate this database. Therefore, we made subdatabases: one containing Bigfoot genes and the other containing genes with three to five CNSs (Smallfoot). Bigfoot genes are generally TFs that respond to signals, with their modal CNS positioned 3.1 kb 5' from the ATG. Smallfoot genes encode components of signal transduction machinery, the cytoskeleton, or involve transcription. We queried each subdatabase with each possible 7-nucleotide sequence. Among hundreds of hits, most were purified from CNSs, and almost all of those significantly enriched in CNSs had no experimental history. The 7-mers in CNSs are not 5'- to 3'-oriented in Bigfoot genes but are often oriented in Smallfoot genes. CNSs with one G-box tend to have two G-boxes. CNSs were shared with the homoeolog only and with no other gene, suggesting that binding site turnover impedes detection. Bigfoot genes may function in adaptation to environmental change.
Conserved noncoding sequences conserve biological networks and influence genome evolution.
Xie, Jianbo; Qian, Kecheng; Si, Jingna; Xiao, Liang; Ci, Dong; Zhang, Deqiang
2018-05-01
Comparative genomics approaches have identified numerous conserved cis-regulatory sequences near genes in plant genomes. Despite the identification of these conserved noncoding sequences (CNSs), our knowledge of their functional importance and selection remains limited. Here, we used a combination of DNA methylome analysis, microarray expression analyses, and functional annotation to study these sequences in the model tree Populus trichocarpa. Methylation in CG contexts and non-CG contexts was lower in CNSs, particularly CNSs in the 5'-upstream regions of genes, compared with other sites in the genome. We observed that CNSs are enriched in genes with transcription and binding functions, and this also associated with syntenic genes and those from whole-genome duplications, suggesting that cis-regulatory sequences play a key role in genome evolution. We detected a significant positive correlation between CNS number and protein interactions, suggesting that CNSs may have roles in the evolution and maintenance of biological networks. The divergence of CNSs indicates that duplication-degeneration-complementation drives the subfunctionalization of a proportion of duplicated genes from whole-genome duplication. Furthermore, population genomics confirmed that most CNSs are under strong purifying selection and only a small subset of CNSs shows evidence of adaptive evolution. These findings provide a foundation for future studies exploring these key genomic features in the maintenance of biological networks, local adaptation, and transcription.
Carbon Nanosheets: Synthesis and Application.
Fan, Huailin; Shen, Wenzhong
2015-06-22
Carbon nanosheets (CNSs) with tunable sizes, morphologies, and pore structures have been synthesized through several chemical routes. Graphitized CNSs have been synthesized through exfoliation, chemical vapor deposition, or high-temperature carbonization. Porous CNSs have been synthesized by using various methods, including pyrolysis, self-assembly, or a solvothermal method in connection with carbonization. These CNSs have successfully been used as detectors for metal ions, as cathodes for field electron emissions, as electrodes for supercapacitors and fuel cells, and as supports for photocatalytic and catalytic oxygen reduction. Therefore, the synthesis and application of CNSs are receiving increasing levels of interest, particularly as application benefits, in the context of future energy/chemical industry, are becoming recognized. This review provides a summary of the most recent and important progress in the production of CNSs and highlights their application in environmental and energy-related fields. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Preparation of ultrasmall porous carbon nanospheres by reverse microemulsion-hydrothermal method
NASA Astrophysics Data System (ADS)
Wang, Jiasheng; Zhao, Yahong; Wang, Wan-Hui; Bao, Ming
Porous carbon nanospheres (CNSs) have wide applications. A big challenge in materials science is synthesis of discrete ultrasmall porous carbon nanospheres. Herein, we report a facile reverse microemulsion-hydrothermal method to prepare discrete porous CNSs. The obtained CNSs possess an average diameter of 20nm and pores of 0.7nm and 3.4nm. Our work has provided a convenient method for the controllable synthesis of ultrasmall porous CNSs with potential applications.
Arabidopsis intragenomic conserved noncoding sequence
Thomas, Brian C.; Rapaka, Lakshmi; Lyons, Eric; Pedersen, Brent; Freeling, Michael
2007-01-01
After the most recent tetraploidy in the Arabidopsis lineage, most gene pairs lost one, but not both, of their duplicates. We manually inspected the 3,179 retained gene pairs and their surrounding gene space still present in the genome using a custom-made viewer application. The display of these pairs allowed us to define intragenic conserved noncoding sequences (CNSs), identify exon annotation errors, and discover potentially new genes. Using a strict algorithm to sort high-scoring pair sequences from the bl2seq data, we created a database of 14,944 intragenomic Arabidopsis CNSs. The mean CNS length is 31 bp, ranging from 15 to 285 bp. There are ≈1.7 CNSs associated with a typical gene, and Arabidopsis CNSs are found in all areas around exons, most frequently in the 5′ upstream region. Gene ontology classifications related to transcription, regulation, or “response to …” external or endogenous stimuli, especially hormones, tend to be significantly overrepresented among genes containing a large number of CNSs, whereas protein localization, transport, and metabolism are common among genes with no CNSs. There is a 1.5% overlap between these CNSs and the 218,982 putative RNAs in the Arabidopsis Small RNA Project database, allowing for two mismatches. These CNSs provide a unique set of noncoding sequences enriched for function. CNS function is implied by evolutionary conservation and independently supported because CNS-richness predicts regulatory gene ontology categories. PMID:17301222
Clinical nurse specialists in Canada: why are some not working in the role?
Kilpatrick, Kelley; DiCenso, Alba; Bryant-Lukosius, Denise; Ritchie, Judith A; Martin-Misener, Ruth; Carter, Nancy
2014-03-01
Clinical nurse specialists (CNSs) are advanced practice nurses. They contribute to the quality and safety of patient care by providing an advanced level of clinical care to patients and families and by supporting healthcare team members to deliver evidence-based care. CNSs help to reduce healthcare costs when the roles are fully deployed and all the dimensions of the CNS role are implemented. The dimensions of the CNS role include clinical care, organizational leadership, research, education, professional development and consultation to provide patient care. There is a paucity of research on CNSs in Canada. We conducted the first Canada-wide survey of CNSs and asked each nursing regulatory body to identify the CNSs in their registration database. One-quarter (n=196/776) of the regulator-identified CNS respondents whom we contacted for the study were no longer or had never been a CNS. Currently, adequate mechanisms are lacking to identify and track CNSs in Canada, and little is known about the factors that influence CNSs' decisions to leave their role. The non-employed CNS respondents in our survey highlighted that the lack of role clarity, their inability to find employment as a CNS and the inability to implement all the dimensions of the CNS role were key factors in their decision not to work as a CNS. These findings have important implications, given that these factors are potentially modifiable and amenable to decisions made by nursing leaders in organizations and regulatory bodies. Mechanisms to identify and track CNSs in Canada are needed to develop an effective workforce plan and maximize the integration of CNSs in the workforce.
Conserved noncoding sequences (CNSs) in higher plants.
Freeling, Michael; Subramaniam, Shabarinath
2009-04-01
Plant conserved noncoding sequences (CNSs)--a specific category of phylogenetic footprint--have been shown experimentally to function. No plant CNS is conserved to the extent that ultraconserved noncoding sequences are conserved in vertebrates. Plant CNSs are enriched in known transcription factor or other cis-acting binding sites, and are usually clustered around genes. Genes that encode transcription factors and/or those that respond to stimuli are particularly CNS-rich. Only rarely could this function involve small RNA binding. Some transcribed CNSs encode short translation products as a form of negative control. Approximately 4% of Arabidopsis gene content is estimated to be both CNS-rich and occupies a relatively long stretch of chromosome: Bigfoot genes (long phylogenetic footprints). We discuss a 'DNA-templated protein assembly' idea that might help explain Bigfoot gene CNSs.
Conserved Non-Coding Sequences are Associated with Rates of mRNA Decay in Arabidopsis.
Spangler, Jacob B; Feltus, Frank Alex
2013-01-01
Steady-state mRNA levels are tightly regulated through a combination of transcriptional and post-transcriptional control mechanisms. The discovery of cis-acting DNA elements that encode these control mechanisms is of high importance. We have investigated the influence of conserved non-coding sequences (CNSs), DNA patterns retained after an ancient whole genome duplication event, on the breadth of gene expression and the rates of mRNA decay in Arabidopsis thaliana. The absence of CNSs near α duplicate genes was associated with a decrease in breadth of gene expression and slower mRNA decay rates while the presence CNSs near α duplicates was associated with an increase in breadth of gene expression and faster mRNA decay rates. The observed difference in mRNA decay rate was fastest in genes with CNSs in both non-transcribed and transcribed regions, albeit through an unknown mechanism. This study supports the notion that some Arabidopsis CNSs regulate the steady-state mRNA levels through post-transcriptional control mechanisms and that CNSs also play a role in controlling the breadth of gene expression.
Conserved Non-Coding Sequences are Associated with Rates of mRNA Decay in Arabidopsis
Spangler, Jacob B.; Feltus, Frank Alex
2013-01-01
Steady-state mRNA levels are tightly regulated through a combination of transcriptional and post-transcriptional control mechanisms. The discovery of cis-acting DNA elements that encode these control mechanisms is of high importance. We have investigated the influence of conserved non-coding sequences (CNSs), DNA patterns retained after an ancient whole genome duplication event, on the breadth of gene expression and the rates of mRNA decay in Arabidopsis thaliana. The absence of CNSs near α duplicate genes was associated with a decrease in breadth of gene expression and slower mRNA decay rates while the presence CNSs near α duplicates was associated with an increase in breadth of gene expression and faster mRNA decay rates. The observed difference in mRNA decay rate was fastest in genes with CNSs in both non-transcribed and transcribed regions, albeit through an unknown mechanism. This study supports the notion that some Arabidopsis CNSs regulate the steady-state mRNA levels through post-transcriptional control mechanisms and that CNSs also play a role in controlling the breadth of gene expression. PMID:23675377
The clinical nurse specialist in an Irish hospital.
Wickham, Sheelagh
2011-01-01
This study was set in an acute Irish health care setting and aimed to explore the activity of the clinical nurse specialist (CNS) in this setting. Quantitative methodology, using a valid and reliable questionnaire, provided descriptive statistics that gave accurate data on the total population of CNSs in the health care setting. The study was set in an acute-care 750-bed hospital that had 25 CNSs in practice. The sample consisted of all 25 CNSs who are the total population of CNSs working in the acute health care institution. The findings show the CNS to be active in the roles of researcher, educator, communicator, change agent, leader, and clinical specialist, but the level of activity varies between different roles. There is variety in the activity of CNSs in the various roles and to what extent they enact the role. The findings merit further study on CNS role activity and possible variables that influence role activity.
Turco, Gina; Schnable, James C.; Pedersen, Brent; Freeling, Michael
2013-01-01
Conserved non-coding sequences (CNS) are islands of non-coding sequence that, like protein coding exons, show less divergence in sequence between related species than functionless DNA. Several CNSs have been demonstrated experimentally to function as cis-regulatory regions. However, the specific functions of most CNSs remain unknown. Previous searches for CNS in plants have either anchored on exons and only identified nearby sequences or required years of painstaking manual annotation. Here we present an open source tool that can accurately identify CNSs between any two related species with sequenced genomes, including both those immediately adjacent to exons and distal sequences separated by >12 kb of non-coding sequence. We have used this tool to characterize new motifs, associate CNSs with additional functions, and identify previously undetected genes encoding RNA and protein in the genomes of five grass species. We provide a list of 15,363 orthologous CNSs conserved across all grasses tested. We were also able to identify regulatory sequences present in the common ancestor of grasses that have been lost in one or more extant grass lineages. Lists of orthologous gene pairs and associated CNSs are provided for reference inbred lines of arabidopsis, Japonica rice, foxtail millet, sorghum, brachypodium, and maize. PMID:23874343
Ito, C; Satoh, I; Michiya, H; Kitayama, Y; Miyazaki, K; Ota, S; Satoh, H; Sakurai, T; Shirato, H; Miyasaka, K
1997-01-01
A computerised nursing support system (CNSS) linked to the hospital information system (HIS) was developed and has been in use for one year, in order to reduce the workload of nurses. CNSS consists of (1) a hand held computer for each nurse (2) desk-top computers in the nurses' station and doctors' rooms (3) a data server (4) an interface with the main hospital information system. Nurses enter vital signs, food intake and other information about the patients into the hand held computer at the bed-side. The information is then sent automatically to the CNSS data server, which also receives patients' details (prescribed medicines etc.) from the HIS. Nurses and doctors can see all the information on the desk-top and hand held computers. This system was introduced in May 1995 into a university hospital ward with 40 beds. A questionnaire was completed by 23 nurses before and after the introduction of CNSS. The mean time required to post vital data was significantly reduced from 121 seconds to 54 seconds (p < 0.01). After three months 30% of nurses felt CNSS had reduced their workload, while 30% felt it had complicated their work; after five months 70% noted a reduction and 0% reported that CNSS had made their work more complex. The study therefore concludes that the interface between a computerised nursing support system and the hospital information system reduced the workload of nurses.
Klein, Tracy Ann
2012-01-01
The purpose of this study was to identify and implement a competency-based regulatory model that transitions clinical nurse specialists (CNSs) to autonomous prescriptive authority pursuant to change in state law. Prescriptive authority for CNSs may be optional or restricted under current state law. Implementation of the APRN Consensus Model includes full prescriptive authority for all advanced practice registered nurses. Clinical nurse specialists face barriers to establishing their prescribing authority when laws or practice change. Identification of transition models will assist CNSs who need to add prescriptive authority to their scope of practice. Identification and implementation of a competency-based transition model for expansion of CNS prescriptive authority. By January 1, 2012, 9 CNSs in the state exemplar have completed a practicum and been granted full prescriptive authority including scheduled drug prescribing. No complaints or board actions resulted from the transition to autonomous prescribing. Transition to prescribing may be facilitated through competency-based outcomes including practicum hours as appropriate to the individual CNS nursing specialty. Outcomes from this model can be used to develop and further validate educational and credentialing policies to reduce barriers for CNSs requiring prescriptive authority in other states.
The clinical nurse specialist role in the Army Medical Department.
Frelin, A J; Oda, D S; Staggers, N
1990-01-01
Although clinical nurse specialists (CNSs) have been in the Army Medical Department for more than 10 years, there are no reports in the literature regarding role implementation for them. In this study, a survey of all practicing CNSs in the Army Medical Department (AMEDD) and their supervisors was conducted with the purpose of defining their perceived role and the value placed on it by their supervisors. The results showed that the study population (n = 52) has implemented the role with all components (practice, education, consultation, administration, and research) considered important by them. Further, 85% of the CNSs report positive job satisfaction, and 67% believe they have reached role maturation. Their supervisors were equally or more positive about the importance of the role, and all (n = 26) felt it must be maintained despite budget constraints and nursing shortages. Findings were that CNSs experience role satisfaction, have achieved role maturation, and are valued by their supervisors within the AMEDD.
Orienting and Onboarding Clinical Nurse Specialists: A Process Improvement Project.
Garcia, Mayra G; Watt, Jennifer L; Falder-Saeed, Karie; Lewis, Brennan; Patton, Lindsey
Clinical nurse specialists (CNSs) have a unique advanced practice role. This article describes a process useful in establishing a comprehensive orientation and onboarding program for a newly hired CNS. The project team used the National Association of Clinical Nurse Specialists core competencies as a guide to construct a process for effectively onboarding and orienting newly hired CNSs. Standardized documents were created for the orientation process including a competency checklist, needs assessment template, and professional evaluation goals. In addition, other documents were revised to streamline the orientation process. Standardizing the onboarding and orientation process has demonstrated favorable results. As of 2016, 3 CNSs have successfully been oriented and onboarded using the new process. Unique healthcare roles require special focus when onboarding and orienting into a healthcare system. The use of the National Association of Clinical Nurse Specialists core competencies guided the project in establishing a successful orientation and onboarding process for newly hired CNSs.
NASA Astrophysics Data System (ADS)
Kristianto, H.; Arie, A. A.; Susanti, R. F.; Halim, M.; Lee, J. K.
2016-11-01
In this study the effect of activated carbon support modification to synthesis of CNSs was observed. Modification of activated carbon was done by using nitric acid. The effect of modification was analyzed from its FTIR spectra. The Fe catalysts were deposited on to the support by using urea deposition precipitation method at various initial catalysts concentration. CNSs was synthesized by utilizing cooking palm oil as renewable carbon source, and pyrolized at 700°C for 1 hour under nitrogen atmosphere. The products obtained then analyzed using SEM-EDS, TEM, XRD, and Raman spectroscopy. The modification of activated carbon support had increased the oxygen functional group. This increase resulted on increase of metal catalysts deposited on activated carbon surface. Peak of C (100) was observed, while ID/IG of samples were obtained around 0.9, which is commonly obtained for CNSs. High catalysts loading on modified activated carbon support caused decomposition of CNSs and formation carbon onion.
First Science Verification of the VLA Sky Survey Pilot
NASA Astrophysics Data System (ADS)
Cavanaugh, Amy
2017-01-01
My research involved analyzing test images by Steve Myers for the upcoming VLA Sky Survey. This survey will cover the entire sky visible from the VLA site in S band (2-4 GHz). The VLA will be in B configuration for the survey, as it was when the test images were produced, meaning a resolution of approximately 2.5 arcseconds. Conducted using On-the-Fly mode, the survey will have a speed of approximately 20 deg2 hr-1 (including overhead). New Python imaging scripts are being developed and improved to process the VLASS images. My research consisted of comparing a continuum test image over S band (from the new imaging scripts) to two previous images of the same region of the sky (from the CNSS and FIRST surveys), as well as comparing the continuum image to single spectral windows (from the new imaging scripts and of the same sky region). By comparing our continuum test image to images from CNSS and FIRST, we tested on-the-Fly mode and the imaging script used to produce our images. Another goal was to test whether individual spectral windows could be used in combination to calculate spectral indices close to those produced over S band (based only on our continuum image). Our continuum image contained 64 sources as opposed to the 99 sources found in the CNSS image. The CNSS image also had lower noise level (0.095 mJy/beam compared to 0.119 mJy/beam). Additionally, when our continuum image was compared to the CNSS image, separation showed no dependence on total flux density (in our continuum image). At lower flux densities, sources in our image were brighter than the same ones in the CNSS image. When our continuum image was compared to the FIRST catalog, the spectral index difference showed no dependence on total flux (in our continuum image). In conclusion, the quality of our images did not completely match the quality of the CNSS and FIRST images. More work is needed in developing the new imaging scripts.
Dimensions of clinical nurse specialist work in the UK.
Leary, Alison; Crouch, Heather; Lezard, Anthony; Rawcliffe, Chris; Boden, Louise; Richardson, Alison
To model the work of clinical nurse specialists (CNSs) in the UK. This article examines data mined as part of a national project. The Pandora database was initially collected on a Microsoft Office Access database and subsequently, a Structured Query Language database in several iterations from June 2006 to September 2008. Pandora recorded CNS activity as a series of events with eight dimensions to each event. Data from this were mined to examine the complexity of CNS work. This study represents the work of 463 CNSs over 2,778 days in England, Scotland and Wales. Clinical work, including physical assessment, referral, symptom control and 'rescue' work, accounted for a large part of the CNS's role. Administration was the second highest workload, with about half of these administrative tasks identified as being suitable for secretarial staff to undertake. Research, education and consultation accounted for less time. A significant proportion of the nurses' clinical work is undertaken by telephone. CNSs in this study spent much of their time doing complex clinical work. Payment by Results (Department of Health 2006) should recognise the work undertaken by CNSs, particularly that done on the telephone. Complex clinical work by CNSs takes place in many different contexts using a wide range of interventions. The role of the CNS is complex and diverse, making comparisons of it difficult. More research needs to be done in relation to quality, safety and efficiency.
Activities of Intellectual Disability Clinical Nurse Specialists in Ireland.
Doody, Owen; Slevin, Eamonn; Taggart, Laurence
The aim of this study was to identify the contribution of Irish intellectual disability clinical nurse specialists (ID CNSs) to service delivery. A nonexperimental descriptive design was selected to survey ID CNSs presently working in Ireland. The questionnaire was developed based on focus group interviews, available literature, and expert panel views. Ethical approval and access were granted to all ID CNSs in Ireland. Thirty-two responded (33.68% response rate) from all work areas (voluntary organizations or health service executive) practicing within residential, community, or school services. Respondents were surveyed across a range of areas (demographic details and support to client, staff, family, organization, community, other agencies, and professional development). Findings identify that ID CNSs are active in all aspects of their roles as clinical specialist, educator, communicator, researcher, change agent, and leader, thus supporting person-centered care and improving service delivery. To meet changing healthcare demands, promote person-centered care, and improve service delivery, the CNS role in ID should be developed and supported. The findings merit a further study on ID CNS role activity, possible variables influencing role activity, and team members' views.
Li, Haiqing; Song, Sing I; Song, Ga Young; Kim, Il
2014-02-01
Carbon nanostructures (CNSs) such as carbon nanotubes, graphene sheets, and nanodiamonds provide an important type of substrate for constructing a variety of hybrid nanomaterials. However, their intrinsic chemistry-inert surfaces make it indispensable to pre-functionalize them prior to immobilizing additional components onto their surfaces. Currently developed strategies for functionalizing CNSs include covalent and non-covalent approaches. Conventional covalent treatments often damage the structure integrity of carbon surfaces and adversely affect their physical properties. In contrast, the non-covalent approach offers a non-destructive way to modify CNSs with desired functional surfaces, while reserving their intrinsic properties. Thus far, a number of surface modifiers including aromatic compounds, small-molecular surfactants, amphiphilic polymers, and biomacromolecules have been developed to non-covalently functionalize CNS surfaces. Mediated by these surface modifiers, various functional components such as organic species and inorganic nanoparticles were further decorated onto their surfaces, resulting in versatile carbon-based hybrid nanomaterials with broad applications in chemical engineering and biomedical areas. In this review, the recent advances in the generation of such hybrid nanostructures based on non-covalently functionalized CNSs will be reviewed.
Zhong, Tao; Chung, Pak-Kwong; Liu, Jing Dong
2018-02-01
Independent from noise exposure, noise sensitivity plays a pivotal role in people's noise annoyance perception and concomitant health deteriorations. The present study empirically investigated the psychometric properties of the Chinese version of the Weinstein Noise Sensitivity Scale-Short Form (CNSS-SF), the widely used inventory measuring individual differences in noise perception. In total, 373 Chinese participants (age = 21.41 ± 3.36) completed the online, anonymous questionnaire package. Examination of the CNSS-SF's reliability (internal consistency), factorial validity through validation and cross-validation, nomological validity and measurement invariance across gender groups were undertaken. The Cronbach alpha coefficients and composite reliabilities indicated sufficient reliability of the CNSS-SF. Two confirmatory factor analyses (CFA), in two randomly partitioned groups of participants, substantiated the factorial validity of the scale. The nomological validity of the scale was also corroborated by the significant positive association of its score with the trait anxiety score. Measurement invariance of the CNSS-SF was also found across genders via multi-group CFA. Though not without limitations, findings from the present research provide promising evidence for the utility of the scale in measuring noise sensitivity among the Chinese population. The availability of the CNSS-SF can promote research related to environmental noise and health in China, as well as facilitate cross-cultural comparisons. Copyright © 2018 The Editorial Board of Biomedical and Environmental Sciences. Published by China CDC. All rights reserved.
Comparative Study of Carbon Materials Synthesized "Greenly" for 2-CP Removal.
Ma, Ying; Lu, Nan; Lu, Ying; Guan, Jiu-Nian; Qu, Jiao; Liu, Hai-Yang; Cong, Qiao; Yuan, Xing
2016-07-04
Carbon nanotubes (CNTs), graphene (GA) and carbon nanospheres (CNSs) were prepared respectively using grass (Festucaarundinace) as the sole carbon resource by solvothermal method and characterized as adsorbent and photocatalyst for 2-chlorophenol (2-CP) removal in water. With H2O2/HNO3/H2SO4, the CNTs were firstly produced from grass (Festucaarundinace) at 300 °C by hydrolysis and oxidization, the CNTs were secondly opened to form the GA by oxidization at 400 °C, and the GA was lastly rolled-up to form the CNSs by oxidization at 500 °C. All adsorption equilibration of the CNTs, GA, and CNSs for 2-CP were achieved within 120 min, and 60.35%, 20.12%, and 76.22% of 2-CP (5 mg L(-1), pH = 6.3) were adsorbed, respectively. Furthermore, the high removal rates of 2-CP were about 88.23%, 92.90%, and 79.64% by the CNTs, GA, and CNSs, after 120 min adsorption and 160 min irradiation. On the basis of these results, the CNSs were suitable for removal 2-CP as adsorbent, and the GA was suitable as photocatalyst. The photooxidation of 2-CP was mainly initiated by O2(·-) or ·OH which was generated from the combine with simulated sunlight and the CNTs or GA, respectively. However, the CNTs was not suitable for removal 2-CP owing to the increasing toxicity.
Lu, Weiqun; Jin, Yingying; Xu, Jinling; Greenwood, Michael P; Balment, Richard J
2017-08-01
Parathyroid hormone-related protein (PTHrP) is a hypercalcemic factor in fish, but the source of circulating PTHrP remains unclear. In this study investigation of the caudal neurosecretory system (CNSS), considered one of major sources of PTHrP in fish, provided valuable insights into this regulatory system. We report pthrpa and pthrpb gene cloning, characterization, expression, and responses to low salinity and hypocalcemia challenge in flounder. The pthrpa and pthrpb precursors, isolated from a European flounder CNSS library, consist of 166 and 192 amino acid residues, respectively, with an overall homology of approximately 59.2%. Both precursors contain a signal peptide and a mature peptide with cleavage and amidation sites. The flounder PTHrPA and PTHrPB peptides share only 41% sequence identity with human PTHrPA. Quantitative PCR analysis demonstrated that the bone and bladder, are respectively major sites of pthrpa and pthrpb expression in flounder. Urophysectomy confirmed the CNSS as a likely contributor to circulating PTHrP peptides. There were no significant differences in CNSS pthrpa and pthrpb mRNA expression or plasma PTHrP levels between seawater (SW) and freshwater (FW)-adapted fish, though plasma total calcium concentrations were higher in FW animals. The intraperitonial administration of EGTA rapidly induced hypocalcemia and concomitant elevation in plasma PTHrP accompanied by increases in both pthrpa and pthrpb expression in the CNSS. Together, these findings support an evolutionary conserved role for PTHrP in the endocrine regulation of calcium. Copyright © 2017 Elsevier Inc. All rights reserved.
Peng, Hui; Ma, Guofu; Sun, Kanjun; Mu, Jingjing; Zhang, Zhe; Lei, Ziqiang
2014-12-10
Two-dimensional mesoporous carbon nanosheets (CNSs) have been prepared via simultaneous activation and catalytic carbonization route using macroporous anion-exchange resin (AER) as carbon precursor and ZnCl2 and FeCl3 as activating agent and catalyst, respectively. The iron catalyst in the skeleton of the AER may lead to carburization to form a sheetlike structure during the carbonization process. The obtained CNSs have a large number of mesopores, a maximum specific surface area of 1764.9 m(2) g(-1), and large pore volume of 1.38 cm(3) g(-1). As an electrode material for supercapacitors application, the CNSs electrode possesses a large specific capacitance of 283 F g(-1) at 0.5 A g(-1) and excellent rate capability (64% retention ratio even at 50 A g(-1)) in 6 mol L(-1) KOH. Furthermore, CNSs symmetric supercapacitor exhibits specific energies of 17.2 W h kg(-1) at a power density of 224 W kg(-1) operated in the voltage range of 0-1.8 V in 0.5 mol L(-1) Na2SO4 aqueous electrolyte, and outstanding cyclability (retains about 96% initial capacitance after 5000 cycles).
Kim, Na Rae; Yun, Young Soo; Song, Min Yeong; Hong, Sung Ju; Kang, Minjee; Leal, Cecilia; Park, Yung Woo; Jin, Hyoung-Joon
2016-02-10
Advanced design of nanostructured functional carbon materials for use in sustainable energy storage systems suffers from complex fabrication procedures and the use of special methods and/or expensive precursors, limiting their practical applications. In this study, nanoporous carbon nanosheets (NP-CNSs) containing numerous redox-active heteroatoms (C/O and C/N ratios of 5.5 and 34.3, respectively) were fabricated from citrus peels by simply heating the peels in the presence of potassium ions. The NP-CNSs had a 2D-like morphology with a high aspect ratio of >100, high specific surface area of 1167 m(2) g(-1), and a large amount of nanopores between 1 and 5 nm. The NP-CNSs also had an electrical conductivity of 2.6 × 10(1) s cm(-1), which is approximately 50 times higher than that of reduced graphene oxide. These unique material properties resulted in superior electrochemical performance with a high specific capacity of 140 mAh g(-1) in the cathodic potential range. In addition, symmetric full-cell devices based on the NP-CNSs showed excellent cyclic performance over 100,000 repetitive cycles.
Kilpatrick, Kelley; Kaasalainen, Sharon; Donald, Faith; Reid, Kim; Carter, Nancy; Bryant-Lukosius, Denise; Martin-Misener, Ruth; Harbman, Patricia; Marshall, Deborah Anne; Charbonneau-Smith, Renee; DiCenso, Alba
2014-12-01
Increasing numbers of clinical nurse specialists (CNSs) are working in outpatient settings. The objective of this paper is to describe a systematic review of randomized controlled trials (RCTs) evaluating the cost-effectiveness of CNSs delivering outpatient care in alternative or complementary provider roles. We searched CINAHL, MEDLINE, EMBASE and seven other electronic databases, 1980 to July 2012 and hand-searched bibliographies and key journals. RCTs that evaluated formally trained CNSs and health system outcomes were included. Study quality was assessed using the Cochrane risk of bias tool and the Quality of Health Economic Studies instrument. We used the Grading of Recommendations Assessment, Development and Evaluation to assess quality of evidence for individual outcomes. Eleven RCTs, four evaluating alternative provider (n = 683 participants) and seven evaluating complementary provider roles (n = 1464 participants), were identified. Results of the alternative provider RCTs (low-to-moderate quality evidence) were fairly consistent across study populations with similar patient outcomes to usual care, some evidence of reduced resource use and costs, and two economic analyses (one fair and one high quality) favouring CNS care. Results of the complementary provider RCTs (low-to-moderate quality evidence) were also fairly consistent across study populations with similar or improved patient outcomes and mostly similar health system outcomes when compared with usual care; however, the economic analyses were weak. Low-to-moderate quality evidence supports the effectiveness and two fair-to-high quality economic analyses support the cost-effectiveness of outpatient alternative provider CNSs. Low-to-moderate quality evidence supports the effectiveness of outpatient complementary provider CNSs; however, robust economic evaluations are needed to address cost-effectiveness. © 2014 John Wiley & Sons, Ltd.
Theoretical and clinical perspectives of client stalking behavior.
Laskowski, Cheryl
2003-11-01
This article applies theoretical perspectives of client stalking behavior to vignettes of clinical nurse specialists (CNSs) who have experienced stalking incidents. A description of stalking behavior, estimations of the frequency of stalking behavior, characteristics of stalkers, and the impact of stalking on victims are addressed. Health care professionals, including CNSs, may inadvertently become victims of stalking behavior. Firm and clear boundary setting is important in all CNS-client relationships. CNSs who believe that they are becoming the objects of attention for particular individuals are advised to convey a clear message that they have no interest in the development of such a relationship. In this article CNS responses to actual client stalking behavior, including confrontation by the CNS, police involvement, restraining orders, and use of the CNS's attorney, are explored. The use of clinical consultation and the need for agencies to develop safety plans for all employees are also addressed.
Review on the Antimicrobial Properties of Carbon Nanostructures
Al-Jumaili, Ahmed; Alancherry, Surjith; Bazaka, Kateryna
2017-01-01
Swift developments in nanotechnology have prominently encouraged innovative discoveries across many fields. Carbon-based nanomaterials have emerged as promising platforms for a broad range of applications due to their unique mechanical, electronic, and biological properties. Carbon nanostructures (CNSs) such as fullerene, carbon nanotubes (CNTs), graphene and diamond-like carbon (DLC) have been demonstrated to have potent broad-spectrum antibacterial activities toward pathogens. In order to ensure the safe and effective integration of these structures as antibacterial agents into biomaterials, the specific mechanisms that govern the antibacterial activity of CNSs need to be understood, yet it is challenging to decouple individual and synergistic contributions of physical, chemical and electrical effects of CNSs on cells. In this article, recent progress in this area is reviewed, with a focus on the interaction between different families of carbon nanostructures and microorganisms to evaluate their bactericidal performance. PMID:28892011
Controlled fabrication of high-quality carbon nanoscrolls from monolayer graphene.
Xie, Xu; Ju, Long; Feng, Xiaofeng; Sun, Yinghui; Zhou, Ruifeng; Liu, Kai; Fan, Shoushan; Li, Qunqing; Jiang, Kaili
2009-07-01
We report a simple and effective way of fabricating high-quality carbon nanoscrolls (CNSs), using isopropyl alcohol solution to roll up monolayer graphene predefined on SiO(2)/Si substrates. Transmission electron microscopy studies reveal that the CNS has a tube-like structure with a hollow core surrounded by graphene walls 0.35 nm apart. Raman spectroscopy studies show that the CNS is free of significant defects, and the electronic structure and phonon dispersion are slightly different from those of two-dimensional graphene. Finally, the CNS-based device is fabricated, directly on the SiO(2)/Si substrate. Electrical-transport measurements show that its resistance is weakly gate-dependent but strongly temperature-dependent. In addition, the CNS can sustain a high current density up to 5 x 10(7) A/cm(2), indicating that it is a good candidate for microcircuit interconnects. The controlled fabrication of high-quality CNSs may open up new opportunities for both fundamental and applied research of CNSs.
Photocatalytic hollow TiO2 and ZnO nanospheres prepared by atomic layer deposition.
Justh, Nóra; Bakos, László Péter; Hernádi, Klára; Kiss, Gabriella; Réti, Balázs; Erdélyi, Zoltán; Parditka, Bence; Szilágyi, Imre Miklós
2017-06-28
Carbon nanospheres (CNSs) were prepared by hydrothermal synthesis, and coated with TiO 2 and ZnO nanofilms by atomic layer deposition. Subsequently, through burning out the carbon core templates hollow metal oxide nanospheres were obtained. The substrates, the carbon-metal oxide composites and the hollow nanospheres were characterized with TG/DTA-MS, FTIR, Raman, XRD, SEM-EDX, TEM-SAED and their photocatalytic activity was also investigated. The results indicate that CNSs are not beneficial for photocatalysis, but the crystalline hollow metal oxide nanospheres have considerable photocatalytic activity.
Skills and attributes required by clinical nurse specialists to promote evidence-based practice.
Campbell, T Diane; Profetto-McGrath, Joanne
2013-01-01
The purposes of this article were to describe the challenges that clinical nurse specialists (CNS) face in their role and to examine how CNSs describe the skills and attributes that are needed to promote the use of evidence-based practice (EBP) in their workplaces. This article is based on findings from a dissertation regarding how CNSs promote EBP in a western Canadian province. A sequential explanatory participant selection mixed-methods design was used for this study. The study took place in a western Canadian province that has a population of 1 million people, with 42.7% of the population residing in the 2 largest cities. The sample was drawn from a provincial registered nurse database. The sample for the survey was 23, and for the interviews, there were 11 participants. The telephone survey contained 113 questions grouped into several subcategories. SPSS 18 was used to analyze the survey data. The semistructured interviews were conducted face to face, transcribed, and reviewed for recurrent themes. Interpretive description was used to analyze the themes. The major challenges faced by CNSs are role strain, lack of support and resources, and role ambiguity. The skills and attributes required to be a CNS are graduate preparation, clinical expertise, and people/communication skills. Clinical nurse specialists can improve patient outcomes by promoting EBP; to do so, they need to work in supportive contexts that give those in the CNS role a set of clear role expectations. There are challenges faced by CNSs in Canada, and there is a need to strengthen the CNS's role by standardizing the regulatory requirements at a national level.
Hou, Hongshuai; Shao, Lidong; Zhang, Yan; Zou, Guoqiang; Chen, Jun; Ji, Xiaobo
2017-01-01
Large-area phosphorus-doped carbon nanosheets (P-CNSs) are first obtained from carbon dots (CDs) through self-assembly driving from thermal treatment with Na catalysis. This is the first time to realize the conversion from 0D CDs to 2D nanosheets doped with phosphorus. The sodium storage behavior of phosphorus-doped carbon material is also investigated for the first time. As anode material for sodium-ion batteries (SIBs), P-CNSs exhibit superb performances for electrochemical storage of sodium. When cycled at 0.1 A g -1 , the P-CNSs electrode delivers a high reversible capacity of 328 mAh g -1 , even at a high current density of 20 A g -1 , a considerable capacity of 108 mAh g -1 can still be maintained. Besides, this material also shows excellent cycling stability, at a current density of 5 A g -1 , the reversible capacity can still reach 149 mAh g -1 after 5000 cycles. This work will provide significant value for the development of both carbon materials and SIBs anode materials.
Gori Savellini, Gianni; Gandolfo, Claudia; Cusi, Maria Grazia
2015-12-01
Toscana Virus (TOSV) is a Phlebovirus responsible for central nervous system (CNS) injury in humans. The TOSV non-structural protein (NSs), which interacting with RIG-I leads to its degradation, was analysed in the C terminus fragment in order to identify its functional domains. To this aim, two C-terminal truncated NSs proteins, Δ1C-NSs (aa 1-284) and Δ2C-NSs (aa 1-287) were tested. Only Δ1C-NSs did not present any inhibitory effect on RIG-I and it showed a greater stability than the whole NSs protein. Moreover, the deletion of the TLQ aa sequence interposed between the two ΔC constructs caused a greater accumulation of the protein with a weak inhibitory effect on RIG-I, indicating some involvement of these amino acids in the NSs activity. Nevertheless, all the truncated proteins were still able to interact with RIG-I, suggesting that the domains responsible for RIG-I signaling and RIG-I interaction are mapped on different regions of the protein. Copyright © 2015 Elsevier Inc. All rights reserved.
Showcasing a profession: getting nursing on the newsstand.
Hobdell, E F; Slusser, M; Patterson, J; Burgess, E
1991-01-01
Interacting with the media is a method of showcasing the nursing profession. Clinical nurse specialists (CNSs) have a variety of opportunities available for these interactions: appearing on television, participating in a radio program or writing to the media. A survey completed by the authors indicated that CNSs had many media interactions, yet overall, only 17% of all nurses surveyed used writing. This paper begins by discussing where to publish and how to prepare and target the audience. General and specific guidelines for publishing feature articles, health tips, letters to the editor, and other publishing possibilities are presented.
Martin, Natalia; Patel, Satyakam; Segre, Julia A.
2004-01-01
Mammalian epidermis provides a permeability barrier between an organism and its environment. Under homeostatic conditions, epidermal cells produce structural proteins, which are cross-linked in an orderly fashion to form a cornified envelope (CE). However, under genetic or environmental stress, specific genes are induced to rapidly build a temporary barrier. Small proline-rich (SPRR) proteins are the primary constituents of the CE. Under stress the entire family of 14 Sprr genes is upregulated. The Sprr genes are clustered within the larger epidermal differentiation complex on mouse chromosome 3, human chromosome 1q21. The clustering of the Sprr genes and their upregulation under stress suggest that these genes may be coordinately regulated. To identify enhancer elements that regulate this stress response activation of the Sprr locus, we utilized bioinformatic tools and classical biochemical dissection. Long-range comparative sequence analysis identified conserved noncoding sequences (CNSs). Clusters of epidermal-specific DNaseI-hypersensitive sites (HSs) mapped to specific CNSs. Increased prevalence of these HSs in barrier-deficient epidermis provides in vivo evidence of the regulation of the Sprr locus by these conserved sequences. Individual components of these HSs were cloned, and one was shown to have strong enhancer activity specific to conditions when the Sprr genes are coordinately upregulated. PMID:15574822
Subramaniam, Sabarinath; Wang, Xiaowu; Freeling, Michael; Pires, J. Chris
2013-01-01
Following polyploidy, duplicate genes are often deleted, and if they are not, then duplicate regulatory regions are sometimes lost. By what mechanism is this loss and what is the chance that such a loss removes function? To explore these questions, we followed individual Arabidopsis thaliana–A. thaliana conserved noncoding sequences (CNSs) into the Brassica ancestor, through a paleohexaploidy and into Brassica rapa. Thus, a single Brassicaceae CNS has six potential orthologous positions in B. rapa; a single Arabidopsis CNS has three potential homeologous positions. We reasoned that a CNS, if present on a singlet Brassica gene, would be unlikely to lose function compared with a more redundant CNS, and this is the case. Redundant CNSs go nondetectable often. Using this logic, each mechanism of CNS loss was assigned a metric of functionality. By definition, proved deletions do not function as sequence. Our results indicated that CNSs that go nondetectable by base substitution or large insertion are almost certainly still functional (redundancy does not matter much to their detectability frequency), whereas those lost by inferred deletion or indels are approximately 75% likely to be nonfunctional. Overall, an average nondetectable, once-redundant CNS more than 30 bp in length has a 72% chance of being nonfunctional, and that makes sense because 97% of them sort to a molecular mechanism with “deletion” in its description, but base substitutions do cause loss. Similarly, proved-functional G-boxes go undetectable by deletion 82% of the time. Fractionation mutagenesis is a procedure that uses polyploidy as a mutagenic agent to genetically alter RNA expression profiles, and then to construct testable hypotheses as to the function of the lost regulatory site. We show fractionation mutagenesis to be a “deletion machine” in the Brassica lineage. PMID:23493633
Technology transfer: Half-way houses. No. 17
DOE Office of Scientific and Technical Information (OSTI.GOV)
Seidel, R.W.
1995-05-01
In the fall of 1993, 1 was asked by the Center for National Security Studies (CNSS) of the Los Alamos National Laboratory (LANL) to study the ways in which technology transfer and defense conversion had been accomplished at General Atomics (GA) and Science Applications International Corporation (SAIC) by interviewing Harold Agnew, who had served as director of Los Alamos before becoming president of General Atomics in 1979, and J. Robert Beyster, who had been a staff member at Los Alamos and at General Atomics before founding SAIC in 1969. Harold Agnew readily complied with my request for an interview andmore » also suggested that I talk to Douglas Fouquet, who is in charge of public relations at General Atomics and is their unofficial historian. Robert Beyster was not available for an interview, but, through the courtesy of John C. Hopkins, a former director of CNSS, I was able to interview SAIC`s executive vice president, Donald M. Kerr, who is also a former director at Los Alamos, and Steven Rockwood, a sector vice president at SAIC who was formerly a staff member at the Laboratory Because Agnew, Kerr, and Rockwood are all familiar with LANL, as well as with their respective companies, the interviews becam exercises In comparative analyses of technology transfer. In what follows, I have tried to summarize both the interviews and some of the research which attended them. It is the historian`s hope that by use of comparative institutional analyses, Laboratory administrators may learn something of value in directing their efforts toward the transfer of technology to private industry and other government agencies.« less
Mayo, Ann M
2015-01-01
It is important for CNSs and other APNs to consider the reliability and validity of instruments chosen for clinical practice, evidence-based practice projects, or research studies. Psychometric testing uses specific research methods to evaluate the amount of error associated with any particular instrument. Reliability estimates explain more about how well the instrument is designed, whereas validity estimates explain more about scores that are produced by the instrument. An instrument may be architecturally sound overall (reliable), but the same instrument may not be valid. For example, if a specific group does not understand certain well-constructed items, then the instrument does not produce valid scores when used with that group. Many instrument developers may conduct reliability testing only once, yet continue validity testing in different populations over many years. All CNSs should be advocating for the use of reliable instruments that produce valid results. Clinical nurse specialists may find themselves in situations where reliability and validity estimates for some instruments that are being utilized are unknown. In such cases, CNSs should engage key stakeholders to sponsor nursing researchers to pursue this most important work.
Burgess, Diane; Freeling, Michael
2014-01-01
In vertebrates, conserved noncoding elements (CNEs) are functionally constrained sequences that can show striking conservation over >400 million years of evolutionary distance and frequently are located megabases away from target developmental genes. Conserved noncoding sequences (CNSs) in plants are much shorter, and it has been difficult to detect conservation among distantly related genomes. In this article, we show not only that CNS sequences can be detected throughout the eudicot clade of flowering plants, but also that a subset of 37 CNSs can be found in all flowering plants (diverging ∼170 million years ago). These CNSs are functionally similar to vertebrate CNEs, being highly associated with transcription factor and development genes and enriched in transcription factor binding sites. Some of the most highly conserved sequences occur in genes encoding RNA binding proteins, particularly the RNA splicing–associated SR genes. Differences in sequence conservation between plants and animals are likely to reflect differences in the biology of the organisms, with plants being much more able to tolerate genomic deletions and whole-genome duplication events due, in part, to their far greater fecundity compared with vertebrates. PMID:24681619
Enhancing communication by using the Coordinated Care Classification System.
O'Neal, P V; Kozeny, D K; Garland, P P; Gaunt, S M; Gordon, S C
1998-07-01
Because of the changes in our healthcare system, some clinical nurse specialists (CNSs) are having to expand their traditional roles of clinician, educator, consultant, leader, and researcher to include case management activities. The CNSs at Promina Gwinnett Health System in Lawrenceville, Georgia, have combined CNS and case manager activities and have adopted the title "CNS/Outcomes Coordinator." The CNS/Outcomes Coordinator is responsible for coordinating patient care, promoting team collaboration, and facilitating communication. To inform the healthcare team of the CNS/Outcomes Coordinator's patient responsibilities, the CNS/Outcomes Coordinators developed a Coordinated Care Classification System. This article describes how coordinating patient care, promoting team collaboration, and facilitating communication can be enhanced by the use of a classification system.
Zhao, Zhe; Liu, Siliang; Zhu, Jixin; Xu, Jingsan; Li, Le; Huang, Zhaoqi; Zhang, Chao; Liu, Tianxi
2018-05-31
Interconnected close-packed nitrogen-doped porous carbon polyhedrons (NCPs) confined in two-dimensional carbon nanosheets (CNSs) have been prepared through a sustainable one-pot pyrolysis of a simple solid mixture of zeolitic imidazolate framework-8 (ZIF-8) crystals and with organic potassium as the precursors. The hierarchically organized framework of the NCP-CNS composites enables NCPs and CNSs to act as well-defined electrolyte reservoirs and mechanical buffers accommodating large volume expansions of NCPs, respectively. Among the unique composite nanostructures, the NCPs with vast micropores provide electric double-layer capacitances, while the CNSs bridge the individual NCPs to form a conductive pathway with a hierarchical porosity. As a result, the NCP-CNS composites with high electrical integrity and structural stability are used as electrode materials for high-performance supercapacitors, which exhibit excellent electrochemical capacitive characteristics in terms of an outstanding capacitance of 300 F g -1 at 1 A g -1 , large energy density of 20.9 W h kg -1 , and great cycling performance of 100% retention after 6000 cycles. This work therefore presents a one-pot and efficient strategy to prepare an ordered arrangement of ZIF-8-derived porous carbons toward new electrode materials in promising energy storage systems.
A trust-wide review of clinical nurse specialists' productivity.
Balsdon, Helen; Wilkinson, Susan
2014-04-01
The contribution made by clinical nurse specialists (CNSs) to patient care needs to be understood fully to provide assurance of effective use of resources. However, CNS roles are often poorly understood and not easily articulated. Due to the diversity of these roles, robust reviews of performance and economic benefits can be regarded as time consuming and resource intense, and many organisations enlist external agencies to clarify the contribution to care made by their CNSs. This article gives an overview of a Cambridge University Hospitals NHS Foundation Trust internal review of CNS roles without the support of an external agency. The review provided assurance that this group of nurses is being used effectively and identified opportunities to use the role in different ways to increase effectiveness.
Schnable, James C; Pedersen, Brent S; Subramaniam, Sabarinath; Freeling, Michael
2011-01-01
Whole genome duplications, or tetraploidies, are an important source of increased gene content. Following whole genome duplication, duplicate copies of many genes are lost from the genome. This loss of genes is biased both in the classes of genes deleted and the subgenome from which they are lost. Many or all classes are genes preferentially retained as duplicate copies are engaged in dose sensitive protein-protein interactions, such that deletion of any one duplicate upsets the status quo of subunit concentrations, and presumably lowers fitness as a result. Transcription factors are also preferentially retained following every whole genome duplications studied. This has been explained as a consequence of protein-protein interactions, just as for other highly retained classes of genes. We show that the quantity of conserved noncoding sequences (CNSs) associated with genes predicts the likelihood of their retention as duplicate pairs following whole genome duplication. As many CNSs likely represent binding sites for transcriptional regulators, we propose that the likelihood of gene retention following tetraploidy may also be influenced by dose-sensitive protein-DNA interactions between the regulatory regions of CNS-rich genes - nicknamed bigfoot genes - and the proteins that bind to them. Using grass genomes, we show that differential loss of CNSs from one member of a pair following the pre-grass tetraploidy reduces its chance of retention in the subsequent maize lineage tetraploidy.
Schnable, James C.; Pedersen, Brent S.; Subramaniam, Sabarinath; Freeling, Michael
2011-01-01
Whole genome duplications, or tetraploidies, are an important source of increased gene content. Following whole genome duplication, duplicate copies of many genes are lost from the genome. This loss of genes is biased both in the classes of genes deleted and the subgenome from which they are lost. Many or all classes are genes preferentially retained as duplicate copies are engaged in dose sensitive protein–protein interactions, such that deletion of any one duplicate upsets the status quo of subunit concentrations, and presumably lowers fitness as a result. Transcription factors are also preferentially retained following every whole genome duplications studied. This has been explained as a consequence of protein–protein interactions, just as for other highly retained classes of genes. We show that the quantity of conserved noncoding sequences (CNSs) associated with genes predicts the likelihood of their retention as duplicate pairs following whole genome duplication. As many CNSs likely represent binding sites for transcriptional regulators, we propose that the likelihood of gene retention following tetraploidy may also be influenced by dose–sensitive protein–DNA interactions between the regulatory regions of CNS-rich genes – nicknamed bigfoot genes – and the proteins that bind to them. Using grass genomes, we show that differential loss of CNSs from one member of a pair following the pre-grass tetraploidy reduces its chance of retention in the subsequent maize lineage tetraploidy. PMID:22645525
Radiation Shielding Systems Using Nanotechnology
NASA Technical Reports Server (NTRS)
Chen, Bin (Inventor); McKay, Christoper P. (Inventor)
2011-01-01
A system for shielding personnel and/or equipment from radiation particles. In one embodiment, a first substrate is connected to a first array or perpendicularly oriented metal-like fingers, and a second, electrically conducting substrate has an array of carbon nanostructure (CNS) fingers, coated with an electro-active polymer extending toward, but spaced apart from, the first substrate fingers. An electric current and electric charge discharge and dissipation system, connected to the second substrate, receives a current and/or voltage pulse initially generated when the first substrate receives incident radiation. In another embodiment, an array of CNSs is immersed in a first layer of hydrogen-rich polymers and in a second layer of metal-like material. In another embodiment, a one- or two-dimensional assembly of fibers containing CNSs embedded in a metal-like matrix serves as a radiation-protective fabric or body covering.
Transition of carbon nanostructures in heptane diffusion flames
NASA Astrophysics Data System (ADS)
Hu, Wei-Chieh; Hou, Shuhn-Shyurng; Lin, Ta-Hui
2017-02-01
The flame synthesis has high potential in industrial production of carbon nanostructure (CNS). Unfortunately, the complexity of combustion chemistry leads to less controlling of synthesized products. In order to improve the understanding of the relation between flames and CNSs synthesized within, experiments were conducted through heptane flames in a stagnation-point liquid-pool system. The operating parameters for the synthesis include oxygen supply, sampling position, and sampling time. Two kinds of nanostructures were observed, carbon nanotube (CNT) and carbon nano-onion (CNO). CNTs were synthesized in a weaker flame near extinction. CNOs were synthesized in a more sooty flame. The average diameter of CNTs formed at oxygen concentration of 15% was in the range of 20-30 nm. For oxygen concentration of 17%, the average diameter of CNTs ranged from 24 to 27 nm, while that of CNOs was around 28 nm. For oxygen concentration of 19%, the average diameter of CNOs produced at the sampling position 0.5 mm below the flame front was about 57 nm, while the average diameters of CNOs formed at the sampling positions 1-2.5 mm below the flame front were in the range of 20-25 nm. A transition from CNT to CNO was observed by variation of sampling position in a flame. We found that the morphology of CNS is directly affected by the presence of soot layer due to the carbonaceous environment and the growth mechanisms of CNT and CNO. The sampling time can alter the yield of CNSs depending on the temperature of sampling position, but the morphology of products is not affected.
Contemporary challenges for specialist nursing in interstitial lung disease
Russell, Anne Marie; Olive, Sandra; Lines, Sarah; Murphy, Anna; Hocking, Julie; Newell, Karen; Morris, Helen; Harris, Emma; Dixon, Catherine; Agnew, Sarah; Burge, Geraldine
2018-01-01
The role of clinical nurse specialists (CNSs) in interstitial lung disease (ILD) is evolving in response to clinical guidelines and the growth of clinical research. The role is well established in the UK, although more ILD posts are needed to ensure supply meets clinical demand. This phenomenon is also happening across Europe. An appreciation of the similarities and differences between CNS and advanced nurse practitioners is important given the challenges in defining, developing and supporting this nursing specialisation. Globally, different models exist. In some countries charitable organisations take a leading role in supporting patients. Many European centres look to the National Institute for Health and Care Excellence guidelines and quality standards as a template to develop and evaluate the role of the ILD CNS. We present a UK perspective in the context of a government subsidised healthcare system to promote professional discussion and debate regarding the future of nursing practice in the ILD specialty. Key points ILDs are often complex and associated with significant mortality, morbidity and co-morbid conditions that require a technical healthcare skill set There is worldwide shortage of nurses, low retention rates and retirement of many skilled nurses Collaboration across the ILD interdisciplinary community is needed to safeguard the future of our professions and high-quality patient care The ILD interdisciplinary and nurse network has identified key priorities to help secure the future of the ILD clinical and academic nurse specialism Educational aims To explain the similarities and differences between clinical nurse specialists (CNSs) and advanced nurse practitioners (ANPs) in the context of ILD specialism To review contemporary nursing specialism in the UK’s government subsidised healthcare system To stimulate discussion and debate across the European/international respiratory community regarding the clinical and academic development of the ILD CNS To identify key priorities that will support collaboration across the ILD interdisciplinary workforce in clinical practice and research PMID:29515666
Contemporary challenges for specialist nursing in interstitial lung disease.
Russell, Anne Marie; Olive, Sandra; Lines, Sarah; Murphy, Anna; Hocking, Julie; Newell, Karen; Morris, Helen; Harris, Emma; Dixon, Catherine; Agnew, Sarah; Burge, Geraldine
2018-03-01
The role of clinical nurse specialists (CNSs) in interstitial lung disease (ILD) is evolving in response to clinical guidelines and the growth of clinical research. The role is well established in the UK, although more ILD posts are needed to ensure supply meets clinical demand. This phenomenon is also happening across Europe. An appreciation of the similarities and differences between CNS and advanced nurse practitioners is important given the challenges in defining, developing and supporting this nursing specialisation. Globally, different models exist. In some countries charitable organisations take a leading role in supporting patients. Many European centres look to the National Institute for Health and Care Excellence guidelines and quality standards as a template to develop and evaluate the role of the ILD CNS. We present a UK perspective in the context of a government subsidised healthcare system to promote professional discussion and debate regarding the future of nursing practice in the ILD specialty. ILDs are often complex and associated with significant mortality, morbidity and co-morbid conditions that require a technical healthcare skill setThere is worldwide shortage of nurses, low retention rates and retirement of many skilled nursesCollaboration across the ILD interdisciplinary community is needed to safeguard the future of our professions and high-quality patient careThe ILD interdisciplinary and nurse network has identified key priorities to help secure the future of the ILD clinical and academic nurse specialism. To explain the similarities and differences between clinical nurse specialists (CNSs) and advanced nurse practitioners (ANPs) in the context of ILD specialismTo review contemporary nursing specialism in the UK's government subsidised healthcare systemTo stimulate discussion and debate across the European/international respiratory community regarding the clinical and academic development of the ILD CNSTo identify key priorities that will support collaboration across the ILD interdisciplinary workforce in clinical practice and research.
NASA Astrophysics Data System (ADS)
Qian, Min; Niu, Yue Ping; Gong, Shang Qing
2018-01-01
Pulsed Nd:YAG (532 nm) and Excimer (248 nm) lasers were employed to produce freestanding, two-dimensional (2D), carbon nanosheets (CNSs) from naphthalene, through laser-induced exfoliation. The polymer-to-carbon transition was investigated in terms of laser wavelengths, fluences, as well as target preparations. Continuous and porous CNSs of several nanometers in thickness and micrometers in size were obtained from 532 and 248 nm pulsed laser exfoliation of spin-coated naphthalene films, respectively. The porous morphology is ascribed to the photon-induced dissociation of chemical bonds dominated in 248 nm laser interaction with ablated naphthalene. With the increase of laser fluences from 1 to 5 J cm-2, amorphous carbon and ultrathin CNS structures were obtained in sequence. This work revealed a general mechanism of producing 2D structured carbon materials from pulsed laser exfoliation.
Mishelmovich, Nina; Arber, Anne; Odelius, Anki
2016-04-01
The aim of the research was to explore specialist cancer and palliative care nurses experience of delivering significant news to patients with advanced cancer. A qualitative phenomenological research study was conducted to capture nurses' experiences with the aim of understanding how cancer and palliative care clinical nurse specialists work towards disclosure of advanced and terminal cancer. Data were collected through semi-structured interviews with 10 clinical nurse specialists working in one acute NHS trust. Clinical nurse specialists were recruited from the following specialities: lung cancer, breast cancer, gynaecological cancer, upper and lower gastrointestinal cancer and palliative care. Four themes emerged from the data: importance of relationships; perspective taking; ways to break significant news; feeling prepared and putting yourself forward. The findings revealed that highly experienced clinical nurse specialists (CNSs) felt confident in their skills in delivering significant news and they report using patient centred communication to build a trusting relationship so significant news was easier to share with patients. CNSs were aware of guidelines and protocols for breaking significant and bad news but reported that they used guidelines flexibly and it was their years of clinical experience that enabled them to be effective in disclosing significant news. Some areas of disclosure were found to be challenging in particular news of a terminal prognosis to patients who were of a younger age. CNSs have become more directly involved in breaking significant news to those with advanced cancer by putting themselves forward and feeling confident in their skills. Copyright © 2015 Elsevier Ltd. All rights reserved.
Krapivin, Vladimir F; Varotsos, Costas A; Soldatov, Vladimir Yu
2017-08-07
This paper presents the results obtained from the study of the sustainable state between nature and human society on a global scale, focusing on the most critical interactions between the natural and anthropogenic processes. Apart from the conventional global models, the basic tool employed herein is the newly proposed complex model entitled "nature-society system (NSS) model", through which a reliable modeling of the processes taking place in the global climate-nature-society system (CNSS) is achieved. This universal tool is mainly based on the information technology that allows the adaptive conformance of the parametric and functional space of this model. The structure of this model includes the global biogeochemical cycles, the hydrological cycle, the demographic processes and a simple climate model. In this model, the survivability indicator is used as a criterion for the survival of humanity, which defines a trend in the dynamics of the total biomass of the biosphere, taking into account the trends of the biocomplexity dynamics of the land and hydrosphere ecosystems. It should be stressed that there are no other complex global models comparable to those of the CNSS model developed here. The potential of this global model is demonstrated through specific examples in which the classification of the terrestrial ecosystem is accomplished by separating 30 soil-plant formations for geographic pixels 4° × 5°. In addition, humanity is considered to be represented by three groups of economic development status (high, transition, developing) and the World Ocean is parameterized by three latitude zones (low, middle, high). The modelling results obtained show the dynamics of the CNSS at the beginning of the 23rd century, according to which the world population can reach the level of 14 billion without the occurrence of major negative impacts.
Myers, Neely Anne Laurenzo; Alolayan, Yazeed; Smith, Kelly; Pope, Susan Alicia; Broussard, Beth; Haynes, Nora; Compton, Michael T
2015-06-01
Opening Doors to Recovery (ODR) in southeast Georgia included a family community navigation specialist (F-CNS) in addition to a peer specialist and a mental health professional. This qualitative study assessed the usefulness of the F-CNS role. Semistructured interviews were conducted with 30 respondents (ten ODR participants with serious mental illnesses; ten family members; and ten ODR leaders and team members, including two F-CNSs). Interviews were recorded and transcribed for qualitative analysis. Many respondents found the F-CNS to be helpful, providing psychosocial support, serving as a communication liaison, and being a team member dedicated to the family. Aspects that might require improvement include insufficient description of the F-CNS role to participants and the limited experience and training of the F-CNSs. The F-CNS represents an unexplored role for family members of persons with serious mental illnesses that may complement the roles of other service providers and strengthen recovery-oriented teams.
The practice of certified community health CNSs.
Logan, Leanne
2005-01-01
This study explored the practice of clinical nurse specialists (CNSs) certified in Community Health nursing in the United States and described demographic and employment characteristics and perspectives about professional practice. The survey method was used. Of the 209 Community Health CNSs certified by American Nurses Credentialing Center (ANCC) invited to complete the investigator-designed mail questionnaire, 111 (53%) returned a completed questionnaire. The questionnaire contained 27 items about employment, income, years in practice, certification, career satisfaction, and educational preparation, and asked participants to indicate the fit between the Community Health CNS role and the traditional CNS subroles model described by the American Nurses Association (ANA) (The Role of the Clinical Nurse Specialist, 1986) and the updated National Association of Clinical Nurse Specialists (NACNS) CNS practice model (Statement on Clinical Nurse Specialist Practice and Education, 1998). Content validity was established by Community Health CNS reviewer feedback. Quantifiable data were tallied and analyzed using standard spreadsheet computer software. Qualitative data were summarized for content themes. The majority of participants were white, middle-aged females who reported being satisfied with their careers as Community Health CNSs. Most indicated that they were respected by colleagues, that they had been adequately prepared by their education, and that their current work made good use of their education and expertise. When asked to identify, by percentage of effort, the fit between their job responsibilities and the traditional subroles model of practice, the mean of reported fit was as follows: educator, 35%; administrator/leader, 22%; clinician, 21%; consultant, 14%; and researcher, 8%. The fit between job responsibilities and the spheres of influence in the NACNS model of practice was reported to average 39% for patient/client, 35% for organization/network, and 25% for nurses/ nursing practice. Community Health CNS is a viable specialty practice with long-term career options. The subrole functions-described by ANA-of clinician, educator, administrator/leader, consultant, and to a lesser extent researcher apply to the role. The more intergraded updated model offered by NACNS also fits Community Health CNS practice with more emphasis on patient/client and organization/ network spheres than on nurses/nursing practice sphere. Schools of nursing should continue to offer the Community Health CNS programs and incorporate both the traditional functions and newer practice model into their curricula, with a greater emphasis on diversity of students to help ensure a more diverse CNS population. Further research is needed to explore the outcomes of Community Health CNS practice and the factors that contribute to role satisfaction.
Gong, Sheng-Xiang; Wang, Xia; Li, Lei; Wang, Ming-Lin; Zhao, Ru-Song
2015-11-01
In this paper, a novel and simple method for the sensitive determination of endocrine disrupter compounds octylphenol (OP) and nonylphenol (NP) in environmental water samples has been developed using solid-phase microextraction (SPME) coupled with gas chromatography-mass spectrometry. Carboxylated carbon nano-spheres (CNSs-COOH) are used as a novel SPME coating via physical adhesion. The CNSs-COOH fiber possessed higher adsorption efficiency than 100 μm polydimethysiloxane (PDMS) fiber and was similar to 85 μm polyacrylate (PA) fiber for the two analytes. Important parameters, such as extraction time, pH, agitation speed, ionic strength, and desorption temperature and time, were investigated and optimized in detail. Under the optimal parameters, the developed method achieved low limits of detection of 0.13~0.14 ng·L(-1) and a wide linear range of 1~1000 ng·(-1) for OP and NP. The novel method was validated with several real environmental water samples, and satisfactory results were obtained.
Krapivin, Vladimir F.; Varotsos, Costas A.; Soldatov, Vladimir Yu.
2017-01-01
This paper presents the results obtained from the study of the sustainable state between nature and human society on a global scale, focusing on the most critical interactions between the natural and anthropogenic processes. Apart from the conventional global models, the basic tool employed herein is the newly proposed complex model entitled “nature-society system (NSS) model”, through which a reliable modeling of the processes taking place in the global climate-nature-society system (CNSS) is achieved. This universal tool is mainly based on the information technology that allows the adaptive conformance of the parametric and functional space of this model. The structure of this model includes the global biogeochemical cycles, the hydrological cycle, the demographic processes and a simple climate model. In this model, the survivability indicator is used as a criterion for the survival of humanity, which defines a trend in the dynamics of the total biomass of the biosphere, taking into account the trends of the biocomplexity dynamics of the land and hydrosphere ecosystems. It should be stressed that there are no other complex global models comparable to those of the CNSS model developed here. The potential of this global model is demonstrated through specific examples in which the classification of the terrestrial ecosystem is accomplished by separating 30 soil-plant formations for geographic pixels 4° × 5°. In addition, humanity is considered to be represented by three groups of economic development status (high, transition, developing) and the World Ocean is parameterized by three latitude zones (low, middle, high). The modelling results obtained show the dynamics of the CNSS at the beginning of the 23rd century, according to which the world population can reach the level of 14 billion without the occurrence of major negative impacts. PMID:28783136
Berke, Lidija; Snel, Berend
2014-01-01
The histone modification H3K27me3 is involved in repression of transcription and plays a crucial role in developmental transitions in both animals and plants. It is deposited by PRC2 (Polycomb repressive complex 2), a conserved protein complex. In Arabidopsis thaliana, H3K27me3 is found at 15% of all genes. These tend to encode transcription factors and other regulators important for development. However, it is not known how PRC2 is recruited to target loci nor how this set of target genes arose during Arabidopsis evolution. To resolve the latter, we integrated A. thaliana gene families with five independent genome-wide H3K27me3 data sets. Gene families were either significantly enriched or depleted of H3K27me3, showing a strong impact of shared ancestry to H3K27me3 distribution. To quantify this, we performed ancestral state reconstruction of H3K27me3 on phylogenetic trees of gene families. The set of H3K27me3-marked genes changed less than expected by chance, suggesting that H3K27me3 was retained after gene duplication. This retention suggests that the PRC2-recruiting signal could be encoded in the DNA and also conserved among certain duplicated genes. Indeed, H3K27me3-marked genes were overrepresented among paralogs sharing conserved noncoding sequences (CNSs) that are enriched with transcription factor binding sites. The association of upstream CNSs with H3K27me3-marked genes represents the first genome-wide connection between H3K27me3 and potential regulatory elements in plants. Thus, we propose that CNSs likely function as part of the PRC2 recruitment in plants. PMID:24567304
Conserved Non-Coding Regulatory Signatures in Arabidopsis Co-Expressed Gene Modules
Spangler, Jacob B.; Ficklin, Stephen P.; Luo, Feng; Freeling, Michael; Feltus, F. Alex
2012-01-01
Complex traits and other polygenic processes require coordinated gene expression. Co-expression networks model mRNA co-expression: the product of gene regulatory networks. To identify regulatory mechanisms underlying coordinated gene expression in a tissue-enriched context, ten Arabidopsis thaliana co-expression networks were constructed after manually sorting 4,566 RNA profiling datasets into aerial, flower, leaf, root, rosette, seedling, seed, shoot, whole plant, and global (all samples combined) groups. Collectively, the ten networks contained 30% of the measurable genes of Arabidopsis and were circumscribed into 5,491 modules. Modules were scrutinized for cis regulatory mechanisms putatively encoded in conserved non-coding sequences (CNSs) previously identified as remnants of a whole genome duplication event. We determined the non-random association of 1,361 unique CNSs to 1,904 co-expression network gene modules. Furthermore, the CNS elements were placed in the context of known gene regulatory networks (GRNs) by connecting 250 CNS motifs with known GRN cis elements. Our results provide support for a regulatory role of some CNS elements and suggest the functional consequences of CNS activation of co-expression in specific gene sets dispersed throughout the genome. PMID:23024789
Conserved non-coding regulatory signatures in Arabidopsis co-expressed gene modules.
Spangler, Jacob B; Ficklin, Stephen P; Luo, Feng; Freeling, Michael; Feltus, F Alex
2012-01-01
Complex traits and other polygenic processes require coordinated gene expression. Co-expression networks model mRNA co-expression: the product of gene regulatory networks. To identify regulatory mechanisms underlying coordinated gene expression in a tissue-enriched context, ten Arabidopsis thaliana co-expression networks were constructed after manually sorting 4,566 RNA profiling datasets into aerial, flower, leaf, root, rosette, seedling, seed, shoot, whole plant, and global (all samples combined) groups. Collectively, the ten networks contained 30% of the measurable genes of Arabidopsis and were circumscribed into 5,491 modules. Modules were scrutinized for cis regulatory mechanisms putatively encoded in conserved non-coding sequences (CNSs) previously identified as remnants of a whole genome duplication event. We determined the non-random association of 1,361 unique CNSs to 1,904 co-expression network gene modules. Furthermore, the CNS elements were placed in the context of known gene regulatory networks (GRNs) by connecting 250 CNS motifs with known GRN cis elements. Our results provide support for a regulatory role of some CNS elements and suggest the functional consequences of CNS activation of co-expression in specific gene sets dispersed throughout the genome.
Controlled fabrication of electrically contacted carbon nanoscrolls.
Schmidt, Marek E; Hammam, Ahmed M M; Iwasaki, Takuya; Kanzaki, Teruhisa; Muruganathan, Manoharan; Ogawa, Shinichi; Mizuta, Hiroshi
2018-06-08
Carbon nanoscrolls (CNS) with their open ended morphology have recently attracted interest due to the potential application in gas capture, biosensors and interconnects. However, CNS currently suffer from the same issue that have hindered widespread integration of CNTs in sensors and devices: formation is done ex situ, and the tubes have to be placed with precision and reliability-a difficult task with low yield. Here, we demonstrate controlled in situ formation of electrically contacted CNS from suspended graphene nanoribbons with slight tensile stress. Formation probability depends on the length to width aspect ratio. Van der Waals interaction between the overlapping layers fixes the nanoscroll once formed. The stability of these CNSs is investigated by helium nano ion beam assisted in situ cutting. The loose stubs remain rolled and mostly suspended unless subject to a moderate helium dose corresponding to a damage rate of 4%-20%. One CNS stub remaining perfectly straight even after touching the SiO 2 substrate allows estimation of the bending moment due to van der Waals force between the CNS and the substrate. The bending moment of 5400 eV is comparable to previous theoretical studies. The cut CNSs show long-term stability when not touching the substrate.
Controlled fabrication of electrically contacted carbon nanoscrolls
NASA Astrophysics Data System (ADS)
Schmidt, Marek E.; Hammam, Ahmed M. M.; Iwasaki, Takuya; Kanzaki, Teruhisa; Muruganathan, Manoharan; Ogawa, Shinichi; Mizuta, Hiroshi
2018-06-01
Carbon nanoscrolls (CNS) with their open ended morphology have recently attracted interest due to the potential application in gas capture, biosensors and interconnects. However, CNS currently suffer from the same issue that have hindered widespread integration of CNTs in sensors and devices: formation is done ex situ, and the tubes have to be placed with precision and reliability—a difficult task with low yield. Here, we demonstrate controlled in situ formation of electrically contacted CNS from suspended graphene nanoribbons with slight tensile stress. Formation probability depends on the length to width aspect ratio. Van der Waals interaction between the overlapping layers fixes the nanoscroll once formed. The stability of these CNSs is investigated by helium nano ion beam assisted in situ cutting. The loose stubs remain rolled and mostly suspended unless subject to a moderate helium dose corresponding to a damage rate of 4%–20%. One CNS stub remaining perfectly straight even after touching the SiO2 substrate allows estimation of the bending moment due to van der Waals force between the CNS and the substrate. The bending moment of 5400 eV is comparable to previous theoretical studies. The cut CNSs show long-term stability when not touching the substrate.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Widjaja, Ongky, E-mail: wijayaongky@yahoo.co.id; Arie, Arenst Andreas, E-mail: arenst@unpar.ac.id; Halim, Martin
In this work, kerosene oil based nanocarbons were synthesized by a nebulized spray pyrolysis method. This method was conducted at temperature of 700°C under a nitrogen inert atmospheric condition. Activated carbon and ferrocene were used as substrate and catalyst, respectively. Initially, ferrocene was dissolved in the oil with fixed concentration of 0.02 g/ml. The pyrolysis reaction was carried out by varying the operating time of 15, 30 and 45 minutes. The main aim of this work was to investigate the effect of varying the operation time on the morphology and structural characteristics of as-prepared carbon products. The morphology and structural characteristicsmore » of synthesized nanocarbons were examined by Scanning Electron Microscope (SEM), Transmission Electron Microscopy (TEM), and Raman Spectroscopy, respectively. SEM and TEM observations showed that nano carbons were formed as agglomerated carbon nanospheres (CNSs) and graphene for all variation of operating time. Furthermore, it was observed that the size of agglomerated CNSs was proportional with the operating time from 15 to 45 minutes. Raman analysis showed that the ratio between graphite like and disorder carbon structure (I{sub G}/I{sub D})of carbon samples increased from operating time of 15 to 30 minutes, however the ratio decreased from 30 minutes to 45 minutes.« less
VizieR Online Data Catalog: CNSS pilot survey (Mooley+, 2016)
NASA Astrophysics Data System (ADS)
Mooley, K. P.; Hallinan, G.; Bourke, S.; Horesh, A.; Myers, S. T.; Frail, D. A.; Kulkarni, S. R.; Levitan, D. B.; Kasliwal, M. M.; Cenko, S. B.; Cao, Y.; Bellm, E.; Laher, R. R.
2017-11-01
The radio observations were carried out across four epochs (E1-E4) with the Jansky VLA in B array configuration, and S band was chosen to maximize survey speed. The optical survey, designed to be contemporaneous with the radio survey, was carried out with the 1.2-m (48-inch) Samuel Oschin Telescope at the Palomar Observatory as part of the Palomar Transient Factory (PTF). (1 data file).
Lee, Ji Ha; Kim, Chaelin; Jung, Jong Hwa
2015-10-21
A 1,3-alternate calix[4]arene derivative 1 possessing four guanidinium moieties was synthesized as a molecular binder. The clay nanosheet (CNS) hydrogels were prepared upon addition of 1 and sodium polyacrylate (ASSP), and their mechanical properties were measured by rheometry. CNS hydrogels prepared by combining calix[4]arene 1 with dispersed CNSs surrounded by ASSPs showed an enhancement of mechanical properties such as viscosity and elasticity.
Kring, Daria L
2008-01-01
The purpose of this article is to describe master's-level evidence-based practice (EBP) competencies as determined by a national consensus panel and present an EBP matrix that illustrates the influence that the clinical nurse specialist (CNS) practice can have on driving EBP change. Evidence-based practice is a growing and necessary paradigm for nursing care. The ACE Star Model conceptualizes the knowledge transformation that must occur in an EBP environment as 5 distinct points: discovery, summary, translation, integration, and evaluation. Master's-level EBP competencies based on these 5 steps were established by a national consensus panel. The CNS's practice can be organized around 5 domains: expert practitioner, researcher, consultant, educator, and leader. The master's-level EBP competencies can be transposed on a crosswalk of the ACE Star Model and the 5 CNS practice domains to form a matrix representing the influence that CNSs can have over the EBP process. Each competency falls well within the practice domains of the CNS, making the CNS an ideal person to lead the EBP movement forward, providing tangible outcomes to further demonstrate the need for the CNS role.
Family meals and body weight in US adults.
Sobal, Jeffery; Hanson, Karla
2011-09-01
Family meals are an important ritual in contemporary societies and many studies have reported associations of family meals with several biopsychosocial outcomes among children and adolescents. However, few representative analyses of family meals have been conducted in samples of adults, and adults may differ from young people in predictors and outcomes of family meal consumption. We examined the prevalence and predictors of adult family meals and body weight outcomes. The cross-sectional 2009 Cornell National Social Survey (CNSS) included questions about the frequency of family meals, body weight as BMI and sociodemographic characteristics. The CNSS telephone survey used random digit dialling to sample individuals. We analysed data from 882 adults living with family members in a nationally representative US sample. Prevalence of family meals among these adults revealed that 53 % reported eating family meals seven or more times per week. Predictive results revealed that adults who more frequently ate family meals were more likely to be married and less likely to be employed full-time, year-round. Outcome results revealed that the overall frequency of family meals among adults was not significantly associated with any measure of body weight. However, interaction term analysis suggested an inverse association between frequency of family meals and BMI for adults with children in the household, and no association among adults without children. These findings suggest that family meals among adults are commonplace, associated with marital and work roles, and marginally associated with body weight only in households with children.
NASA Technical Reports Server (NTRS)
Mooley, K. P.; Hallinan, G.; Bourke, S.; Horesh, A.; Myers, S. T.; Frail, D. A.; Kulkarni, S. R.; Levitan, D. B.; Kasliwal, M. M.; Cenko, S. B.;
2016-01-01
We have commenced a multiyear program, the Caltech-NRAO Stripe 82 Survey (CNSS), to search for radio transients with the Jansky VLA in the Sloan Digital Sky Survey Stripe 82 region. The CNSS will deliver five epochs over the entire approx. 270 deg.(exp. 2) of Stripe 82, an eventual deep combined map with an rms noise of approx. 40 proper motion epoch y and catalogs at a frequency of 3 GHz, and having a spatial resolution of 3 inches. This first paper presents the results from an initial pilot survey of a 50 deg.(exp. 2) region of Stripe 82, involving four epochs spanning logarithmic timescales between 1 week and 1.5 yr, with the combined map having a median rms noise of 35 proper motion epoch y. This pilot survey enabled the development of the hardware and software for rapid data processing, as well as transient detection and follow-up, necessary for the full 270 deg.(exp. 2) survey. Data editing, calibration, imaging, source extraction, cataloging, and transient identification were completed in a semi-automated fashion within 6 hr of completion of each epoch of observations, using dedicated computational hardware at the NRAO in Socorro and custom-developed data reduction and transient detection pipelines. Classification of variable and transient sources relied heavily on the wealth of multiwavelength legacy survey data in the Stripe 82 region, supplemented by repeated mapping of the region by the Palomar Transient Factory. A total of 3.9(+0.5%/-0.9%) of the few thousand detected point sources werefound to vary by greater than 30%, consistent with similar studies at 1.4 and 5 GHz. Multiwavelength photometric data and light curves suggest that the variability is mostly due to shock-induced flaring in the jets of active galactic nuclei (AGNs). Although this was only a pilot survey, we detected two bona fide transients, associated with an RS CVn binary and a dKe star. Comparison with existing legacy survey data (FIRST, VLA-Stripe 82) revealed additional highly variable and transient sources on timescales between 5 and 20 yr, largely associated with renewed AGN activity. The rates of such AGNs possibly imply episodes of enhanced accretion and jet activity occurring once every approx. 40,000 yr in these galaxies. We compile the revised radio transient rates and make recommendations for future transient surveys and joint radio-optical experiments.
NASA Astrophysics Data System (ADS)
Han, Jinzhi; Qin, Jian; Guo, Lichao; Qin, Kaiqiang; Zhao, Naiqin; Shi, Chunsheng; Liu, Enzuo; He, Fang; Ma, Liying; He, Chunnian
2018-01-01
Poor intrinsic conductivity and huge volume expansion during charge/discharge process greatly limit the development of Ge-based ternary oxide as anode material for both lithium-ion batteries and sodium-ion batteries. To alleviate these issues, an ideal strategy is developed to achieve active particle nanocrystallization and composite with conductive carbon materials, simultaneously. Therefore, ultrasmall Fe2GeO4 nanodots (∼4.6 nm) uniformly and tightly anchored on 3D interconnected N-doped ultrathin carbon nanosheets (3D Fe2GeO4/N-CNSs) were constructed via one-step high temperature calcination process. This unique hybrid nanostructure can not only effectively enhance electron conductivity but also restrict the aggregation and volume fluctuation of Fe2GeO4 during the charge/discharge process. As a result, the 3D Fe2GeO4/N-CNSs electrode exhibited excellent electrochemical performances for both lithium-ion and sodium-ion battery anodes. When utilized for lithium-ion battery anode, the electrode delivered a highly reversible specific capacity (1280 mA h g-1 at 0.4 A g-1 after 180 cycles). It is the first time that Fe2GeO4 was applied for sodium-ion battery anode, which showed a remarkable rate capability (350 mA h g-1 at 0.1 A g-1 and 180 mA h g-1 at 22.8 A g-1), and ultralong cycling stability (∼86% reversible capacity retention after 6000 cycles).
A cooperative model for IS security risk management in distributed environment.
Feng, Nan; Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
Regulation of Six1 expression by evolutionarily conserved enhancers in tetrapods.
Sato, Shigeru; Ikeda, Keiko; Shioi, Go; Nakao, Kazuki; Yajima, Hiroshi; Kawakami, Kiyoshi
2012-08-01
The Six1 homeobox gene plays critical roles in vertebrate organogenesis. Mice deficient for Six1 show severe defects in organs such as skeletal muscle, kidney, thymus, sensory organs and ganglia derived from cranial placodes, and mutations in human SIX1 cause branchio-oto-renal syndrome, an autosomal dominant developmental disorder characterized by hearing loss and branchial defects. The present study was designed to identify enhancers responsible for the dynamic expression pattern of Six1 during mouse embryogenesis. The results showed distinct enhancer activities of seven conserved non-coding sequences (CNSs) retained in tetrapod Six1 loci. The activities were detected in all cranial placodes (excluding the lens placode), dorsal root ganglia, somites, nephrogenic cord, notochord and cranial mesoderm. The major Six1-expression domains during development were covered by the sum of activities of these enhancers, together with the previously identified enhancer for the pre-placodal region and foregut endoderm. Thus, the eight CNSs identified in a series of our study represent major evolutionarily conserved enhancers responsible for the expression of Six1 in tetrapods. The results also confirmed that chick electroporation is a robust means to decipher regulatory information stored in vertebrate genomes. Mutational analysis of the most conserved placode-specific enhancer, Six1-21, indicated that the enhancer integrates a variety of inputs from Sox, Pax, Fox, Six, Wnt/Lef1 and basic helix-loop-helix proteins. Positive autoregulation of Six1 is achieved through the regulation of Six protein-binding sites. The identified Six1 enhancers provide valuable tools to understand the mechanism of Six1 regulation and to manipulate gene expression in the developing embryo, particularly in the sensory organs. Copyright © 2012 Elsevier Inc. All rights reserved.
Clinical nurse specialist prescriber characteristics and challenges in Oregon.
Klein, Tracy
2015-01-01
The purpose of this study was to assess role characteristics of clinical nurse specialists (CNSs) with prescriptive authority in Oregon 10 years after passage of Senate Bill 460. Factors examined included role preparation and mentorship, use and maintenance of authority, prescribing benefits and barriers, and types of drugs/nondrugs prescribed. This study was a descriptive survey using both quantitative and qualitative analysis. The sample was obtained from a list provided on June 13, 2014, by the Oregon State Board of Nursing of all CNSs in Oregon who had ever been granted prescriptive authority (n = 40). Twenty-nine with active authority, 7 with expired authority, and 4 with inactive status were sampled. E-mail distribution with Qualtrics software was released on June 27, 2014. Reminder e-mails were sent at 1 and 2 weeks. Of the 38 e-mails successfully delivered, 23 responses were received for a total response rate of 60%. Clinical nurse specialists successfully maintained their authority in Oregon and felt well prepared for their role. Their prescribing mentorship included nurse and nonnurse prescribers. They were most likely to have ever prescribed psychiatric, noncontrolled analgesics and durable medical equipment. They most frequently prescribed nutrition/electrolytes/fluids, durable medical equipment, and controlled analgesics. Lapse in authority was attributed to constraints regarding certification or credentialing in the role. Clinical nurse specialists uniformly expressed benefits from prescriptive authority. There were no differences in perceptions of preparation based on type of mentorship or educational modality for completion of prescribing requirements. There were systems barriers including lack of employer and colleague support to use of authority. Durable medical equipment authority is important to the CNS role. Clinical nurse specialists valued and maintained their prescriptive authority despite barriers. Further research is recommended to support success for CNS prescribers from multiple settings and specialties.
Effects of heating time on the growth and behavior of amorphous carbon nanostructures from ferrocene
NASA Astrophysics Data System (ADS)
Rafiqul Islam, Md; Rashid, A. K. M. B.; Ferdous, Md; Shafiul Azam, Md
2017-05-01
Heating time is one of the crucial factors in various methods employed for the synthesis of carbon nanostructures (CNSs) from ferrocene. However, the effects of heating time on the growth and morphology of the nanostructured materials has not been well explored yet, particularly for amorphous carbon. Herein, we investigate how the variation of heating time impacts the growth of CNSs by carrying out the reaction between ferrocene and ammonium chloride in a solvent free condition at 250 °C. Several different forms of carbon nanostructures yielded from this reaction at 25 min (CNS-25), 30 min (CNS-30), 35 min (CNS-35) and 40 min (CNS-40) were analyzed by means of field emission scanning electron microscopy (FESEM) coupled with energy-dispersive x-ray (EDX), Fourier transform infrared (FTIR) and ultraviolet-visible (UV-Vis) spectroscopy. The final product CNS-40 was washed several times with concentrated hydrochloric acid solution to remove the impurities and then characterized by the means of similar techniques. FTIR spectra of all the nanostructures confirmed the presence of several functional groups such as C = C, C-O and -OH etc, which are common in carbonaceous nanostructures. However, the FESEM images obtained are significantly different and suggest a gradual growth of the carbon nanostructures ending up with long carbon nanotubes after 40 min. No absorption peak in the visible region of the UV-Vis spectra of the final product confirms the amorphous nature, which is also supported by XRD of the synthesized nanotube. Moreover, a noteworthy redshift in the UV-Vis peaks reflecting a huge increase in length and diameter of the nanostructures indicates the maximum longitudinal growth of the carbon nanotubes occurs during 35 min to 40 min.
A Cooperative Model for IS Security Risk Management in Distributed Environment
Zheng, Chundong
2014-01-01
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626
Peace Operations in Mali: Theory into Practice Then Measuring Effectiveness
2017-06-09
community’s response along two broad lines of effort (LOE): Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a... Safe and Secure Environment , two objectives were measured. Objective #1 sought the Cessation of Large Scale Violence. Success was attained, as...Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a Safe and Secure Environment , two objectives were
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
32 CFR 2001.23 - Classification marking in the electronic environment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine
High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less
Lockwood, Emily B; Fealy, Gerard M
2008-10-01
Nurses and midwives are expanding the scope of their professional practice, assuming additional responsibilities including the management and prescribing of medications. The aim of the study was to discover the attitudes of clinical nurse specialists (CNSs) in Ireland to nurse prescribing and to examine perceived barriers to engaging in this aspect of future role expansion. The expansion of the nursing role in relation to nurse prescribing is an ongoing process and is subject to incremental iterations of legislation and professional policy. Nurse prescribing as an expanded role function has become a reality in many countries. Ireland has addressed the matter in a formal and systematic way through legislation. A questionnaire was administered to a sample of 283 CNSs practising in a variety of care settings in Ireland. Attitudes were measured using Likert-type attitudinal scales, designed specifically for the study. Findings indicate that the majority of clinical nurse specialists were positively disposed toward nurse prescribing as a future role expansion. The fear of litigation was identified as the most significant barrier to nurse prescribing. The majority of respondents equated nurse prescribing with increased autonomy and holistic care. The findings indicate that there is a need for further examination of the educational requirements of the CNS in relation to nurse prescribing. The legislative implications for nurse prescribing and fear of legal consequences need to be considered prior to any implementation of nurse prescribing. While senior clinicians are willing to embrace future role expansion in the area of nurse prescribing, their Nurse Managers should recognize that facilitation of nurse prescribing needs to address the legal and educational requirements for such activity. Failure to address these requirements can represent a barrier to role expansion. This paper offers new understandings on the views of senior clinicians concerning nurse prescribing at a time of ongoing professional policy iteration and practice change in the area.
Distinguishing the Clinical Nurse Specialist From Other Graduate Nursing Roles.
Mohr, Lynn D; Coke, Lola A
Today's healthcare environment poses diverse and complex patient care challenges and requires a highly qualified and experienced nursing workforce. To mitigate these challenges are graduate nursing roles, each with a different set of competencies and expertise. With the availability of many different graduate nursing roles, both patients and healthcare professionals can be confused in understanding the benefit of each role. To gain the maximum benefit from each role, it is important that healthcare providers and administrators are able to distinguish the uniqueness of each role to best use the role and develop strategies for effective collaboration and interprofessional interaction. The purpose of this article was to define the role, educational preparation, role differences, and practice competencies for the clinical nurse specialist (CNS), nurse practitioner, clinical nurse leader, and nurse educator/staff development educator roles. A second purpose was to provide role clarity and demonstrate the unique value the CNS brings to the healthcare environment. Using evidence and reviewing role competencies established by varying organizations, each role is presented with similarities and differences among the roles discussed. In addition, collaboration among the identified roles was reviewed, and recommendations were provided for the new and practicing CNSs. Although there are some similarities among the graduate nursing roles such as in educational, licensing, and certification requirements, each role must be understood to gain the full role scope and benefit and glean the anticipated outcomes. Healthcare providers must be aware of the differences in graduate nursing roles, especially in comparing the CNS with other roles to avoid confusion that may lead to roles being underused with a limited job scope. The CNS provides a unique set of services at all system outcome levels and is an essential part of the healthcare team especially in the acute care setting.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-29
... DEPARTMENT OF TRANSPORTATION Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle- to... Enabling a Secure Environment for Vehicle- to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I... will be presented in August 2012 during the annual Connected Vehicle Safety public meeting and via...
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Sustainable Food Security Measurement: A Systemic Methodology
NASA Astrophysics Data System (ADS)
Findiastuti, W.; Singgih, M. L.; Anityasari, M.
2017-04-01
Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1988-11-01
secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun
2015-01-01
Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff. PMID:26618034
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung
2015-10-01
Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.
17 CFR 240.17Ad-21T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operational capability in a Year 2000 environment. 240.17Ad-21T Section 240.17Ad-21T Commodity and Securities Exchanges SECURITIES... Company Rules § 240.17Ad-21T Operational capability in a Year 2000 environment. (a) This section applies...
Implementation of customized health information technology in diabetes self management programs.
Alexander, Susan; Frith, Karen H; O'Keefe, Louise; Hennigan, Michael A
2011-01-01
The project was a nurse-led implementation of a software application, designed to combine clinical and demographic records for a diabetes education program, which would result in secure, long-term record storage. Clinical information systems may be prohibitively expensive for small practices and require extensive training for implementation. A review of the literature suggests that the use of simple, practice-based registries offer an economical method of monitoring the outcomes of diabetic patients. The database was designed using a common software application, Microsoft Access. The theory used to guide implementation and staff training was Rogers' Diffusion of Innovations theory (1995). Outcomes after a 3-month period included incorporation of 100% of new clinical and demographic patient records into the database and positive changes in staff attitudes regarding software applications used in diabetes self-management training. These objectives were met while keeping project costs under budgeted amounts. As a function of the clinical nurse specialist (CNS) researcher role, there is a need for CNSs to identify innovative and economical methods of data collection. The success of this nurse-led project reinforces suggestions in the literature for less costly methods of data maintenance in small practice settings. Ongoing utilization and enhancement have resulted in the creation of a robust database that could aid in the research of multiple clinical issues. Clinical nurse specialists can use existing evidence to guide and improve both their own practice and outcomes for patients and organizations. Further research regarding specific factors that predict efficient transition of informatics applications, how these factors vary according to practice settings, and the role of the CNS in implementation of such applications is needed.
2010-03-17
the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed
NASA Astrophysics Data System (ADS)
Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.
2018-04-01
According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.
NASA Astrophysics Data System (ADS)
Zhang, Q.; Song, W.; Yang, J.
2017-12-01
Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy will ameliorate the ecological environment, on the contrary, high-intensity human activities will make it tends to deteriorate. This research would provide scientific guidance and suggestions for the ecological environment protection and sustainable development of Xinjiang.
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
Security risks associated with radio frequency identification in medical environments.
Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio
2012-12-01
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.
40 CFR 205.5-2 - National security exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...
40 CFR 205.5-2 - National security exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...
Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.
77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
... implement comprehensive port security regimes designed to safeguard human life, vessels, and waterfront... protect life, property and the environment, therefore, a 30-day notice period is impracticable. Delaying... enhance public and maritime safety and security in order to safeguard life, property, and the environment...
Securing Resources in Collaborative Environments: A Peer-to-peerApproach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.
2005-09-19
We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.
A Cluster-Based Framework for the Security of Medical Sensor Environments
NASA Astrophysics Data System (ADS)
Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos
The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012
NASA Astrophysics Data System (ADS)
Li, X. S.; Peng, Z. Y.; Li, T. T.
2016-08-01
This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.
Student Perceptions of High-Security School Environments
ERIC Educational Resources Information Center
Bracy, Nicole L.
2011-01-01
Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…
76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... security regimes designed to safeguard human life, vessels, and waterfront facilities while still... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... maritime safety and security in order to safeguard life, property, and the environment on or near the...
77 FR 3118 - Security Zone; Choptank River and Cambridge Channel, Cambridge, MD
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
... security regimes designed to safeguard human life, vessels, and waterfront facilities while still... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... maritime safety and security in order to safeguard life, property, and the environment on or near the...
Evaluation of Traditional Security Solutions in the SCADA Environment
2012-03-01
Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of
Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad
2008-10-01
The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
The strategic security officer.
Hodges, Charles
2014-01-01
This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.
Introduction to 'Homology and convergence in nervous system evolution'.
Strausfeld, Nicholas J; Hirth, Frank
2016-01-05
The origin of brains and central nervous systems (CNSs) is thought to have occurred before the Palaeozoic era 540 Ma. Yet in the absence of tangible evidence, there has been continued debate whether today's brains and nervous systems derive from one ancestral origin or whether similarities among them are due to convergent evolution. With the advent of molecular developmental genetics and genomics, it has become clear that homology is a concept that applies not only to morphologies, but also to genes, developmental processes, as well as to behaviours. Comparative studies in phyla ranging from annelids and arthropods to mammals are providing evidence that corresponding developmental genetic mechanisms act not only in dorso-ventral and anterior-posterior axis specification but also in segmentation, neurogenesis, axogenesis and eye/photoreceptor cell formation that appear to be conserved throughout the animal kingdom. These data are supported by recent studies which identified Mid-Cambrian fossils with preserved soft body parts that present segmental arrangements in brains typical of modern arthropods, and similarly organized brain centres and circuits across phyla that may reflect genealogical correspondence and control similar behavioural manifestations. Moreover, congruence between genetic and geological fossil records support the notion that by the 'Cambrian explosion' arthropods and chordates shared similarities in brain and nervous system organization. However, these similarities are strikingly absent in several sister- and outgroups of arthropods and chordates which raises several questions, foremost among them: what kind of natural laws and mechanisms underlie the convergent evolution of such similarities? And, vice versa: what are the selection pressures and genetic mechanisms underlying the possible loss or reduction of brains and CNSs in multiple lineages during the course of evolution? These questions were addressed at a Royal Society meeting to discuss homology and convergence in nervous system evolution. By integrating knowledge ranging from evolutionary theory and palaeontology to comparative developmental genetics and phylogenomics, the meeting covered disparities in nervous system origins as well as correspondences of neural circuit organization and behaviours, all of which allow evidence-based debates for and against the proposition that the nervous systems and brains of animals might derive from a common ancestor. © 2015 The Author(s).
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
78 FR 27392 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Office (AMSO) provides a safe, secure, healthy, and functional workplace environment for CDC staff by... provides the tools needed for workers to be safe, work in a healthy environment, and ensures environmental... Office of Security and Emergency Preparedness (CAJJ); Office of Safety, Health and Environment (CAJP...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
...; Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity Reporting... Environment Suspicious Activity Reporting Initiative System of Records'' and this proposed rulemaking. In this... establish a new DHS system of records titled, ``DHS/ALL-031 Information Sharing Environment (ISE) Suspicious...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orrell, S.; Ralstin, S.
1992-04-01
Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orrell, S.; Ralstin, S.
1992-01-01
Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining
2015-03-01
Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.
Additional Security Considerations for Grid Management
NASA Technical Reports Server (NTRS)
Eidson, Thomas M.
2003-01-01
The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.
Son, Su-Young; Noh, Yong-Jin; Bok, Changsuk; Lee, Sungho; Kim, Byoung Gak; Na, Seok-In; Joh, Han-Ik
2014-01-21
Through a catalyst- and transfer-free process, we fabricated indium tin oxide (ITO)-free organic solar cells (OSCs) using a carbon nanosheet (CNS) with properties similar to graphene. The morphological and electrical properties of the CNS derived from a polymer of intrinsic microporosity-1 (PIM-1), which is mainly composed of several aromatic hydrocarbons and cycloalkanes, can be easily controlled by adjusting the polymer concentration. The CNSs, which are prepared by simple spin-coating and heat-treatment on a quartz substrate, are directly used as the electrodes of ITO-free OSCs, showing a high efficiency of approximately 1.922% under 100 mW cm(-2) illumination and air mass 1.5 G conditions. This catalyst- and transfer-free approach is highly desirable for electrodes in organic electronics.
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-06-15
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.
Implementing healthcare information security: standards can help.
Orel, Andrej; Bernik, Igor
2013-01-01
Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.
A secure medical data exchange protocol based on cloud environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn
2014-09-01
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.
A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment
NASA Astrophysics Data System (ADS)
Ula, M.; Ula, M.; Fuadi, W.
2017-02-01
As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.
The effects of environmental resource and security on aggressive behavior.
Ng, Henry Kin Shing; Chow, Tak Sang
2017-05-01
Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Is the biggest security threat to medical information simply a lack of understanding?
Williams, Patricia A H
2011-01-01
Connecting Australian health services and the e-health initiative is a major focus in the current health environment. Many issues are presented as key to its success including solving issues with confidentiality and privacy. However, the main problem may not be these issues in sharing information but the fact that the point of origin of such records is still relatively insecure. This paper highlights why this may be the case. Research into the security of medical information has shown that many primary healthcare providers are unable to create an environment with effective information security. Numerous factors contribute to this complex situation including a trustful environment, the resultant security culture and the capability of individual healthcare organisations. Further, the growing importance of new directions in the use of patient information is considered. This paper discusses these issues and positions them within the complex environment that is healthcare. In our current health system infrastructure, the points of origin of patient information are our most vulnerable. This entwined with progressively new uses of this information expose additional security concerns, such as re-identification of information, that require attention.
Williams, Patricia A H
Australia is stepping up to the new e-health environment. With this comes new legislation and new demands on information security. The expanded functionality of e-health and the increased legislative requirements, coupled with new uses of technology, means that enhancement of existing security practice will be necessary. This paperanalyses the new operating environment for Australian healthcare and the legislation governing it, and highlights the changes that are required to meet this new context. Individuals are now more responsible for security and organisations should be prompted to review their security measures in light of the new demands of legislative compliance.
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Purpose. 11.1 Section 11.1 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS PURSUANT... the classification and declassification of national security information. They apply also to...
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-01-01
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348
U.S. Space Policy and Space Industry Strangulation
2010-03-01
protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry. 14...still protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry...security, and creating and sustaining a globally competitive space industry. These realms are not mutually exclusive. If technologies are overly guarded
Healthcare teams over the Internet: programming a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2003-07-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS.... Confidential refers to that national security information or material which requires protection. The test for...
Land Ecological Security Evaluation of Underground Iron Mine Based on PSR Model
NASA Astrophysics Data System (ADS)
Xiao, Xiao; Chen, Yong; Ruan, Jinghua; Hong, Qiang; Gan, Yong
2018-01-01
Iron ore mine provides an important strategic resource to the national economy while it also causes many serious ecological problems to the environment. The study summed up the characteristics of ecological environment problems of underground iron mine. Considering the mining process of underground iron mine, we analysis connections between mining production, resource, environment and economical background. The paper proposed a land ecological security evaluation system and method of underground iron mine based on Pressure-State-Response model. Our application in Chengchao iron mine proves its efficiency and promising guide on land ecological security evaluation.
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
Measuring Stability and Security in Iraq
2008-06-01
1 1.1. Political Stability .....................................................................................................1...Section 1—Stability and Security 1.1 Political Stability With recent improvements in security, the current political environment in Iraq is
MYSEA: The Monterey Security Architecture
2009-01-01
Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized
Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.
ERIC Educational Resources Information Center
Trinkaus-Randall, Gregor
1998-01-01
Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…
Designing a Secure Exam Management System (SEMS) for M-Learning Environments
ERIC Educational Resources Information Center
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc
2016-01-01
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Enhancing Security by System-Level Virtualization in Cloud Computing Environments
NASA Astrophysics Data System (ADS)
Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei
Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.
Two RFID standard-based security protocols for healthcare environments.
Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E
2013-10-01
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel
2016-08-01
Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.
Strategic Paralysis: An Airpower Theory for the Present
1992-05-01
Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Control as: �The role that encompasses all actions taken to secure and control the aerospace environment and to deny the use of that environment to the...destruction is to damage one�s own future prosperity, and, by sowing the seeds of revenge, to jeopardize one�s future security .�48 This is a hauntingly
Pérez, Elsury; Roncarolo, Federico; Potvin, Louise
2017-04-20
To examine the association between the local food environment and the severity of food insecurity among new families using community food security interventions in Montreal. In this cross-sectional study, we analyzed baseline data from 785 adults aged 18-65 years enrolled in the evaluation of the effects of organizations delivering community food security interventions in Montreal. The dependent variable was household food insecurity, while the independent variable was the local food environment, assessed through: location of the most frequently used grocery store, distance between the participant's residence and the community organization used, mode of transportation, walking time to the most frequently used grocery store, satisfaction with the acceptability and affordability of food available at the most frequently used grocery store, and self-reported difficulties in accessing food. We used polytomous logistic regression to estimate the association between household food insecurity and the local food environment. In all the models, we coded food security status in three categories: food security, moderate food insecurity and severe food insecurity. The last group was used as a reference group. Our data suggest that compared to households with severe food insecurity, those with moderate food insecurity (OR = 0.43, 95% CI: 0.28-0.62) and those with food security (OR = 0.13, 95% CI: 0.06-0.26) were less likely to report difficulties in accessing food due to food affordability. Food-secure households also had lower odds of reporting difficulties in accessing food due to transportation constraints (OR = 0.18, 95% CI: 0.06-0.55) compared with severe food-insecure households. Living a distance of between 1 and 2 km from the organization used was significantly correlated with moderate food insecurity (OR = 1.80, 95% CI: 1.12-2.88). The local food environment is associated with severity of household food insecurity among new families using community food security interventions in Montreal. Future studies should study the relationship between the local food environment and food insecurity across all dimensions of food access.
2004-06-01
Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect
Transboundary natural area protection: Broadening the definition of national security
Haven B. Cook
2007-01-01
This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Barrocas, Albert; Cohen, Michael L
2016-06-01
Clinical nutrition specialists (CNSs) are often confronted with technological, ethical, and legal questions, that is, what can be done technologically, what should be done ethically, and what must be done legally, which conflict at times. The conflict represents a "troubling trichotomy" as discussed in the lead article of this issue of Nutrition in Clinical Practice (NCP). During Clinical Nutrition Week in 2006, a symposium covering these 3 topics was presented, and later that year, an article covering the same topic was published in NCP In this article, we revisit several legal questions/issues that were raised 10 years ago and discuss current answers and approaches. Some of the answers remain unchanged. Other answers have been modified by additional legislation, court decisions, or regulations. In addition, new questions/issues have arisen. Some of the most common questions regarding nutrition support involve the following: liability, informed consent, medical decisional incapacity vs legal competence, advance directive specificity, surrogate decision making, physician orders for life-sustaining treatment and electronic medical orders for life-sustaining treatment, legal definition of death, patient vs family decision making, the noncompliant patient, and elder abuse obligations. In the current healthcare environment, these questions and issues are best addressed via a transdisciplinary team that focuses on function rather than form. The CNS can play a pivotal role in dealing with these challenges by applying the acronym ACT: being Accountable and Communicating with all stakeholders while actively participating as an integral part of the transdisciplinary Team. © 2016 American Society for Parenteral and Enteral Nutrition.
NASA Astrophysics Data System (ADS)
Hecker, S. S.
1987-07-01
The basic research community is responding splendidly in pushing the limits of superconductivity. The race to commercialize these new materials is on. The US will face unprecedented international competition, especially from the Japanese. The US needs to develop a partnership among universities, federal laboratories, and private industry. Universities have begun to team with industry while some of the large industrial companies like AT and T and IBM are competing effectively. But it will take more to make the mainstream of US industry competitive. Therefore, an initiative is proposed to develop an industry-DOE national laboratory partnership by establishing Exploratory R and D Centers at these laboratories. The centers will concentrate on the R and D for enabling technologies required to commercialize high-temperature superconductors. This initiative will in part help US industry to be competitive in this new and exciting field.
Afghanistan: Key Oversight Issues
2013-02-01
2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and
Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations
2014-08-26
America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal
NASA Astrophysics Data System (ADS)
Li, Z. J.; Tian, Q.; Song, L. L.
2016-08-01
In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.
Birds of a Feather: Supporting Secure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Braswell III, H V
2006-04-24
Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less
Coping with Iran: Confrontation, Containment, or Engagement?
2007-01-01
David Ignatius (national security columnist , The Washington Post) IRAN’S NATIONAL SECURITY ENVIRONMENT Mohammad Javad Zarif Iran’s national security...senior editor, Newsweek) David Ignatius (national security columnist , The Washington Post) HOW THE U.S. GOVERNMENT VIEWS IRAN R. Nicholas Burns...Iranian Ambassador to the United Nations Questions Michael Hirsh Senior Editor Newsweek David Ignatius National Security Columnist The Washington
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...
40 CFR 92.908 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...
40 CFR 85.1708 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Booker, Paul M.; Maple, Scott A.
2010-06-08
Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less
There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-06
... DEPARTMENT OF TRANSPORTATION Enabling a Secure Environment for Vehicle-to-Infrastructure Research Workshop; Notice of Public Meeting AGENCY: ITS Joint Program Office, Research and Innovative Technology Administration, U.S. Department of Transportation. ACTION: Notice. The U.S. Department of Transportation (USDOT...
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
Computer Assisted Exercise Environment for Terrorist Attack Consequence Management
2006-09-01
security and crisis management. Fig. 3. Third Generation SSR for Integrated Security Sector MoD MoI MoEM MoFA Special Services Integrated Security...Ministries: MoEM , MoI, MoD, MH, MoEW, MoE, MoAF National Media, NGOs, other agencies District EOC / LEMA MHS/IDS/WIS Field EOC MHS/IDS/WIS MHS IDS...SRA EDA DG Environment ... EU SR Fund MoD MoI MoE&S MoEM ... National USA Great Britain Netherlands Germany ... Bilateral BSEC Stab. Pact ... Regional
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-25
... significant effect on the human environment. This rule involves security during the arrival, commissioning... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0333] RIN 1625-AA87 Security Zone; USS MISSISSIPPI Commissioning; Pascagoula Harbor & Pascagoula River; Pascagoula, MS...
School Security Assessment Programme in Australia
ERIC Educational Resources Information Center
Marrapodi, John
2007-01-01
This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…
40 CFR 90.908 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...
40 CFR 89.908 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...
Computer-Based Testing: Test Site Security.
ERIC Educational Resources Information Center
Rosen, Gerald A.
Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…
The Department of Homeland Security’s Role in Protecting the National Economy
2017-09-01
national influence, power, and security. However, new characteristics of the modern trade environment have the potential to undermine U.S. economic ...prosperity. The Department of Homeland Security (DHS) claims that homeland security is inseparable from economic security and, as such, that the...department has a role to play in supporting national economic security goals. However, DHS has yet to fully reconcile the tension between its trade
Derived virtual devices: a secure distributed file system mechanism
NASA Technical Reports Server (NTRS)
VanMeter, Rodney; Hotz, Steve; Finn, Gregory
1996-01-01
This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.
ERIC Educational Resources Information Center
Simonsen, Amy E.
2010-01-01
The purpose of this qualitative study was to examine how adolescent girls with diagnosed learning and emotional disabilities described themselves as they negotiated various environments and relationships within a secure residential facility. The goal was to explore how conditions and interactions in these environments promoted both risk and…
DOT National Transportation Integrated Search
2012-06-08
This report provides a summary and overview of the Public Workshop entitled, Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle-to-Infrastructure Transactions, presented by USDOT. The workshop took place on April 19-20, 2012 at th...
2016-06-08
Affairs June 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43838 A Shift in the International Security Environment: Potential...Implications for Defense Congressional Research Service Summary World events have led some observers, starting in late 2013, to conclude that the...Defense Congressional Research Service Contents Introduction
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.
Zhao, Zhenguo
2014-05-01
With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.
Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-12-21
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.
Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-01-01
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834
Lee, Adrian J; Jacobson, Sheldon H
2012-02-01
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.
Evaluation of power system security and development of transmission pricing method
NASA Astrophysics Data System (ADS)
Kim, Hyungchul
The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.
Secure data exchange between intelligent devices and computing centers
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2005-03-01
The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.
40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...
Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises
ERIC Educational Resources Information Center
Shah, Ashish
2017-01-01
Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm
2017-03-01
and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201
Homeland Security and Defense Applications
None
2018-01-16
Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.
Security for Multimedia Space Data Distribution over the Internet
NASA Technical Reports Server (NTRS)
Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)
1995-01-01
Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
17 CFR 200.551 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applicability. 200.551 Section 200.551 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
... security zones would be part of a comprehensive port security regime designed to safeguard human life... do not individually or cumulatively have a significant effect on the human environment. This rule is...
Hilda Diaz-Soltero; Amy Y. Rossman
2011-01-01
Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...
Trust Model to Enhance Security and Interoperability of Cloud Environment
NASA Astrophysics Data System (ADS)
Li, Wenjuan; Ping, Lingdi
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert
2013-06-01
To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.
Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance
ERIC Educational Resources Information Center
Shim, Woohyun
2010-01-01
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
2009-06-01
Worst of Times: Maritime Security in the Asia-Pacific eds. Joshua Ho and Catherine Zara Raymond (Singapore: Institute of Defense and Strategic Studies...Security Outlook for Southeast Asia,” in The Best of Times, the Worst of Times: Maritime Security in the Asia-Pacific eds. Joshua Ho and Catherine Zara
40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?
Code of Federal Regulations, 2010 CFR
2010-07-01
... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL... security? (a) An engine/equipment is exempt without a request if it will be used or owned by an agency of...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of...
2010-09-01
secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless
Information security for compliance with select agent regulations.
Lewis, Nick; Campbell, Mark J; Baskin, Carole R
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.
Information Security for Compliance with Select Agent Regulations
Lewis, Nick; Campbell, Mark J.
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Purpose. 200.550 Section 200.550 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment § 200...
17 CFR 200.552 - NEPA planning.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false NEPA planning. 200.552 Section 200.552 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...
The Security Factor in School Renovations.
ERIC Educational Resources Information Center
Fickes, Michael
1998-01-01
Discusses how one Indiana high school used its renovation as an opportunity to reevaluate the school's security design. Security considerations in the building's external and internal environment include lighting, directional signage, parking, access control technology, and issues regarding the use of closed circuit television. (GR)
The adoption of IT security standards in a healthcare environment.
Gomes, Rui; Lapão, Luís Velez
2008-01-01
Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205
Integration of Control Algorithms for Quadrotor UAV’s Using an Indoor Sensor Environment
2011-09-01
PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY...gorgeous wife, Maggie, thank you for your loving support and continuous study snacks . xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I
15 CFR 784.3 - Scope and conduct of complementary access.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., safety, and security regulations (e.g., regulations for protection of controlled environments within the... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS... presence of a U.S. Government Host Team. No information of direct national security significance shall be...
High Assurance Models for Secure Systems
ERIC Educational Resources Information Center
Almohri, Hussain M. J.
2013-01-01
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
Assessing staff attitudes towards information security in a European healthcare establishment.
Furnell, S M; Gaunt, P N; Holben, R F; Sanders, P W; Stockel, C T; Warren, M J
1996-01-01
Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. This paper establishes that the staff culture of the organization is of particular importance in determining the level and types of security that will be accepted. This culture will be based upon staff awareness of and attitudes towards security and it is, therefore, important to have a clear idea of what these attitudes are. To this end, two surveys have been conducted within a reference environment to establish the attitudes of general users and technical staff, allowing the results to be fed back to HCE management to enable security policy to be appropriately defined. These results indicated that, although the establishment had participated in a European healthcare security initiative, staff attitudes and awareness were still weak in some areas.
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
2012-01-01
Background Revalidation for UK doctors is expected to be introduced from late 2012. For general practitioners (GPs), this entails collecting supporting information to be submitted and assessed in a revalidation portfolio every five years. The aim of this study was to explore the feasibility of GPs working in secure environments to collect supporting information for the Royal College of General Practitioners’ (RCGP) proposed revalidation portfolio. Methods We invited GPs working in secure environments in England to submit items of supporting information collected during the previous 12 months using criteria and standards required for the proposed RCGP revalidation portfolio and complete a GP issues log. Initial focus groups and initial and follow-up semi-structured face-to-face and telephone interviews were held to explore GPs’ views of this process. Quantitative and qualitative data were analysed using descriptive statistics and identifying themes respectively. Results Of the 50 GPs who consented to participate in the study, 20 submitted a portfolio. Thirty-eight GPs participated in an initial interview, nine took part in a follow-up interview and 17 completed a GP issues log. GPs reported difficulty in collecting supporting information for valid patient feedback, full-cycle clinical audits and evidence for their extended practice role(s) as sessional practitioners in the high population turnover custodial environment. Peripatetic practitioners experienced more difficulty than their institution based counterparts collating this evidence. Conclusions GPs working in secure environments may experience difficulties in collecting the newer types of supporting information for the proposed RCGP revalidation portfolio primarily due to their employment status within a non-medical environment and characteristics of the detainee population. Increased support from secure environment service commissioners and employers will be a prerequisite for these practitioners to enable them to re-license using the RCGP revalidation proposals. PMID:23253694
The Reality Of The Homeland Security Enterprise Information Sharing Environment
2017-12-01
THE HOMELAND SECURITY ENTERPRISE INFORMATION SHARING ENVIRONMENT by Michael E. Brown December 2017 Thesis Advisors: Erik Dahl Robert...collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources...gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this burden estimate or
ERIC Educational Resources Information Center
Musa, Alice K. J.; Meshak, Bibi; Sagir, Jummai Ibrahim
2016-01-01
The purpose of the study was to determine adolescents' perceptions of the psychological security of their schools environments and their relationship with their emotional development and academic performance in secondary schools in Gombe Metropolis. A sample of 239 (107 males and 133 females) secondary school students selected via stratified…
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram
2016-07-01
To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1991-02-01
enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane
NASA Astrophysics Data System (ADS)
Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor
Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.
He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna
2017-09-06
With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.
Future of Assurance: Ensuring that a System is Trustworthy
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire
Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.
Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S
2011-06-06
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.
2011-01-01
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214
The Defender's Role in Cyber Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.
The Graduate MIS Security Course: Objectives and Challenges
ERIC Educational Resources Information Center
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew
2009-01-01
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
An approach for investigation of secure access processes at a combined e-learning environment
NASA Astrophysics Data System (ADS)
Romansky, Radi; Noninska, Irina
2017-12-01
The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
2015-01-01
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment.
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
2015-01-01
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
Yu, Rui-Feng; Yang, Lin-Dong; Wu, Xin
2017-05-01
This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.
The role of the health physicist in nuclear security.
Waller, Edward J; van Maanen, Jim
2015-04-01
Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards.
The Role of the Health Physicist in Nuclear Security
Waller, Edward J.; van Maanen, Jim
2015-01-01
Abstract Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards. PMID:25706142
Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress
2010-11-15
American Institute of Chemical Engineers , before the Senate Committee on Environment and Public Works, June 21, 2006, S.Hrg. 109-1044. See also...American Institute of Chemical Engineers , before the Senate Committee on Environment and Public Works, June 21, 2006, S.Hrg. 109-1044. 57 The DHS...CRS Report for Congress Prepared for Members and Committees of Congress Chemical Facility Security: Reauthorization, Policy Issues, and
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702
Development of a Secure Mobile GPS Tracking and Management System
ERIC Educational Resources Information Center
Liu, Anyi
2012-01-01
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
The Importance of Trust in Electronic Commerce.
ERIC Educational Resources Information Center
Ratnasingham, Pauline
1998-01-01
Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)
17 CFR 200.553 - Draft, final and supplemental impact statements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Draft, final and supplemental impact statements. 200.553 Section 200.553 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Protection of the Environment § 200.553 Draft, final and supplemental impact statements. If the Commission...
17 CFR 200.553 - Draft, final and supplemental impact statements.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Draft, final and supplemental impact statements. 200.553 Section 200.553 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Protection of the Environment § 200.553 Draft, final and supplemental impact statements. If the Commission...
17 CFR 200.553 - Draft, final and supplemental impact statements.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Draft, final and supplemental impact statements. 200.553 Section 200.553 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Protection of the Environment § 200.553 Draft, final and supplemental impact statements. If the Commission...
17 CFR 200.553 - Draft, final and supplemental impact statements.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Draft, final and supplemental impact statements. 200.553 Section 200.553 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Protection of the Environment § 200.553 Draft, final and supplemental impact statements. If the Commission...
17 CFR 200.553 - Draft, final and supplemental impact statements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Draft, final and supplemental impact statements. 200.553 Section 200.553 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Protection of the Environment § 200.553 Draft, final and supplemental impact statements. If the Commission...
77 FR 64943 - Security Zone, Potomac and Anacostia Rivers; Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... the ability to implement comprehensive port security regimes designed to safeguard human life, vessels... communities would have. The proposed security zone is necessary to safeguard life and property on the... cumulatively have a significant effect on the human environment. This proposed rule involves establishing a...
Keeping the Care in Secure Care
ERIC Educational Resources Information Center
Cunningham, James; Hood, Terry
2011-01-01
A secure setting creates a physical perimeter that prevents youth from leaving, which can provide safety for certain troubled youth. But in this totally closed environment, staff bear major responsibility for meeting a youth's developmental needs, a role normally fulfilled by parents. Secure settings often compromise goals of care when safety…
A Study on Corporate Security Awareness and Compliance Behavior Intent
ERIC Educational Resources Information Center
Clark, Christine Y.
2013-01-01
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Building Security and Personal Safety. SPEC Kit 150.
ERIC Educational Resources Information Center
Bingham, Karen Havill
This report on a survey of Association of Research Libraries (ARL) member libraries on building security and personal safety policies examines three areas in detail: (1) general building security (access to the building, key distribution, patrols or monitors, intrusion prevention, lighting, work environment after dark); (2) problem behavior…
Stonework or Sandcastle? Asia’s Regional Security Forum.
1995-07-01
security without equal security for all," and "with the growing interdependence of states, the differences in economic and social systems, ideologies... social integration, and historical background . . . [W]e cannot directly apply a European model to the different security environment of the Asia...contentious issue of human rights, a prominent theme in CSCE, along with pressures from Western countries on social , political and environmental
Potential reduction exposure products and FDA tobacco and regulation: a CNS call to action.
Heath, Janie; Andrews, Jeannette; Balkstra, Cindy R
2004-01-01
A new generation of tobacco harm reduction products is stirring controversy and confusion among healthcare providers. These products, known as "potential reduction exposure products" (PREPs), can be described in terms of reported scientific evidence, as "the good, the bad, and the ugly." On the good side, there is sufficient scientific evidence to support the use of Commit, a new over-the-counter nicotine lozenge PREP, approved for smoking cessation. On the bad side, there is no scientific evidence to support the use of Ariva, another over-the-counter nicotine lozenge PREP, marketed as an alternative to cigarettes when smoking is restricted. On the ugly side, both of these PREPs are nicotine delivery systems with "candy-like" appearances; however, one (Commit) has the Food and Drug Administration (FDA) approval and the other (Ariva) does not. This article provides an overview of PREPs and strategies to help clinical nurse specialists (CNSs) address tobacco harm reduction issues.
Hollow carbon nanospheres/silicon/alumina core-shell film as an anode for lithium-ion batteries
Li, Bing; Yao, Fei; Bae, Jung Jun; Chang, Jian; Zamfir, Mihai Robert; Le, Duc Toan; Pham, Duy Tho; Yue, Hongyan; Lee, Young Hee
2015-01-01
Hollow carbon nanospheres/silicon/alumina (CNS/Si/Al2O3) core-shell films obtained by the deposition of Si and Al2O3 on hollow CNS interconnected films are used as the anode materials for lithium-ion batteries. The hollow CNS film acts as a three dimensional conductive substrate and provides void space for silicon volume expansion during electrochemical cycling. The Al2O3 thin layer is beneficial to the reduction of solid-electrolyte interphase (SEI) formation. Moreover, as-designed structure holds the robust surface-to-surface contact between Si and CNSs, which facilitates the fast electron transport. As a consequence, the electrode exhibits high specific capacity and remarkable capacity retention simultaneously: 1560 mA h g−1 after 100 cycles at a current density of 1 A g−1 with the capacity retention of 85% and an average decay rate of 0.16% per cycle. The superior battery properties are further confirmed by cyclic voltammetry (CV) and impedance measurement. PMID:25564245
Carter, Nancy; Lavis, John N; MacDonald-Rencz, Sandra
2014-01-01
Disseminating research to decision makers is difficult. Interaction between researchers and decision makers can identify key messages and processes for dissemination. To gain agreement on the key findings from a synthesis on the integration of advanced practice nurses, we used a modified Delphi process. Nursing decision makers contributed ideas via e-mail, discussed and clarified ideas face to face, and then prioritized statements. Sixteen (89%) participated and 14 (77%) completed the final phase. Priority key messages were around access to care and outcomes. The majority identified "NPs increase access to care" and "NPs and CNSs improve patient and system outcomes" as priority messaging statements. Participants agreed policy makers and the public were target audiences for messages. Consulting with policy makers provided the necessary context to develop tailored policy messages and is a helpful approach for research dissemination. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Carbon nanosphere-based fluorescence aptasensor for targeted detection of breast cancer cell MCF-7.
Yang, Dandan; Liu, Mei; Xu, Jing; Yang, Chao; Wang, Xiaoxiao; Lou, Yongbing; He, Nongyue; Wang, Zhifei
2018-08-01
In this work, carbon nanosphere (CNS)-based fluorescence "turn off/on" aptasensor was developed for targeted detection of breast cancer cell MCF-7 by conjugation with FAM (a dye)-labeled mucin1 (MUC1) aptamer P0 (P0-FAM), which can recognize MUC1 protein overexpressed on the surface of MCF-7. Different from other carbon based fluorescence quenching materials, CNSs prepared by the carbonization of glucose not only have the high fluorescence quenching efficiency (98.8%), but also possess negligible cytotoxicity (in the concentration range of 0-1 mg/mL, which is 10 times higher than that of traditional carbon nanotubes or graphene oxide (0-100 µg/mL)). As for the detection of the mimic of the tumor antigen MUC1, the resulting fluorescence intensity increases nearly linearly in the range of 0-6 μM with the limit of detection (LOD) of 25 nM. Copyright © 2018 Elsevier B.V. All rights reserved.
Starting a nursing consultation practice.
Schulmeister, L
1999-03-01
Because the clinical nurse specialist (CNS) role has been changed or eliminated in many hospital organizations, many CNSs in career transition are considering establishing collaborative or independent nursing consultation practices. Opportunities for consultants exist in diverse practice settings and specialties. Before starting a consultation practice, the CNS should carefully examine goals, identify resources, and begin contacting potential referral sources. He or she must also decide what form of business organization to establish and write a business plan to solidify ideas and prepare for the unexpected. Most CNS consultants rely on personal savings to cover initial business and personal expenses, and many continue working as a CNS until the consultation practice is established. Fees can be set based on community standards, what the market will bear, desired projected income, or a third-party payor's fee schedule. The consultation practice can be marketed by word of mouth, inexpensive advertising techniques such as distributing flyers and business cards, direct mall, and media advertising. In today's healthcare marketplace, opportunities abound for the CNS risk-taker interested in starting a nursing consultation practice.
A Secure Framework for Location Verification in Pervasive Computing
NASA Astrophysics Data System (ADS)
Liu, Dawei; Lee, Moon-Chuen; Wu, Dan
The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.
NASA Astrophysics Data System (ADS)
Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian
2018-01-01
Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.
The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2015-01-01
This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.
Thundercloud: Domain specific information security training for the smart grid
NASA Astrophysics Data System (ADS)
Stites, Joseph
In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.
Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
He, Jingsha; Xu, Jing; Zhu, Xingye; Zhang, Yuqiang; Zhang, Ting; Fu, Wanqing
2014-01-01
Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments. PMID:24982940
UNIX security in a supercomputing environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.
2013-09-01
AND COLLABORATION IN THE HOMELAND SECURITY ENVIRONMENT 5. FUNDING NUMBERS 6. AUTHOR(S) Andrew J. Phelps 7. PERFORMING ORGANIZATION NAME(S) AND...ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S...collaboration is important, but we are not told how to collaborate. Improvisational theater, on the other hand, is built on collaboration among performers to
DNA EMP Awareness Course Notes. Supplement to Third Edition.
1978-07-31
UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING FORM I REPORT...the environment through system design and testing. FORM 143 E,,N F’NOV 65 IS OBSOLETE DD JAN73 1473 EDITION OF UNCLASSIFIED SECURITY CLASSIFICATION OF...fields generated tems mission and deployment factors by the prompt gammas. Other forms of EMP, where these environments should be con- such as
Indicators of State Failure: Phase 2
2010-08-01
List - Security & Crime ................................................................................ 75 Table 19: Cluster List - Human... crime , environment, human development, and population and demography lines as shown in Figure 21. DRDC Toronto: Adversarial Intent Section CR 2010...Security & Crime Human Develop ment Demogra phy Environ ment Sudan 7.02 7.35 6.88 6.75 7.86 6.62 8.03 7.85 6.51 5.27 Afghanistan 6.93 7.40 7.09 6.24
A Semantic Based Policy Management Framework for Cloud Computing Environments
ERIC Educational Resources Information Center
Takabi, Hassan
2013-01-01
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
The Handbook for Campus Safety and Security Reporting. 2016 Edition
ERIC Educational Resources Information Center
US Department of Education, 2016
2016-01-01
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
2002-04-01
Training environments; Distance learning; Information sharing; System architecture; 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public... security , and the team members generally originate from different geographical locations and different units with varied operational mission and...Use of a server provides security and flexibility in the development and updating of training material. The lessons are created in HTML, a widely
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
The Price of Uncertainty in Security Games
NASA Astrophysics Data System (ADS)
Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas
In the realm of information security, lack of information about other users' incentives in a network can lead to inefficient security choices and reductions in individuals' payoffs. We propose, contrast and compare three metrics for measuring the price of uncertainty due to the departure from the payoff-optimal security outcomes under complete information. Per the analogy with other efficiency metrics, such as the price of anarchy, we define the price of uncertainty as the maximum discrepancy in expected payoff in a complete information environment versus the payoff in an incomplete information environment. We consider difference, payoffratio, and cost-ratio metrics as canonical nontrivial measurements of the price of uncertainty. We conduct an algebraic, numerical, and graphical analysis of these metrics applied to different well-studied security scenarios proposed in prior work (i.e., best shot, weakest-link, and total effort). In these scenarios, we study how a fully rational expert agent could utilize the metrics to decide whether to gather information about the economic incentives of multiple nearsighted and naïve agents. We find substantial differences between the various metrics and evaluate the appropriateness for security choices in networked systems.
A Game Theory Based Solution for Security Challenges in CRNs
NASA Astrophysics Data System (ADS)
Poonam; Nagpal, Chander Kumar
2018-03-01
Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.
Web Server Security on Open Source Environments
NASA Astrophysics Data System (ADS)
Gkoutzelis, Dimitrios X.; Sardis, Manolis S.
Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.
Evaluation of security algorithms used for security processing on DICOM images
NASA Astrophysics Data System (ADS)
Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.
2005-04-01
In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.
Radiation Shielding System Using a Composite of Carbon Nanotubes Loaded with Electropolymers
NASA Technical Reports Server (NTRS)
McKay, Chris; Chen, Bin
2012-01-01
Single-wall carbon nanotubes (SWCNTs) coated with a hydrogen-rich, electrically conducting polymer such as polyethylene, receive and dissipate a portion of incoming radiation pulse energy to electrical signals that are transmitted along the CNT axes, and are received at energy-dissipating terminals. In this innovation, an array of highly aligned nanowires is grown using a strong electric field or another suitable orientation procedure. Polyethylene (PE), polymethymlethacrylate (PMMA), or other electrically conducting polymer is spin-coated onto the SWCNTs with an average thickness of a few hundred nanometers to a few tenths of micrometers to form a PE/SWCNT composite. Alternatively, the polymer is spin-coated onto the nanowire array or an anodized alumina membrane (AAM) to form a PE/metal core shell structure, or PE can be electropolymerized using the SWCNTs or the metal nanowires as an electrode to form a PE/SWCNT core shell structure. The core shell structures can be extruded as anisotropic fibers. A monomer can be polymerized in the presence of SWCNTs to form highly cross-linked PE/SWCNT films. Alternatively, Pb colloid solution can be impregnated into a three-dimensional PE/SWCNT nanostructure to form a PW/SWCNT/Pb composite structure. A face-centered cubic (FCC) arrangement provides up to 12 interconnection channels connected to each core, with transverse channel dimensions up to 20 nm, with adequate mechanical compressive strength, and with an associated electrical conductivity of around 3 Seimens/cm for currents ranging from 0.01 to 10 mA. This threedimensional nanostructure is used as a host material to house appropriate radiation shielding material such as hydrogen- rich polymer/CNT structures, metal nanoparticles, and nanowires. Thicknesses of this material required to attenuate 10 percent, 50 percent, and 90 percent of an incident beam (gamma, X-ray, ultraviolet, neutron, proton, and electron) at energies in the range of 0 440 MeV are being determined, for example, by measuring fluence rate reduction. For example, a radiation field arrives first at an exposed surface of the innovation and produces an associated first electric field within the metal-like fingers of the three-dimensional nanostructure. This field is intensified near the exposed tips of the fingers, and this intensified field generates an intensified second electric field near the adjacent exposed tips of the coated CNSs. This generates an associated electrical current in the CNSs, and the associated electropolymer coating. The current is received by the second substrate transport component and is transported to the dissipation mechanism located contiguously to the second substrate.
NASA Astrophysics Data System (ADS)
Blount, P. J.
2017-06-01
Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.
NASA Astrophysics Data System (ADS)
Mohammadi, Hadi
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Meyer, Adrian; Green, Laura; Faulk, Ciearro; Galla, Stephen; Meyer, Anne-Marie
2016-01-01
Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information. Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training. Conclusion: A platform like SeDAP is not simply successful through technical excellence and performance. It’s adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects. PMID:27683665
COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES
2017-04-06
Today, one such weakness is the seams that exist in the system . Organizational criteria like geography , functions, and responsibilities often create...establishment by the National Security Act of 1947, the modern U.S. national security system has evolved as a result of legislation, presidential preference...and because of changes in the U.S. and international security environments. With each evolution, the system has found ways to function in dealing
2010-06-01
62 1. KPP 1: High Performing Workplace and Environment................65 a. Attribute 1. System...source for employee values and actions. The stereotypical value of the federal government employee, especially under the GS system, was job security...most directly met by this model is job security. This job security is often stereotyped by the saying; you cannot fire a government employee
Meeting EHR security requirements: SeAAS approach.
Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian
2010-01-01
In the last few years, Electronic Health Record (EHR) systems have received a great attention in the literature, as well as in the industry. They are expected to lead to health care savings, increase health care quality and reduce medical errors. This interest has been accompanied by the development of different standards and frameworks to meet EHR challenges. One of the most important initiatives that was developed to solve problems of EHR is IHE (Integrating the Healthcare Enterprise), which adapts the distributed approach to store and manage healthcare data. IHE aims at standardizing the way healthcare systems exchange information in distributed environments. For this purpose it defines several so called Integration Profiles that specify the interactions and the interfaces (Transactions) between various healthcare systems (Actors) or entities. Security was considered also in few profiles that tackled the main security requirements, mainly authentication and audit trails. The security profiles of IHE currently suffer two drawbacks. First, they apply end point security methodology, which has been proven recently to be insufficient and cumbersome in distributed and heterogeneous environment. Second, the current security profiles for more complex security requirements are oversimplified, vague and do not consider architectural design. This recently changed to some extend e.g., with the introduction of newly published white papers regarding privacy [5] and access control [9]. In order to solve the first problem we utilize results of previous studies conducted in the area of security-aware IHE-based systems and the state-of-the-art Security-as-a-Service approach as a convenient methodology to group domain-wide security needs and overcome the end point security shortcomings.
The Millennial Generation: Developing Leaders for the Future Security Environment
2011-02-15
Dumbest Generation (Penguin Group, New York, New York: 2009) p 8, 10. 19 National Academy of Sciences, “Generation Y : The Millennials …Ready or Not, Here...St ra te gy R es ea rc h Pr oj ec t THE MILLENNIAL GENERATION: DEVELOPING LEADERS FOR THE FUTURE SECURITY ENVIRONMENT BY COLONEL LANCE...Strategy Research Project 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Millennial Generation: Developing Leaders for the Future
Return with Honor: Code of Conduct Training in the National Military Strategy Security Environment
2004-09-01
maximize the number of deaths and injuries among the most vulnerable civilians, such as children, women and the elderly… The terrorist leaders - who do...Return with Honor: Code of Conduct Training in the National Military Strategy Security Environment 6. AUTHOR(S) Major Laura M. Ryan 5. FUNDING NUMBERS ...7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER
An Australian Land Force for Conflict in a World Without Precedent (Future Warfare Concept Paper)
2009-01-01
Michael B. Ryan, Australian Army Thesis: The current pace of change in the global security environment and information technology demands that, like...information) Wave societies.6 The current pace of change in the global security environment and information technology demands that, like all...Blue, downloaded from www.defence.gov.au/navy; La Franchi , Peter, “High Level Interoperability: Future Development of t Peter, “Development Role
2016-05-26
makers. The third case study, on Nigeria , will provide an analysis of a peaceful transition of power. Finally, the structure for a proposed Post...15. SUBJECT TERMS Regime Change, National Security Council, Kosovo, Libya, Nigeria , transition of power, post-regime change planning. 16. SECURITY...conflation that exists between the planning element and politically appointed decision makers. The third case study, on Nigeria , will provide an analysis of
Uncertain programming models for portfolio selection with uncertain returns
NASA Astrophysics Data System (ADS)
Zhang, Bo; Peng, Jin; Li, Shengguo
2015-10-01
In an indeterminacy economic environment, experts' knowledge about the returns of securities consists of much uncertainty instead of randomness. This paper discusses portfolio selection problem in uncertain environment in which security returns cannot be well reflected by historical data, but can be evaluated by the experts. In the paper, returns of securities are assumed to be given by uncertain variables. According to various decision criteria, the portfolio selection problem in uncertain environment is formulated as expected-variance-chance model and chance-expected-variance model by using the uncertainty programming. Within the framework of uncertainty theory, for the convenience of solving the models, some crisp equivalents are discussed under different conditions. In addition, a hybrid intelligent algorithm is designed in the paper to provide a general method for solving the new models in general cases. At last, two numerical examples are provided to show the performance and applications of the models and algorithm.
The Essence and Phases of the Comprehensive System of Ensuring the Economic Security of Enterprise
ERIC Educational Resources Information Center
Ianioglo, Alina; Polajeva, Tatjana
2017-01-01
In present conditions of instability of the environment, entrepreneurs assume the most of the business risks. In this regard, problems of ensuring the economic security become particularly important. The comprehensive system of ensuring the economic security of enterprise was worked out and the results are presented in the article. This system is…
Learner Centric in M-Learning: Integration of Security, Dependability and Trust
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Security in Distributed Collaborative Environments: Limitations and Solutions
NASA Astrophysics Data System (ADS)
Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel
The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.
Lawrence Livermore National Laboratory Environmental Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Henry E.; Armstrong, Dave; Blake, Rick G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less
Lawrence Livermore National Laboratory Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, H. E.; Bertoldo, N. A.; Blake, R. G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine
High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in reconfigurable network enclaving through Software Defined Networking (SDN) and Network Function Virtualization (NFV) and their applicability to secure enclaves in HPC environments. SDN and NFV methods are based on a solid foundation of system wide virtualization. The purpose of which is very straight forward, the system administrator can deploy networks that are more amenable to customer needs, and at the same time achieve increased scalability making it easier to increase overall capacity as needed without negatively affecting functionality. The network administration of both the server system and the virtual sub-systems is simplified allowing control of the infrastructure through well-defined APIs (Application Programming Interface). While SDN and NFV technologies offer significant promise in meeting these goals, they also provide the ability to address a significant component of the multi-tenant challenge in HPC environments, namely resource isolation. Traditional HPC systems are built upon scalable high-performance networking technologies designed to meet specific application requirements. Dynamic isolation of resources within these environments has remained difficult to achieve. SDN and NFV methodology provide us with relevant concepts and available open standards based APIs that isolate compute and storage resources within an otherwise common networking infrastructure. Additionally, the integration of the networking APIs within larger system frameworks such as OpenStack provide the tools necessary to establish isolated enclaves dynamically allowing the benefits of HPC while providing a controlled security structure surrounding these systems.« less
Security Risks: Management and Mitigation in the Software Life Cycle
NASA Technical Reports Server (NTRS)
Gilliam, David P.
2004-01-01
A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.
Transportation Security Administration in Defense of the National Aviation Infrastructure
2009-02-12
evidence suggests a hole exists within our airport security process. That hole may be caused by an over-reliance on technology and a blatant disregard of...environment enables BDOs to operate with increased effectiveness.11 Technology. Three major tools sit at the airport security technology forefront...Through Covert Testing of TSA’s Passenger Screening Process, GAO‐08‐48T, 15 Nov 07, 2. 16 Orlando News, “TSA Workers Skipping Orlando Airport Security Causes
Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian
2007-03-01
Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.
Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.
Rajivan, Prashanth; Cooke, Nancy J
2018-03-01
Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.
Educating Special Forces Junior Leaders for a Complex Security Environment
2009-07-01
Security Environment 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK...UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Joint Special Operations University,357 Tully Street Alison Building,Hurlburt Field,FL...32544 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR
IT-security challenges in IoT environments and autonomous systems
NASA Astrophysics Data System (ADS)
Heun, Ulrich
2017-05-01
Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.
Causes of Improvement in the Security Environment of Iraq, 2006-2009
2009-12-01
Thomas Ricks,4 Peter Mansoor,5 John Nagl,6 and others have argued that the surge was the mechanism by which improvement in the security environment in...September 16, 2009). 3 Bob Woodward, The War Within (New York: Simon and Schuster, 2008). 4 Thomas Ricks, The Gamble (New York: The Penguin Press, 2009...23 Bob Woodward, The War Within (New York: Simon and Schuster, 2008): 130. 24 Ibid.,136. 25 Thomas Ricks, The Gamble (New York
Impact of Export Control and Technology Transfer Regimes: International Perspectives
2012-01-07
major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea in a project...cover) was based on a survey of UK stakeholders. The results were unambiguous and striking. Our British partners conclude ITAR is a good idea gone...ITAR) regime is a major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea
Trusted computing strengthens cloud authentication.
Ghazizadeh, Eghbal; Zamani, Mazdak; Ab Manan, Jamalul-lail; Alizadeh, Mojtaba
2014-01-01
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
Trusted Computing Strengthens Cloud Authentication
2014-01-01
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. PMID:24701149
Old age security in rural China: there is a long way to go.
Dai, Bao-Zhen; Zhou, Lu-Lin; Mei, Y John
2013-11-01
We aimed to examine the current developments and challenges confronted by old age security in rural China. This study is based on the data from PubMed, Elsevier, Wiley, EBSCO, EMBASE, SCI Expanded, ProQuest, Google, and CNKI which is the most informative database in Chinese. Articles were selected with the search terms "rural", "China", "old", "older", or "elder", "elderly", or "aged", "aging", "security", "culture", "value", "medical insurance" or "community based medical insurance" or "cooperative medical scheme". Related websites and yearbooks were searched as well. The socio-economic development has made the burden of traditional care for the rural elderly heavier than ever, and new challenges are emerging in rural communities, such as poor economic, deteriorating natural environment and health crisis. The governments should improve the scale and caliber of rural old age security and strengthen regulations with great efforts in developing the rural economy and protecting the natural environment of rural communities.
An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simmhan, Yogesh; Kumbhare, Alok; Cao, Baohua
2011-07-09
Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns inherent in an information rich Smart Grid environment are further exacerbated by their deployment on Clouds. Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy. We use the Los Angeles Smart Gridmore » Project that is underway in the largest U.S. municipal utility to drive this analysis that will benefit both Cloud practitioners targeting Smart Grid applications, and Cloud researchers investigating security and privacy.« less
Security warning method and system for worker safety during live-line working
NASA Astrophysics Data System (ADS)
Jiang, Chilong; Zou, Dehua; Long, Chenhai; Yang, Miao; Zhang, Zhanlong; Mei, Daojun
2017-09-01
Live-line working is an essential part in the operations in an electric power system. Live-line workers are required to wear shielding clothing. Shielding clothing, however, acts as a closed environment for the human body. Working in a closed environment for a long time can change the physiological responses of the body and even endanger personal safety. According to the typical conditions of live-line working, this study synthesizes environmental factors related to shielding clothing and the physiological factors of the body to establish the heart rate variability index RMSSD and the comprehensive security warning index SWI. On the basis of both indices, this paper proposes a security warning method and system for the safety live-line workers. The system can monitor the real-time status of workers during live-line working to provide security warning and facilitate the effective safety supervision by the live operation center during actual live-line working.
An authentication infrastructure for today and tomorrow
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engert, D.E.
1996-06-01
The Open Software Foundation`s Distributed Computing Environment (OSF/DCE) was originally designed to provide a secure environment for distributed applications. By combining it with Kerberos Version 5 from MIT, it can be extended to provide network security as well. This combination can be used to build both an inter and intra organizational infrastructure while providing single sign-on for the user with overall improved security. The ESnet community of the Department of Energy is building just such an infrastructure. ESnet has modified these systems to improve their interoperability, while encouraging the developers to incorporate these changes and work more closely together tomore » continue to improve the interoperability. The success of this infrastructure depends on its flexibility to meet the needs of many applications and network security requirements. The open nature of Kerberos, combined with the vendor support of OSF/DCE, provides the infrastructure for today and tomorrow.« less
Monitoring of continuous-variable quantum key distribution system in real environment.
Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua
2017-08-07
How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
Romania and the New Cold War Security Challenges
2017-06-09
social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Using Swarming Agents for Scalable Security in Large Network Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crouse, Michael; White, Jacob L.; Fulp, Errin W.
2011-09-23
The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less
Secure real-time wireless video streaming in the aeronautical telecommunications network
NASA Astrophysics Data System (ADS)
Czernik, Pawel; Olszyna, Jakub
2010-09-01
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor development kid and Embedded Linux operation system.
The Natural Hospital Environment: a Socio-Technical-Material perspective.
Fernando, Juanita; Dawson, Linda
2014-02-01
This paper introduces two concepts into analyses of information security and hospital-based information systems-- a Socio-Technical-Material theoretical framework and the Natural Hospital Environment. The research is grounded in a review of pertinent literature with previously published Australian (Victoria) case study data to analyse the way clinicians work with privacy and security in their work. The analysis was sorted into thematic categories, providing the basis for the Natural Hospital Environment and Socio-Technical-Material framework theories discussed here. Natural Hospital Environments feature inadequate yet pervasive computer use, aural privacy shortcomings, shared workspace, meagre budgets, complex regulation that hinders training outcomes and out-dated infrastructure and are highly interruptive. Working collaboratively in many cases, participants found ways to avoid or misuse security tools, such as passwords or screensavers for patient care. Workgroup infrastructure was old, architecturally limited, haphazard in some instances, and was less useful than paper handover sheets to ensure the quality of patient care outcomes. Despite valiant efforts by some participants, they were unable to control factors influencing the privacy of patient health information in public hospital settings. Future improvements to hospital-based organisational frameworks for e-health can only be made when there is an improved understanding of the Socio-Technical-Material theoretical framework and Natural Hospital Environment contexts. Aspects within control of clinicians and administrators can be addressed directly although some others are beyond their control. An understanding and acknowledgement of these issues will benefit the management and planning of improved and secure hospital settings. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Risk management and security services interaction--a must in today's health care environment.
Stultz, M S
1990-01-01
The author shows why risk managers and security directors are natural partners in the effort of a hospital to reduce risks from such occurrences as baby kidnappings, serial killers, thefts, and rapes/sexual assaults.
76 FR 1519 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... comprehensive port security regime designed to safeguard human life, vessels, and waterfront facilities against... do not individually or cumulatively have a significant effect on the human environment. This rule is...
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
The New Pacific Security Environment: Challenges and Opportunities
1993-01-01
Retreat 249 Doug Bandow 17. Playing Catch Among the Crystal: Planning Tomorrow’s Pacific Security Today 253 Charles R. Larson viii 18. Does...much it may be in the interest of Asian nations to have us stay. he argues, it is in our interest to leave. Admiral Charles Larson would no doubt...Tomorrow’s Pacific Security Today Charles R. Larson I’M PLEASED TO RFPORT OUR SECURITY POST- ure in the Pacific is in good shape. And I’m optimistic our
The Evaluation of Land Ecological Safety of Chengchao Iron Mine Based on PSR and MEM
NASA Astrophysics Data System (ADS)
Jin, Xiangdong; Chen, Yong
2018-01-01
Land ecological security is of vital importance to local security and sustainable development of mining activities. The study has analyzed the potential causal chains between the land ecological security of Iron Mine mining environment, mine resource and the social-economic background. On the base of Pressure-State-Response model, the paper set up a matter element evaluation model of land ecological security, and applies it in Chengchao iron mine. The evaluation result proves to be effective in land ecological evaluation.
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
NASA Astrophysics Data System (ADS)
Borgohain, Tuhin; Borgohain, Amardeep; Borgohain, Rajdeep; Sanyal, Sugata
2015-02-01
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments
ERIC Educational Resources Information Center
Zhang, Yue
2010-01-01
Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…
42 CFR 403.742 - Condition of participation: Physical environment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... temperature control and appropriate lighting levels to ensure a safe and secure environment. (4) A written... 42 Public Health 2 2010-10-01 2010-10-01 false Condition of participation: Physical environment... environment. A RNHCI must be designed, constructed, and maintained to ensure the safety of the patients, staff...
Autonomous Byte Stream Randomizer
NASA Technical Reports Server (NTRS)
Paloulian, George K.; Woo, Simon S.; Chow, Edward T.
2013-01-01
Net-centric networking environments are often faced with limited resources and must utilize bandwidth as efficiently as possible. In networking environments that span wide areas, the data transmission has to be efficient without any redundant or exuberant metadata. The Autonomous Byte Stream Randomizer software provides an extra level of security on top of existing data encryption methods. Randomizing the data s byte stream adds an extra layer to existing data protection methods, thus making it harder for an attacker to decrypt protected data. Based on a generated crypto-graphically secure random seed, a random sequence of numbers is used to intelligently and efficiently swap the organization of bytes in data using the unbiased and memory-efficient in-place Fisher-Yates shuffle method. Swapping bytes and reorganizing the crucial structure of the byte data renders the data file unreadable and leaves the data in a deconstructed state. This deconstruction adds an extra level of security requiring the byte stream to be reconstructed with the random seed in order to be readable. Once the data byte stream has been randomized, the software enables the data to be distributed to N nodes in an environment. Each piece of the data in randomized and distributed form is a separate entity unreadable on its own right, but when combined with all N pieces, is able to be reconstructed back to one. Reconstruction requires possession of the key used for randomizing the bytes, leading to the generation of the same cryptographically secure random sequence of numbers used to randomize the data. This software is a cornerstone capability possessing the ability to generate the same cryptographically secure sequence on different machines and time intervals, thus allowing this software to be used more heavily in net-centric environments where data transfer bandwidth is limited.
NASA Astrophysics Data System (ADS)
Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout
This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.
2015-09-01
colonels would be providing junior officers with the same “ rich feedback, individual attention, praise, guidance, and direction” that millennials are...Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c
2009-06-12
OF MILITARY ART AND SCIENCE General Studies by KAREN J. DILL, MAJ, USA M.A.E.D., University of Phoenix , Hampton, Virginia, 2005 B.A...policy areas or gaps that require clarification or revision in light of the 21st century security environment and the changes in Army structure, doctrine...researcher identified policy gaps by determining how verbiage is understood in light of the modern OE and Army organization and tactics changes. The
Research on Influence of Cloud Environment on Traditional Network Security
NASA Astrophysics Data System (ADS)
Ming, Xiaobo; Guo, Jinhua
2018-02-01
Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.
Security Cooperation Organizations in the Country Team: Options for Success
2010-01-01
JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Security Cooperation Organizations in the Country Team Options for Success Terrence K. Kelly, Jefferson P. Marquis, Cathryn Quantic Thurston...Tommie Sue Montgomery, “Fighting Guerrillas: The United States and Low-Intensity Conflict in El Salvador,” New Political Science , Vol. 9, No. 18–19
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
Finding the ’RITE’ Acquisition Environment for Navy C2 Software
2015-05-01
Boiler plate contract language - Gov purpose Rights • Adding expectation of quality to contracting language • Template SOW’s created Pr...Debugger MCCABE IQ Static Analysis Cyclomatic Complexity and KSLOC. All Languages HP Fortify Security Scan STIG and Vulnerabilities Security & IA...GSSAT (GOTS) Security Scan STIG and Vulnerabilities AutoIT Automated Test Scripting Engine for Automation Functional Testing TestComplete Automated
China in Africa: An AFRICOM Response
2009-01-01
physical security of Chinese investment and, more fundamentally, whether agreements with the current sitting government will have lasting economic and...political and economic stability in Africa. These interests support U.S. security objectives in Africa, encouraging more ef- fective governance and mitigating...grievances against the status quo. Conse- quently, in the furtherance of its mission “to promote a stable and secure African environment,” the newly
76 FR 62420 - Statement of Organization, Functions and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-07
... leadership, consultation, training, and management services for HRSA's enterprise computing environment; (2... responsibility with improved security management capabilities and improved alignment of current security... responsible for the organization, management, and administrative functions necessary to carry out the...
17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the issuer's consolidated financial statements and not located in a hyperinflationary environment..., Oct. 5, 1999] Consolidated and Combined Financial Statements ... SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES...
Methods of Organizational Information Security
NASA Astrophysics Data System (ADS)
Martins, José; Dos Santos, Henrique
The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.
Safety | Argonne National Laboratory
laboratory's ongoing effort to provide a safe and productive environment for employees, users, other site Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Environment Careers Education Community Diversity Directory Energy Environment National Security User Facilities
3 CFR - Classified Information and Controlled Unclassified Information
Code of Federal Regulations, 2010 CFR
2010-01-01
... declassification of information in the electronic environment, as recommended by the Commission on the Intelligence... need in recent years to enhance national security by establishing an information sharing environment... information within the information sharing environment. In the absence of a single, comprehensive framework...
Nunnery, Danielle L; Labban, Jeffrey D; Dharod, Jigna M
2018-03-01
To (i) determine differences in the availability of variety of fruits and vegetables (F&V) at home by food security status; and (ii) examine the inter-associations between food security status, availability of variety of F&V at home and frequency of F&V intake, among low-income pregnant women. Design/Setting Participants were interviewed to collect food security status, home availability of variety of F&V and frequency of F&V intake. Bivariate analyses, multivariate regression and exploratory mediation analyses were conducted using IBM SPSS Statistics version 23.0 and the PROCESS macro. Low-income pregnant women (n 198) were interviewed if they were ≥18 years of age, in the second trimester of pregnancy, and spoke English or Spanish. Low/very low food security was found among 43 % of participants. Compared with fully food-secure participants, very low food-secure participants reported a lower variety of fruits (P=0·028) and vegetables (P=0·058) available at home. Mediation analyses indicated that through home availability of variety of fresh F&V, food security status was associated with the daily intake of F&V (indirect effect (95 % CI): fresh fruits, -0·039 (-0·074, -0·013); fresh vegetables, -0·048 (-0·083, -0·023)). As food security worsened, the available variety of fresh F&V decreased, which was associated with lower intake. The study highlights the interlink between food security, home food environment and diet quality, and the importance of nutrition education intervention to promote a healthy home food environment and improved pregnancy outcomes among low-income women.
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
2015-01-01
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
ERIC Educational Resources Information Center
Technology & Learning, 2008
2008-01-01
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
The ISACA Business Model for Information Security: An Integrative and Innovative Approach
NASA Astrophysics Data System (ADS)
von Roessing, Rolf
In recent years, information security management has matured into a professional discipline that covers both technical and managerial aspects in an organisational environment. Information security is increasingly dependent on business-driven parameters and interfaces to a variety of organisational units and departments. In contrast, common security models and frameworks have remained largely technical. A review of extant models ranging from [LaBe73] to more recent models shows that technical aspects are covered in great detail, while the managerial aspects of security are often neglected.Likewise, the business view on organisational security is frequently at odds with the demands of information security personnel or information technology management. In practice, senior and executive level management remain comparatively distant from technical requirements. As a result, information security is generally regarded as a cost factor rather than a benefit to the organisation.
Use of an Objective Structured Clinical Examination in Clinical Nurse Specialist Education.
Cuevas, Heather E; Timmerman, Gayle M
2016-01-01
Helping patients maximize their potential using expert coaching to facilitate lifestyle change is an important practice area for clinical nurse specialists (CNSs). The purpose is to determine the usefulness of objective structured clinical examinations (OSCEs) for evaluating CNS students' coaching competencies in the context of facilitating lifestyle change. Despite the use of OSCEs to assess competencies in clinical skills (eg, performance of procedures, decision making), its potential for evaluating coaching competencies for lifestyle change has not been demonstrated. We developed 4 OSCEs dealing with coaching patients in exercise, weight loss, stress reduction, or nonpharmacologic management of hyperlipidemia. Evaluation criteria included (1) approach to the patient, (2) information gathering, (3) motivational interviewing, and (4) management (medical and behavioral strategies). Student performance ranged from highly organized with proficient coaching skills to disorganized and focused solely on clinical management and prescriptive communication. Student responses were positive. Objective structured clinical examinations were highly useful for evaluating CNS students' coaching competencies for lifestyle change. Using OSCEs early in the semester to provide students feedback on their performance and again at the end to determine improvement optimizes use of this teaching strategy.
Group functioning of a collaborative family research team.
Johnson, S K; Halm, M A; Titler, M G; Craft, M; Kleiber, C; Montgomery, L A; Nicholson, A; Buckwalter, K; Cram, E
1993-07-01
Collaborative research teams are an attractive means of conducting nursing research in the clinical setting because of the many opportunities that collaboration can supply. These opportunities include a chance to: (1) network with other nurses who have similar interests, (2) share knowledge and expertise for designing clinical studies that directly affect daily practice, (3) develop instruments, (4) write grant proposals, (5) collect and analyze data, and (6) prepare manuscripts for publication. The effectiveness of research teams, however, is strongly influenced by group functioning. This article describes the functioning of a collaborative family interventions research team of nursing faculty members and CNSs at a large Midwestern university setting. The formation of the group and membership characteristics are described, along with strategies used to identify the research focus and individual and group goals. Aspects related to the influence of the group on members and the internal operations of the group are also addressed. Future strategies to be explored will focus on the size of the group and joint authorship issues. The authors also set forth a number of recommendations for development of collaborative research groups.
Promoting Productive Urban Green Open Space Towards Food Security: Case Study Taman Sari, Bandung
NASA Astrophysics Data System (ADS)
Ridwan, M.; Sinatra, Fran; Natalivan, Petrus
2017-10-01
The common trend of urban population has been growing significantly in Indonesia for decades, are affected by urban green space conversion. Generally, this area is utilized for urban infrastructures and residences. Furthermore, urban area has grown uncontrollably that could enhance the phenomenon of urban sprawl. The conversion of green urban area and agricultural area will significantly decrease urban food security and quality of urban environment. This problem becomes a serious issue for urban sustainability. Bandung is a city with dense population where there are many poor inhabitants. Families living in poverty are subjected to food insecurity caused by the rise of food prices. Based on the urgency of urban food security and urban environment quality the local government has to achieve comprehensive solutions. This research aims to formulate the policy of productive green open space towards food security for poor people in Bandung. This research not only examines the role played by productive green open space to supply food for the urban poor but also how to govern urban areas sustainably and ensure food security. This research uses descriptive explanatory methodology that describes and explains how to generate policy and strategic planning for edible landscape to promote urban food security. Taman Sari is the location of this research, this area is a populous area that has amount of poor people and has a quite worse quality of urban environment. This study shows that urban green open space has the potential to be utilized as an urban farming land, which poor inhabitants could be main actors to manage urban agriculture to provide their food. Meanwhile, local government could contribute to subsidize the financial of urban farming activities.
Bigdata Driven Cloud Security: A Survey
NASA Astrophysics Data System (ADS)
Raja, K.; Hanifa, Sabibullah Mohamed
2017-08-01
Cloud Computing (CC) is a fast-growing technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space, and software. Recently, it has been observed that massive growth in the scale of data or big data generated through cloud computing. CC consists of a front-end, includes the users’ computers and software required to access the cloud network, and back-end consists of various computers, servers and database systems that create the cloud. In SaaS (Software as-a-Service - end users to utilize outsourced software), PaaS (Platform as-a-Service-platform is provided) and IaaS (Infrastructure as-a-Service-physical environment is outsourced), and DaaS (Database as-a-Service-data can be housed within a cloud), where leading / traditional cloud ecosystem delivers the cloud services become a powerful and popular architecture. Many challenges and issues are in security or threats, most vital barrier for cloud computing environment. The main barrier to the adoption of CC in health care relates to Data security. When placing and transmitting data using public networks, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model during deployment. This survey deeply covers the CC security issues (covering Data Security in Health care) so as to researchers can develop the robust security application models using Big Data (BD) on CC (can be created / deployed easily). Since, BD evaluation is driven by fast-growing cloud-based applications developed using virtualized technologies. In this purview, MapReduce [12] is a good example of big data processing in a cloud environment, and a model for Cloud providers.
NASA Astrophysics Data System (ADS)
Lall, U.
2017-12-01
As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for the approval of the strategies that are implemented. In this talk, I will strive to lay out a cognitive framework for how performance evaluation of water security, and instrument design for assurance can be approached from a multi-stress and multi-user perspective. Selected examples will be used to lillustrate the idea in the context of America's Water.
Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E.; Tkachenko, Valery; Torcivia-Rodriguez, John; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja
2016-01-01
The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure. The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu PMID:26989153
Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E; Tkachenko, Valery; Torcivia-Rodriguez, John; Voskanian, Alin; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja
2016-01-01
The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure.The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu. © The Author(s) 2016. Published by Oxford University Press.
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Army Global Basing Posture: An Analytic Framework for Maximizing Responsiveness and Effectiveness
2015-01-01
potential changes in the national security environment and to evaluate U.S. Army stationing, prepositioning, security cooperation activities, and...report should be of interest to those concerned with U.S. global posture and national security strategy, especially as it pertains to U.S. land power...40 A.1. United Nations Support Index for Plenary Votes, by State ................................................ 64 A.2. United Nations
ERIC Educational Resources Information Center
Umemura, Tomotaka; Watanabe, Manami; Tazuke, Kohei; Asada-Hirano, Shintaro; Kudo, Shimpei
2018-01-01
The universality of secure base construct, which suggests that one's use of an attachment figure as a secure base from which to explore the environment is an evolutionary outcome, is one of the core ideas of attachment theory. However, this universality idea has been critiqued because exploration is not as valued in Japanese culture as it is in…
Security Controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE).
1985-03-01
call programs as authorized after checks by the Terminal Management Subsystem on SAS databases . SAS overlays the TANDEM GUARDIAN operating system to...Security Access Profile database (SAP) and a query capability generating various security reports. SAS operates with the System Monitor (SMON) subsystem...system to DDN and other components. The first SAS component to be reviewed is the SAP database . SAP is organized into two types of files. Relational
Latin America in the 1980’s: The Strategic Environment and Inter-American Security.
1981-06-15
Investigaciones socio-economicas (CISEC), Las Fuerzas Armadas en la Sociedad Civil, Santiago: Talleres Graficos , pages 143-229. 25. A 1976 International Monetary...Moreover, Latin American countries, notably Brazil, Peru, and Chile , have elaborated and implemented comprehensive national security doctrines that...equate development and social integration with national security. In the 1980’s Argentina, Brazil, Chile , Colombia, Mexico, Peru and Venezuela-the seven
Towards a Cross-Domain MapReduce Framework
2013-11-01
These Big Data applications typically run as a set of MapReduce jobs to take advantage of Hadoop’s ease of service deployment and large-scale...parallelism. Yet, Hadoop has not been adapted for multilevel secure (MLS) environments where data of different security classifications co-exist. To solve...multilevel security. I. INTRODUCTION The US Department of Defense (DoD) and US Intelligence Community (IC) recognize they have a Big Data problem
A sensor monitoring system for telemedicine, safety and security applications
NASA Astrophysics Data System (ADS)
Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka
2017-02-01
A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.
Building a gateway with open source software for secure-DICOM communication over insecure networks
NASA Astrophysics Data System (ADS)
Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland
2002-05-01
For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
NASA Astrophysics Data System (ADS)
Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.
2002-08-01
This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.
Safer environment makes sense for all.
Frith, Sue
2011-06-01
Sue Frith, deputy head of the NHS Security Management Service (NHS SMS), explains the organisation's important role in advising, and supporting, security staff at NHS hospitals in dealing with incidents ranging from verbal abuse to serious violence and aggression. Arguing that security in the NHS is "everyone's business", she explains both a range of processes and initiatives,already in place to safeguard people and assets, and discusses recent developments, such as a new incident reporting website, designed to help keep patients, staff, visitors, and property, at healthcare facilities safe and secure.
Nevada National Security Site Environmental Report 2012 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy A
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2016, Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2013 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
CAS. Controlled Access Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-01
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
Ownership, Privacy, Confidentiality, and Security Data.
ERIC Educational Resources Information Center
Staman, E. Michael
1986-01-01
One of the areas most often neglected by those responsible for information systems in colleges and universities relates to ownership, privacy, confidentiality, and security of data. Background information and definitions are provided, and a suggested environment is described. Model recommendations for institutional policy are offered. (MLW)
DOT National Transportation Integrated Search
2017-02-01
Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can c...
IT Security on Campus: A Fragile Equilibrium.
ERIC Educational Resources Information Center
Wada, Kent
2003-01-01
Considers how to provide appropriate levels of information technology (IT) security in the higher education environment. Discusses implications of the Digital Millennium Copyright Act, the USA Patriot Act, the Health Insurance Portability and Accountability Act of 1996, California Information Practices Act, VISA USA Cardholder Information Security…
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A
2014-08-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.
Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.
2014-01-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148
Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.
Keys, Yolanda; Stichler, Jaynelle F
Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.
Open-area concealed-weapon detection system
NASA Astrophysics Data System (ADS)
Pati, P.; Mather, P.
2011-06-01
Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2013-01-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2014-07-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
NASA Technical Reports Server (NTRS)
1986-01-01
The Johnson Space Center Management Information System (JSCMIS) is an interface to computer data bases at NASA Johnson which allows an authorized user to browse and retrieve information from a variety of sources with minimum effort. This issue gives requirements definition and design specifications for versions 2.1 and 2.1.1, along with documented test scenario environments, and security object design and specifications.
2000-07-01
Poverty; growing gap between rich and poor 30. Increasing intensive use of chemical fertilizer, pesticides and detergents 31. Destruction of coral reefs ... oceans 24. Fishery depletion due to over-fishing 25. Forest fires like those in Indonesia, Australia, Amazonian and Mediterranean countries 26...to abate eutrophication and acidification , as well as pollution of the marine environment, in particular coastal areas, from land-based sources
Surveillance of ground vehicles for airport security
NASA Astrophysics Data System (ADS)
Blasch, Erik; Wang, Zhonghai; Shen, Dan; Ling, Haibin; Chen, Genshe
2014-06-01
Future surveillance systems will work in complex and cluttered environments which require systems engineering solutions for such applications such as airport ground surface management. In this paper, we highlight the use of a L1 video tracker for monitoring activities at an airport. We present methods of information fusion, entity detection, and activity analysis using airport videos for runway detection and airport terminal events. For coordinated airport security, automated ground surveillance enhances efficient and safe maneuvers for aircraft, unmanned air vehicles (UAVs) and unmanned ground vehicles (UGVs) operating within airport environments.
International Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, James E.
2012-08-14
This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less
46 CFR 151.03-19 - Environment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Environment. 151.03-19 Section 151.03-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES BARGES CARRYING BULK LIQUID HAZARDOUS MATERIAL CARGOES Definitions § 151.03-19 Environment. This term refers to the atmosphere...
Implementing AORN recommended practices for a safe environment of care, part II.
Kennedy, Lynne
2014-09-01
Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
2016-12-01
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
2016-01-01
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments. PMID:27916962
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2015-09-01
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... in the test environment. The test environment is designed to closely mirror the live trading... Test Environment November 13, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934... fees under Rule 7030(d) for use of the NASDAQ Testing Facility (``NTF'') test environment located in...
ERIC Educational Resources Information Center
Harrison, Linda
This booklet provides suggestions for reassessing, modifying, and arranging child care center environments to best serve the needs of children and staff. The booklet notes that a well-planned environment can provide young children with appropriate and challenging learning experiences within a consistent and secure setting. Such an environment also…
Report #15-P-0013, November 10, 2014. Continued security breaches at some sites could impair the effectiveness of the remedy to protect human health and the environment and could expose trespassers to safety or health risks.
77 FR 73464 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...
2009-06-12
and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
The Challenge of Small Satellite Systems to the Space Security Environment
2012-03-01
Space, 1945–1995, (New York: Dodd, Mead & Company, Inc. 1984), 142. 40 Moltz, The Politics of Space Security, 93. 41William E. Burrows , Deep Black...90 Stares, The Militarization of Space, 170. 91 Ibid. 92 Burrows , Deep Black, 279- 280. 30 to gather together in 1978 at the request...www.technologynewsroom.com/press_releases/company_releases.aspx?sto ry=522. Burrows , William E. Deep Black: Space Espionage and National Security
Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges
2010-07-01
the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity
2009-01-01
country in order to establish a physically and psychologically secured environment conducive to national development."g Challenges to Inter.naI Security...be accommodated under the present Constitution and laws particularly the powers conceded by the MOA-AD to the 5 Bangsamoro Juridical Entity (BJE, an...AFP under Magsaysay underwent organizational changes with the introduction of psychological warfare activities that .complemented the usual combat
Protecting proprietary rights - A potential Shuttle user's view
NASA Technical Reports Server (NTRS)
Day, J. B.
1977-01-01
Maintaining a high degree of industrial security in the multiple-payload Shuttle environment poses a number of problems for NASA. As a part of Battelle-Columbus' support of NASA's User Development Program, this paper presents a potential user's perspective on this situation. The need for security, the nature of the problem, and precedents for NASA security measures are discussed. Eleven policy guidelines representing desirable features from a potential user's viewpoint are presented for NASA consideration.
2009-12-17
IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital
2002-09-01
Secure Multicast......................................................................24 i. Message Digests and Message Authentication Codes ( MACs ...that is, the needs of the VE will determine what the design will look like (e.g., reliable vs . unreliable data communications). In general, there...Molva00] and [Abdalla00]. i. Message Digests and Message Authentication Codes ( MACs ) Message digests and MACs are used for data integrity verification
A study of IEEE 802.15.4 security framework for wireless body area networks.
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358
Collusion issue in video watermarking
NASA Astrophysics Data System (ADS)
Doerr, Gwenael; Dugelay, Jean-Luc
2005-03-01
Digital watermarking has first been introduced as a possible way to ensure intellectual property (IP) protection. However, fifteen years after its infancy, it is still viewed as a young technology and digital watermarking is far from being introduced in Digital Right Management (DRM) frameworks. A possible explanation is that the research community has so far mainly focused on the robustness of the embedded watermark and has almost ignored security aspects. For IP protection applications such as fingerprinting and copyright protection, the watermark should provide means to ensure some kind of trust in a non secure environment. To this end, security against attacks from malicious users has to be considered. This paper will focus on collusion attacks to evaluate security in the context of video watermarking. In particular, security pitfalls will be exhibited when frame-by-frame embedding strategies are enforced for video watermarking. Two alternative strategies will be surveyed: either eavesdropping the watermarking channel to identify some redundant hidden structure, or jamming the watermarking channel to wash out the embedded watermark signal. Finally, the need for a new brand of watermarking schemes will be highlighted if the watermark is to be released in a hostile environment, which is typically the case for IP protection applications.
NASA Astrophysics Data System (ADS)
Vijay Singh, Ran; Agilandeeswari, L.
2017-11-01
To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.
Sustainability impact assessment to improve food security of smallholders in Tanzania
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schindler, Jana, E-mail: jana.schindler@zalf.de; Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin; Graef, Frieder, E-mail: graef@zalf.de
The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agriculturalmore » production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.« less
A privacy authentication scheme based on cloud for medical environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn
2014-11-01
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
A Study of Security Awareness Information Delivery within the Defense Intelligence Community
ERIC Educational Resources Information Center
Krasley, Paul F.
2011-01-01
Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…
Securing the Data Storage and Processing in Cloud Computing Environment
ERIC Educational Resources Information Center
Owens, Rodney
2013-01-01
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…
Automatic Web-based Calibration of Network-Capable Shipboard Sensors
2007-09-01
Server, Java , Applet, and Servlet . 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...49 b. Sensor Applet...........................................................................49 3. Java Servlet ...Table 1. Required System Environment Variables for Java Servlet Development. ......25 Table 2. Payload Data Format of the POST Requests from
Teaching Network Security in a Virtual Learning Environment
ERIC Educational Resources Information Center
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik
2004-01-01
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Information Security and Privacy in Network Environments.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quirk, W.J.; Canada, J.; de Vore, L.
1994-04-01
This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.
OAS - Organization of American States: Democracy for peace, security, and
Elections Environment Equity G General Assembly Governance H Human Development Human Rights I Indigenous Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and Technology Social Development Summits of the Americas Sustainable Development T Telecommunications Terrorism Tourism
The Handbook for Campus Crime Reporting
ERIC Educational Resources Information Center
Ward, Diane; Lee, Janice
2005-01-01
Campus security and safety are important issues in postsecondary education today. Providing students nationwide with a safe environment in which to learn and keeping students, parents and employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced by the Crime Awareness and Campus…
Custodians/Security Program Evaluation.
ERIC Educational Resources Information Center
Ennis, Bob
The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…
Microcomputer Security Issues in an Office Environment.
1986-11-01
Holmes Inc. A. 4605 Post Oak Place Drive, Suite 209 Houston, Texas 77027 r -w (713) 840-7771 Lockit I/Lockit II Security Microsystems Consultants 16...9300 MultiSentry/ComputerSentry Tact Technology 100 North 20th Street Philadelphia, PA 19103 (215) 569-1300 . Sherlock PC/ISM/ISM-Federal Analytics
78 FR 54392 - Security Zone, Baltimore Harbor, Baltimore's Inner Harbor; Baltimore, MD
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-04
... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... of the Port the ability to implement comprehensive port security regimes designed to safeguard human life, vessels, and waterfront facilities while still sustaining the flow of commerce. The Captain of...
Perilous Human Security in South Asia: Are There Ways Out?
2011-03-21
threats directed against women and child . Most people derive security from their membership in a group – a family, a community, an organization, a...Strategic Environment, 10-11. 84 Aun Porn Moniroth, “Economic Integration in East Asia – Cambodia’s Experience” in East Asian Visions, ed. Indermit Gil
OAS - Organization of American States: Democracy for peace, security, and
Elections Environment Equity G General Assembly Governance H Human Development Human Rights I Indigenous Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and Technology cooperation among states and advance a common regional agenda on democratic governance, human rights
ERIC Educational Resources Information Center
Jokela, Paivi; Karlsudd, Peter
2007-01-01
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Security of Personal Computer Systems: A Management Guide.
ERIC Educational Resources Information Center
Steinauer, Dennis D.
This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…
Health and security in the global village.
Evans, G
1993-01-01
With the ecological stability of the world under threat, no country can stand alone. National security should no longer be viewed in a purely military light but rather as a matter demanding cooperation between all countries on a broad range of vital issues, not least those related to health and the environment.
Pangalos, George
2001-01-01
Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented. PMID:11720956
Ilioudis, C; Pangalos, G
2001-01-01
The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented.
Security Measures to Protect Mobile Agents
NASA Astrophysics Data System (ADS)
Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh
2010-11-01
The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.
Protecting genomic data analytics in the cloud: state of the art and opportunities.
Tang, Haixu; Jiang, Xiaoqian; Wang, Xiaofeng; Wang, Shuang; Sofia, Heidi; Fox, Dov; Lauter, Kristin; Malin, Bradley; Telenti, Amalio; Xiong, Li; Ohno-Machado, Lucila
2016-10-13
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, 'anonymization' and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.
NASA Astrophysics Data System (ADS)
Wang, Qiang
2017-09-01
As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.
A Secure Communication Suite for Underwater Acoustic Sensor Networks
Dini, Gianluca; Duca, Angelica Lo
2012-01-01
In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204
Analysis of security and threat of underwater wireless sensor network topology
NASA Astrophysics Data System (ADS)
Yang, Guang; Wei, Zhiqiang; Cong, Yanping; Jia, Dongning
2012-04-01
Underwater wireless sensor networks (UWSNs) are a subclass of wireless sensor networks. Underwater sensor deployment is a significant challenge due to the characteristics of UWSNs and underwater environment. Recent researches for UWSNs deployment mostly focus on the maintenance of network connectivity and maximum communication coverage. However, the broadcast nature of the transmission medium incurs various types of security attacks. This paper studies the security issues and threats of UWSNs topology. Based on the cluster-based topology, an underwater cluster-based security scheme (U-CBSS) is presented to defend against these attacks. and safety.
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
Assessment of the work environment of faculty of a Medical College in Pakistan.
Saeed, Abid; Butt, Zahid Ahmad
2014-01-01
Extensive research is done on nursing work environments but less is known about the job conditions and environments of other health professionals. This study was aimed to fill this information gap by highlighting the factors affecting the work environment and stressors causing turnover of staff. A cross sectional study was conducted in Bolan Medical College Quetta for the assessment of working environment of the faculty from 22nd April to 22nd July 2012. All permanent teaching staff was included. A structured questionnaire was adopted fromI health sciences association of Alberta (HSSA), 2006 work Environment Survey. An observational check list for assessment of the physical environment /infrastructure and other general physical stuff was used. The faculty menibers were-not-satisfied with the security and safety of their work place but were satisfied with salaries, employer, and management. Work teams and relationship between employees and employers were respectful with good communication. Majority found their work times stressful and opportunities for on job trainings and professional development, adequate tools, equipment and conditions were mostly lacking. The overall working environment is not that good and few areas need serious attention like: professional development, trainings, adequate equipment, and security.
A layered trust information security architecture.
de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon
2014-12-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.
Interpreting international governance standards for health IT use within general medical practice.
Mahncke, Rachel J; Williams, Patricia A H
2014-01-01
General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
1999-01-01
This article reports on the PEDA (population changes, environment, socioeconomic development and agriculture) model and its implication for policy-making in Africa. PEDA is an interactive computer simulation model (developed for a Windows environment) demonstrating the long-term impacts of alternative national policies on food security status of the population. The model is based on multistate demographic techniques, projecting at the same time 8 different subgroups (by age and sex) in the population, and based on 3 dichotomous individual characteristics: urban/rural place of residence; literacy status; and food security status. Through the manipulation of scenario variables, the model enables the user to project the proportion of the population that will be food secure and food insecure for a chosen point in time. This model developed by Dr. W. Lutz, Director of the International Institute for Applied Systems Analysis, will serve as an advocacy tool to help convince policy-makers and country experts in Africa of the negative synergy arising from the interconnections of population growth, environmental deterioration, and declining agricultural production.
Integrity mechanism for eHealth tele-monitoring system in smart home environment.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2009-01-01
During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.
National Center for Nuclear Security - NCNS
None
2018-01-16
As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.
Venipuncture and intravenous infusion access during zero-gravity flight
NASA Technical Reports Server (NTRS)
Krupa, Debra T.; Gosbee, John; Billica, Roger; Bechtle, Perry; Creager, Gerald J.; Boyce, Joey B.
1991-01-01
The purpose of this experiment is to establish the difficulty associated with securing an intravenous (IV) catheter in place in microgravity flight and the techniques applicable in training the Crew Medical Officer (CMO) for Space Station Freedom, as well as aiding in the selection of appropriate hardware and supplies for the Health Maintenance Facility (HMF). The objectives are the following: (1) to determine the difficulties associated with venipuncture in a microgravity environment; (2) to evaluate the various methods of securing an IV catheter and attached tubing for infusion with regard to the unique environment; (3) to evaluate the various materials available for securing an intravenous catheter in place; and (4) to evaluate the fluid therapy administration system when functioning in a complete system. The inflight test procedures and other aspects of the KC-135 parabolic flight test to simulate microgravity are presented.
Secure Infant-Mother Attachment Buffers the Effect of Early-Life Stress on Age of Menarche.
Sung, Sooyeon; Simpson, Jeffry A; Griskevicius, Vladas; Kuo, Sally I-Chun; Schlomer, Gabriel L; Belsky, Jay
2016-05-01
Prior research indicates that being reared in stressful environments is associated with earlier onset of menarche in girls. In this research, we examined (a) whether these effects are driven by exposure to certain dimensions of stress (harshness or unpredictability) during the first 5 years of life and (b) whether the negative effects of stress on the timing of menarche are buffered by secure infant-mother attachment. Results revealed that (a) exposure to greater harshness (but not unpredictability) during the first 5 years of life predicted earlier menarche and (b) secure infant-mother attachment buffered girls from this effect of harsh environments. By connecting attachment research to its evolutionary foundations, these results illuminate how environmental stressors and relationships early in life jointly affect pubertal timing. © The Author(s) 2016.
Security and Efficiency Concerns With Distributed Collaborative Networking Environments
2003-09-01
have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while
Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks
NASA Astrophysics Data System (ADS)
Song, Jae-Gu; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo
This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.
Institutionalizing Sustainability into the Total Army
2008-03-14
unsustainable world in which we live has an impact on our national security. Today it is clear that linkages between the environment and security are powerful...U.S. national security interests…” 31 The world is in an unsustainable state as it continues to incur a vast water deficit by consuming water belonging...any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ahn, Gail-Joon
The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid
2016-01-01
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques. PMID:27384239
Abdulhamid, Shafi'i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid
2016-01-01
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
High-Surety Telemedicine in a Distributed, 'Plug-andPlan' Environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craft, Richard L.; Funkhouser, Donald R.; Gallagher, Linda K.
1999-05-17
Commercial telemedicine systems are increasingly functional, incorporating video-conferencing capabilities, diagnostic peripherals, medication reminders, and patient education services. However, these systems (1) rarely utilize information architectures which allow them to be easily integrated with existing health information networks and (2) do not always protect patient confidentiality with adequate security mechanisms. Using object-oriented methods and software wrappers, we illustrate the transformation of an existing stand-alone telemedicine system into `plug-and-play' components that function in a distributed medical information environment. We show, through the use of open standards and published component interfaces, that commercial telemedicine offerings which were once incompatible with electronic patient recordmore » systems can now share relevant data with clinical information repositories while at the same time hiding the proprietary implementations of the respective systems. Additionally, we illustrate how leading-edge technology can secure this distributed telemedicine environment, maintaining patient confidentiality and the integrity of the associated electronic medical data. Information surety technology also encourages the development of telemedicine systems that have both read and write access to electronic medical records containing patient-identifiable information. The win-win approach to telemedicine information system development preserves investments in legacy software and hardware while promoting security and interoperability in a distributed environment.« less
A system for distributed intrusion detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Snapp, S.R.; Brentano, J.; Dias, G.V.
1991-01-01
The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less
Democratizing Authority in the Built Environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Andersen, Michael P; Kolb, John; Chen, Kaifei
Operating systems and applications in the built environment have relied upon central authorization and management mechanisms which restrict their scalability, especially with respect to administrative overhead. We propose a new set of primitives encompassing syndication, security, and service execution that unifies the management of applications and services across the built environment, while enabling participants to individually delegate privilege across multiple administrative domains with no loss of security or manageability. We show how to leverage a decentralized authorization syndication platform to extend the design of building operating systems beyond the single administrative domain of a building. The authorization system leveraged ismore » based on blockchain smart contracts to permit decentralized and democratized delegation of authorization without central trust. Upon this, a publish/subscribe syndication tier and a containerized service execution environment are constructed. Combined, these mechanisms solve problems of delegation, federation, device protection and service execution that arise throughout the built environment. We leverage a high-fidelity city-scale emulation to verify the scalability of the authorization tier, and briefly describe a prototypical democratized operating system for the built environment using this foundation.« less
Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.S.; Clauss, D.B.; Blower, D.F.
1994-04-01
Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.
Lorence, Daniel; Chin, John; Richards, Michael
2010-08-01
Goal Two of the US ONCHIT Plan focuses on enabling the use of electronic health information for critical health improvement activities that promote the health of targeted communities, and the US population as a whole. Because of the focus on communities and populations, the activities under this second goal differ fundamentally from those of the first goal, which focus on the care of individuals. Proposed here is a model for health information management in such population-based environments, which allows selective access and use of information, and maintains transportability while ensuring security and confidentiality.
An overview of computer viruses in a research environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1991-01-01
The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically threats aimed at subverting computer security. Here, computer viruses are examined as a malicious logic in a research and development environment. A relation is drawn between the viruses and various models of security and integrity. Current research techniques aimed at controlling the threats posed to computer systems by threatening viruses in particular and malicious logic in general are examined. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken.
The Regulatory Framework for Privacy and Security
NASA Astrophysics Data System (ADS)
Hiller, Janine S.
The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.
Controlling multiple security robots in a warehouse environment
NASA Technical Reports Server (NTRS)
Everett, H. R.; Gilbreath, G. A.; Heath-Pastore, T. A.; Laird, R. T.
1994-01-01
The Naval Command Control and Ocean Surveillance Center (NCCOSC) has developed an architecture to provide coordinated control of multiple autonomous vehicles from a single host console. The multiple robot host architecture (MRHA) is a distributed multiprocessing system that can be expanded to accommodate as many as 32 robots. The initial application will employ eight Cybermotion K2A Navmaster robots configured as remote security platforms in support of the Mobile Detection Assessment and Response System (MDARS) Program. This paper discusses developmental testing of the MRHA in an operational warehouse environment, with two actual and four simulated robotic platforms.
Development of a COTS-Based Computing Environment Blueprint Application at KSC
NASA Technical Reports Server (NTRS)
Ghansah, Isaac; Boatright, Bryan
1996-01-01
This paper describes a blueprint that can be used for developing a distributed computing environment (DCE) for NASA in general, and the Kennedy Space Center (KSC) in particular. A comprehensive, open, secure, integrated, and multi-vendor DCE such as OSF DCE has been suggested. Design issues, as well as recommendations for each component have been given. Where necessary, modifications were suggested to fit the needs of KSC. This was done in the areas of security and directory services. Readers requiring a more comprehensive coverage are encouraged to refer to the eight-chapter document prepared for this work.
One Health in food safety and security education: Subject matter outline for a curricular framework.
Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I
2017-06-01
Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Stable operation of a Secure QKD system in the real-world setting
NASA Astrophysics Data System (ADS)
Tomita, Akihisa
2007-06-01
Quantum Key Distribution (QKD) now steps forward from the proof of principle to the validation of the practical feasibility. Nevertheless, the QKD technology should respond to the challenges from the real-world such as stable operation against the fluctuating environment, and security proof under the practical setting. We report our recent progress on stable operation of a QKD system, and key generation with security assurance. A QKD system should robust to temperature fluctuation in a common office environment. We developed a loop-mirror, a substitution of a Faraday mirror, to allow easy compensation for the temperature dependence of the device. Phase locking technique was also employed to synchronize the system clock to the quantum signals. This technique is indispensable for the transmission system based on the installed fiber cables, which stretch and shrink due to the temperature change. The security proof of QKD, however, has assumed the ideal conditions, such as the use of a genuine single photon source and/or unlimited computational resources. It has been highly desirable to give an assurance of security for practical systems, where the ideal conditions are no longer satisfied. We have constructed a theory to estimate the leakage information on the transmitted key under the practically attainable conditions, and have developed a QKD system equipped with software for secure key distillation. The QKD system generates the final key at the rate of 2000 bps after 20 km fiber transmission. Eavesdropper's information on the final key is guaranteed to be less than 2-7 per bit. This is the first successful generation of the secure key with quantitative assurance of the upper bound of the leakage information. It will put forth the realization of highly secure metropolitan optical communication network against any types of eavesdropping.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-09-28
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-01-01
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042
School Security: A Growing Concern
ERIC Educational Resources Information Center
Walker, Milton G.
1976-01-01
Vandalism, trespassing, drug traffic, crowd control, automobile traffic, and emergencies such as fire or storms--these are the kinds of problems a school security system should be designed to eliminate or minimize. A preventive program can save more money than it costs and can improve the learning environment at the same time, says this writer.…
2006-06-01
environment of Web-enabled database searches, online shopping , e-business, and daily credit-card use, which are very common in the United States. Cyberspace...establishing credibility for data exchange such as online shopping . Present regulations stipulate that security chips used by the Chinese government and
Mobile Technology: The Foundation for an Engaged and Secure Campus Community
ERIC Educational Resources Information Center
Chapel, Edward
2008-01-01
Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…
Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.
ERIC Educational Resources Information Center
Furnell, S. M.; Karweni, T.
1999-01-01
Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…
Securing Emergency State Data in a Tactical Computing Environment
2010-12-01
in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS), 847–854. [38] K. Kifayat, D. Llewellyn - Jones , A. Arabo, O...Drew, M. Merabti, Q. Shi, A. Waller, R. Craddock, G. Jones , State-of-the-Art in System-of-Systems Security for Crisis Management, Fourth Annual
ERIC Educational Resources Information Center
Ibrahim, Sara
2017-01-01
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
The Specter of Sunni Military Mobilization in Lebanon
2013-11-01
stabilization Future national security environment and forces European security issues, especially the Mediterranean littoral West Africa...5 More space for militant narratives .......................................................... 8 The Syrian war comes...their political dominance Sunni officials and elites attack the legitimacy of state institu- tions, particularly the Lebanese Army The Future
The Nature, Function, and Impact of Inmate Communication Patterns in a Maximum Security Prison.
ERIC Educational Resources Information Center
Van Voorhis, Patricia
To determine the areas in which communication affects prison environments and prison inmates, interviews were conducted with 21 adult male inmates shortly after their admission into a federal maximum security institution. The interviews were semistructured, addressing such issues as (1) perceptions of fellow inmates and staff; (2) additional…
2010-10-22
4. TITLE AND SUBTITLE Enhanced Systemic Understanding of the Information Environment in Complex Crisis Management Analytical Concept, Version 1.0...Email: schmidtb@iabg.de UNCLASSIFIED FOR PUBLIC RELEASE – Enhanced Systemic Understanding of the Information Environment in Complex Crisis ...multinational crisis management and the security sector about the significance and characteristics of the information environment. The framework is
2001-07-01
and it (usu ally) takes the in put of ju niors to help a se nior strat e gist ar rive at his con clu sions. 3 Lieutenant General Richard Chilcoat...Major General Richard A. Chilcoat, Strategic Art: The New Discipline for 21st Century Leaders, Carlisle Barracks, PA: Strategic Studies Institute...beyond the scope of this chapter, Richard Betts’ insightful essay on the importance of strategic studies supports the notion that security studies is