Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-07
... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 1 RIN 3038-AD46 SECURITIES AND EXCHANGE...-Based Swap Agreement Recordkeeping AGENCY: Commodity Futures Trading Commission; Securities and Exchange... Futures Trading Commission and the Securities and Exchange Commission published a document in the Federal...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Futures contracts on security... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on security indexes trading on or subject to the rules of a foreign...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 41.13 Section 41.13 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... conditions, to trade foreign non- narrow-based security index futures contracts where the foreign exchange... futures on broad-based security indexes; (ii) the securities comprising such an index are principally... the person within ten (10) business days that the claimant does not meet the requirements of the...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2014 CFR
2014-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of...
Hardware-Enabled Security Through On-Chip Reconfigurable Fabric
2016-02-05
SECURITY CLASSIFICATION OF: The goal of this project was to enable hardware-based security techniques on future microprocessors in a way that they... microprocessors in a way that they can be added and updated after fabrication, similar to software, while maintaining the efficiency and the security of...Progress The goal of this project was to enable hardware-based security techniques on future microprocessors in a way that they can be added and
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2011 CFR
2011-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2012 CFR
2012-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2013 CFR
2013-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-10
... categorical Section 4(c) exemption to permit options and futures on shares of all or some precious metal commodity-based ETFs to be traded and cleared as options on securities and security futures, respectively... options and futures on shares of precious metal commodity- based ETFs. The Commission believes that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-13
...; File No. 4-611] Joint Public Roundtable To Discuss Data for Swaps and Security- Based Swaps, Swap Data Repositories, Security-Based Swap Data Repositories, and Real-Time Public Reporting AGENCY: Commodity Futures... public roundtable discussion at which invited participants will discuss data for swaps and security-based...
17 CFR 23.609 - Clearing member risk management.
Code of Federal Regulations, 2014 CFR
2014-04-01
... management. 23.609 Section 23.609 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... Clearing member risk management. (a) With respect to clearing activities in futures, security futures...) Monitor for adherence to the risk-based limits intra-day and overnight; (4) Conduct stress tests under...
17 CFR 23.609 - Clearing member risk management.
Code of Federal Regulations, 2013 CFR
2013-04-01
... management. 23.609 Section 23.609 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... Clearing member risk management. (a) With respect to clearing activities in futures, security futures...) Monitor for adherence to the risk-based limits intra-day and overnight; (4) Conduct stress tests under...
Food Security in India, China, and the World
2016-06-01
undernourishment and projections of food security are made by the United Nations Food and Agricultural Organization (FAO). The FAO has been collecting... agricultural data from individual nations for decades and makes yearly assessments of the current state of food insecurity and periodic projections of...future global food security. The FAO assessment of food security in 2050 presents a likely future based on projections of current agricultural
Quantum technology and cryptology for information security
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2007-04-01
Cryptology and information security are set to play a more prominent role in the near future. In this regard, quantum communication and cryptography offer new opportunities to tackle ICT security. Quantum Information Processing and Communication (QIPC) is a scientific field where new conceptual foundations and techniques are being developed. They promise to play an important role in the future of information Security. It is therefore essential to have a cross-fertilizing development between quantum technology and cryptology in order to address the security challenges of the emerging quantum era. In this article, we discuss the impact of quantum technology on the current as well as future crypto-techniques. We then analyse the assumptions on which quantum computers may operate. Then we present our vision for the distribution of security attributes using a novel form of trust based on Heisenberg's uncertainty; and, building highly secure quantum networks based on the clear transmission of single photons and/or bundles of photons able to withstand unauthorized reading as a result of secure protocols based on the observations of quantum mechanics. We argue how quantum cryptographic systems need to be developed that can take advantage of the laws of physics to provide long-term security based on solid assumptions. This requires a structured integration effort to deploy quantum technologies within the existing security infrastructure. Finally, we conclude that classical cryptographic techniques need to be redesigned and upgraded in view of the growing threat of cryptanalytic attacks posed by quantum information processing devices leading to the development of post-quantum cryptography.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... derivatives transaction execution facility for transactions for future delivery in any commodity under section... categorical Section 4(c) exemption to permit options and futures on shares of all or some precious metal commodity-based ETFs to be traded and cleared as options on securities and security futures, respectively...
Rep. Issa, Darrell E. [R-CA-49
2012-02-09
House - 02/23/2012 Referred to the Subcommittee on Capital Markets and Government Sponsored Enterprises. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
17 CFR 41.41 - Security futures products accounts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SECURITY FUTURES PRODUCTS Customer Accounts and Margin Requirements § 41.41 Security futures products... all of a customer's security futures products in a futures account, all of a customer's security futures products in a securities account, or some of a customer's security futures products in a futures...
17 CFR 1.7 - Books and records requirements for security-based swap agreements.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based swap...
17 CFR 1.7 - Books and records requirements for security-based swap agreements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based swap...
Code of Federal Regulations, 2010 CFR
2010-04-01
... COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS Pt. 30, App. D Appendix D to Part 30—Information... trading of futures contracts on a group or index of securities on contract markets and derivatives... United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... directly in investments comprising or otherwise based on any combination of futures contracts, options on futures contracts, forward contracts, swap contracts, commodities and/or securities rather than solely in... investments comprising or otherwise based on any combination of futures contracts, options on futures...
Security in the Cache and Forward Architecture for the Next Generation Internet
NASA Astrophysics Data System (ADS)
Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.
The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.
Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations
2011-03-01
leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements...Detection with an Autonomous Micro UAV Mesh Network . In the near future police departments, fire brigades and other homeland security ...UAV-based sensor networks with respect to existing constraints and user requirements. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2011 CFR
2011-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a) Common...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2012 CFR
2012-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a) Common...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2013 CFR
2013-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a) Common...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2014 CFR
2014-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-13
...; information and data relating to the index, including the design, computation and maintenance thereof. In... extension is necessary to address complex or novel issues. The information that a foreign board of trade... 45 days if the foreign security index futures contract raises novel or complex issues that require...
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-06-15
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-23
...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, the ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are adopting new rules and interpretive guidance under the Commodity Exchange Act (``CEA''), and the Securities Exchange Act of 1934 (``Exchange Act''), to further define the terms ``swap dealer,'' ``security-based swap dealer,'' ``major swap participant,'' ``major security-based swap participant,'' and ``eligible contract participant.''
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
ERIC Educational Resources Information Center
Kyslenko, Dmytro
2017-01-01
The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-01-01
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348
Mobile Device Security: Perspectives of Future Healthcare Workers
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992
Mobile Device Security: Perspectives of Future Healthcare Workers.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
Jones, Jason D; Cassidy, Jude
2014-01-01
The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.
Code of Federal Regulations, 2010 CFR
2010-04-01
... as being willing to buy and sell security futures for its own account on a regular or continuous... for security futures-authority, purpose, interpretation, and scope. 41.42 Section 41.42 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Customer Accounts and...
76 FR 27673 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... futures on individual stocks or on narrow-based stock indexes (collectively, ``security futures products....\\2\\ \\1\\ These matters are higher margin levels, fraud or manipulation, recordkeeping, reporting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-13
...In accordance with section 712(a)(8), section 712(d)(1), sections 712(d)(2)(B) and (C), sections 721(b) and (c), and section 761(b) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are jointly adopting new rules and interpretations under the Commodity Exchange Act (``CEA'') and the Securities Exchange Act of 1934 (``Exchange Act'') to further define the terms ``swap,'' ``security-based swap,'' and ``security-based swap agreement'' (collectively, ``Product Definitions''); regarding ``mixed swaps;'' and governing books and records with respect to ``security-based swap agreements.'' The CFTC requests comment on its interpretation concerning forwards with embedded volumetric optionality, contained in Section II.B.2.(b)(ii) of this release.
17 CFR 41.24 - Rule amendments to security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... rule amendment relating to a security futures product if the registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Rule amendments to security futures products. 41.24 Section 41.24 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
..., other than a single equity option or a security futures product, whose value is based, in whole or in... Change To Amend its Fee Schedule To Assess Fees for Derivative Securities Products January 11, 2012..., effective January 9, 2012, to create a separate fee and rebate structure for Derivative Securities Products...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security futures products for trading, a designated contract market or registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Listing of security futures products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...
Jones, Jason D.; Cassidy, Jude
2014-01-01
The secure base construct is a core aspect of attachment theory and, according to Bowlby (1988), represents one of attachment theory’s most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents’ self-reported attachment styles relate to parental secure base provision and adolescent (Mage = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers’, as well as mothers’, attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers’ self-reported hostile behavior toward their adolescents and through adolescents’ less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers’ self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research. PMID:24897927
17 CFR 41.21 - Requirements for underlying securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Requirements for underlying securities. 41.21 Section 41.21 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.21...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... financial products such as securities index options, index futures, and options on index futures to be... futures, options on S&P 500 futures or any other instrument that tracks the performance of or is based on... 24.4.05(A). These definitions would allow financial products such as ETF options, index futures...
Uncertainty in simulating wheat yields under climate change
USDA-ARS?s Scientific Manuscript database
Anticipating the impacts of climate change on crop yields is critical for assessing future food security. Process-based crop simulation models are the most commonly used tools in such assessments. Analysis of uncertainties in future greenhouse gas emissions and their impacts on future climate change...
Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes
NASA Astrophysics Data System (ADS)
Tavallaei, Saeed Ebadi; Falahati, Abolfazl
Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2011 CFR
2011-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market or registered derivatives transaction...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2013 CFR
2013-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market shall submit to the Commission at its...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2012 CFR
2012-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market or registered derivatives transaction...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2014 CFR
2014-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Products § 41.23 Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market shall submit to...
Food security and sustainability: can one exist without the other?
Berry, Elliot M; Dernini, Sandro; Burlingame, Barbara; Meybeck, Alexandre; Conforti, Piero
2015-09-01
To position the concept of sustainability within the context of food security. An overview of the interrelationships between food security and sustainability based on a non-systematic literature review and informed discussions based principally on a quasi-historical approach from meetings and reports. International and global food security and nutrition. The Rome Declaration on World Food Security in 1996 defined its three basic dimensions as: availability, accessibility and utilization, with a focus on nutritional well-being. It also stressed the importance of sustainable management of natural resources and the elimination of unsustainable patterns of food consumption and production. In 2009, at the World Summit on Food Security, the concept of stability/vulnerability was added as the short-term time indicator of the ability of food systems to withstand shocks, whether natural or man-made, as part of the Five Rome Principles for Sustainable Global Food Security. More recently, intergovernmental processes have emphasized the importance of sustainability to preserve the environment, natural resources and agro-ecosystems (and thus the overlying social system), as well as the importance of food security as part of sustainability and vice versa. Sustainability should be considered as part of the long-term time dimension in the assessment of food security. From such a perspective the concept of sustainable diets can play a key role as a goal and a way of maintaining nutritional well-being and health, while ensuring the sustainability for future food security. Without integrating sustainability as an explicit (fifth?) dimension of food security, today's policies and programmes could become the very cause of increased food insecurity in the future.
ERIC Educational Resources Information Center
Iams, Howard M.; Reznik, Gayle L.; Tamborini, Christopher R.
2010-01-01
Purpose: As part of an ongoing effort to analyze the distributional implications of potential policy reforms to the U.S. Social Security system, we consider the widely discussed reform of earnings sharing. Such an approach has been viewed as a way to "update" Social Security's family benefits based on marital status and as a means to…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-04
... or options on futures, or any other related derivatives, which the ETP Holder acting as registered... or commodity, related futures or options on futures, or any other related derivatives, in an account... option or a security futures product, whose value is based, in whole or in part, upon the performance of...
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Require such member to hold itself out as being willing to buy and sell security futures for its own... for security futures-authority, purpose, interpretation, and scope. 242.400 Section 242.400 Commodity..., AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin Requirements for...
17 CFR 30.7 - Treatment of foreign futures or foreign options secured amount.
Code of Federal Regulations, 2010 CFR
2010-04-01
... FUTURES TRADING COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS § 30.7 Treatment of foreign futures or foreign options secured amount. (a) Except as provided in this section, a futures commission... options customers denominated as the foreign futures or foreign options secured amount. Such money...
Sparks, Lauren A; Trentacosta, Christopher J; Owusu, Erika; McLear, Caitlin; Smith-Darden, Joanne
2018-08-01
Secure attachment relationships have been linked to social competence in at-risk children. In the current study, we examined the role of parent secure base scripts in predicting at-risk kindergarteners' social competence. Parent representations of secure attachment were hypothesized to mediate the relationship between lower family cumulative risk and children's social competence. Participants included 106 kindergarteners and their primary caregivers recruited from three urban charter schools serving low-income families as a part of a longitudinal study. Lower levels of cumulative risk predicted greater secure attachment representations in parents, and scores on the secure base script assessment predicted children's social competence. An indirect relationship between lower cumulative risk and kindergarteners' social competence via parent secure base script scores was also supported. Parent script-based representations of the attachment relationship appear to be an important link between lower levels of cumulative risk and low-income kindergarteners' social competence. Implications of these findings for future interventions are discussed.
Do You Ignore Information Security in Your Journal Website?
Dadkhah, Mehdi; Borchardt, Glenn; Lagzian, Mohammad
2017-08-01
Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-04
... securities options or the clearing of such futures as security futures constitutes a violation of the CEA. \\3... same as the options and security futures on SPDR Gold Shares, iShares COMEX Gold Shares, and iShares... to help clarify that options and security futures on ETFS Physical Swiss Gold Shares and ETFS...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... for the following securities: Index-Linked Exchangeable Notes; Equity Gold Shares; Trust Certificates; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants (together with...
Code of Federal Regulations, 2010 CFR
2010-04-01
... options with persons other than brokers, dealers, futures commission merchants, floor brokers, or floor... securities, commodity futures, or commodity options with persons other than brokers, dealers, persons....43 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS...
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
Experimental plug and play quantum coin flipping.
Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni
2014-04-24
Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer-related government securities activities incidental to the futures-related business of a futures commission merchant registered with the Commodity Futures Trading Commission. 240.3a43-1 Section 240.3a43-1 Commodity and Securities...
NASA Astrophysics Data System (ADS)
Wada, Y.; Luan, Y.; Fischer, G.; Sun, L.; Shi, P.
2015-12-01
Forcing with the population growth and consequently increasing food requirement, food security in sub-Saharan Africa is one of the most emergent and challenging issues. The purposes of this work are 1) what's the future food requirement and their food security status in each sub-Saharan African countries? What is the distance from current and future food security status, corresponding to the food requirement, to the targeted food security status? 2) To what extent Sub-Saharan countries could meet their present and future food requirement, and whether they have potential to improve their food insecurity status on currently cultivated land? 3) Whether or, if there have, how the pressures on land resources from meeting the food requirements? To figure those questions out, we firstly use socio-economic pathways datasets, and historical food diet pattern classification to forecast the 2010-2050 food commodity and feed calories demand per country. A new food security indicator, which considered the influences of both the food energy and quality intake, was used to evaluate the food insecurity status and the distances to different targeted statuses of the specific country. The latest Global Agro-Ecological Zones (GAEZ) databases were used to estimate the current and future crop yield gap and crop potential production. For current to future scenario analysis, we considered population growth, dietary change, climate change, agricultural input level, and target food security status. Then the balance of food requirement with the current and potential crop production was analyzed for different scenarios. Land requirements were calculated for meeting those food requirements, and the pressures on land resources are evaluated. Our works are hoping to provide scientific-based evidences for policy recommendations for local government to tackle food insecurity problems in Sub-Saharan Africa.
12 CFR 220.9 - Clearance of securities, options, and futures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security (including options on any security, certificate of deposit, securities index or foreign currency); or (ii) Guarantees performance of contracts for the purchase or sale of a commodity for future... Exchange Commission or is the clearing agency for a contract market regulated by the Commodity Futures...
12 CFR 220.9 - Clearance of securities, options, and futures.
Code of Federal Regulations, 2011 CFR
2011-01-01
... security (including options on any security, certificate of deposit, securities index or foreign currency); or (ii) Guarantees performance of contracts for the purchase or sale of a commodity for future... Exchange Commission or is the clearing agency for a contract market regulated by the Commodity Futures...
The Economic Impact on Future European Security.
1991-07-01
countries in the developing tripolar scenario, I purposely focused this discussion on economics within the realm of Europe with some consideration of...security definitions of a bipolar world to a world of what some would like to consider as multipolar, but is actually evolving into a tripolar world of U.S...Europe-Japan based on economic security.1 In his article describing the new tripolar world, Mr. Bergsten quotes historian Robert Gilpin’s statement
Secure Image Hash Comparison for Warhead Verification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bruillard, Paul J.; Jarman, Kenneth D.; Robinson, Sean M.
2014-06-06
The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.
Content Management and the Future of Academic Libraries.
ERIC Educational Resources Information Center
Wu, Yuhfen Diana; Liu, Mengxiong
2001-01-01
Discusses Internet-based electronic content management in digital libraries and considers the future of academic libraries. Topics include digital technologies; content management systems; standards; bandwidth; security and privacy concerns; legal matters, including copyrights and ownership; lifecycle; and multilingual access and interface. (LRW)
17 CFR 240.15b11-1 - Registration by notice of security futures product broker-dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... § 240.15b11-1 Registration by notice of security futures product broker-dealers. (a) A broker or dealer... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Registration by notice of security futures product broker-dealers. 240.15b11-1 Section 240.15b11-1 Commodity and Securities Exchanges...
ERIC Educational Resources Information Center
Kaya, Sinem; Avci, Rasit
2016-01-01
Problem Statement: Future Anxiety (FA) and Trait Anxiety (TA) have negative effects on individuals' productivity, which can lead them to feelings of insecurity and eventually depression. Knowing more about future anxiety helps people feel more secure and produce more effectively for themselves, and eventually for society. This research examined…
17 CFR 240.31 - Section 31 transaction fees.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of a security future settled by physical delivery) or covered round turn transaction that a covered... resulting from the maturation of a security future settled by physical delivery; and (iv) The trade date.... (6) Covered sale means a sale of a security, other than an exempt sale or a sale of a security future...
System Requirement Analyses for Ubiquitous Environment Management System
NASA Astrophysics Data System (ADS)
Lim, Sang Boem; Gil, Kyung Jun; Choe, Ho Rim; Eo, Yang Dam
We are living in new stage of society. U-City introduces new paradigm that cannot be archived in traditional city to future city. Korea is one of the most active countries to construct U-City based on advances of IT technologies - especially based on high-speed network through out country [1]. Peoples are realizing ubiquitous service is key factor of success of U-City. Among the U-services, U-security service is one of the most important services. Nowadays we have to concern about traditional threat and also personal information. Since apartment complex is the most common residence type in Korea. We are developing security rules and system based on analyses of apartment complex and assert of apartment complex. Based on these analyses, we are developing apartment complex security using various technologies including home network system. We also will discuss basic home network security architecture.
17 CFR 240.15c3-3 - Customer protection-reserves and custody of securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... or dealer has received or acquired or holds funds or securities for the account of that person. The... extent that broker or dealer maintains an omnibus account for the account of customers with the broker or... person has a claim for security futures products held in a futures account, or any security futures...
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
NASA Astrophysics Data System (ADS)
Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan
2017-08-01
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of whose business consists of transactions in securities, commodity futures, or commodity options... securities, commodity futures, or commodity options with persons other than brokers, dealers, persons... M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
17 CFR 41.22 - Required certifications.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 41.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.22 Required certifications. It shall be unlawful for a designated contract market or registered derivatives transaction execution...
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium
Thomas D'Agostino
2017-12-09
Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-12-17
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-01-01
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409
A Survey on Next-generation Power Grid Data Architecture
DOE Office of Scientific and Technical Information (OSTI.GOV)
You, Shutang; Zhu, Dr. Lin; Liu, Yong
2015-01-01
The operation and control of power grids will increasingly rely on data. A high-speed, reliable, flexible and secure data architecture is the prerequisite of the next-generation power grid. This paper summarizes the challenges in collecting and utilizing power grid data, and then provides reference data architecture for future power grids. Based on the data architecture deployment, related research on data architecture is reviewed and summarized in several categories including data measurement/actuation, data transmission, data service layer, data utilization, as well as two cross-cutting issues, interoperability and cyber security. Research gaps and future work are also presented.
Code of Federal Regulations, 2011 CFR
2011-04-01
... such security future is a stock, the product of the daily settlement price of such security future as shown by any regularly published reporting or quotation service, and the applicable number of shares per... regulations applicable to financial relations between a security futures intermediary and a customer with...
17 CFR 41.32 - Continuing obligations.
Code of Federal Regulations, 2014 CFR
2014-04-01
... the Securities and Exchange Commission or with a futures association registered under section 17 of... board of trade lists a security futures product for trading; (iii) Provide the Commission with any new rules or rule amendments that relate to the trading of security futures products, including both...
ERIC Educational Resources Information Center
Niccols, Alison
2008-01-01
Background: Infant attachment security is a protective factor for future mental health, and may be promoted by individual interventions. Given service demands, it is important to determine if a group-based intervention for parents could be used to enhance infant attachment security. Methods: In a randomized trial involving 76 mothers, an 8-session…
Tuffaha, Haitham W; Reynolds, Heather; Gordon, Louisa G; Rickard, Claire M; Scuffham, Paul A
2014-12-01
Value of information analysis has been proposed as an alternative to the standard hypothesis testing approach, which is based on type I and type II errors, in determining sample sizes for randomized clinical trials. However, in addition to sample size calculation, value of information analysis can optimize other aspects of research design such as possible comparator arms and alternative follow-up times, by considering trial designs that maximize the expected net benefit of research, which is the difference between the expected cost of the trial and the expected value of additional information. To apply value of information methods to the results of a pilot study on catheter securement devices to determine the optimal design of a future larger clinical trial. An economic evaluation was performed using data from a multi-arm randomized controlled pilot study comparing the efficacy of four types of catheter securement devices: standard polyurethane, tissue adhesive, bordered polyurethane and sutureless securement device. Probabilistic Monte Carlo simulation was used to characterize uncertainty surrounding the study results and to calculate the expected value of additional information. To guide the optimal future trial design, the expected costs and benefits of the alternative trial designs were estimated and compared. Analysis of the value of further information indicated that a randomized controlled trial on catheter securement devices is potentially worthwhile. Among the possible designs for the future trial, a four-arm study with 220 patients/arm would provide the highest expected net benefit corresponding to 130% return-on-investment. The initially considered design of 388 patients/arm, based on hypothesis testing calculations, would provide lower net benefit with return-on-investment of 79%. Cost-effectiveness and value of information analyses were based on the data from a single pilot trial which might affect the accuracy of our uncertainty estimation. Another limitation was that different follow-up durations for the larger trial were not evaluated. The value of information approach allows efficient trial design by maximizing the expected net benefit of additional research. This approach should be considered early in the design of randomized clinical trials. © The Author(s) 2014.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS Pt... foreign futures and foreign options customers to maintain in a separate account or accounts such money... to those customers. 1 This amount is denominated as the “foreign futures or foreign options secured...
Space Internet-Embedded Web Technologies Demonstration
NASA Technical Reports Server (NTRS)
Foltz, David A.
2001-01-01
The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.
A review of automated image understanding within 3D baggage computed tomography security screening.
Mouton, Andre; Breckon, Toby P
2015-01-01
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints. Although traditionally performed by 2D X-ray based scanning, increasingly stringent security regulations have led to a growing demand for more advanced imaging technologies. The role of X-ray Computed Tomography is thus rapidly expanding beyond the traditional materials-based detection of explosives. The development of computer vision and image processing techniques for the automated understanding of 3D baggage-CT imagery is however, complicated by poor image resolutions, image clutter and high levels of noise and artefacts. We discuss the recent and most pertinent advancements and identify topics for future research within the challenging domain of automated image understanding for baggage security screening CT.
Computer-Aided Sensor Development Focused on Security Issues.
Bialas, Andrzej
2016-05-26
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.
Computer-Aided Sensor Development Focused on Security Issues
Bialas, Andrzej
2016-01-01
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research. PMID:27240360
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
... a number of securities and futures exchanges. Among other things, this Risk Disclosure statement... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62624; File No. SR-NFA-2010-02] Self-Regulatory... Interpretive Notice Entitled ``NFA Compliance Rule 2-30(b): Risk Disclosure Statement for Security Futures...
Risk to Water Security on Small Islands
NASA Astrophysics Data System (ADS)
Holding, S. T.; Allen, D. M.
2013-12-01
The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map of the risk to water security throughout Andros Island. It evaluates risk to water security for current and future scenarios and will enable water resource managers to effectively adapt to future impacts on water security.
Security Shift in Future Network Architectures
2010-11-01
RTO-MP-IST-091 2 - 1 Security Shift in Future Network Architectures Tim Hartog, M.Sc Information Security Dept. TNO Information and...current practice military communication infrastructures are deployed as stand-alone networked information systems. Network -Enabled Capabilities (NEC) and...information architects and security specialists about the separation of network and information security, the consequences of this shift and our view
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Proprietary government securities transactions incidental to the futures-related business of a CFTC-regulated person. 240.3a44-1 Section 240.3a44-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...
Privacy and security in teleradiology.
Ruotsalainen, Pekka
2010-01-01
Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.
Securing your financial future.
Kachalia, Parag R
2009-04-01
Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... predetermined algorithm, a transaction for the same security futures product on the same designated contract... place advantage or the ability to override a predetermined algorithm must submit an appropriate rule... predetermined algorithm from trading a security futures product for accounts in which these same participants...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... predetermined algorithm, a transaction for the same security futures product on the same designated contract... place advantage or the ability to override a predetermined algorithm must submit an appropriate rule... predetermined algorithm from trading a security futures product for accounts in which these same participants...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... predetermined algorithm, a transaction for the same security futures product on the same designated contract... place advantage or the ability to override a predetermined algorithm must submit an appropriate rule... predetermined algorithm from trading a security futures product for accounts in which these same participants...
Global renewable energy-based electricity generation and smart grid system for energy security.
Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.
Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security
Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201
Liu, Bo; Zhang, Lijia; Xin, Xiangjun
2018-03-19
This paper proposes and demonstrates an enhanced secure 4-D modulation optical generalized filter bank multi-carrier (GFBMC) system based on joint constellation and Stokes vector scrambling. The constellation and Stokes vectors are scrambled by using different scrambling parameters. A multi-scroll Chua's circuit map is adopted as the chaotic model. Large secure key space can be obtained due to the multi-scroll attractors and independent operability of subcarriers. A 40.32Gb/s encrypted optical GFBMC signal with 128 parallel subcarriers is successfully demonstrated in the experiment. The results show good resistance against the illegal receiver and indicate a potential way for the future optical multi-carrier system.
Governing through time: preparing for future threats to health and security.
Samimian-Darash, Limor
2011-09-01
During preparations for the Second Gulf War, Israel considered universal smallpox vaccination. In doing so, it faced a problem: how to legitimise carrying out a security action against an uncertain future danger (smallpox pandemic), when this action carried specific, known risks (vaccine complications). To solve this problem, the Israeli preparedness system created a new domain through which the security action could reach its goal with minimum risk: first responders (a group of medical personnel and security forces). First-responder vaccination represents a shift in the form of 'securing health' and in the governmental technology applied to this goal, in which past, present, and future occurrences are governed to enable the execution of a security action. Through this practice, risks are not located in the present or in the future but in a 'shared' temporal space and thus can be seen as existing simultaneously. Preparedness for emerging future biological events, then, involves more than questioning how the future is contingent on the present and how the present is contingent on the future's perception; it also recognises the need for a new time positioning that allows operating on both present and future risks simultaneously. Governing these risks, then, means governing through time. © 2011 The Author. Sociology of Health & Illness © 2011 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.
Hybrid network defense model based on fuzzy evaluation.
Cho, Ying-Chiang; Pan, Jen-Yi
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-18
... Limited Partnership; Supplemental Notice That Initial Market-Based Rate Filing Includes Request for... proceeding of Gulf Oil Limited Partnership's application for market-based rate authority, with an... CFR Part 34, of future issuances of securities and assumptions of liability. Any person desiring to...
The Intersection of National Security and Climate Change
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.
On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.
Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan
2016-01-01
Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-18
... interpretation with respect to the treatment and clearing of options and security futures on SPDR Gold Shares.\\2... amended the interpretation to extend similar treatment to options and security futures on iShares[supreg... rule filing SR-OCC-2009-20, which extended similar treatment to options and security futures on ETFS...
17 CFR 240.6h-1 - Settlement and regulatory halt requirements for security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... investors and the public interest, taking into account such factors as fairness to buyers and sellers of the affected security futures product, the maintenance of a fair and orderly market in such security futures... with the protection of investors. An exemption granted pursuant to this paragraph shall not operate as...
17 CFR 260.7a-25 - Words relating to the future.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Words relating to the future. 260.7a-25 Section 260.7a-25 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... § 260.7a-25 Words relating to the future. Unless the context clearly shows otherwise, whenever words...
Fueling the dragon: Alternative Chinese oil futures and their implications for the United States
NASA Astrophysics Data System (ADS)
Eberling, George G.
This study examines how Chinese oil energy will likely shape future Sino-American relations under conditions of dependency and non-dependency. The study will list and describe three possible Chinese oil energy futures or scenarios (Competitive Dependency, Competitive Surplus and Cooperative Surplus) using Scenario Analysis to subsequently estimate their associated likelihoods using the PRINCE forecasting system and discuss and evaluate their strategic implications for the United States. Further, this study will determine the most likely oil energy future or scenario. Finally, the study will list and describe the most likely United States political, economic and/or military policy responses for each future or scenario. The study contributes to the literature on Chinese and United States energy security, foreign policy, political economy and political risk analysis by showing how China will most likely address its growing oil energy dependence and by determining what will be the most likely U.S. foreign policy consequences based on the most current literature available on energy security and foreign policy.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... controls on trading; information and data relating to the index, including the design, computation and... futures contract raises novel or complex issues that require additional time for review, or if the foreign... composition, computation, or method of selection of component entities of an index referenced and defined in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
...-Laws and Rules to security futures on index-linked securities such as exchange-traded notes, which are currently traded on OneChicago, LLC. Index-linked securities are non-convertible debt of a major financial... futures contracts, one or more physical commodities, currencies or debt securities, or a combination of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Antle, John M.; Stoorvogel, Jetse J.; Valdivia, Roberto O.
2014-01-01
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models. PMID:24535388
Antle, John M; Stoorvogel, Jetse J; Valdivia, Roberto O
2014-04-05
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models.
Mishra, Dheerendra
2015-03-01
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.
Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan
2013-06-01
Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-23
... the proposed Information Collection Request (ICR) titled: Part 41, Relating to Security Futures... COMMODITY FUTURES TRADING COMMISSION Agency Information Collection Activities; Proposed Collection; Comment Request: Part 41, Relating to Security Futures Products AGENCY: Commodity Futures Trading...
NASA Astrophysics Data System (ADS)
Caldera, Upeksha; Breyer, Christian
2017-12-01
Seawater reverse osmosis (SWRO) desalination is expected to play a pivotal role in helping to secure future global water supply. While the global reliance on SWRO plants for water security increases, there is no consensus on how the capital costs of SWRO plants will vary in the future. The aim of this paper is to analyze the past trends of the SWRO capital expenditures (capex) as the historic global cumulative online SWRO capacity increases, based on the learning curve concept. The SWRO capex learning curve is found based on 4,237 plants that came online from 1977 to 2015. A learning rate of 15% is determined, implying that the SWRO capex reduced by 15% when the cumulative capacity was doubled. Based on SWRO capacity annual growth rates of 10% and 20%, by 2030, the global average capex of SWRO plants is found to fall to 1,580 USD/(m3/d) and 1,340 USD/(m3/d), respectively. A learning curve for SWRO capital costs has not been presented previously. This research highlights the potential for decrease in SWRO capex with the increase in installation of SWRO plants and the value of the learning curve approach to estimate future SWRO capex.
Research of Trust Chain of Operating System
NASA Astrophysics Data System (ADS)
Li, Hongjiao; Tian, Xiuxia
Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Network systems security analysis
NASA Astrophysics Data System (ADS)
Yilmaz, Ä.°smail
2015-05-01
Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
... Industrial Power Services (NY), LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes...-referenced proceeding of EDF Industrial Power Services (NY), LLC's application for market-based rate... authorization, under 18 CFR part 34, of future issuances of securities and assumptions of liability. Any person...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
... Industrial Power Services (IL), LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes...-referenced proceeding of Eagle Industrial Power Services (IL), LLC's application for market- based rate... authorization, under 18 CFR part 34, of future issuances of securities and assumptions of liability. Any person...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-05
... Industrial Power Services (CA), LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes... proceeding of EDF Industrial Power Services (CA), LLC's application for market-based rate [[Page 33211... authorization, under 18 CFR part 34, of future issuances of securities and assumptions of liability. Any person...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
... Industrial Power Services (OH), LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes... proceeding, of EDF Industrial Power Services (OH), LLC's application for market- based rate authority, with... authorization, under 18 CFR Part 34, of future issuances of securities and assumptions of liability. Any person...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-04
...; securities; options on securities and indices; futures contracts; options on futures contracts; forward... options, futures, or options on futures on, Shares through ETP Holders, in connection with such ETP... pool operator with the Commodity Futures Trading Commission (``CFTC'') and is a member of the National...
17 CFR 30.7 - Treatment of foreign futures or foreign options secured amount.
Code of Federal Regulations, 2014 CFR
2014-04-01
... day, unless the futures commission merchant's chief executive officer, chief finance officer or other... unsecured basis to finance a 30.7 customer's foreign futures and foreign options trading, nor may a futures... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Treatment of foreign futures...
17 CFR 5.22 - Registered futures association membership.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Registered futures association membership. 5.22 Section 5.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.22 Registered futures association membership. (a) Each person...
Fuzzy assessment of health information system users' security awareness.
Aydın, Özlem Müge; Chouseinoglou, Oumout
2013-12-01
Health information systems (HIS) are a specific area of information systems (IS), where critical patient data is stored and quality health service is only realized with the correct use and efficient dissemination of this data to health workers. Therefore, a balance needs to be established between the levels of security and flow of information on HIS. Instead of implementing higher levels and further mechanisms of control to increase the security of HIS, it is preferable to deal with the arguably weakest link on HIS chain with respect to security: HIS users. In order to provide solutions and approaches for transforming users to the first line of defense in HIS but also to employ capable and appropriate candidates from the pool of newly graduated students, it is important to assess and evaluate the security awareness levels and characteristics of these existing and future users. This study aims to provide a new perspective to understand the phenomenon of security awareness of HIS users with the use of fuzzy analysis, and to assess the present situation of current and future HIS users of a leading medical and educational institution of Turkey, with respect to their security characteristics based on four different security scales. The results of the fuzzy analysis, the guide on how to implement this fuzzy analysis to any health institution and how to read and interpret these results, together with the possible implications of these results to the organization are provided.
Code of Federal Regulations, 2011 CFR
2011-04-01
... price of such security future as shown by any regularly published reporting or quotation service, and... regularly published reporting or quotation service. If there is no recent closing sale price, the security... to financial relations between a security futures intermediary and a customer with respect to...
75 FR 18566 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0014] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Seventh Panel Meeting. DATES: May... ``the FACA'') shall report to and provide the Commissioner of Social Security independent advice and...
75 FR 38861 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-06
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0037] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Eighth Panel Meeting. DATES... referred to as ``the FACA'') shall report to and provide the Commissioner of Social Security independent...
78 FR 26406 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-06
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... trade security futures products to establish listing standards that, among other things, require that... which the security futures product trades has in place procedures to coordinate trading halts with the...
76 FR 4146 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-24
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0010] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Tenth Panel Meeting. DATES... referred to as ``the FACA'') shall report to and provide the Commissioner of Social Security independent...
17 CFR 41.2 - Required records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Required records. 41.2 Section 41.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS General Provisions § 41.2 Required records. A designated contract market or registered derivatives...
Aviation Security: A Case for Risk-Based Passenger Screening
2011-12-01
5 3. Threat Uncertainty ..............................................................................7 4. Increased Risk and Cost ...Airport Checkpoints .....................................131 ix 2. Technology Integration and Implementation Costs .....................131 3...Background Investigations and Sustaining Program Costs ........133 D. AREAS FOR FUTURE RESEARCH
2012-05-15
Method for Ubiquitous Robots Based on Wireless Sensor Networks , in 1st European Conference on Smart Sensing and Context2006, Springer: Enschede, The...SUBJECT TERMS Directed Energy, Lasers, Networking , Wireless , Threat, Remote, Sensors , Database, Targets, Security, Transmit, Mobile, Unmanned...the researchers explore the potential for a network that could transport any type of sensor data now or in the future. 29 3. Methods , Assumptions
Hybrid Network Defense Model Based on Fuzzy Evaluation
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. PMID:24574870
Security challenges in integration of a PHR-S into a standards based national EHR.
Mense, Alexander; Hoheiser Pförtner, Franz; Sauermann, Stefan
2014-01-01
Health related data provided by patients themselves is expected to play a major role in future healthcare. Data from personal health devices, vaccination records, health diaries or observations of daily living, for instance, is stored in personal health records (PHR) which are maintained by personal health record systems (PHR-S). Combining this information with medical records provided by healthcare providers in electronic health records (EHR) is one of the next steps towards "personal care". Austria currently sets up a nationwide EHR system that incorporates all healthcare providers and is technically based on international standards (IHE, HL7, OASIS, ...). Looking at the expected potential of merging PHR and EHR data it is worth to analyse integration approaches. Although knowing that an integration requires the coordination of processes, information models and technical architectures, this paper specifically focuses on security issues by evaluating general security requirements for a PHR-S (based on HL7 PHR-S FM), comparing them with the information security specifications for the Austrian's national EHR (based on ISO/IES 27000 series) and identifying the main challenges as well as possible approaches.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-20
..., stock index futures contracts, options on futures, options on securities and indexes, equity caps... holding and/ or managing portfolios or baskets of securities, commodity futures contracts, options on commodity futures contracts, swaps, forward contracts and/or options on physical commodities and/or non-U.S...
Internet/Web-based administration of benefits.
Vitiello, J
2001-09-01
Most funds will face the challenge of deploying at least some Web-based functionality in the near future, if they have not already done so. Clear objectives and careful planning will help ensure success. Issues that must be considered include support requirements, security concerns, functional business objectives, and employer and member Web access.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-01
... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ER10-2281-000] Constellation... proceeding of Constellation Mystic Power, LLC's application for market-based rate authority, with an... CFR part 34, of future issuances of securities and assumptions of liability. Any person desiring to...
USDA-ARS?s Scientific Manuscript database
Assessing and improving the sustainability of dairy production systems is essential to secure future food production. This requires a holistic approach that reveals trade-offs between emissions of the different greenhouse gases (GHG) and nutrient-based pollutants and ensures that interactions betwee...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
Strengthening Sustainability and Resiliency of a Future Force, Phase 1. FY2010-2011 Summer Study
2011-03-01
Resiliency of a Future Force: Phase I Interim Report - 48 Please Enter Custom Water factor adjustments below: m Unit Level* (Gat/Ptisan/ Dti ...cost of mov- ing the consumables in terms of the assets required to move the commodity and the security Intra Theater Resupply: 4 Legs Army...Expeditionary Force-Logistics ResupplyDetails Legl Leg 2 Leg 3 Leg 4 Resupply Trip Legs Super FOB (Div)to Base Camp (bde) Base Camp (Bde) to FOB (Bn
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
Challenges and Responses to Asian Food Security
NASA Astrophysics Data System (ADS)
Teng, Paul P. S.; Oliveros, Jurise A. P.
2015-10-01
Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.
Individuals’ Uncertainty about Future Social Security Benefits and Portfolio Choice
Delavande, Adeline
2013-01-01
Summary Little is known about the degree to which individuals are uncertain about their future Social Security benefits, how this varies within the U.S. population, and whether this uncertainty influences financial decisions related to retirement planning. To illuminate these issues, we present empirical evidence from the Health and Retirement Study Internet Survey and document systematic variation in respondents’ uncertainty about their future Social Security benefits by individual characteristics. We find that respondents with higher levels of uncertainty about future benefits hold a smaller share of their wealth in stocks. PMID:23914049
Hybrid cloud: bridging of private and public cloud computing
NASA Astrophysics Data System (ADS)
Aryotejo, Guruh; Kristiyanto, Daniel Y.; Mufadhol
2018-05-01
Cloud Computing is quickly emerging as a promising paradigm in the recent years especially for the business sector. In addition, through cloud service providers, cloud computing is widely used by Information Technology (IT) based startup company to grow their business. However, the level of most businesses awareness on data security issues is low, since some Cloud Service Provider (CSP) could decrypt their data. Hybrid Cloud Deployment Model (HCDM) has characteristic as open source, which is one of secure cloud computing model, thus HCDM may solve data security issues. The objective of this study is to design, deploy and evaluate a HCDM as Infrastructure as a Service (IaaS). In the implementation process, Metal as a Service (MAAS) engine was used as a base to build an actual server and node. Followed by installing the vsftpd application, which serves as FTP server. In comparison with HCDM, public cloud was adopted through public cloud interface. As a result, the design and deployment of HCDM was conducted successfully, instead of having good security, HCDM able to transfer data faster than public cloud significantly. To the best of our knowledge, Hybrid Cloud Deployment model is one of secure cloud computing model due to its characteristic as open source. Furthermore, this study will serve as a base for future studies about Hybrid Cloud Deployment model which may relevant for solving big security issues of IT-based startup companies especially in Indonesia.
78 FR 71686 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
..., Copies Available From: US Securities and Exchange Commission, Office of Investor Education and Advocacy... that futures commission merchants and introducing brokers registered with the Commidity Futures Trading Commission that conduct a business in security futures products must notice-register as broker-dealers...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... including, but not limited to, stock index futures contracts, options on futures, options on securities and... holding and/ or managing portfolios or baskets of securities, commodity futures contracts, options on commodity futures contracts, swaps, forward contracts and/or options on physical commodities and/or non-U.S...
17 CFR 1.30 - Loans by futures commission merchants; treatment of proceeds.
Code of Federal Regulations, 2014 CFR
2014-04-01
... funds on an unsecured basis to finance customers' trading, nor may a futures commission merchant loan... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Loans by futures commission merchants; treatment of proceeds. 1.30 Section 1.30 Commodity and Securities Exchanges COMMODITY FUTURES...
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
17 CFR 403.6 - Compliance with part by futures commission merchants.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Compliance with part by futures commission merchants. 403.6 Section 403.6 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER...
17 CFR 4.12 - Exemption from provisions of part 4.
Code of Federal Regulations, 2010 CFR
2010-04-01
... part 4. 4.12 Section 4.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... said Act; (B) Will generally and routinely engage in the buying and selling of securities and securities derived instruments; (C) Will not enter into commodity futures and commodity options contracts for...
NASA Astrophysics Data System (ADS)
Kumar, Pawan; Singh, Satbir; Gupta, Bipin Kumar
2016-07-01
Counterfeiting of valuable documents, currency and branded products is a challenging problem that has serious economic, security and health ramifications for governments, businesses and consumers all over the world. It is estimated that counterfeiting represents a multi-billion dollar underground economy with counterfeit products being produced on a large scale every year. Counterfeiting is an increasingly high-tech crime and calls for high-tech solutions to prevent and deter the acts of counterfeiting. The present review briefly outlines and addresses the key challenges in this area, including the above mentioned concerns for anti-counterfeiting applications. This article describes a unique combination of all possible kinds of security ink formulations based on lanthanide doped luminescent nanomaterials, quantum dots (semiconductor and carbon based), metal organic frameworks as well as plasmonic nanomaterials for their possible use in anti-counterfeiting applications. Moreover, in this review, we have briefly discussed and described the historical background of luminescent nanomaterials, basic concepts and detailed synthesis methods along with their characterization. Furthermore, we have also discussed the methods adopted for the fabrication and design of luminescent security inks, various security printing techniques and their anti-counterfeiting applications.
Network-Centric Quantum Communications
NASA Astrophysics Data System (ADS)
Hughes, Richard
2014-03-01
Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Information That a Foreign Board of Trade Should Submit When Seeking No-Action Relief To Offer and Sell, to Persons Located in the United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign Board of Trade D Appendix D to Part 30...
Emergency department workers' perceptions of security officers' effectiveness during violent events.
Gillespie, Gordon Lee; Gates, Donna M; Miller, Margaret; Howard, Patricia Kunz
2012-01-01
The emergency department (ED) is among the most at-risk settings for violence by patients and visitors against ED workers. A first response to potential or actual events of workplace violence is often contacting hospital security officers for assistance. The purpose of this study is to describe ED workers' views of security officers' effectiveness during actual events of verbal and/or physical violence. Healthcare workers (n=31) from an urban pediatric ED in the Midwest United States. Participants were interviewed regarding their experiences with workplace violence. Verbatim transcripts were qualitatively analyzed. Six themes were identified: (1) a need for security officers, (2) security officers' availability and response, (3) security officers' presence or involvement, (4) security officers' ability to handle violent situations, (5) security officers' role with restraints, and (6) security officers' role with access. It is important that early communication between security officers and ED workers takes place before violent events occur. A uniform understanding of the roles and responsibilities of security officers should be clearly communicated to ED workers. Future research needs to be conducted with hospital-based security officers to describe their perceptions about their role in the prevention and management of workplace violence.
Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona
2003-01-01
The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.
Inter-organizational future proof EHR systems. A review of the security and privacy related issues.
van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan
2009-03-01
Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.
He, Ying; Johnson, Chris
2015-11-01
The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
2014-01-01
Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613
17 CFR 40.11 - Review of event contracts based upon certain excluded commodities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Review of event contracts... COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES § 40.11 Review of event...) [Reserved] (c) 90-day review and approval of certain event contracts. The Commission may determine, based...
17 CFR 40.11 - Review of event contracts based upon certain excluded commodities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Review of event contracts... COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES § 40.11 Review of event...) [Reserved] (c) 90-day review and approval of certain event contracts. The Commission may determine, based...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
Towards an integrated defense system for cyber security situation awareness experiment
NASA Astrophysics Data System (ADS)
Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.
Code of Federal Regulations, 2014 CFR
2014-04-01
... security futures intermediary were not a participant. (6) Daily settlement price means, with respect to a... futures commission merchant that has been in existence for less than one year may meet the definition of... M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
Code of Federal Regulations, 2013 CFR
2013-04-01
... security futures intermediary were not a participant. (6) Daily settlement price means, with respect to a... futures commission merchant that has been in existence for less than one year may meet the definition of... M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
Code of Federal Regulations, 2012 CFR
2012-04-01
... security futures intermediary were not a participant. (6) Daily settlement price means, with respect to a... futures commission merchant that has been in existence for less than one year may meet the definition of... M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke
2015-12-01
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
NASA Astrophysics Data System (ADS)
Balamurugan, A. M.; Sivasubramanian, A.
2014-06-01
The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.
Science and the Energy Security Challenge: The Example of Solid-State Lighting
Philips, Julia [Sandia
2017-12-09
Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products â a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.
ERIC Educational Resources Information Center
College Planning & Management, 1999
1999-01-01
Presents administrator's views on possible trends in college and universities. Addresses: hazardous waste disposal; privatization of custodial services; libraries and technology; building product purchases based on life-cycle cost; continuing education for employees; armed campus security; fees and tuition collection via online transactions; and…
2011-06-01
Remote sensing from space provides critical data for many commercial space applications. Due to global market demand, it has undergone tremendous...commercial space imaging capability in the future, remote sensing policy makers, systems engineers, and industry analysts must be aware of the implications to United States National Security....available dissemination and accessibility. The analysis results, together with the findings from a review of commercial programs, initiatives, and remote
The Landscape of International Biosurveillance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hartley, David M.; Nelson, Noele P.; Walters, Ronald A.
2010-02-01
Event-based biosurveillance is a scientific discipline in which diverse streams of data, available from the Internet, are characterized prospectively to provide information on infectious disease events. Biosurveillance complements traditional public health surveillance to provide both early warning of infectious disease events as well as situational awareness. The Global Health Security Action Group (GHSAG) of the Global Health Security Initiative is developing a biosurveillance capability that integrates and leverages component systems from member nations. This work discusses these biosurveillance systems and identifies needed future studies.
Designing Smart Health Care Technology into the Home of the Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craft, R.L.; Warren, S.
1999-04-20
This editorial paper presents a vision for intelligent health care in the home of the future, focusing on technologies with the highest potential payoff given targeted government funding over the next ten years. A secure, plug-and-play information framework provides the starting point for identifying technologies that must be developed before home-based devices can know their context and assimilate information to support care decisions.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
.... The proposed rule would allow financial products such as securities index options, index futures, and options on index futures to be included along with the ETF in an equity option's net delta calculation. So... S&P 500 options, S&P 500 futures, options on S&P 500 futures or any other instrument that tracks the...
17 CFR 37.3 - Requirements for underlying commodities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 5a(b)(3) of the Act, may trade any contract of sale of a commodity for future delivery (or option on... that are a security futures product, and the registered derivatives transaction execution facility is a... commodities. 37.3 Section 37.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64153; File No. SR-CFE-2011-002] Self-Regulatory Organizations; CBOE Futures Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change Relating to Listing and Trading CBOE Gold ETF Volatility Index Security Futures...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-29
... remove any potential cloud on the jurisdictional status of options or security futures on ETFS Palladium... that are affected by this approval order are essentially the same as the options and security futures... securities transactions and derivative transactions.\\6\\ By amending its By-Laws to help clarify that options...
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman
2015-10-30
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman
2015-01-01
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280
NASA Astrophysics Data System (ADS)
Li, Z. J.; Tian, Q.; Song, L. L.
2016-08-01
In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih
2016-11-01
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.
Motion/imagery secure cloud enterprise architecture analysis
NASA Astrophysics Data System (ADS)
DeLay, John L.
2012-06-01
Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.
A New Model for the Financing of Higher Education Institutions by Students and Alumni.
ERIC Educational Resources Information Center
Schily, Konrad
2003-01-01
Describes a new model of university funding by German students and alumni. A system of tuition fees was introduced to secure the university's future. Based on the "reversed generation contract" concept, there are three options for payment (payment after graduation based on income, immediate payment, and paying half of the total tuition…
The Nicaragua Canal:Security And Economic Boom Or Bust
2014-04-01
Advisor: Dr. Kathleen Mahoney -Norris Maxwell Air Force Base, Alabama April 2014 DISTRIBUTION A. Approved for public release: Distribution...Commerce and the Future of the Panama Canal. Cambridge, MD: Cornell Maritime Press, Inc., 1975 . Panama Canal Authority. “History.” https
75 FR 47738 - Acknowledgment Letters for Customer Funds and Secured Amount Funds
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
... of foreign futures or foreign options customers, and certain technical changes. DATES: Submit... foreign futures and foreign options customers. \\1\\ See 17 CFR 1.3(gg) (defining the term ``customer funds...-199. \\5\\ See 17 CFR 1.3(rr) (defining the term ``foreign futures or foreign options secured amount...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-29
... to security futures), and in either case cleared through the Options Clearing Corporation (``OCC... contract market or derivatives transaction execution facility for transactions for future delivery in any... of the Options and Security Futures on Gold and Silver Products. In enacting Section 4(c), Congress...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Reporting to customers of....13 Section 5.13 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.13 Reporting to customers of retail foreign exchange dealers and futures...
Argonne Director Eric Isaacs addresses the National Press Club
Eric Isaccs
2017-12-09
Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.
Argonne Director Eric Isaacs addresses the National Press Club
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eric Isaccs
2009-09-17
Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.
Mobile health requires mobile security: challenges, solutions, and standardization.
Pharow, Peter; Blobel, Bernd
2008-01-01
Extended communication and advanced cooperation in a permanently growing healthcare and welfare domain require a well-defined set of security services provided by an interoperable security infrastructure based on international and European standards. Any communication and collaboration procedure requires a purpose. But such legal purpose-binding is definitely not the only aspect to carefully be observed and investigated. More and more, aspects of security, safety, privacy, ethics, and quality reach importance while discussing about future-proof health information systems and health networks - regardless whether local, regional or even pan-European networks. During the course of the current paradigm change from an organization-centered to a process-related and to a person-centered health system, different new technologies including mobile solutions need to be applied in order to meet challenges arising from both legal and technical circumstances. Beside the typical Information and Communication Technology systems and applications, the extended use of modern technologies includes large medical devices like, e.g., MRI and CT but also small devices like sensors worn by a person or included in clothing. Security and safety are on top of the priority list. The paper addresses the identification of some specific aspects like mobile technology and safety when moving both IT and people towards mobile health aiming at increasing citizens and patients awareness, confidence, and acceptance in future mobile care - a world often still beyond the horizon.
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-08
... any option or any futures contracts on ETFS Physical Swiss Gold Shares and ETFS Physical Silver Shares... jurisdictional status of options or security futures on ETFS Physical Swiss Gold Shares or ETFS Physical Silver... approving a proposed rule change clarifying that options and securities futures on SPDR Gold Shares are...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Records to be kept by retail foreign exchange dealers and futures commission merchants. 5.14 Section 5.14 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.14 Records to...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...
Shaping the Future: A Holistic Approach to Planning
1992-03-01
history. Revolutionary changes affect the world’s political , economic, and security systems. Because of these changes, the opportuni ty exists to...paralyze our thinking, cause us to muddle through, or vigorously attempt to shape the future. Change causes macro-economic, social, political , and...purposes of this paper, in military and security matters. Today, for example, the United States’ national security relates to domestic politics , global
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...
17 CFR 240.3a11-1 - Definition of the term “equity security.”
Code of Federal Regulations, 2010 CFR
2010-04-01
... joint venture, or certificate of interest in a business trust; any security future on any such security..., call, straddle, or other option or privilege of buying such a security from or selling such a security...
Emerging Security Mechanisms for Medical Cyber Physical Systems.
Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K
2016-01-01
The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keller, Elizabeth James Kistin; Roll, Elizabeth; Aamir, Munaf Syed
In August 2017, Sandia convened five workshops to explore the future of advanced technologies and global peace and security through the lenses of deterrence, information, innovation, nonproliferation, and population and Earth systems.
Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations
NASA Technical Reports Server (NTRS)
Donohue, John T.; Critchfield, Anna R.
2000-01-01
We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.
Reducing Future International Chemical and Biological Dangers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haddal, Chad; Bull, Diana L.; Hernandez, Patricia Marie
The International Biological and Chemical Threat Reduction Program at Sandia National Laboratories is developing a 15 - year technology road map in support the United States Government efforts to reduce international chemical and biological dangers . In 2017, the program leadership chartered an analysis team to explore dangers in the future international chemical and biological landscape through engagements with national security experts within and beyond Sandia to gain a multidisciplinary perspective on the future . This report offers a hi gh level landscape of future chemical and biological dangers based upon analysis of those engagements and provides support for furthermore » technology road map development.« less
AMERICA’S BASE NETWORK: CREDIBLE DETERRENCE
2017-04-06
reduction occurring after World War I.13 Both eras saw decades of instability and warfare replace the economic stability provided by the US and its global...is still in effect today and is based on shared interests in security and stability . The alliance was formally established via an Economic and...Abstract This essay looks at historical US basing strategy in order to understand the geopolitical and economic complexity facing diplomacy of future
MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
2014-01-01
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
[Welfare and health in the century of social security].
Westin, S
1999-12-10
Great achievements for public health in this century include penicillin, oral contraception, vaccination and transplantation, but the greatest contribution to the health of Norwegians may have been made by social security and the welfare state policies. The beneficial effects of social security include: less social inequality, a factor which in itself makes for better health, some degree of financial security for people who are ill and unable to support themselves or their families, universal availability of medical and health services. This paper explores the ideas and sources from which present-day social security legislation stems. The emergence of state based welfare legislation was inspired by developments in Germany under Bismarck; accident insurance for industrial workers was the first to be introduced in 1894. Several periods of active social security legislation followed at times when labour unions and socialist ideas were strong, supported, to some degree, by radical clergy and public health doctors. Social democratic governments, inspired by the British Beveridge plan towards the end of World War II, took the lead during the long post-war period until the mid 1970s. The Scandinavian model of social security is based on universal coverage and a single payer system. However, since the 1980s, as in other countries of Northern Europe, the social security system has come under pressure from market liberalism. Now at the turn of the century, increasing social inequalities cause some concern for the future of the welfare state.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
... clearing of certain contracts called ``options'' and other contracts called ``security futures'' on each of... amend all orders issued exempting the trading and clearing of options and futures on gold and silver... manner.'' \\11\\ Permitting Options and Security Futures on Gold and Silver Products to trade on national...
Code of Federal Regulations, 2010 CFR
2010-04-01
... B. Item 2 shall include the amount of options-related or security futures product-related Letters of...-1) or a derivatives clearing organization registered with the Commodity Futures Trading Commission... related to security futures products on deposit with: (1) A registered clearing agency or derivatives...
Park, Sohyun; Kim, Kirang
2018-01-01
This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127
Park, Sohyun; Kim, Kirang
2018-01-25
This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.
Abolhallaj, Masood; Hosseini, Seyed Mohammadreza; Jafari, Mehdi; Alaei, Fatemeh
2017-01-01
Background: Sukuk is a type of financial instrument backed by balance sheet and physical assets. This applied and descriptive study aimed at providing solutions to the problems faced by insurance companies in the health sector. Methods: In this study, we achieved operational models by reviewing the release nature and mechanism of any of the securities and combining them. Results: According to the model presented in this study, 2 problems could be solved: settling the past debts and avoiding future debts. This model was deigned based on asset backed securities. Conclusion: Utilizing financing instruments (such as Sukuk), creating investment funds, and finding a solution to this problem, this study was conducted in 2 aspects: (1) models that are settling old debts of the organization, and (2) models that prevent debts in the future.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY... effort to assess the probability of future behavior which could have an effect adverse to the national... the past but necessarily anticipating the future. Rarely is proof of trustworthiness and reliability...
17 CFR 38.605 - Requirements for financial surveillance program.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Requirements for financial surveillance program. 38.605 Section 38.605 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... financial surveillance program. A designated contract market's financial surveillance program for futures...
17 CFR 38.605 - Requirements for financial surveillance program.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Requirements for financial surveillance program. 38.605 Section 38.605 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... financial surveillance program. A designated contract market's financial surveillance program for futures...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Security deposits for retail forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions...
78 FR 20219 - National Financial Capability Month, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-04
... when they invest in higher education. Together, we can prepare young people to tackle financial... education that gets every child on the right track early. These reforms would encourage the kind of broad-based economic growth that gives everyone a better chance to secure their financial future. Our history...
Ensuring the security of synthetic biology-towards a 5P governance strategy.
Kelle, Alexander
2009-12-01
Over recent years the label "synthetic biology" has been attached to a number of diverse research and commercial activities, ranging from the search for a minimal cell to the quick delivery of customized genes by DNA synthesis companies. Based on the analysis of biosecurity issues surrounding synthetic biology during the SYNBIOSAFE project, this paper will first provide a rationale for taking security, in addition to safety aspects of this new field, seriously. It will then take stock of the initiatives and measures that have already been taken in this area and will lastly try to map out future areas of activities in order to minimise the security risks emanating from this promising new field of scientific inquiry and technological progress.
The Future of Indigenous Security Force Training: Considerations for the Joint Operational Commander
2007-11-06
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Future of Indigenous Security Force Training: 5a. CONTRACT NUMBER...focus on indigenous security force training and development (ISFTD) is unique to OIF or if it foreshadows a requirement that must be addressed in...operational plans using ad hoc capabilities. This research paper seeks to demonstrate that the U.S. military has an increased need to train indigenous
Governance: The Mission Ingredient in Security Cooperation
2017-06-09
assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and... principle of “do-no-harm.” 15. SUBJECT TERMS Security cooperation, security assistance, defense institution building, USAID, best practices...foreign assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and
Strategic Paralysis: An Airpower Theory for the Present
1992-05-01
Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Control as: �The role that encompasses all actions taken to secure and control the aerospace environment and to deny the use of that environment to the...destruction is to damage one�s own future prosperity, and, by sowing the seeds of revenge, to jeopardize one�s future security .�48 This is a hauntingly
FAA computer security : concerns remain due to personnel and other continuing weaknesses
DOT National Transportation Integrated Search
2000-08-01
FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.
2008-08-01
This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less
17 CFR 3.3 - Chief compliance officer.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Chief compliance officer. 3.3 Section 3.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGISTRATION Registration § 3.3 Chief compliance officer. (a) Designation. Each futures commission merchant, swap dealer...
17 CFR 3.3 - Chief compliance officer.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Chief compliance officer. 3.3 Section 3.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGISTRATION Registration § 3.3 Chief compliance officer. (a) Designation. Each futures commission merchant, swap dealer...
76 FR 27143 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-10
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0038] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Eleventh Panel Meeting. DATES: May... amended, (hereinafter referred to as ``the FACA'') shall report to and provide the Commissioner of Social...
17 CFR 166.2 - Authorization to trade.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, retail foreign exchange dealer...
17 CFR 166.2 - Authorization to trade.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, retail foreign exchange dealer...
17 CFR 166.2 - Authorization to trade.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, retail foreign exchange...
Shared Electronic Health Record Systems: Key Legal and Security Challenges.
Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M
2017-11-01
Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.
[Landscape ecological security pattern during urban expansion of Nanchong City].
Li, Sui; Shi, Tie-mao; Fu, Shi-lei; Zhou, Le; Liu, Miao; Wang, Wei
2011-03-01
Based on the theory of landscape ecological security pattern and the RS and GIS techniques, this paper analyzed the distribution of ecological security grades in Nanchong City, taking six elements including terrain condition, flood hazard, soil erosion, vegetation cover, geological disaster, and biological protection as the ecological constraints (or determinants) of urban expansion. According to the minimum cumulative resistance model, the ecological corridors and ecological nodes were built to strengthen the space contact of ecological network, and, on the basis of the protection of ecological safety, the reasonable trend of urban expansion and the optimization of space layout were investigated. The results showed that the ecological security of Nanchong City was quite good, with the regions of low ecological security mainly distributed in the west suburban mountains and the downstream region of Jialing River in the south of the City. Ecological elements were the most important constraints for the future expansion of urban space. There were more spaces for the urban expansion in the southern and northern parts of Nanchong City. To develop satellite towns would be the best selection to guarantee the ecological security of the city.
Global climate change and international security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karas, Thomas H.
2003-11-01
This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national andmore » international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.« less
Zhou, Ming; Zheng, Xiliang; Wang, Jin; Dong, Shaojun
2011-02-01
Biofuel cells (BFCs) based on enzymes and microbes are the promising future alternative sources of sustainable electrical energy under mild conditions (i.e. ambient temperature and neutral pH). By combining the adaptive behavior of BFCs self-regulating energy release with the versatility of biocomputing, we construct a novel gas-controlled biocomputing security system, which could be used as the potential implantable self-powered and 'smart' medical system with the logic diagnosis aim. We have demonstrated a biocomputing security system based on BFCs. Due to the unique 'RESET' reagent of N(2) applied in this work, the prepared biocomputing security system can be reset and cycled for a large number of times with no 'RESET' reagent-based 'waste'. This would be advantageous for the potential practical applications of such keypad lock as well as the development of biocomputing security devices. In order to validate the universality of the system and also to harvest energy directly from biofuels with enhanced power output, we replace the glucose with orange juice as the biofuel to operate BFCs-based biocomputing system, which also possesses the function of keypad lock. In addition, by introducing BFCs into the biocomputing security system, the adaptive behavior of the BFCs self-regulating the power release would be an immense advantage of such security keypad lock devices in potential self-powered implantable medical systems. The designed sequence gives the maximum power output and discriminate itself from the rest of the sequences. From this, we find that maximizing the dimensionless ratio of gap versus SD of the power output spectrum (a funnel in power outputs) gives the quantitative optimal design criterion. Therefore, our construction here may also provide a practical example and microscopic structural basis for mimicking the real biological network systems and bridge the gaps between the theoretical concepts and experiments important for biomolecular systems and synthetic biology.
17 CFR 242.403 - Required margin.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Required margin. 242.403 Section 242.403 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
17 CFR 242.402 - General provisions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false General provisions. 242.402 Section 242.402 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 1.28 - Appraisal of instruments purchased with customer funds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... purchased with customer funds. 1.28 Section 1.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Customers' Money, Securities, and Property § 1.28 Appraisal of instruments purchased with customer funds. Futures commission merchants who...
17 CFR 1.26 - Deposit of instruments purchased with customer funds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... purchased with customer funds. 1.26 Section 1.26 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Customers' Money, Securities, and Property § 1.26 Deposit of instruments purchased with customer funds. (a) Each futures commission merchant...
17 CFR 242.402 - General provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... with Regulation T and the margin rules of the self-regulatory authorities of which the security futures... security future and related positions in accordance with the margin rules of the self-regulatory... same regulatory classification or account type and are owned by the same customer to be a single...
17 CFR 5.17 - Authorization to trade.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Authorization to trade. 5.17 Section 5.17 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.17 Authorization to trade. No retail foreign exchange dealer, futures commission...
17 CFR 166.2 - Authorization to trade.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, introducing broker or any of their...
78 FR 36797 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
...\\ sets out a framework for the registration and regulation of national securities exchanges. Under the... regarding how the futures market operates, its rules and procedures, corporate governance, its criteria for membership, its subsidiaries and affiliates, and the security futures products it intends to trade. Rule 6a-4...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
17 CFR 31.22 - Prohibited trading in leverage contracts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Prohibited trading in leverage contracts. 31.22 Section 31.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.22 Prohibited trading in leverage contracts. No futures commission merchant or...
17 CFR 242.405 - Withdrawal of margin.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Withdrawal of margin. 242.405 Section 242.405 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin...
17 CFR 242.101 - Activities by distribution participants.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Activities by distribution participants. 242.101 Section 242.101 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES...
17 CFR 2.2 - Authority to affix seal.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Authority to affix seal. 2.2 Section 2.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFFICIAL SEAL § 2.2 Authority to affix seal. (a) The following officials of the Commodity Futures Trading Commission are...
17 CFR 2.2 - Authority to affix seal.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Authority to affix seal. 2.2 Section 2.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFFICIAL SEAL § 2.2 Authority to affix seal. (a) The following officials of the Commodity Futures Trading Commission are...
ERIC Educational Resources Information Center
National Academies Press, 2012
2012-01-01
"Research Universities and the Future of America" presents critically important strategies for ensuring that our nation's research universities contribute strongly to America's prosperity, security, and national goals. Widely considered the best in the world, our nation's research universities today confront significant financial…
17 CFR 41.32 - Continuing obligations.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities and Exchange Commission or with a futures association registered under section 17 of the Act; (ii... amendments that relate to the trading of security futures products, including both operational rules and the... information filed pursuant to paragraph (a) of this section shall be addressed to the Secretary of the...
17 CFR 41.32 - Continuing obligations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities and Exchange Commission or with a futures association registered under section 17 of the Act; (ii... amendments that relate to the trading of security futures products, including both operational rules and the... information filed pursuant to paragraph (a) of this section shall be addressed to the Secretary of the...
17 CFR 41.32 - Continuing obligations.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities and Exchange Commission or with a futures association registered under section 17 of the Act; (ii... amendments that relate to the trading of security futures products, including both operational rules and the... information filed pursuant to paragraph (a) of this section shall be addressed to the Secretary of the...
17 CFR 30.11 - Applicability of state law.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Applicability of state law. 30.11 Section 30.11 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS § 30.11 Applicability of state law. Pursuant to section 12(e)(2...
12 CFR 221.1 - Authority, purpose, and scope.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Commodity Futures Trading Commission that accept deposits of margin stock in connection with: (i) The... security, certificate of deposit, securities index or foreign currency); or (ii) The guarantee of contracts for the purchase or sale of a commodity for future delivery or options on such contracts. (3) This...
12 CFR 221.1 - Authority, purpose, and scope.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Commodity Futures Trading Commission that accept deposits of margin stock in connection with: (i) The... security, certificate of deposit, securities index or foreign currency); or (ii) The guarantee of contracts for the purchase or sale of a commodity for future delivery or options on such contracts. (3) This...
17 CFR 166.2 - Authorization to trade.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Authorization to trade. 166.2 Section 166.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION CUSTOMER PROTECTION RULES § 166.2 Authorization to trade. No futures commission merchant, retail foreign exchange dealer, introducing broker or any of their...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-09
... COMMODITY FUTURES TRADING COMMISSION SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63423... Reform and Consumer Protection Act, Section 719(b) AGENCY: Commodity Futures Trading Commission; Securities and Exchange Commission. ACTION: Request for Comments. SUMMARY: The Dodd-Frank Wall Street Reform...
Code of Federal Regulations, 2012 CFR
2012-04-01
... concentrated orange juice, and all other goods and articles, except onions as provided in Pub. L. 85-839, and... futures commission merchant to margin, guarantee, or secure open foreign futures contracts plus or minus... or received, plus any other funds required to guarantee or secure open transactions plus or minus any...
Afghanistan: Key Oversight Issues
2013-02-01
2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and
Illinois Kids Count 2001: Envisioning the Future.
ERIC Educational Resources Information Center
Baker, Brenda; Familia, Yahaira; Gifford, Amy; Knowlton, Gretchen; Matakis, Brian; Olson, Melissa; Owens, Tracy; Zasadny, Julie
This Kids Count report examines statewide trends in the well-being of Illinois' children. The statistical portrait is based on indicators in the areas of family, education and child care, arts and recreation, safety, health, and economic security. The indicators are: (1) percent of children living in poverty; (2) number of children enrolled in…
Cognitive Communications Protocols for SATCOM
2017-10-20
both inadvertent Radio Frequency Interference (RFI) and deliberate jammers. Cognitive satellite and space communications strategies based on the... communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer...proposed WACR as the basis for future space communication systems that will offer significant benefits to national war‐fighting and peacekeeping
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-10
... Asset. The term ``Currency,'' as used in the proposed rule, means one or more currencies, or currency...; Commodity-Based Trust Shares; Currency Trust Shares; Commodity Index Trust Shares; Commodity Futures Trust Shares; Partnership Units; Trust Units; Managed Trust Securities; and Currency Warrants. Specifically...
Career Paths of Former Apprentices. Making Work-Based Learning Work. Series 2
ERIC Educational Resources Information Center
Perez-del-Aguila, Rossana; Monteiro, Helen; Hughes, Maria
2006-01-01
This report investigates the career paths taken by apprentices after they complete their training, and the extent to which their apprenticeships has been influential in their future success. The project investigated what careers apprenticeship training secures access to; whether the method and quality of the learning experience in apprenticeships;…
A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.
ERIC Educational Resources Information Center
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin
2003-01-01
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
NASA Astrophysics Data System (ADS)
Paron, Paolo; von Hagen, Craig; Peppino Disperati, Stefano; Hermansyah, Budi; Shaheen, Imra; Jan, Qasim; Berloffa, Andrea; Khan, Ruby; Fakhre, Alam
2013-04-01
Pakistan is highly disaster-prone, with three major flood disasters occurred in the past three years, yet major losses are not inevitable. Farming-based families still struggling to recover from 2010 and 2011 floods have again faced another bad monsoon season in 2012. Meanwhile, the likelihood of yet more natural disasters in the future is high as the phenomenon of climate change is increasing the prevalence of extreme weather conditions. Even with less rainfall, the risk of flooding this year remains high, while many villages have not fully recovered from the 2011-2012 floods. It is of utmost importance to support the most vulnerable rural communities to recover their flood-affected livelihoods. In the meantime, prioritizing disaster preparedness through flood hazard and population mapping is crucial to ensure that realistic contingency plans are in place to deliver an effective and timely response and reduce the impact of floods before they strike. To increase preparedness in future floods, an integrated approach that builds the resilience of flood affected community and enhances emergency preparedness based on reliable data is critical. We present here the innovative methodology developed for estimating population and livelihood that could potentially be affected by a future flood scenario, as well as a methodology for knowing where these people are located, along with an overview of their livelihood pattern. This project has used only freely available dataset, due to the urgency of providing a toolbox to the humanitarian community and the absence of readily available detailed information on natural hazards and exposure in Pakistan. The estimated figures resulting from this project, would provide the Food Security stakeholders with adequate information and data for programming a tailored response in case of floods during future monsoon season. For the purpose of preparedness, understanding the risks, and its potential magnitude, is crucial to provide decision makers with timely information that can serve as a baseline to inform assessments, data analysis and programming of response. Having an estimate of the potentially affected people and agricultural areas before a disaster occurs, can contribute to an organized, appropriate, more timely and targeted response. We also developed a web-based mapping tool to allow remote access to relevant real-time data and scenarios. By combining maps of land cover, crop zones, flood hazard and population, this project has provided essential geographic orientation for food security preparedness analysis, and is essential for the following reasons: i. It provides the basis for quantifying population at risk of food insecurity before a disaster occurs; ii. It provides a stratification for any post-disaster assessment; iii. Combined with a FS&L (Food Security and Livelihood Assessment), it helps to inform the Food Security response analyses and assistance targeting; iv. It complements and inform the district-based HLV (Hazard Livelihood and Vulnerability baseline and contingency plans) with data and analyses at country and provincial level linked with agriculture seasonal calendars, main key production cycles, and seasonal hazards; v. It provides inputs to any future activities under the Integrated Phase Classification (IPC) project.
76 FR 27671 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... limit their business to the sale and redemption of securities of registered investment companies and... required to register only because they effect transactions in securities futures products. The information... securities business or do not hold inventories of securities. For these reasons, the staff estimates that the...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security outstanding, the designated contract market or registered derivatives transaction execution... securities. (3) Notwithstanding paragraphs (b)(1) or (b)(2) of this section, if a derivatives clearing... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Additional conditions for...
Teaching RFID Information Systems Security
ERIC Educational Resources Information Center
Thompson, Dale R.; Di, Jia; Daugherty, Michael K.
2014-01-01
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
NASA Astrophysics Data System (ADS)
Cao, Guangxi; Han, Yan; Cui, Weijun; Guo, Yu
2014-11-01
The cross-correlation between the China Securities Index 300 (CSI 300) index futures and the spot markets based on high-frequency data is discussed in this paper. We empirically analyze the cross-correlation by using the multifractal detrended cross-correlation analysis (MF-DCCA), and investigate further the characteristics of asymmetry, frequency difference, and transmission direction of the cross-correlation. The results indicate that the cross-correlation between the two markets is significant and multifractal. Meanwhile, weak asymmetries exist in the cross-correlation, and higher data frequency results in a lower multifractality degree of the cross-correlation. The causal relationship between the two markets is bidirectional, but the CSI 300 index futures market has greater impact on the spot market.
NASA Astrophysics Data System (ADS)
Graham, Christopher J.
2012-05-01
Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=
The aspects of safety in future care settings.
Pharow, Peter; Blobel, Bernd G M E; Savastano, Mario
2007-01-01
Communication and cooperation processes in the growing healthcare and welfare domain require a well-defined set of security services provided by a standards-based interoperable security infrastructure. Any communication and collaboration procedures require a verifiable purpose. Without such a purpose for communicating with each other, there's no need to communicate at all. But security is not the only aspect that needs to carefully be investigated. More and more, aspects of safety, privacy, and quality get importance while discussing about future-proof health information systems and health networks--regardless whether local, regional and national ones or even pan-European networks. The patient needs to be moved into the center of each care process. During the course of the current paradigm change from an organization centered via a process-related to a person-centered healthcare and welfare system approach, different new technologies need to be applied in order to meet the new challenges arising from both legal and technical circumstances. International organizations like WHO, UNESCO and the European Parliament increasingly aim at enhancing the safety aspect in future care settings, and so do many projects and studies. Beside typical information and communication devices, extended use of modern IT technology in healthcare and welfare includes large medical devices like, e.g., CT, X-ray and MR but also very tiny devices like sensors worn or implemented in a person's clothing. Safety gets on top of the nations priority list for several reasons. The paper aims at identifying some of these reasons along with possible solutions on how to increase patient's awareness, confidence, and acceptance in future care settings.
2014-12-01
Press, 2010), Kindle edition. 35 Peter H. Diamandis and Steven Kotler , Abundance: The Future Is Better than You Think (New York: Free Press, 2012...Diamandis and Kotler , Abundance: The Future Is Better Than You Think, 6. 116 Maeve Duggan and Aaron Smith, “Social Media Update 2013,” Pew Research Center...Committee on Homeland Security and Governmental Affairs of the U.S. Senate). 298 Philip J. Palin, “Perspectives on Preparedness: Nudging Us Forward a
Medicare privatization and the erosion of retirement security.
Polivka, Larry; Kwak, Jung
2008-01-01
This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.
In the Face of Cybersecurity: How the Common Information Model Can Be Used
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skare, Paul; Falk, Herbert; Rice, Mark
2016-01-01
Efforts are underway to combine smart grid information, devices, networking, and emergency response information to create messages that are not dependent on specific standards development organizations (SDOs). This supports a future-proof approach of allowing changes in the canonical data models (CDMs) going forward without having to perform forklift replacements of solutions that use the messages. This also allows end users (electric utilities) to upgrade individual components of a larger system while keeping the message payload definitions intact. The goal is to enable public and private information sharing securely in a standards-based approach that can be integrated into existing operations. Wemore » provide an example architecture that could benefit from this multi-SDO, secure message approach. This article also describes how to improve message security« less
Ethical management of food systems: plant based diet as a holistic approach.
Chiu, Tina H T; Lin, Chin-Lon
2009-01-01
While improvement in agricultural technology had enabled the production of abundant food, it has thus far failed to eliminate hunger. Malnutrition is expected to reach an all time high. Evidences have suggested that animal based diet has put immense pressure on the already fragile food system, contributing to problems in terms of global food security, health security, and environmental sustainability. Plant based dietary approaches may therefore, target some of these problems from the roots, and may be a solution to improving ethical issues and equity in the current food system. This paper examines how meat production and consumption contributed to the current crises in the food system through the lens of ethics--the moral compass--to find directions on how the present generation should eat, and how the food system could be maintained for a better future.
The Millennial Generation: Developing Leaders for the Future Security Environment
2011-02-15
Dumbest Generation (Penguin Group, New York, New York: 2009) p 8, 10. 19 National Academy of Sciences, “Generation Y : The Millennials …Ready or Not, Here...St ra te gy R es ea rc h Pr oj ec t THE MILLENNIAL GENERATION: DEVELOPING LEADERS FOR THE FUTURE SECURITY ENVIRONMENT BY COLONEL LANCE...Strategy Research Project 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Millennial Generation: Developing Leaders for the Future
17 CFR 402.2 - Capital requirements for registered government securities brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Options on those futures contracts described in paragraph (e)(1)(vii) of this section, settled on a cash... determining net worth, all long and short positions in unlisted options that are Treasury market risk... securities, debt instruments, and derivative instruments: (i) Government securities, except equity securities...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halvorson, C S
The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... Adjusted trading means any method or transaction whereby a corporate credit union sells a security to a... securities, asset-backed securities, or corporate obligations in the form of loans or debt. Senior tranches... repurchase the same security at a specified time in the future. The corporate credit union then sells that...
Defense.gov Special Report: Aspen Security Forum 2014
Adventurism-Is Europe Ready? Cooperation in Counterterrorism Bringing into Balance the Military Instrument The Future of Warfare Striking Balance between Security and Liberty Assessing Department of Homeland Security Aspen Security Forum. Story Army Needs Balance, Odierno Says In the debate about how large the Army
Enhancement of A5/1 encryption algorithm
NASA Astrophysics Data System (ADS)
Thomas, Ria Elin; Chandhiny, G.; Sharma, Katyayani; Santhi, H.; Gayathri, P.
2017-11-01
Mobiles have become an integral part of today’s world. Various standards have been proposed for the mobile communication, one of them being GSM. With the rising increase of mobile-based crimes, it is necessary to improve the security of the information passed in the form of voice or data. GSM uses A5/1 for its encryption. It is known that various attacks have been implemented, exploiting the vulnerabilities present within the A5/1 algorithm. Thus, in this paper, we proceed to look at what these vulnerabilities are, and propose the enhanced A5/1 (E-A5/1) where, we try to improve the security provided by the A5/1 algorithm by XORing the key stream generated with a pseudo random number, without increasing the time complexity. We need to study what the vulnerabilities of the base algorithm (A5/1) is, and try to improve upon its security. This will help in the future releases of the A5 family of algorithms.
[Significance of re-evaluation and development of Chinese herbal drugs].
Gao, Yue; Ma, Zengchun; Zhang, Boli
2012-01-01
The research of new herbal drugs involves in new herbal drugs development and renew the old drugs. It is necessary to research new herbal drugs based on the theory of traditional Chinese medicine (TCM). The current development of famous TCM focuses on the manufacture process, quality control standards, material basis and clinical research. But system management of security evaluation is deficient, the relevant system for the safety assessment TCM has not been established. The causes of security problems, security risks, target organ of toxicity, weak link of safety evaluation, and ideas of safety evaluation are discussed in this paper. The toxicology research of chinese herbal drugs is necessary based on standard of good laboratory practices (GLP), the characteristic of Chinese herbal drugs is necessary to be fully integrated into safety evaluation. The safety of new drug research is necessary to be integrated throughout the entire process. Famous Chinese medicine safety research must be paid more attention in the future.
A Security Architecture for Grid-enabling OGC Web Services
NASA Astrophysics Data System (ADS)
Angelini, Valerio; Petronzio, Luca
2010-05-01
In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.
NASA Astrophysics Data System (ADS)
Yang, Xiaoli; Zheng, Weifei; Ren, Liliang; Zhang, Mengru; Wang, Yuqian; Liu, Yi; Yuan, Fei; Jiang, Shanhu
2018-02-01
The Yellow River Basin (YRB) is the largest river basin in northern China, which has suffering water scarcity and drought hazard for many years. Therefore, assessments the potential impacts of climate change on the future streamflow in this basin is very important for local policy and planning on food security. In this study, based on the observations of 101 meteorological stations in YRB, equidistant CDF matching (EDCDFm) statistical downscaling approach was applied to eight climate models under two emissions scenarios (RCP4.5 and RCP8.5) from phase five of the Coupled Model Intercomparison Project (CMIP5). Variable infiltration capacity (VIC) model with 0.25° × 0.25° spatial resolution was developed based on downscaled fields for simulating streamflow in the future period over YRB. The results show that with the global warming trend, the annual streamflow will reduced about 10 % during the period of 2021-2050, compared to the base period of 1961-1990 in YRB. There should be suitable water resources planning to meet the demands of growing populations and future climate changing in this region.
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
17 CFR 242.404 - Type, form and use of margin.
Code of Federal Regulations, 2010 CFR
2010-04-01
... (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin Requirements for Security Futures § 242.404 Type, form and use of margin. (a) When margin... (§§ 242.400 through 242.406), provided that: (i) The customer waives any right to redeem the shares...
17 CFR 41.31 - Notice-designation requirements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... designated contract market in security futures products under section 5f of the Act, shall so notify the Commission. Such notification shall be filed with the Secretary of the Commission at its Washington, D.C... Market in Security Futures Products,” and shall include: (1) The name and address of the board of trade...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Minimum financial requirements... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.7 Minimum financial requirements for retail foreign...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Maintenance of minimum... engaging in retail forex transactions. 5.6 Section 5.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.6 Maintenance of minimum financial...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Indexes underlying futures contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY... reported transactions used in calculating dollar value of trading volume is reported in a currency other...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Distribution of âRisk... brokers regarding retail forex transactions. 5.5 Section 5.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.5 Distribution of “Risk...
The role of plant pathology and plant pathology journals in future food security
USDA-ARS?s Scientific Manuscript database
The world's population is expected to exceed 9 billion by 2050 and this will require a significant increase in crop production for global food security. Future increases in crop production will require limiting the effects of weeds, insects, and diseases incited by fungi, viruses, nematodes, and ba...
17 CFR 100.1 - Delivery period required with respect to certain grains.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Delivery period required with respect to certain grains. 100.1 Section 100.1 Commodity and Securities Exchanges COMMODITY FUTURES... grains. A period of seven business days is required during which contracts for future delivery in the...
The Specter of Sunni Military Mobilization in Lebanon
2013-11-01
stabilization Future national security environment and forces European security issues, especially the Mediterranean littoral West Africa...5 More space for militant narratives .......................................................... 8 The Syrian war comes...their political dominance Sunni officials and elites attack the legitimacy of state institu- tions, particularly the Lebanese Army The Future
17 CFR 17.01 - Identification of special accounts, volume threshold accounts, and omnibus accounts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Identification of special accounts, volume threshold accounts, and omnibus accounts. 17.01 Section 17.01 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REPORTS BY REPORTING MARKETS, FUTURES COMMISSION MERCHANTS, CLEARING MEMBERS, AND FOREIGN BROKERS §...
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Zarei, Javad; Sadoughi, Farahnaz
2016-01-01
In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.
Plant genetics, sustainable agriculture and global food security.
Ronald, Pamela
2011-05-01
The United States and the world face serious societal challenges in the areas of food, environment, energy, and health. Historically, advances in plant genetics have provided new knowledge and technologies needed to address these challenges. Plant genetics remains a key component of global food security, peace, and prosperity for the foreseeable future. Millions of lives depend upon the extent to which crop genetic improvement can keep pace with the growing global population, changing climate, and shrinking environmental resources. While there is still much to be learned about the biology of plant-environment interactions, the fundamental technologies of plant genetic improvement, including crop genetic engineering, are in place, and are expected to play crucial roles in meeting the chronic demands of global food security. However, genetically improved seed is only part of the solution. Such seed must be integrated into ecologically based farming systems and evaluated in light of their environmental, economic, and social impacts-the three pillars of sustainable agriculture. In this review, I describe some lessons learned, over the last decade, of how genetically engineered crops have been integrated into agricultural practices around the world and discuss their current and future contribution to sustainable agricultural systems.
Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili
2014-01-01
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729
Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili
2014-01-01
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.
Protecting computer-based medical devices: defending against viruses and other threats.
2005-07-01
The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.
Growing America's Energy Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The emerging U.S. bioenergy industry provides a secure and growing supply of transportation fuels, biopower, and bioproducts produced from a range of abundant, renewable biomass resources. Bioenergy can help ensure a secure, sustainable, and economically sound future by reducing U.S. dependence on foreign oil, developing domestic clean energy sources, and generating domestic green jobs. Bioenergy can also help address growing concerns about climate change by reducing greenhouse gas emissions to create a healthier environment for current and future generations.
Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks
ERIC Educational Resources Information Center
Bashar, Muhammad Shafi Al
2011-01-01
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... options, forwards, futures, swap agreements, or collars involving currencies, interest or other rates... derivatives dealers. 240.15a-1 Section 240.15a-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Under the Securities Exchange Act of 1934 Exemption of Certain Otc Derivatives Dealers § 240.15a-1...
Security for IP Multimedia Services in the 3GPP Third Generation Mobile System.
ERIC Educational Resources Information Center
Horn, G.; Kroselberg, D.; Muller, K.
2003-01-01
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
2002-04-01
Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
NASA Astrophysics Data System (ADS)
Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr
2018-05-01
The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
NASA Astrophysics Data System (ADS)
Sklavos, N.; Selimis, G.; Koufopavlou, O.
2005-01-01
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
Reframing for Global Sustainability: The "Second Manifesto" for the "Turn of the Titanic"
ERIC Educational Resources Information Center
Rauch, Herbert
2013-01-01
Purpose: This paper aims to encourage "discourse concerning a 'sustainable societal system'", proposing S.E.E.D. (=Secure-base Earth Equilibrium Development). S.E.E.D. outlines a possible transition to a viable future civilisation, a realistic eco-social turnaround, a "taming" (i.e. a cultivation) of the market with regard to…
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... through a trading system that electronically matches bids and offers pursuant to a predetermined algorithm... participants with a time or place advantage or the ability to override a predetermined algorithm must submit an... override a predetermined algorithm from trading a security futures product for accounts in which these same...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... through a trading system that electronically matches bids and offers pursuant to a predetermined algorithm... participants with a time or place advantage or the ability to override a predetermined algorithm must submit an... override a predetermined algorithm from trading a security futures product for accounts in which these same...
Nuclear Security Futures Scenarios.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keller, Elizabeth James Kistin; Warren, Drake Edward; Hayden, Nancy Kay
This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.
This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... DEPARTMENT OF LABOR Employee Benefits Security Administration Prohibited Transaction Exemptions... Fund; Correction AGENCY: Employee Benefits Security Administration, Department of Labor (the Department... of Exemption Determinations, Employee Benefits Security Administration, U.S. Department of Labor...
A copula-multifractal volatility hedging model for CSI 300 index futures
NASA Astrophysics Data System (ADS)
Wei, Yu; Wang, Yudong; Huang, Dengshi
2011-11-01
In this paper, we propose a new hedging model combining the newly introduced multifractal volatility (MFV) model and the dynamic copula functions. Using high-frequency intraday quotes of the spot Shanghai Stock Exchange Composite Index (SSEC), spot China Securities Index 300 (CSI 300), and CSI 300 index futures, we compare the direct and cross hedging effectiveness of the copula-MFV model with several popular copula-GARCH models. The main empirical results show that the proposed copula-MFV model obtains better hedging effectiveness than the copula-GARCH-type models in general. Furthermore, the hedge operating strategy based MFV hedging model involves fewer transaction costs than those based on the GARCH-type models. The finding of this paper indicates that multifractal analysis may offer a new way of quantitative hedging model design using financial futures.
Wang, Liangmin
2018-01-01
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314
Sohail, Muhammad; Wang, Liangmin
2018-03-14
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.
The Command of Space: A National Vision for American Prosperity and Security
2000-03-01
are also made for the president and Congress to advance toward the goal of commanding space. The future requires a national effort to master all...information flows and these are increasingly space dependent. Both a nation’s prosperity and security, now and in the future , are thus linked to...or future adversaries—China—compete with the U.S. China is expected to surpass the size of the U.S. economy in about ten years. While a vision for
Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao
2015-08-01
Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.
NASA Astrophysics Data System (ADS)
Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue
This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.
Continuous-variable quantum computing on encrypted data.
Marshall, Kevin; Jacobsen, Christian S; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L
2016-12-14
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
Field studies of safety security rescue technologies through training and response activities
NASA Astrophysics Data System (ADS)
Murphy, Robin R.; Stover, Sam
2006-05-01
This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.
Continuous-variable quantum computing on encrypted data
Marshall, Kevin; Jacobsen, Christian S.; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L.
2016-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks. PMID:27966528
Secure Network-Centric Aviation Communication (SNAC)
NASA Technical Reports Server (NTRS)
Nelson, Paul H.; Muha, Mark A.; Sheehe, Charles J.
2017-01-01
The existing National Airspace System (NAS) communications capabilities are largely unsecured, are not designed for efficient use of spectrum and collectively are not capable of servicing the future needs of the NAS with the inclusion of new operators in Unmanned Aviation Systems (UAS) or On Demand Mobility (ODM). SNAC will provide a ubiquitous secure, network-based communications architecture that will provide new service capabilities and allow for the migration of current communications to SNAC over time. The necessary change in communication technologies to digital domains will allow for the adoption of security mechanisms, sharing of link technologies, large increase in spectrum utilization, new forms of resilience and redundancy and the possibly of spectrum reuse. SNAC consists of a long term open architectural approach with increasingly capable designs used to steer research and development and enable operating capabilities that run in parallel with current NAS systems.
Continuous-variable quantum computing on encrypted data
NASA Astrophysics Data System (ADS)
Marshall, Kevin; Jacobsen, Christian S.; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L.
2016-12-01
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
Chip-based quantum key distribution
NASA Astrophysics Data System (ADS)
Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.
2017-02-01
Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip--monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols--BB84, Coherent One Way and Differential Phase Shift--with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks.
Chip-based quantum key distribution
Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.
2017-01-01
Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip—monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols—BB84, Coherent One Way and Differential Phase Shift—with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks. PMID:28181489
Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man
2014-01-01
Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... other things, clarify the scope of products proposed to be cleared, add new Rule 207(f) prohibiting FCM.... securities laws (i.e., LIFFE futures and options on equity securities) (the ``LIFFE securities products... facility for purposes of trading such products. In addition, only certain LIFFE securities products are...
The 1983 Amendments to the Social Security Act: The Issue of Intergenerational Equity.
ERIC Educational Resources Information Center
Ozawa, Martha N.
1984-01-01
Reviews the conditions that prevailed before the passage of the 1983 amendments to the Social Security Act, the probable effects of the amendments, and the future direction of social security. Questions whether the amendments have in reality rescued social security from financial insolvency and discusses the concept of intergenerational equity.…
17 CFR 41.46 - Type, form and use of margin.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Type, form and use of margin. 41.46 Section 41.46 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY... security in § 240.15c3-1(c)(2)(vi) of this title; (v) Freely convertible foreign currency may be valued at...
Visualizing Alternative Phosphorus Scenarios for Future Food Security
Neset, Tina-Simone; Cordell, Dana; Mohr, Steve; VanRiper, Froggi; White, Stuart
2016-01-01
The impact of global phosphorus scarcity on food security has increasingly been the focus of scientific studies over the past decade. However, systematic analyses of alternative futures for phosphorus supply and demand throughout the food system are still rare and provide limited inclusion of key stakeholders. Addressing global phosphorus scarcity requires an integrated approach exploring potential demand reduction as well as recycling opportunities. This implies recovering phosphorus from multiple sources, such as food waste, manure, and excreta, as well as exploring novel opportunities to reduce the long-term demand for phosphorus in food production such as changing diets. Presently, there is a lack of stakeholder and scientific consensus around priority measures. To therefore enable exploration of multiple pathways and facilitate a stakeholder dialog on the technical, behavioral, and institutional changes required to meet long-term future phosphorus demand, this paper introduces an interactive web-based tool, designed for visualizing global phosphorus scenarios in real time. The interactive global phosphorus scenario tool builds on several demand and supply side measures that can be selected and manipulated interactively by the user. It provides a platform to facilitate stakeholder dialog to plan for a soft landing and identify a suite of concrete priority options, such as investing in agricultural phosphorus use efficiency, or renewable fertilizers derived from phosphorus recovered from wastewater and food waste, to determine how phosphorus demand to meet future food security could be attained on a global scale in 2040 and 2070. This paper presents four example scenarios, including (1) the potential of full recovery of human excreta, (2) the challenge of a potential increase in non-food phosphorus demand, (3) the potential of decreased animal product consumption, and (4) the potential decrease in phosphorus demand from increased efficiency and yield gains in crop and livestock systems. PMID:27840814
Visualizing Alternative Phosphorus Scenarios for Future Food Security.
Neset, Tina-Simone; Cordell, Dana; Mohr, Steve; VanRiper, Froggi; White, Stuart
2016-01-01
The impact of global phosphorus scarcity on food security has increasingly been the focus of scientific studies over the past decade. However, systematic analyses of alternative futures for phosphorus supply and demand throughout the food system are still rare and provide limited inclusion of key stakeholders. Addressing global phosphorus scarcity requires an integrated approach exploring potential demand reduction as well as recycling opportunities. This implies recovering phosphorus from multiple sources, such as food waste, manure, and excreta, as well as exploring novel opportunities to reduce the long-term demand for phosphorus in food production such as changing diets. Presently, there is a lack of stakeholder and scientific consensus around priority measures. To therefore enable exploration of multiple pathways and facilitate a stakeholder dialog on the technical, behavioral, and institutional changes required to meet long-term future phosphorus demand, this paper introduces an interactive web-based tool, designed for visualizing global phosphorus scenarios in real time. The interactive global phosphorus scenario tool builds on several demand and supply side measures that can be selected and manipulated interactively by the user. It provides a platform to facilitate stakeholder dialog to plan for a soft landing and identify a suite of concrete priority options, such as investing in agricultural phosphorus use efficiency, or renewable fertilizers derived from phosphorus recovered from wastewater and food waste, to determine how phosphorus demand to meet future food security could be attained on a global scale in 2040 and 2070. This paper presents four example scenarios, including (1) the potential of full recovery of human excreta, (2) the challenge of a potential increase in non-food phosphorus demand, (3) the potential of decreased animal product consumption, and (4) the potential decrease in phosphorus demand from increased efficiency and yield gains in crop and livestock systems.
Nuclear security policy in the context of counter-terrorism in Cambodia
NASA Astrophysics Data System (ADS)
Khun, Vuthy; Wongsawaeng, Doonyapong
2016-01-01
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Definitions. 141.2 Section 141.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SALARY OFFSET § 141.2... social security, federal, state or local income tax, health insurance premiums, retirement contributions...
76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on December 15, 2011, to establish working groups and set the agenda for future activity. This meeting will be open to the public.
Finland’s Security Solution in the Future
2013-03-01
important for foreign and security policies. This part of the world is becoming increasingly important for transport, natural resources and tourism . The...julkaisu/fi.jsp?oid=373066 (accessed December 22, 2012, only in Finnish). 6 Finnish Goverment Communication Department, “Government Security and
Attack Classification Schema for Smart City WSNs
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-01-01
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192
Attack Classification Schema for Smart City WSNs.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-04-05
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
Food for thought: food systems, livestock futures and animal health.
Wilkinson, Angela
2013-12-01
Global food security, livestock production and animal health are inextricably bound. However, our focus on the future tends to disaggregate food and health into largely separate domains. Indeed, much foresight work is either food systems or health-based with little overlap in terms of predictions or narratives. Work on animal health is no exception. Part of the problem is the fundamental misunderstanding of the role, nature and impact of the modern futures tool kit. Here, I outline three key issues in futures research ranging from methodological confusion over the application of scenarios to the failure to effectively integrate multiple methodologies to the gap between the need for more evidence and power and control over futures processes. At its core, however, a better understanding of the narrative and worldview framing much of the futures work in animal health is required to enhance the value and impact of such exercises.
17 CFR 1.26 - Deposit of instruments purchased with futures customer funds.
Code of Federal Regulations, 2014 CFR
2014-04-01
... that we might owe to you, and they may not be used by us to secure or obtain credit from you. You... us to secure or guarantee any obligations that we might owe to you, and they may not be used by us to... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Customers' Money...
NATO Regional Capacity Building: The Foundation for Success in the Counter-Piracy Campaign
2011-04-16
could best tailor 68 Nana K. Poku, Neil Renwick, and Joao Gomes Porto, “Human Security and...be established for 79 Alberto Bin, “NATO’s Mediterranean dialogue,” in The Future of the...nations. 81 Alberto Bin, “NATO’s Mediterranean dialogue,” in The Future of the Euro-Mediterranean Security Dialogue, ed. Martin Ortega (Paris
A Further Look at the Prediction of Weapons Effectiveness in Suppressive Fire
1979-05-01
official Oeciertmirit Of the .,m’y politiOn. unless 11) designated by other authorized documents. . I tiny~ flggq rr- SECURITY CLASSIFICAT ION OF THIS PAGE...presents the results of an investigation originally designed to determine what aspects of the auditory signatures of passing projectiles are perceived as...suppression is based on a future risk, while reactive suppression is based on a current risk. Nay-or 2 0 implies that weapons designers need more
Department of Defense Annual Report on Sexual Assault in the Military. Fiscal Year 2013
2014-04-16
a web based, self-guided training solution for SARCs and SAPR PMs consisting of simulations demonstrating DSAID’s capabilities; Included D-SAACP...for future Soldiers. This is a web -based training tool for potential and new recruits that can be accessed and used in Recruiting Stations. Topics...sensitive” to protect and promote the welfare of the patient. Paper records are treated as “sensitive,” maintained in a locked, secured container
Instantly Basing Locust Swarms: New Options for Future Air Operations
2012-06-01
force’s fighting potential.”51 Moreover, JP 3-0 specifically emphasizes “Securing and protecting forces, bases, JSAs [Joint Storage Areas], and LOCs ...Smith and Leo Marx (Cambridge, MA: The MIT Press, 1994), 101-113. 64 Hughes, “Technological Momentum,”108. 65 John Law, "Technology and Heterogeneous...Technology Drive History?, edited by Merritt Roe Smith and Leo Marx, 101-113. Cambridge, MA: The MIT Press, 1994. Jean, Grace V. "Remotely Piloted
DOE Office of Scientific and Technical Information (OSTI.GOV)
BLEJWAS,THOMAS E.; SANDERS,THOMAS L.; EAGAN,ROBERT J.
2000-01-01
Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadershipmore » or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity.« less
78 FR 77173 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... because they effect transactions in securities futures products. The information obtained from Rule 17a-13... time complying with the rule, given that they do not do a public securities business or do not hold... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request...
32 CFR 154.60 - Evaluating continued security eligibility.
Code of Federal Regulations, 2014 CFR
2014-07-01
....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...
32 CFR 154.60 - Evaluating continued security eligibility.
Code of Federal Regulations, 2013 CFR
2013-07-01
....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...
32 CFR 154.60 - Evaluating continued security eligibility.
Code of Federal Regulations, 2012 CFR
2012-07-01
....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Segregation. 32.6 Section 32.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.6 Segregation. (a) Any person which accepts money, securities, or property from an option...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Segregation. 32.6 Section 32.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.6 Segregation. (a) Any person which accepts money, securities, or property from an option...
78 FR 42113 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget... settlement price for each cash-settled security futures product fairly reflect the opening price of the... Securities and Exchange Commission, Office of Information and Regulatory Affairs, Office of Management and...
Precision Strike Annual Programs Review
2008-04-16
SW For Precise Targeting 8 “Secure the High Ground” Evolution of Deployable HEL Weapons Capability THEL ACTD C5 Galaxy HEL TD C17 Globemaster Future...Security Ranger Training Maritime Ops CT Coastal SecurityERITREA African Union CA Wells, Schools MED / VETCAPs CA MED / VET Bilateral Military
SPCC- Software Elements for Security Partition Communication Controller
NASA Astrophysics Data System (ADS)
Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.
2016-08-01
Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.
Zarei, Javad; Sadoughi, Farahnaz
2016-01-01
Background In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. Materials and methods This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Results Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Conclusion Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran. PMID:27313481
Fueling the Future: Furthering Theater Security with Burma’s Energy Industry
2014-10-30
Illustrations Figure Title Page 1. Energy Assessment of Geologic Provinces in Burma, USGS 2 2. China’s “Malacca Dilemma” and...extractable” oil and natural gas. A recent geology-based assessment of undiscovered technically recoverable oil, natural gas and gas liquids conducted... Assessment of Geologic Provinces in Burma, U.S. Geological Survey, 2012 1 C.J. Wandey, et al
Organizational Identity: Positioning The Coast Guard for Future Success In An Evolving Environment
2016-12-01
Security, missions, social identity, organizational identity, social network analysis, social structure , social categorization, social comparison...essence of the organization among its members.”33 In seeking to understand the current organizational identity of the Coast Guard based on...maritime domain; (4) operational and organizational structure ; (5) how the Service operates; and (6) how Coast Guard authorities, capabilities, competencies
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
Future climate impacts on maize farming and food security in Malawi
NASA Astrophysics Data System (ADS)
Stevens, Tilele; Madani, Kaveh
2016-11-01
Agriculture is the mainstay of Malawi’s economy and maize is the most important crop for food security. As a Least Developed Country (LDC), adverse effects of climate change (CC) on agriculture in Malawi are expected to be significant. We examined the impacts of CC on maize production and food security in Malawi’s dominant cereal producing region, Lilongwe District. We used five Global Circulation Models (GCMs) to make future (2011 to 2100) rainfall and temperature projections and simulated maize yields under these projections. Our future rainfall projections did not reveal a strong increasing or decreasing trend, but temperatures are expected to increase. Our crop modelling results, for the short-term future, suggest that maize farming might benefit from CC. However, faster crop growth could worsen Malawi’s soil fertility problem. Increasing temperature could drive lower maize yields in the medium to long-term future. Consequently, up to 12% of the population in Lilongwe District might be vulnerable to food insecurity by the end of the century. Measures to increase soil fertility and moisture must be developed to build resilience into Malawi’s agriculture sector.
17 CFR 242.501 - Certifications in connection with research reports.
Code of Federal Regulations, 2011 CFR
2011-04-01
... with research reports. 242.501 Section 242.501 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ac-Analyst Certification § 242.501 Certifications in connection with research reports. (a) A broker or dealer or covered person that publishes, circulates, or provides a research...
Code of Federal Regulations, 2011 CFR
2011-01-01
... mortgage related security. Core capital means the sum of a corporate credit union's retained earnings, and... repurchase the same security at a specified time in the future. The corporate credit union then sells that... which the corporate credit union is obligated to return the security to its member credit union...
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
Network Security Is Manageable
ERIC Educational Resources Information Center
Roberts, Gary
2006-01-01
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
17 CFR 242.501 - Certifications in connection with research reports.
Code of Federal Regulations, 2010 CFR
2010-04-01
... with research reports. 242.501 Section 242.501 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ac-Analyst Certification § 242.501 Certifications in connection with research reports. (a) A broker or dealer or covered person that publishes, circulates, or provides a research...
Field resistance of transgenic plantain to nematodes has potential for future African food security
Tripathi, Leena; Babirye, Annet; Roderick, Hugh; Tripathi, Jaindra N.; Changa, Charles; Urwin, Peter E.; Tushemereirwe, Wilberforce K.; Coyne, Danny; Atkinson, Howard J.
2015-01-01
Plant parasitic nematodes impose losses of up to 70% on plantains and cooking bananas in Africa. Application of nematicides is inappropriate and resistant cultivars are unavailable. Where grown, demand for plantain is more than for other staple crops. Confined field testing demonstrated that transgenic expression of a biosafe, anti-feedant cysteine proteinase inhibitor and an anti-root invasion, non-lethal synthetic peptide confers resistance to plantain against the key nematode pests Radopholus similis and Helicotylenchus multicinctus. The best peptide transgenic line showed improved agronomic performance relative to non-transgenic controls and provided about 99% nematode resistance at harvest of the mother crop. Its yield was about 186% in comparison with the nematode challenged control non-transgenic plants based on larger bunches and diminished plant toppling in storms, due to less root damage. This is strong evidence for utilizing this resistance to support the future food security of 70 million, mainly poor Africans that depend upon plantain as a staple food. PMID:25634654
Primary care in the United States and its precarious future.
Starfield, Barbara; Oliver, Thomas
1999-09-01
Primary care has not secured a firm place within the US health services system. Since primary care lacks a strong research base, is not institutionalized in medical education or in policy-making and is marginalized in both proposed and actual reforms, it has not developed into a central component of the health care infrastructure. We discuss recent efforts that promised modest improvements, including the Clinton health care reform proposals and subsequent federal and state actions, in the role of primary care within the health services system. We also assess the likely fate of primary care given the accelerated growth of managed care and market competition, the dissatisfaction of large segments of the population with managed care and misperceptions of managed care as synonymous with primary care. We highlight how managed care fails to achieve the cardinal functions of primary care and summarize initiatives that, at a minimum, would be required to secure a stronger position for primary care in the future.
Diversified models for portfolio selection based on uncertain semivariance
NASA Astrophysics Data System (ADS)
Chen, Lin; Peng, Jin; Zhang, Bo; Rosyida, Isnaini
2017-02-01
Since the financial markets are complex, sometimes the future security returns are represented mainly based on experts' estimations due to lack of historical data. This paper proposes a semivariance method for diversified portfolio selection, in which the security returns are given subjective to experts' estimations and depicted as uncertain variables. In the paper, three properties of the semivariance of uncertain variables are verified. Based on the concept of semivariance of uncertain variables, two types of mean-semivariance diversified models for uncertain portfolio selection are proposed. Since the models are complex, a hybrid intelligent algorithm which is based on 99-method and genetic algorithm is designed to solve the models. In this hybrid intelligent algorithm, 99-method is applied to compute the expected value and semivariance of uncertain variables, and genetic algorithm is employed to seek the best allocation plan for portfolio selection. At last, several numerical examples are presented to illustrate the modelling idea and the effectiveness of the algorithm.
Automated, Certified Program-rewriting for Software Security Enforcement
2012-03-05
VLC ), pages 257-260, Oak Brook, Illinois, Oc- tober 2010. [14] Aditi A. Patwardhan. Security-aware program visualization for analyz- ing in-lined...January 2010. [17] Meera Sridhar and Kevin W. Hamlen. Flexible in-lined reference moni- tor certification: Challenges and future directions. In...pages 55-60, Austin, Texas, January 2011. [18] Bhavani Thuraisingham and Kevin W. Hamlen. Challenges and future directions of software technology
17 CFR 240.3a55-2 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Indexes underlying futures contracts trading for fewer than 30 days. 240.3a55-2 Section 240.3a55-2 Commodity and Securities Exchanges... of trading volume is reported in a currency other than U.S. dollars, the total value of each day's...
The US Army and Future Security Force Assistance Operations
2013-04-01
havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the future...safe havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the...organizations at all levels. 5 SFA extends well beyond military-to-military training and conceptually addresses security as a system of
VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance
Watzlaf, Valerie R.; Ondich, Briana
2012-01-01
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194
An evaluation of authentication methods for smartphone based on users’ preferences
NASA Astrophysics Data System (ADS)
Sari, P. K.; Ratnasari, G. S.; Prasetio, A.
2016-04-01
This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.
Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian
2015-11-01
Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.
Blanquer, Ignacio; Hernandez, Vicente; Segrelles, Damià; Torres, Erik
2007-01-01
Today most European healthcare centers use the digital format for their databases of images. TRENCADIS is a software architecture comprising a set of services as a solution for interconnecting, managing and sharing selected parts of medical DICOM data for the development of training and decision support tools. The organization of the distributed information in virtual repositories is based on semantic criteria. Different groups of researchers could organize themselves to propose a Virtual Organization (VO). These VOs will be interested in specific target areas, and will share information concerning each area. Although the private part of the information to be shared will be removed, special considerations will be taken into account to avoid the access by non-authorized users. This paper describes the security model implemented as part of TRENCADIS. The paper is organized as follows. First introduces the problem and presents our motivations. Section 1 defines the objectives. Section 2 presents an overview of the existing proposals per objective. Section 3 outlines the overall architecture. Section 4 describes how TRENCADIS is architected to realize the security goals discussed in the previous sections. The different security services and components of the infrastructure are briefly explained, as well as the exposed interfaces. Finally, Section 5 concludes and gives some remarks on our future work.
The Mexican Social Security counterreform: pensions for profit.
Laurell, A C
1999-01-01
The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.
Engineering Ultimate Self-Protection in Autonomic Agents for Space Exploration Missions
NASA Technical Reports Server (NTRS)
Sterritt, Roy; Hinchey, Mike
2005-01-01
NASA's Exploration Initiative (EI) will push space exploration missions to the limit. Future missions will be required to be self-managing as well as self-directed, in order to meet the challenges of human and robotic space exploration. We discuss security and self protection in autonomic agent based-systems, and propose the ultimate self-protection mechanism for such systems-self-destruction. Like other metaphors in Autonomic Computing, this is inspired by biological systems, and is the analog of biological apoptosis. Finally, we discus the role it might play in future NASA space exploration missions.
Space division multiplexing chip-to-chip quantum key distribution.
Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo
2017-09-29
Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
Ecosystem and Food Security in a Changing Climate
NASA Astrophysics Data System (ADS)
Field, C. B.
2011-12-01
Observed and projected impacts of climate change for ecosystem and food security tend to appear as changes in the risk of both desirable and undesirable outcomes. As a consequence, it is useful to frame the challenge of adaptation to a changing climate as a problem in risk management. For some kinds of impacts, the risks are relatively well characterized. For others, they are poorly known. Especially for the cases where the risks are poorly known, effective adaptation will need to consider approaches that build dynamic portfolios of options, based on learning from experience. Effective adaptation approaches also need to consider the risks of threshold-type responses, where opportunities for gradual adaptation based on learning may be limited. Finally, effective adaptation should build on the understanding that negative impacts on ecosystems and food security often result from extreme events, where a link to climate change may be unclear now and far into the future. Ecosystem and food security impacts that potentially require adaptation to a changing climate vary from region to region and interact strongly with actions not related to climate. In many ecosystems, climate change shifts the risk profile to increase risks of wildfire and biological invasions. Higher order risks from factors like pests and pathogens remain difficult to quantify. For food security, observational evidence highlights threshold-like behavior to high temperature in yields of a number of crops. But the risks to food security may be much broader, encompassing risks to availability of irrigation, degradation of topsoil, and challenges of storage and distribution. A risk management approach facilitates consideration of all these challenges with a unified framework.
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2011 CFR
2011-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
17 CFR 240.3b-12 - Definition of OTC derivatives dealer.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of OTC derivatives dealer. 240.3b-12 Section 240.3b-12 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... to options, forwards, futures, swap agreements, or collars involving currencies, interest or other...
Code of Federal Regulations, 2014 CFR
2014-01-01
.... Adjusted trading means any method or transaction whereby a corporate credit union sells a security to a... corporate credit union purchases a security from one of its member credit unions under agreement by that member credit union to repurchase the same security at a specified time in the future. The corporate...
Framing GM Crops as a Food Security Solution
ERIC Educational Resources Information Center
Dibden, Jacqui; Gibbs, David; Cocklin, Chris
2013-01-01
The spectre of a food security crisis has raised important questions about future directions for agriculture and given fresh impetus to a long-standing debate about the potential contribution of agricultural biotechnology to food security. This paper considers the discursive foundations for promotion of agricultural biotechnology, arguing that…
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2013 CFR
2013-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2012 CFR
2012-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2014 CFR
2014-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
Racing to the Future: Security in the Gigabit Race?
ERIC Educational Resources Information Center
Gregory, Mark A; Cradduck, Lucy
2016-01-01
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
17 CFR 242.302 - Recordkeeping requirements for alternative trading systems.
Code of Federal Regulations, 2010 CFR
2010-04-01
... alternative trading systems. 242.302 Section 242.302 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ats-Alternative Trading Systems § 242.302 Recordkeeping requirements for alternative trading systems. To comply with the condition set forth in paragraph (b)(8) of § 242.301, an...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yarnall, C.A.; Caruthers, J.R.
This study was performed under FUTURE LOOK, a joint Defense Nuclear Agency/Department of Energy (DNA/DOE) sponsored study. The intent of FUTURE LOOK is to identify and develop means of providing requisite security and survivability to the Non-Strategic Nuclear Forces (NSNF) in the Twenty-First Century. Our current thinking about the future world in Europe is summarized. In this report we develop four scenarios/stockpile cases to cover the spectrum of potential happenings in Europe; we also develop general security and survivability implications and recommendations for each case. The four cases are: (1) a substantially reduced (factor of 2--10) European stockpile; (2) amore » near-zero stockpile, with no Army weapons remaining in Europe; (3) current stockpile in Europe remains; and (4) current stockpile numbers remain, but aggressive modernization is allowed. We plan to use the information in this report to assist in developing detailed security and survivability options as part of our follow-on to FUTURE LOOK studies. 8 refs., 6 tabs.« less
1988-10-20
The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Analysis of Security Protocols for Mobile Healthcare.
Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga
2016-11-01
Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.
A Network Centric Warfare (NCW) Compliance Process for Australian Defence
2006-08-01
discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements
17 CFR 242.406 - Undermargined accounts.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Customer Margin... securities account. Regulation AC—Analyst Certification Source: 68 FR 9492, February 27, 2003, unless...
Modernizing Our Industrial Base: The National Security Challenge of Our Time
2015-08-01
situational awareness tools and applications, au- tonomy and robotics that we need to harness and fully develop for DoD missions . With this type of...to work for the DoD or its industrial base; rather they go to work in the commercial industry for companies such as Facebook, Google and Tesla . This...partnership with industry. The DoD continues talking to indus- try, communicating our vision for the future, to facilitate the best business decisions that
National Center for Nuclear Security - NCNS
None
2018-01-16
As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.
Urban Security Initiative: Earthquake impacts on the urban ``system of systems``
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maheshwari, S.; Jones, E.; Rasmussen, S.
1999-06-01
This paper is a discussion of how to address the problems of disasters in a large city, a project titled Urban Security Initiative undertaken by the Los Alamos National Laboratory. The paper first discusses the need to address the problems of disasters in large cities and ten provides a framework that is suitable to address this problem. The paper then provides an overview of the module of the project that deals with assessment of earthquake damage on urban infrastructure in large cities and an internet-based approach for consensus building leading to better coordination in the post-disaster period. Finally, the papermore » discusses the future direction of the project.« less
Research on energy strategy and Chinese energy investment in the middle east
NASA Astrophysics Data System (ADS)
Huang, Yiling
2017-08-01
The Middle East is a key node of “One Belt and One Road strategy”. Energy investment is an important part of Chinese investment in the Middle East. The political turmoil in the Middle East has brought the political risks to Chinese investors. In the future, with the globalization of Chinese resource distribution and the expansion of Chinese outward investment, it is significant for China to ensure its energy security. Based on the analysis of the situation of Chinese energy strategy in the Middle East, this paper tries to put forward some suggestion about Chinese energy investment in the Middle East in order to protect Chinese energy security effectively.
Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective
NASA Astrophysics Data System (ADS)
Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha
2017-07-01
Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.
[Ecological security of wastewater treatment processes: a review].
Yang, Sai; Hua, Tao
2013-05-01
Though the regular indicators of wastewater after treatment can meet the discharge requirements and reuse standards, it doesn't mean the effluent is harmless. From the sustainable point of view, to ensure the ecological and human security, comprehensive toxicity should be considered when discharge standards are set up. In order to improve the ecological security of wastewater treatment processes, toxicity reduction should be considered when selecting and optimizing the treatment processes. This paper reviewed the researches on the ecological security of wastewater treatment processes, with the focus on the purposes of various treatment processes, including the processes for special wastewater treatment, wastewater reuse, and for the safety of receiving waters. Conventional biological treatment combined with advanced oxidation technologies can enhance the toxicity reduction on the base of pollutants removal, which is worthy of further study. For the process aimed at wastewater reuse, the integration of different process units can complement the advantages of both conventional pollutants removal and toxicity reduction. For the process aimed at ecological security of receiving waters, the emphasis should be put on the toxicity reduction optimization of process parameters and process unit selection. Some suggestions for the problems in the current research and future research directions were put forward.
Security architecture for health grid using ambient intelligence.
Naqvi, S; Riguidel, M; Demeure, I
2005-01-01
To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together. In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs. We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferrell, Paul; Hanson, Paige; Ardi, Calvin
2016-11-04
A system for processing network packet capture streams, extracting metadata and generating flow records (via Argus). The system can be used by network security operators and analysts to enable forensic investigations for network security events.
Nuclear security policy in the context of counter-terrorism in Cambodia
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the contextmore » of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.« less
Carbon plants nutrition and global food security
NASA Astrophysics Data System (ADS)
Mariani, Luigi
2017-02-01
To evaluate the effects of carbon nutrition on agricultural productivity, a physiological-process-based crop simulation model, driven by the 1961-1990 monthly climate data from global FAO dataset, was developed and applied to four crops (wheat, maize, rice and soybean -WMRS) which account for 64% of the global caloric consumption of humans. Five different temperatures and CO2 scenarios (current; glacial; pre-industrial; future_1 with 560 ppmv for CO2 and +2 °C for temperature; and future_2 with 800 ppmv for CO2 and +4 °C) were investigated. The relative values of WMRS global productions for past and future scenarios were, respectively, 49% of the present-day scenario for glacial, 82% for pre-industrial, 115% for future_1 and 124% for future_2. A sensitive growth of productivity of future scenarios (respectively to 117% and 134%) was observed if the northward shift of crops was allowed, and a strong increase was obtained without water limitation (from 151% to 157% for the five scenarios) and without biotic and abiotic stresses (from 30% to 40% for WMRS subject to the current scenario). Furthermore since the beginning of the Green Revolution (roughly happened between the '30s and the '50s of the twentieth century) production losses due to sub-optimal levels of CO2 and to biotic and abiotic stresses have been masked by the strong technological innovation trend still ongoing, which, in the last century, led to a strong increase in the global crop production (+400%-600%). These results show the crucial relevance of the future choices of research and development in agriculture (genetics, land reclamation, irrigation, plant protection, and so on) to ensure global food security.
Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man
2014-01-01
Background Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. Design A qualitative study using group discussions during a workshop. Methods A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions The results of the planning workshop provide a blueprint for future research and intervention projects. PMID:25147772
ERIC Educational Resources Information Center
Danziger, Sheldon, Ed.; Waldfogel, Jane, Ed.
Noting that the human capital of a nation is a primary determinant of its strength, this book reviews what is known about the processes that affect child development and how public and private investments in children might be increased to promote their well-being and to enhance the economic productivity of the next generation in America. Based on…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
..., under 18 CFR Part 34, of future issuances of securities and assumptions of liability is January 7, 2014... the FERC Online links at http://www.ferc.gov . To facilitate electronic service, persons with Internet... J. Davis, Sr., Deputy Secretary. [FR Doc. 2013-30697 Filed 12-24-13; 8:45 am] BILLING CODE 6717-01-P ...
Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.
1992-06-01
Beardsley Headquarters Air Force Logistics Command Wright- Patterson AFB, Ohio Don Carson TASC Arlington, VA William Clark Defense Systems Management...Vice Chairman Senate EDWARD M. KENNEDY Massachusetts ERNEST F. HOLLINGS South Carolina CLAIBORNE PELL Rhode Island ORRIN G. HATCH Utah...President TASC Julius Harwood Consultant William W. Kaufmann Senior Fellow The Brookings Institution General P.X. Kelley USMC (Ret.) James L
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false [Reserved] 3.3 Section 3.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGISTRATION Registration § 3.3 [Reserved] ...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false [Reserved] 3.3 Section 3.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGISTRATION Registration § 3.3 [Reserved] ...
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
NASA Astrophysics Data System (ADS)
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288
Liu, Xin; Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.
Effectiveness of the Civil Aviation Security Program.
1976-09-20
commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air
National Security Education Act of 1991: Summary and Analysis. CRS Report for Congress.
ERIC Educational Resources Information Center
Riddle, Wayne Clifton
This report analyzes and summarizes the National Security Education Act of 1991 (NSEA) which authorizes a new program of aid for foreign language and area studies. The report discusses the legislation's aim to increase future national security through enhanced foreign language abilities and knowledge of other countries, the NSEA's authorized…
17 CFR 141.1 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Purpose and scope. 141.1 Section 141.1 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SALARY OFFSET § 141...: (1) The Internal Revenue Code of 1954, as amended, 26 U.S.C. 1 et seq.; (2) The Social Security Act...
17 CFR 41.31 - Notice-designation requirements.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-designation requirements. (a) Any board of trade that is a national securities exchange, a national securities... electronic or hard copy form, shall be labeled as “Notice of Designation as a Contract Market in Security Futures Products,” and shall include: (1) The name and address of the board of trade; (2) The name and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70990; File No. SR-MSRB-2013-08] Self...\\ Securities Exchange Act Release No. 70607 (October 3, 2013), 78 FR 62736 (``Notice''). II. Description of the... dealer, acting as an underwriter or remarketing agent with no prior or future long-term economic interest...
17 CFR 4.12 - Exemption from provisions of part 4.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Exemption from provisions of part 4. 4.12 Section 4.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... pool for which it makes such claim: (A) Will be offered and sold pursuant to the Securities Act of 1933...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63066; File No. SR-OCC-2010-13] Self-Regulatory... to the Settlement Price of Exchange-Designated Security Futures for All Cash Dividends or Distributions Paid by the Issuer of the Underlying Security October 8, 2010. I. Introduction On August 19, 2010...
Summary Report for the Radiation Detection for Nuclear Security Summer School 2014
DOE Office of Scientific and Technical Information (OSTI.GOV)
Runkle, Robert C.; Baciak, James E.; Woodring, Mitchell L.
Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectivesmore » of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.« less
77 FR 27444 - Joint CFTC-SEC Advisory Committee on Emerging Regulatory Issues
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-10
... SECURITIES AND EXCHANGE COMMISSION COMMODITY FUTURES TRADING COMMISSION [Release Nos. 34-66932... and Exchange Commission (``SEC'') and Commodity Futures Trading Commission (``CFTC'') (each, an.... Commodity Futures Trading Commission Written comments may be mailed to the Commodity Futures Trading...
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less
The future of infrastructure security :
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.
2013-05-01
Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concludedmore » with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.« less
Economic Security and National Security -- Interaction and Synthesis
2009-01-01
phenomenon has not become the case in oil futures contracts; that is, progressively more oil is being traded in pri vate off-market arrangements...involving China, Iran, and Sudan, while Saudi Arabia is able to manipulate oil futures prices higher on rela tively light transactions volume, especially...and the ability of the United States to project hard or soft political power are daunting. Market technicians refer to this as the “ LUV problem
An Australian Land Force for Conflict in a World Without Precedent (Future Warfare Concept Paper)
2009-01-01
Michael B. Ryan, Australian Army Thesis: The current pace of change in the global security environment and information technology demands that, like...information) Wave societies.6 The current pace of change in the global security environment and information technology demands that, like all...Blue, downloaded from www.defence.gov.au/navy; La Franchi , Peter, “High Level Interoperability: Future Development of t Peter, “Development Role
Summary Report for the Radiation Detection for Nuclear Security Summer School 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Runkle, Robert C.; Baciak, James E.; Stave, Jean A.
The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; themore » second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.« less
Evidence-Based Parenting Interventions to Promote Secure Attachment
Wright, Barry; Edginton, Elizabeth
2016-01-01
Various interventions are used in clinical practice to address insecure or disorganized attachment patterns and attachment disorders. The most common of these are parenting interventions, but not all have a robust empirical evidence base. We undertook a systematic review of randomized trials comparing a parenting intervention with a control, where these used a validated attachment instrument, in order to evaluate the clinical and cost-effectiveness of interventions aiming to improve attachment in children with severe attachment problems (mean age <13 years). This article aims to inform clinicians about the parenting interventions included in our systematic review that were clinically effective in promoting secure attachment. For completeness, we also briefly discuss other interventions without randomized controlled trial evidence, identified in Patient Public Involvement workshops and expert groups at the point our review was completed as being used or recommended. We outline the key implications of our findings for clinical practice and future research. PMID:27583298
Current Developments and Prospects for the Future: French Security Policy in a Changing World
1991-06-01
GROUP SUBGROUP France , French Security Policy, Franco-German relations, NATO, French economy, Charles do Gaulle, Francois Mitterrand, European Community...concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by strengthening ties...Gaulle. The thesis concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.
Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo
2015-01-01
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.
Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel
2018-06-12
Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62787; File No. SR-FINRA-2010-045] Self... Effectiveness of Proposed Rule Change To Amend the Security Futures Risk Disclosure Statement August 27, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68468; File No. SR-FINRA-2012-055] Self...-Element Continuing Education Program To Qualify To Engage in a Security Futures Business December 19, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'')\\1\\ and Rule 19b-4 thereunder...
Code of Federal Regulations, 2010 CFR
2010-01-01
... offer to buy, a security or interest in a security, for value. However, these terms shall not include... or offer of a security which gives the holder a present or future right or privilege to convert the... includes a savings association. (10) Purchase and buy mean the same as in § 563b.25 of this chapter. (11...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false [Reserved] 42.1 Section 42.1 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ANTI-MONEY LAUNDERING, TERRORIST FINANCING General Provisions § 42.1 [Reserved] ...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... options or other derivatives on any of the foregoing; or (b) interest rate futures or options or... options or other derivatives on any of the foregoing; or (b) interest rate futures or options or... of futures contracts or options or derivatives on futures contracts (``Futures Reference Asset...
Implications of Technology on the Future Workforce
2017-08-02
industrial base to obtain similar benefits and significant cost savings – Talent to be reallocated for core missions by reducing FTEs associated with...USN Representative Capt Thomas Koch, USMC Representative Mr. Taylor Glover 17-S-2249 CLEARED For Open Publication Aug 18, 2017 Department of Defense...OFFICE OF PREPUBLICATION AND SECURITY REVIEW These are the final briefing slides as approved by the Defense Business Board in the public meeting held
The United Kingdom: Issues for the United States
2007-07-16
of its EU partners than to the United States. For example, like other EU member states, Britain places great emphasis on multilateral... the prospects for the future of the U.S.-UK partnership, especially in the unfolding Brown era. It also describes UK views on political, security...delivery systems for its nuclear warheads since 1963. During the Cold War, the UK served as a vital base for U.S.
Pakistan’s Nuclear Weapons: Proliferation and Security Issues
2009-07-30
Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 79...that Pakistan’s strategic nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs...that gave additional urgency to the program. Pakistan produced fissile material for its nuclear weapons using gas-centrifuge-based uranium
Laser Imaging Video Camera Sees Through Fire, Fog, Smoke
NASA Technical Reports Server (NTRS)
2015-01-01
Under a series of SBIR contracts with Langley Research Center, inventor Richard Billmers refined a prototype for a laser imaging camera capable of seeing through fire, fog, smoke, and other obscurants. Now, Canton, Ohio-based Laser Imaging through Obscurants (LITO) Technologies Inc. is demonstrating the technology as a perimeter security system at Glenn Research Center and planning its future use in aviation, shipping, emergency response, and other fields.
The National Security Doctrine and Policies of the Brazilian Government.
1977-07-15
Studies (1970) and Brazil’s Future Role In Internat ional Politics (1973), and has written articles for professional journals . - S...Considering such an “audit” of their internal political affairs an ~ front to sovereignty, they turned to their own arms industry and West European suppliers...ideologies and empty nationalism such as Mussolini’s and realj power based on technology, industrialization , and organization, and to avoid the
Task Force on the Future of Military Health Care
2007-12-01
Navigator. Service programs are supported by the Military Health System Population Health Portal (MHSPHP), a centralized, secure, web-based population...Congress on March 1, 2008.66 64 Air Force Medical Support Agency, Population Health Support Division. MHS Population Health Portal Methods. July 2007...HEDIS metrics using the MHS Population Health Portal and reporting in the service systems and the Tri- Service Business Planning tool. DoD has several
Advanced Plant Habitat - Packing and Planting Seeds
2017-02-15
Inside a laboratory at the Space Station Processing Facility at NASA's Kennedy Space Center in Florida, scientists prepared the science carrier, or base, of the Advanced Plant Habitat (APH). A growing substrate called arcillite was packed down in the base and coverings were secured on top of the base. Developed by NASA and ORBITEC of Madison, Wisconsin, the APH is the largest plant chamber built for the agency. It is a fully automated plant growth facility that will be used to conduct bioscience research on the International Space Station. The APH will be delivered to the space station aboard future Commercial Resupply Services missions.
2009-01-01
The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance
1990-10-04
methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted
Future of Assurance: Ensuring that a System is Trustworthy
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire
Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.
Planting seeds for the future of food.
Green, Hilary; Broun, Pierre; Cakmak, Ismail; Condon, Liam; Fedoroff, Nina; Gonzalez-Valero, Juan; Graham, Ian; Lewis, Josette; Moloney, Maurice; Oniang'o, Ruth K; Sanginga, Nteranya; Shewry, Peter; Roulin, Anne
2016-03-30
The health and wellbeing of future generations will depend on humankind's ability to deliver sufficient nutritious food to a world population in excess of 9 billion. Feeding this many people by 2050 will require science-based solutions that address sustainable agricultural productivity and enable healthful dietary patterns in a more globally equitable way. This topic was the focus of a multi-disciplinary international conference hosted by Nestlé in June 2015, and provides the inspiration for the present article. The conference brought together a diverse range of expertise and organisations from the developing and industrialised world, all with a common interest in safeguarding the future of food. This article provides a snapshot of three of the recurring topics that were discussed during this conference: soil health, plant science and the future of farming practice. Crop plants and their cultivation are the fundamental building blocks for a food secure world. Whether these are grown for food or feed for livestock, they are the foundation of food and nutrient security. Many of the challenges for the future of food will be faced where the crops are grown: on the farm. Farmers need to plant the right crops and create the right conditions to maximise productivity (yield) and quality (e.g. nutritional content), whilst maintaining the environment, and earning a living. New advances in science and technology can provide the tools and know-how that will, together with a more entrepreneurial approach, help farmers to meet the inexorable demand for the sustainable production of nutritious foods for future generations. © 2015 The Authors. Journal of The Science of Food and Agriculture published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry.
Planting seeds for the future of food
Broun, Pierre; Cakmak, Ismail; Condon, Liam; Fedoroff, Nina; Gonzalez‐Valero, Juan; Graham, Ian; Lewis, Josette; Moloney, Maurice; Oniang'o, Ruth K; Sanginga, Nteranya; Shewry, Peter; Roulin, Anne
2016-01-01
Abstract The health and wellbeing of future generations will depend on humankind's ability to deliver sufficient nutritious food to a world population in excess of 9 billion. Feeding this many people by 2050 will require science‐based solutions that address sustainable agricultural productivity and enable healthful dietary patterns in a more globally equitable way. This topic was the focus of a multi‐disciplinary international conference hosted by Nestlé in June 2015, and provides the inspiration for the present article. The conference brought together a diverse range of expertise and organisations from the developing and industrialised world, all with a common interest in safeguarding the future of food. This article provides a snapshot of three of the recurring topics that were discussed during this conference: soil health, plant science and the future of farming practice. Crop plants and their cultivation are the fundamental building blocks for a food secure world. Whether these are grown for food or feed for livestock, they are the foundation of food and nutrient security. Many of the challenges for the future of food will be faced where the crops are grown: on the farm. Farmers need to plant the right crops and create the right conditions to maximise productivity (yield) and quality (e.g. nutritional content), whilst maintaining the environment, and earning a living. New advances in science and technology can provide the tools and know‐how that will, together with a more entrepreneurial approach, help farmers to meet the inexorable demand for the sustainable production of nutritious foods for future generations. © 2015 The Authors. Journal of The Science of Food and Agriculture published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry. PMID:26619956
Ansari, Armin; Buddemeier, Brooke
2018-02-01
The National Council on Radiation Protection and Measurements (NCRP) Program Area Committee (PAC) 3 covers the broad subject of nuclear and radiological security and safety and provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. In 2017, PAC 3 Scientific Committee 3-1 completed the development of Guidance for Emergency Responder Dosimetry, and began development of a companion commentary on operational aspects of that guidance. PAC 3 members also organized the technical program for the 2017 Annual Meeting of the NCRP on “Assessment of National Efforts in Emergency Preparedness for Nuclear Terrorism:more » Is There a Need for Realignment to Close Remaining Gaps.” Based on discussions and presentations at the annual meeting, PAC 3 is working to develop a commentary on the subject that could serve as a roadmap for focusing our national efforts on the most pressing needs for preparing the nation for nuclear and radiological emergencies. PAC 3 is also engaged in active discussions, exploring the landscape of priority issues for its future activities. Lastly, an important consideration in this discussion is the extent of NCRP’s present and potential future resources to support the work of its scientific committees.« less
Threat to future global food security from climate change and ozone air pollution
NASA Astrophysics Data System (ADS)
Tai, Amos P. K.; Martin, Maria Val; Heald, Colette L.
2014-09-01
Future food production is highly vulnerable to both climate change and air pollution with implications for global food security. Climate change adaptation and ozone regulation have been identified as important strategies to safeguard food production, but little is known about how climate and ozone pollution interact to affect agriculture, nor the relative effectiveness of these two strategies for different crops and regions. Here we present an integrated analysis of the individual and combined effects of 2000-2050 climate change and ozone trends on the production of four major crops (wheat, rice, maize and soybean) worldwide based on historical observations and model projections, specifically accounting for ozone-temperature co-variation. The projections exclude the effect of rising CO2, which has complex and potentially offsetting impacts on global food supply. We show that warming reduces global crop production by >10% by 2050 with a potential to substantially worsen global malnutrition in all scenarios considered. Ozone trends either exacerbate or offset a substantial fraction of climate impacts depending on the scenario, suggesting the importance of air quality management in agricultural planning. Furthermore, we find that depending on region some crops are primarily sensitive to either ozone (for example, wheat) or heat (for example, maize) alone, providing a measure of relative benefits of climate adaptation versus ozone regulation for food security in different regions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garrett, S.A.
1989-06-21
The treaty between the Soviet Union and the United States eliminating a whole class of intermediate-range nuclear forces (INF) in Europe raises a number of questions about NATO's future ability to deter Warsaw Pact aggression. Future choices on Alliance strategy and doctrine will be influenced by a variety of factors, including the image of new thinking in Soviet security policy enunciated by General Secretary Gorbachev, changing West European opinion toward the use of nuclear weapons for NATO deterrence, the complications inherent in further nuclear and conventional arms-control negotiations, assessments of the current conventional arms balance in Europe, and ongoing questionsmore » about NATO cohesion as well as the continued coupling of American security with that of her European allies. In the post-INF environment it may well be that U.S. Navy nuclear assets will assume an increasingly important role, particularly the Tomahawk Land Attack Missile/Nuclear (TLAM/N). The TLAM/N has many attractive attributes that can be supportive of NATO deterrence of the WTO, but there are also a number of unresolved questions to be addressed concerning this particular weapons system. Modernization of NATO's land-based short-range nuclear forces (SNF), such as the Lance missile, is also seen by many as critical to the maintenance of Alliance security in the aftermath of INF.« less
Opportunities and challenges of sustainable agricultural development in China.
Zhao, Jingzhu; Luo, Qishan; Deng, Hongbing; Yan, Yan
2008-02-27
This paper introduces the concepts and aims of sustainable agriculture in China. Sustainable agricultural development comprises sustainability of agricultural production, sustainability of the rural economy, ecological and environmental sustainability within agricultural systems and sustainability of rural society. China's prime aim is to ensure current and future food security. Based on projections of China's population, its economy, societal factors and agricultural resources and inputs between 2000 and 2050, total grain supply and demand has been predicted and the state of food security analysed. Total and per capita demand for grain will increase continuously. Total demand will reach 648 Mt in 2020 and 700 Mt in 2050, while total grain yield of cultivated land will reach 470 Mt in 2010, 585 Mt in 2030 and 656 Mt in 2050. The per capita grain production will be around 360kg in the period 2000-2030 and reach 470kg in 2050. When productivities of cultivated land and other agricultural resources are all taken into consideration, China's food self-sufficiency ratio will increase from 94.4% in 2000 to 101.3% in 2030, suggesting that China will meet its future demand for food and need for food security. Despite this positive assessment, the country's sustainable agricultural development has encountered many obstacles. These include: agricultural water-use shortage; cultivated land loss; inappropriate usage of fertilizers and pesticides, and environmental degradation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ansari, Armin; Buddemeier, Brooke
The National Council on Radiation Protection and Measurements (NCRP) Program Area Committee (PAC) 3 covers the broad subject of nuclear and radiological security and safety and provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. In 2017, PAC 3 Scientific Committee 3-1 completed the development of Guidance for Emergency Responder Dosimetry, and began development of a companion commentary on operational aspects of that guidance. PAC 3 members also organized the technical program for the 2017 Annual Meeting of the NCRP on “Assessment of National Efforts in Emergency Preparedness for Nuclear Terrorism:more » Is There a Need for Realignment to Close Remaining Gaps.” Based on discussions and presentations at the annual meeting, PAC 3 is working to develop a commentary on the subject that could serve as a roadmap for focusing our national efforts on the most pressing needs for preparing the nation for nuclear and radiological emergencies. PAC 3 is also engaged in active discussions, exploring the landscape of priority issues for its future activities. Lastly, an important consideration in this discussion is the extent of NCRP’s present and potential future resources to support the work of its scientific committees.« less
17 CFR 242.104 - Stabilizing and other activities in connection with an offering.
Code of Federal Regulations, 2011 CFR
2011-04-01
... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation M § 242.104 Stabilizing and other activities in connection with an...
2013-06-01
the former Allies of the Second World War, several European countries, the United States of America , and Canada came together to provide for their...European countries, the United States of America , and Canada came together to provide for their security and in 1949 formed a unique security alliance, the ...European countries, the United States of America (U.S.), and Canada came together to provide for their
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
1989-06-01
Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security
Code of Federal Regulations, 2012 CFR
2012-04-01
... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... exchange dealers and futures commission merchants offering or engaging in retail forex transactions. (a)(1)(i) Each futures commission merchant offering or engaging in retail forex transactions and each...
Code of Federal Regulations, 2014 CFR
2014-04-01
... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... exchange dealers and futures commission merchants offering or engaging in retail forex transactions. (a)(1)(i) Each futures commission merchant offering or engaging in retail forex transactions and each...
Code of Federal Regulations, 2013 CFR
2013-04-01
... forex transactions. 5.7 Section 5.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... exchange dealers and futures commission merchants offering or engaging in retail forex transactions. (a)(1)(i) Each futures commission merchant offering or engaging in retail forex transactions and each...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... (6) Daily settlement price means, with respect to a security future, the settlement price of such... futures commission merchant that has been in existence for less than one year may meet the definition of...) Futures account shall have the meaning provided in § 1.3(vv) of this chapter. (14) Futures commission...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... (6) Daily settlement price means, with respect to a security future, the settlement price of such... futures commission merchant that has been in existence for less than one year may meet the definition of...) Futures account shall have the meaning provided in § 1.3(vv) of this chapter. (14) Futures commission...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... (6) Daily settlement price means, with respect to a security future, the settlement price of such... futures commission merchant that has been in existence for less than one year may meet the definition of...) Futures account shall have the meaning provided in § 1.3(vv) of this chapter. (14) Futures commission...
75 FR 1446 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0001] Future Systems Technology Advisory Panel... systems technology and electronic services at the agency five to ten years into the future. The Panel will recommend a road map to aid SSA in determining what future systems technologies may be developed to assist...
Gait recognition based on integral outline
NASA Astrophysics Data System (ADS)
Ming, Guan; Fang, Lv
2017-02-01
Biometric identification technology replaces traditional security technology, which has become a trend, and gait recognition also has become a hot spot of research because its feature is difficult to imitate and theft. This paper presents a gait recognition system based on integral outline of human body. The system has three important aspects: the preprocessing of gait image, feature extraction and classification. Finally, using a method of polling to evaluate the performance of the system, and summarizing the problems existing in the gait recognition and the direction of development in the future.
An Integrative Behavioral Model of Information Security Policy Compliance
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
2014-01-01
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373
An integrative behavioral model of information security policy compliance.
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
2014-01-01
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.
Secure E-mailing Between Physicians and Patients
Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E.; Kanter, Michael H.
2014-01-01
Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization. PMID:24887522
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
17 CFR Appendix C to Part 145 - [Reserved
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false [Reserved] C Appendix C to Part 145 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMISSION RECORDS AND INFORMATION Appendix C to Part 145 [Reserved] ...
17 CFR Appendix C to Part 40 - [Reserved
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false [Reserved] C Appendix C to Part 40 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES Appendix C to Part 40 [Reserved] ...
Eagleson, Roy; Altamirano-Diaz, Luis; McInnis, Alex; Welisch, Eva; De Jesus, Stefanie; Prapavessis, Harry; Rombeek, Meghan; Seabrook, Jamie A; Park, Teresa; Norozi, Kambiz
2017-03-17
With the increasing implementation of web-based, mobile health interventions in clinical trials, it is crucial for researchers to address the security and privacy concerns of patient information according to high ethical standards. The full process of meeting these standards is often made more complicated due to the use of internet-based technology and smartphones for treatment, telecommunication, and data collection; however, this process is not well-documented in the literature. The Smart Heart Trial is a single-arm feasibility study that is currently assessing the effects of a web-based, mobile lifestyle intervention for overweight and obese children and youth with congenital heart disease in Southwestern Ontario. Participants receive telephone counseling regarding nutrition and fitness; and complete goal-setting activities on a web-based application. This paper provides a detailed overview of the challenges the study faced in meeting the high standards of our Research Ethics Board, specifically regarding patient privacy. We outline our solutions, successes, limitations, and lessons learned to inform future similar studies; and model much needed transparency in ensuring high quality security and protection of patient privacy when using web-based and mobile devices for telecommunication and data collection in clinical research.
RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks
Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon
2009-01-01
The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321
RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.
Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon
2009-01-01
The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.
2015-09-01
colonels would be providing junior officers with the same “ rich feedback, individual attention, praise, guidance, and direction” that millennials are...Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c
Naval Expeditionary Logistics. Enabling Operational Maneuver From the Sea
1999-01-01
of the core objectives of the President’s national security strategy is to "enhance our [the nation’s] security with effective diplomacy and with... effect on logistics requirements, and some interpretations of OMFTS assume that the concept applies to a future force much lighter than today’s. Others...addition to, or in lieu of, today’s capabilities? The answer has a profound effect on the future combat service support structure of both the Marine
2006-08-01
AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY...threats, or financial insecurities. Yankee Going Home: The world of 2020 looks like a confused mess! Little is clear except that the world has... statements from Proteus: Insights from 2020 are highly releant when thinking about the current strategic picture in the context of Power: “When Power
17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...