Computer-Based Testing: Test Site Security.
ERIC Educational Resources Information Center
Rosen, Gerald A.
Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Integrated Remote Sensing Modalities for Classification at a Legacy Test Site
NASA Astrophysics Data System (ADS)
Lee, D. J.; Anderson, D.; Craven, J.
2016-12-01
Detecting, locating, and characterizing suspected underground nuclear test sites is of interest to the worldwide nonproliferation monitoring community. Remote sensing provides both cultural and surface geological information over a large search area in a non-intrusive manner. We have characterized a legacy nuclear test site at the Nevada National Security Site (NNSS) using an aerial system based on RGB imagery, light detection and ranging, and hyperspectral imaging. We integrate these different remote sensing modalities to perform pattern recognition and classification tasks on the test site. These tasks include detecting cultural artifacts and exotic materials. We evaluate if the integration of different remote sensing modalities improves classification performance.
Wang, Zhaoguo; Yang, Zhaoping; Du, Xishihui
2015-01-01
World Natural Heritage Sites (WNHS) are treasures that need human protection and invite appreciation, which makes conservation of WNHS an urgent task. This paper assesses where in the world threats are most pressing and which WNHS require emergency assistance. Using an analysis of "hot spots" and inverse distance weighting, it finds that Africa is the region where WNHS are least secure. Reports of the state of the conservation of WNHS describe the many threats that exist. Of these, management activities and institutional factors are the primary threats. The paper suggests relevant measures to improve the WNHS security.
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
Maritime Security: Potential Terrorist Attacks and Protection Priorities
2007-01-09
Liquefied Natural Gas: Siting and Safety .” Feb. 15, 2005. 108 U.S. Coast Guard. U.S. Coast Guard Captain of the Port Long Island Sound Waterways...Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities January 9, 2007 Paul W. Parfomak and John Frittelli...Terrorist Attacks and Protection Priorities 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK
Remote video assessment for missile launch facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.; Stewart, W.A.
1995-07-01
The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less
The DISAM Journal of International Security Assistance Management. Volume 23, Number 2, Winter 2001
2001-01-01
humanitarian role as our forces remain ever prepared for their main task of seeing to the defense and security of our country. The DISAM Journal, Winter 2001...the international mine action community. During 2001, a survey will be conducted with customers of the site to ensure that our focus remains on the...preparation. The DISAM Journal, Winter 200137 United States and Peruvians treat a child on a Medrete in the Peruvian Amazon . Units must prepare for overseas
Simplifying Education Management
ERIC Educational Resources Information Center
Wiley, Wayne C.
2004-01-01
Managing district information, web sites, and data security as well as supplying information on-demand are just a few of the tasks causing educational administrators to seek new solutions these days. The answer is to streamline the business of running schools by putting all information in one place so coordinated data and files can be accessed.…
Maddali, Madan Mohan; Al Balushi, Faisal Khalfan Ahmed; Waje, Niranjan Dilip
2016-02-01
Large head and neck teratomas are very rare. Depending on their site of origin, they can produce varying degrees of airway compromise and can interfere with the conduct of general anesthesia. Large space-occupying lesions of the face may even interfere with the simple task of mask ventilation rendering inhaled induction of general anesthesia and maintenance of spontaneous ventilation difficult. If these neoplasms coexist with cardiac lesions necessitating corrective or palliative procedures, the task of oxygenation, ventilation, and securing a definitive airway becomes challenging especially in the presence of underlying unstable hemodynamics. We report on the anesthetic management of a female infant with a facial teratoma and single-ventricle physiology undergoing a cardiac palliative procedure where securing a definitive airway with minimal hemodynamic instability was the immediate requirement.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Gregory S.; Nickless, William K.; Thiede, David R.
Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease ofmore » development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.« less
75 FR 70764 - Small Business Information Security Task Force
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-18
... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... Task Force. Chairman, Rusty Pickens, called the meeting to order on October 13, 2010 at 1 p.m. Roll...
76 FR 5232 - Small Business Information Security Task Force
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... Task Force. Chairman, Rusty Pickens, called the meeting to order on December 8, 2010 at 1 p.m. Roll...
76 FR 11307 - Small Business Information Security Task Force
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-01
... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... Task Force. Chairman, Mr. Rusty Pickens, called the meeting to order on January 12, 2011 at 1 p.m. Roll...
Airborne and Ground-Based Optical Characterization of Legacy Underground Nuclear Test Sites
NASA Astrophysics Data System (ADS)
Vigil, S.; Craven, J.; Anderson, D.; Dzur, R.; Schultz-Fellenz, E. S.; Sussman, A. J.
2015-12-01
Detecting, locating, and characterizing suspected underground nuclear test sites is a U.S. security priority. Currently, global underground nuclear explosion monitoring relies on seismic and infrasound sensor networks to provide rapid initial detection of potential underground nuclear tests. While seismic and infrasound might be able to generally locate potential underground nuclear tests, additional sensing methods might be required to further pinpoint test site locations. Optical remote sensing is a robust approach for site location and characterization due to the ability it provides to search large areas relatively quickly, resolve surface features in fine detail, and perform these tasks non-intrusively. Optical remote sensing provides both cultural and surface geological information about a site, for example, operational infrastructure, surface fractures. Surface geological information, when combined with known or estimated subsurface geologic information, could provide clues concerning test parameters. We have characterized two legacy nuclear test sites on the Nevada National Security Site (NNSS), U20ak and U20az using helicopter-, ground- and unmanned aerial system-based RGB imagery and light detection and ranging (lidar) systems. The multi-faceted information garnered from these different sensing modalities has allowed us to build a knowledge base of how a nuclear test site might look when sensed remotely, and the standoff distances required to resolve important site characteristics.
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
2013-09-01
control GCE ground combat element LCE logistics combat element MAGTF Marine Air Ground Task Force MWCS Marine Wing Communications Squadron NPS Naval...elements: command element (CE), ground combat el- ement ( GCE ), aviation combat element (ACE), and logistics combat element (LCE). Each ele- ment...This layer provides unimpeded high-speed connectivity between remote sites and the Internet. Limited security policies are applied at this level to
Statistical Models for Predicting Threat Detection From Human Behavior.
Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I
2018-01-01
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.
ERIC Educational Resources Information Center
Thijs, Jochem T.; Koomen, Helma M. Y.
2008-01-01
This study examined the emotional security of kindergarten children in dyadic task-related interactions with their teachers. In particular, it examined the interrelations between security, task behaviours (persistence and independence), social inhibition, and teachers' support. Participants were 79 kindergartners (mean age = 69.7 months) and their…
Resilient Control and Intrusion Detection for SCADA Systems
2014-05-01
Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human
Texting "boosts" felt security.
Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C
2014-01-01
Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.
2008-07-01
The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria,more » to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off the ORR and below an area of intensive commercial and light industrial development; EFK 13.8, located upstream from the Oak Ridge Wastewater Treatment Facility (ORWTF); and EFK 6.3 located approximately 1.4 km below the ORR boundary (Fig. 1.1). Actual sampling locations on EFPC may differ slightly by task according to specific requirements of the task. Brushy Fork (BF) at kilometer (BFK) 7.6 and Hinds Creek at kilometer (HCK) 20.6 are the most commonly used reference sites for the Y-12 BMAP. Additional sites off the ORR are also occasionally used for reference, including Beaver Creek, Bull Run, Cox Creek, and Paint Rock Creek (Fig. 1.2). Summaries of the sampling designs for the three primary tasks of the Y-12 Complex BMAP for EFPC are presented in Tables 1.1-1.3. This report covers the 2007 study period, although data collected outside this time period are included as appropriate. To address the biological monitoring requirements for Bear Creek and McCoy Branch, CERCLA-funded data is summarized in Appendix A (for Bear Creek) and Appendix B (for McCoy Branch). Data for these two watersheds is provided herein to address Section IX of the NPDES Permit for Y-12, where 'Results of these CERCLA programs can be used to meet the biological monitoring requirements of this permit'. For potential comparison with instream biological measures, a summary of the toxicity testing results for Y-12 outfalls into upper EFPC is provided in Appendix C (these results have been previously reported).« less
Re-designing the PhEDEx Security Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, C.-H.; Wildish, T.; Zhang, X.
2014-01-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less
Re-designing the PhEDEx Security Model
NASA Astrophysics Data System (ADS)
C-H, Huang; Wildish, T.; X, Zhang
2014-06-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
Yu, Rui-feng; Wu, Xin
2015-01-01
This study investigated whether the mere presence of a human audience would evoke a social facilitation effect in baggage X-ray security screening tasks. A 2 (target presence: present vs. absent) × 2 (task complexity: simple vs. complex) × 2 (social presence: alone vs. human audience) within-subject experiment simulating a real baggage screening task was conducted. This experiment included 20 male participants. The participants' search performance in this task was recorded. The results showed that the presence of a human audience speeded up responses in simple tasks and slowed down responses in complex tasks. However, the social facilitation effect produced by the presence of a human audience had no effect on response accuracy. These findings suggested that the complexity of screening tasks should be considered when designing work organisation modes for security screening tasks. Practitioner summary: This study investigated whether the presence of a human audience could evoke a social facilitation effect in baggage X-ray security screening tasks. An experimental simulation was conducted. The results showed that the presence of a human audience facilitated the search performance of simple tasks and inhibited the performance of complex tasks.
2000-03-01
national security. The focus should include improved intelligence on development of nuclear, chemical, and biological weapons, their means of...Chemical/ Biological /Nuclear Anti-Terrorism" site provides a variety of links to related materials, (http://www.mindspring.com/~nbcnco) The roots of...vital commercial supplies, and perhaps even the general population with biological or chemical weapons. Accustomed to a qualitative as well as
2010-09-01
IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER...United States. AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND SECURITY OF MILITARY NETWORKS WITH A NETWORK TASKING ORDER PROCESS...USAF September 2010 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/DCS/ENG/10-09 IMPROVING THE QUALITY OF SERVICE AND
Statistical Models for Predicting Threat Detection From Human Behavior
Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.
2018-01-01
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking. PMID:29713296
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowe, Daniel L.
2004-11-01
The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory andmore » knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security plans, etc. This standardized approach is applied to specific country and regional needs. Recent examples (FY 2003-2004) include foreign missions to Lithuania, Russian Federation Navy, Russia - PNPI, Greece (joint mission with IAEA), Tanzania, Iraq, Chile, Ecuador, and Egypt. Some of the ambitions and results of the RTR program may be characterized by the successes in Lithuania, Greece, and Russia.« less
Revegetation Study of Adobe Dam, Phoenix, Arizona. Task 2. Revision.
1983-08-01
revegetation. *~ ~ A DDoa or?, I47 MDTOOOV 65IS OBSOLETE SECURITY CLASSIFICATION OF THIS PAGE (Wh"e Ders, Enreedl k ’, ... . .- r77. -. r - -V...addition to sodic soils, five sites along the wash were discovered to have salinity problems, with electrical conductivity in excess of 4. mmhos/cm. This...established at Indian Bend Wash.This species, along with Salla kalL (Tumbleweed) made upthe majority of the vegetation in 1979. Since 1979, as thedata in
Evaluation of Acquisition Strategies for Image-Based Construction Site Monitoring
NASA Astrophysics Data System (ADS)
Tuttas, S.; Braun, A.; Borrmann, A.; Stilla, U.
2016-06-01
Construction site monitoring is an essential task for keeping track of the ongoing construction work and providing up-to-date information for a Building Information Model (BIM). The BIM contains the as-planned states (geometry, schedule, costs, ...) of a construction project. For updating, the as-built state has to be acquired repeatedly and compared to the as-planned state. In the approach presented here, a 3D representation of the as-built state is calculated from photogrammetric images using multi-view stereo reconstruction. On construction sites one has to cope with several difficulties like security aspects, limited accessibility, occlusions or construction activity. Different acquisition strategies and techniques, namely (i) terrestrial acquisition with a hand-held camera, (ii) aerial acquisition using a Unmanned Aerial Vehicle (UAV) and (iii) acquisition using a fixed stereo camera pair at the boom of the crane, are tested on three test sites. They are assessed considering the special needs for the monitoring tasks and limitations on construction sites. The three scenarios are evaluated based on the ability of automation, the required effort for acquisition, the necessary equipment and its maintaining, disturbance of the construction works, and on the accuracy and completeness of the resulting point clouds. Based on the experiences during the test cases the following conclusions can be drawn: Terrestrial acquisition has the lowest requirements on the device setup but lacks on automation and coverage. The crane camera shows the lowest flexibility but the highest grade of automation. The UAV approach can provide the best coverage by combining nadir and oblique views, but can be limited by obstacles and security aspects. The accuracy of the point clouds is evaluated based on plane fitting of selected building parts. The RMS errors of the fitted parts range from 1 to a few cm for the UAV and the hand-held scenario. First results show that the crane camera approach has the potential to reach the same accuracy level.
DOE Asset Revitalization: Sustainability and Waste Management Aspects - 12120
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robinson, Sharon M.
2012-07-01
In February 2011 Secretary of Energy Steven Chu established a Task Force on Asset Revitalization to facilitate a discussion among the Department of Energy (DOE), communities around DOE sites, non-profits, tribal governments, the private sector, and other stakeholders to identify reuse approaches as environmental cleanup efforts at DOE sites reach completion. The Task Force was charged with exploring opportunities to reuse DOE site assets for beneficial purposes and making recommendations to the Under Secretaries of Energy, Science, and Nuclear Security on the formation of an Asset Revitalization Initiative (ARI). The ARI is a Department-wide effort to advance the beneficial reusemore » of the DOE's unique and diverse mix of assets including land, facilities, infrastructure, equipment, technologies, natural resources, and a highly skilled workforce. The ARI will encourage collaboration between the public and private sectors in order to achieve energy and environmental goals as well as to stimulate and diversify regional economies. The recommendations of the ARI Task Force are summarized below, focusing on the sustainability and waste management aspects. DOE's ongoing completion of cleanup efforts and modernization efforts is creating opportunities to transition under-used or excess assets to future beneficial use. The FY 2011 DOE ARI Task Force determined that DOE's assets could be reused for beneficial purposes such as clean energy production, industrial manufacturing, recreational and conversation use, and other economic development initiatives. Asset revitalization has the potential to both help achieve DOE's energy and environmental goals and diversify regional economies where the sites are located, including providing the support needed to implement large-scale projects that achieve green sustainability goals. Asset revitalization efforts could be accelerated by effectively incorporating future use plans into environmental management and remediation efforts. (authors)« less
Reasoning about Probabilistic Security Using Task-PIOAs
NASA Astrophysics Data System (ADS)
Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto
Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.
reCAPTCHA: human-based character recognition via Web security measures.
von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel
2008-09-12
CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.
1981-06-01
targets that have been cali- brated for different types of search tasks. Recognition tests might include visual recognition of site personnel, auditory ...Strength o Physiological processes o Auditory processes o Visual processes o Tactile sense o Psychomotor processes o Tolerance to environment o Learning...sensitive" to an easily measurable degree, and another third at a more subliminal level. This sensitivity is even further height- ened in individuals by the
A User-centered Model for Web Site Design
Kinzie, Mable B.; Cohn, Wendy F.; Julian, Marti F.; Knaus, William A.
2002-01-01
As the Internet continues to grow as a delivery medium for health information, the design of effective Web sites becomes increasingly important. In this paper, the authors provide an overview of one effective model for Web site design, a user-centered process that includes techniques for needs assessment, goal/task analysis, user interface design, and rapid prototyping. They detail how this approach was employed to design a family health history Web site, Health Heritage
Cyber / Physical Security Vulnerability Assessment Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Simpkins, Bret E.
Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less
Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.
2009-07-01
The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria,more » to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off the ORR and below an area of intensive commercial and light industrial development; EFK 13.8, located upstream from the Oak Ridge Wastewater Treatment Facility (ORWTF); and EFK 6.3 located approximately 1.4 km below the ORR boundary (Fig. 1.1). Actual sampling locations on EFPC may differ slightly by task according to specific requirements of the task. Brushy Fork (BF) at kilometer (BFK) 7.6 and Hinds Creek at kilometer (HCK) 20.6 are the most commonly used reference sites for the Y-12 BMAP. Additional sites off the ORR are also occasionally used for reference, including Beaver Creek, Bull Run, Cox Creek, and Paint Rock Creek (Fig. 1.2). Summaries of the sampling designs for the three primary tasks of the Y-12 Complex BMAP for EFPC are presented in Tables 1.1-1.3. This report covers the 2008 period, although data collected outside this time period are included as appropriate. To address the biological monitoring requirements for Bear Creek and McCoy Branch, CERLCA-funded programs, data are summarized in Appendix A and Appendix B respectively. Data for these two watersheds are provided herein to address Section IX of the NPDES Permit for Y-12, where 'Results of these CERCLA programs can be used to meet the biological monitoring requirements of this permit...'. A summary of the toxicity testing results for Y-12 outfalls into upper EFPC is provided in Appendix C (these results have been previously reported) to provide a more thorough perspective of conditions in the stream. Data summarized in this report are available from the Oak Ridge Environmental Information system (OREIS) in an Arc-GIS usable format (http://www-oreis.bechteljacobs.org/oreis/help/oreishome.html). Per requirements specified in the NPDES permit, data collected following TDEC monitoring protocols (TDEC 2006) is also submitted directly to TDEC in Excel format.« less
Specific-Token Effects in Screening Tasks: Possible Implications for Aviation Security
ERIC Educational Resources Information Center
Smith, J. David; Redford, Joshua S.; Washburn, David A.; Taglialatela, Lauren A.
2005-01-01
Screeners at airport security checkpoints perform an important categorization task in which they search for threat items in complex x-ray images. But little is known about how the processes of categorization stand up to visual complexity. The authors filled this research gap with screening tasks in which participants searched for members of target…
Attachment anxiety benefits from security priming: Evidence from working memory performance
2018-01-01
The present study investigates the relationship between the attachment dimensions (anxious vs. avoidance) and the cognitive performance of individuals, specifically whether the attachment dimensions would predict the working memory (WM) performance. In the n-back task, reflecting the WM capacity, both attachment related and non-attachment related words were used. Participants were randomly assigned into two groups that received either the secure or the neutral subliminal priming. In the secure priming condition, the aim was to induce sense of security by presenting secure attachment words prior to the n-back task performance. In neutral priming condition, neutral words that did not elicit sense of security were presented. Structural equation modeling revealed divergent patterns for attachment anxiety and avoidance dimensions under the different priming conditions. In neutral priming condition, WM performance declined in terms of capacity in the n-back task for individuals who rated higher levels of attachment anxiety. However in the secure priming condition, WM performance was boosted in the n-back task for individuals who rated higher levels of attachment anxiety. In other words, the subliminal priming of the security led to increased WM capacity of individuals who rated higher levels of attachment anxiety. This effect, however, was not observed for higher levels of attachment avoidance. Results are discussed along the lines of hyperactivation and deactivation strategies of the attachment system. PMID:29522549
NASA Astrophysics Data System (ADS)
van Lew, Baldur; Botha, Charl P.; Milles, Julien R.; Vrooman, Henri A.; van de Giessen, Martijn; Lelieveldt, Boudewijn P. F.
2015-03-01
The cohort size required in epidemiological imaging genetics studies often mandates the pooling of data from multiple hospitals. Patient data, however, is subject to strict privacy protection regimes, and physical data storage may be legally restricted to a hospital network. To enable biomarker discovery, fast data access and interactive data exploration must be combined with high-performance computing resources, while respecting privacy regulations. We present a system using fast and inherently secure light-paths to access distributed data, thereby obviating the need for a central data repository. A secure private cloud computing framework facilitates interactive, computationally intensive exploration of this geographically distributed, privacy sensitive data. As a proof of concept, MRI brain imaging data hosted at two remote sites were processed in response to a user command at a third site. The system was able to automatically start virtual machines, run a selected processing pipeline and write results to a user accessible database, while keeping data locally stored in the hospitals. Individual tasks took approximately 50% longer compared to a locally hosted blade server but the cloud infrastructure reduced the total elapsed time by a factor of 40 using 70 virtual machines in the cloud. We demonstrated that the combination light-path and private cloud is a viable means of building an analysis infrastructure for secure data analysis. The system requires further work in the areas of error handling, load balancing and secure support of multiple users.
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
Zeijlmans van Emmichoven, Ingeborg A; van IJzendoorn, Marinus H; de Ruiter, Corine; Brosschot, Jos F
2003-01-01
To investigate the effect of the mental representation of attachment on information processing, 28 anxiety disorder outpatients, as diagnosed by the Anxiety Disorders Interview Schedule-Revised, were administered the Adult Attachment Interview and the State-Trait Anxiety Inventory. They also completed an emotional Stroop task with subliminal and supraliminal exposure conditions, a free recall memory task, and a recognition test. All tasks contained threatening, neutral, and positively valenced stimuli. A nonclinical comparison group of 56 participants completed the same measures. Results on the Stroop task showed color-naming interference for threatening words in the supraliminal condition only. Nonclinical participants with insecure attachment representations showed a global response inhibition to the Stroop task. Clinical participants with secure attachment representations showed the largest Stroop interference of the threatening words compared to the other groups. Results on the free recall task showed superior recall of all types of stimuli by participants with secure attachment representations. In the outpatient group, participants with secure attachment representations showed superior recall of threatening words on the free recall task, compared to insecure participants. Results on the recognition task showed no differences between attachment groups. We conclude that secure attachment representations are characterized by open communication about and processing of threatening information, leading to less defensive exclusion of negative material during the attentional stage of information processing and to better recall of threatening information in a later stage. Attachment insecurity, but not the type of insecurity, seems a decisive factor in attention and memory processes.
Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.
Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G
2000-11-01
We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.
Security concept in 'MyAngelWeb((R))' a website for the individual patient at risk of emergency.
Pinciroli; Nahaissi; Boschini; Ferrari; Meloni; Camnasio; Spaggiari; Carnerone
2000-11-01
We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Russo, Bryan J.; Hoffman, Michael G.; Chvala, William D.
Pacific Northwest National Laboratory provided assistance to Fort Hunter Liggett to determine the opportunities for solar energy development on the site. Increasing use of renewable energy is mandated by several executive orders and legislation. Fort Hunter Liggett has many attributes that enhance its suitability for renewable energy development. First, the site is located south of San Francisco in a remote portion of the costal foothills. Brush and forest fires are frequent and often result in power outages, which subsequently impacts the site’s training mission. In addition, the site’s blended electric rate during fiscal year (FY) 2010 was high at 12more » ¢/kWh. Lastly, the solar resource is moderately high; the site receives nearly 5.7 kWh/m2/day on a south facing, latitude-tilted surface. In light of these factors, the site is a clear candidate for a solar photovoltaic array. Prior to Pacific Northwest National Laboratory’s (PNNL) involvement, the site secured funding for a 1 megawatt (MW) photovoltaic (PV) array that will also provide shading for site vehicles. To best implement this project, PNNL conducted a site visit and was tasked with providing the site technical guidance and support regarding module selection, array siting, and other ancillary issues.« less
Preparation for the Recovery of Spent Nuclear Fuel (SNF) at Andreeva Bay, North West Russia - 13309
DOE Office of Scientific and Technical Information (OSTI.GOV)
Field, D.; McAtamney, N.
Andreeva Bay is located near Murmansk in the Russian Federation close to the Norwegian border. The ex-naval site was used to de-fuel nuclear-powered submarines and icebreakers during the Cold War. Approximately 22,000 fuel assemblies remain in three Dry Storage Units (DSUs) which means that Andreeva Bay has one of the largest stockpiles of highly enriched spent nuclear fuel (SNF) in the world. The high contamination and deteriorating condition of the SNF canisters has made improvements to the management of the SNF a high priority for the international community for safety, security and environmental reasons. International Donors have, since 2002, providedmore » support to projects at Andreeva concerned with improving the management of the SNF. This long-term programme of work has been coordinated between the International Donors and responsible bodies within the Russian Federation. Options for the safe and secure management of SNF at Andreeva Bay were considered in 2004 and developed by a number of Russian Institutes with international participation. This consisted of site investigations, surveys and studies to understand the technical challenges. A principal agreement was reached that the SNF would be removed from the site altogether and transported to Russia's reprocessing facility at Mayak in the Urals. The analytical studies provided the information necessary to develop the construction plan for the site. Following design and regulatory processes, stakeholders endorsed the technical solution in April 2007. This detailed the processes, facilities and equipment required to safely remove the SNF and identified other site services and support facilities required on the site. Implementation of this strategy is now well underway with the facilities in various states of construction. Physical works have been performed to address the most urgent tasks including weather protection over one of the DSUs, installation of shielding over the cells, provision of radiation protection infrastructure and general preparation of the site for construction of the facilities for the removal of the SNF. This paper describes the development and implementation of the strategy and work to improve the safe and secure management of SNF, preparing it for retrieval and removal from Andreeva Bay. (authors)« less
Quantum And Relativistic Protocols For Secure Multi-Party Computation
NASA Astrophysics Data System (ADS)
Colbeck, Roger
2009-11-01
After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias. The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give explicit cheating attacks for such functions. In the final chapter we discuss the task of expanding a private random string, while dropping the usual assumption that the protocol's user trusts her devices. Instead we assume that all quantum devices are supplied by an arbitrarily malicious adversary. We give two protocols that we conjecture securely perform this task. The first allows a private random string to be expanded by a finite amount, while the second generates an arbitrarily large expansion of such a string.
Report of the Task Group on the Department of Energy Aviation Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1992-02-01
The Department of Energy (DOE) owns or leases approximately 43 aircraft of which 17 are airplanes and 26 are helicopters. About two-thirds of these aircraft are used for activities related to defense programs; these are all government owned and contractor operated. The other third of DOE's aircraft is used by Bonneville Power Administration (BPA) and Western Area Power Administration (WAPA). These aircraft are primarily government owned and operated. In addition to transporting passengers, DOE aircraft are used for security operations, powerline and pipeline patrols, research and development activities, and aerial measurement and for the transport of hazardous materials. These operationsmore » are conducted at nine Field Offices under the organizational authority of eight DOE Program Secretarial Officers (PSOs). On July 24, 1991, a DOE-owned helicopter crashed at the Nevada Test Site resulting in the deaths of the five contractor employees on board. A DOE accident investigation board was convened, and an investigation into the causes of the crash was conducted. On November 19, 1991, a briefing of the preliminary results of the investigation was provided to the Assistant Secretary for Environment, Safety and Health (EH), the Assistant Secretary for Defense Programs (DP), and the Director, Office of Security Affairs (SA). On November 27, 1991, the Secretary of Energy directed the Assistant Secretary, EH, to convene and chair a Task Group with the PSOs to define the roles and responsibilities of DOE's aviation program. Task group recommendations are presented.« less
Report of the Task Group on the Department of Energy Aviation Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1992-02-01
The Department of Energy (DOE) owns or leases approximately 43 aircraft of which 17 are airplanes and 26 are helicopters. About two-thirds of these aircraft are used for activities related to defense programs; these are all government owned and contractor operated. The other third of DOE`s aircraft is used by Bonneville Power Administration (BPA) and Western Area Power Administration (WAPA). These aircraft are primarily government owned and operated. In addition to transporting passengers, DOE aircraft are used for security operations, powerline and pipeline patrols, research and development activities, and aerial measurement and for the transport of hazardous materials. These operationsmore » are conducted at nine Field Offices under the organizational authority of eight DOE Program Secretarial Officers (PSOs). On July 24, 1991, a DOE-owned helicopter crashed at the Nevada Test Site resulting in the deaths of the five contractor employees on board. A DOE accident investigation board was convened, and an investigation into the causes of the crash was conducted. On November 19, 1991, a briefing of the preliminary results of the investigation was provided to the Assistant Secretary for Environment, Safety and Health (EH), the Assistant Secretary for Defense Programs (DP), and the Director, Office of Security Affairs (SA). On November 27, 1991, the Secretary of Energy directed the Assistant Secretary, EH, to convene and chair a Task Group with the PSOs to define the roles and responsibilities of DOE`s aviation program. Task group recommendations are presented.« less
Report of the Defense Science Board Task Force on Globalization and Security.
1999-12-01
adversaries, such as North Korea’s progress in ballistic missiles. The leveling effect of globalization is a thread that runs through the Task Force...globalization are manifold. Increased use of the commercial sector cannot be separated from the effects of globalization. Nor is increased DoD reliance...enhance dramatically DSB Task Force on Globalization and Security DoD’s organizational efficiency and effectiveness . This could allow DoD to cut
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L
2018-04-01
Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing. This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents. We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction. Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks. This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.
Private Security Contractors: A Way of Combating Piracy in the Horn of Africa
2014-05-22
September 2011. 79Financial Action Task Force, “Financial Action Task Force Annual Report, 2010-2011,” FATF /OECD, 2011, 10. 80Andrew J. Shapiro...Report, 2010-2011.” FATF /OECD. Paris, 2011. Fox News. “Private Security Firms Join Battle Against Somali Pirates,” October 26, 2008. http
76 FR 34088 - Homeland Security Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-10
... purpose of deliberating on recommendations by the HSAC's Community Resilience Task Force. DATES: The HSAC conference call will take place from 1 p.m. to 2 p.m. E.D.T. on Monday, June 27, 2011. Please be advised that... homeland security operations. The HSAC will meet to review and approve the Community Resilience Task Force...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...
Dattalo, M; Wise, M; Ford Ii, J H; Abramson, B; Mahoney, J
2017-04-01
As of October 2016, use of federal Older Americans Act funds for health promotion and disease prevention will be restricted to the Administration on Aging's criteria for high-level evidence-based health promotion programs. Dissemination of these programs to rural communities remains limited. Therefore a strong need exists to identify strategies that facilitate program implementation and sustainability. The objective of this study was to compare organizational readiness and implementation strategies used by rural communities that achieved varying levels of success in sustaining evidence-based health promotion programs for older adults. We utilized a qualitative multi-site case study design to analyze the longitudinal experiences of eight rural sites working to implement evidence-based health promotion program over 3 years (8/2012-7/2015). Multiple sources of data (interviews, documents, reports, surveys) from each site informed the analysis. We used conventional content analysis to conduct a cross-case comparison to identify common features of rural counties that successfully implemented and sustained their target evidence-based health promotion program. Readiness to implement evidence-based programs as low at baseline as all site leaders described needing to secure additional resources for program implementation. Sites that successfully utilized six essential resources implemented and sustained greater numbers of workshops: (1) External Partnerships, (2) Agency Leadership Commitment, (3) Ongoing Source of Workshop Leaders, (4) Health Promotion Coordination Tasks Assigned to Specific Staff, (5) Organizational Stability, and (6) Change Team Engagement. The six essential resources described in this study can help rural communities assess their readiness to implement health promotion programs and work secure the resources necessary for successful implementation.
New Brunswick Laboratory: Progress report, October 1987--September 1988
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
NBL has been tasked by the DOE Office of Safeguards and Security, Defense Programs (OSS/DP) to assure the application of accurate and reliable measurement technology for the safeguarding of special nuclear materials. NBL is fulfilling its mission responsibilities by identifying and addressing the measurement and measurement-related needs of the nuclear material safeguards community. These responsibilities are being addressed by activities in the following program areas: (1) reference and calibration materials, (2) measurement development, (3) measurement services, (4) measurement evaluation, (5) safeguards assessment, and (6) site-specific assistance. Highlights of each of these programs areas are provided in this summary.
Accounting and Accountability for Distributed and Grid Systems
NASA Technical Reports Server (NTRS)
Thigpen, William; McGinnis, Laura F.; Hacker, Thomas J.
2001-01-01
While the advent of distributed and grid computing systems will open new opportunities for scientific exploration, the reality of such implementations could prove to be a system administrator's nightmare. A lot of effort is being spent on identifying and resolving the obvious problems of security, scheduling, authentication and authorization. Lurking in the background, though, are the largely unaddressed issues of accountability and usage accounting: (1) mapping resource usage to resource users; (2) defining usage economies or methods for resource exchange; (3) describing implementation standards that minimize and compartmentalize the tasks required for a site to participate in a grid.
The Slow Control System of the Auger Fluorescence Detectors
NASA Astrophysics Data System (ADS)
Barenthien, N.; Bethge, C.; Daumiller, K.; Gemmeke, H.; Kampert, K.-H.; Wiebusch, C.
2003-07-01
The fluorescence detector (FD) of the Pierre Auger experiment [1] comprises 24 telescopes that will be situated in 4 remote buildings in the Pampa Amarilla. It is planned to run the fluorescence detectors in absence of operators on site. Therefore, the main task of the Slow Control System (SCS) is to ensure a secure remote operation of the FD system. The Slow Control System works autonomously and continuously monitors those parameters which may disturb a secure operation. Commands from the data-acquisition system or the remote operator are accepted only if they do not violate safety rules that depend on the actual experimental conditions (e.g. high-voltage, wind-sp eed, light, etc.). In case of malfunctions (power failure, communication breakdown, ...) the SCS performs an orderly shutdown and subsequent startup of the fluorescence detector system. The concept and the implementation of the Slow Control System are presented.
Feasibility of Using Distributed Wireless Mesh Networks for Medical Emergency Response
Braunstein, Brian; Trimble, Troy; Mishra, Rajesh; Manoj, B. S.; Rao, Ramesh; Lenert, Leslie
2006-01-01
Achieving reliable, efficient data communications networks at a disaster site is a difficult task. Network paradigms, such as Wireless Mesh Network (WMN) architectures, form one exemplar for providing high-bandwidth, scalable data communication for medical emergency response activity. WMNs are created by self-organized wireless nodes that use multi-hop wireless relaying for data transfer. In this paper, we describe our experience using a mesh network architecture we developed for homeland security and medical emergency applications. We briefly discuss the architecture and present the traffic behavioral observations made by a client-server medical emergency application tested during a large-scale homeland security drill. We present our traffic measurements, describe lessons learned, and offer functional requirements (based on field testing) for practical 802.11 mesh medical emergency response networks. With certain caveats, the results suggest that 802.11 mesh networks are feasible and scalable systems for field communications in disaster settings. PMID:17238308
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Ecological Monitoring and Compliance Program 2007 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, Dennis; Anderson, David; Derek, Hall
2008-03-01
In accordance with U.S. Department of Energy (DOE) Order 450.1, 'Environmental Protection Program', the Office of the Assistant Manager for Environmental Management of the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) requires ecological monitoring and biological compliance support for activities and programs conducted at the Nevada Test Site (NTS). National Security Technologies, LLC (NSTec), Ecological Services has implemented the Ecological Monitoring and Compliance (EMAC) Program to provide this support. EMAC is designed to ensure compliance with applicable laws and regulations, delineate and define NTS ecosystems, and provide ecological information that can be used to predict and evaluate themore » potential impacts of proposed projects and programs on those ecosystems. This report summarizes the EMAC activities conducted by NSTec during calendar year 2007. Monitoring tasks during 2007 included eight program areas: (a) biological surveys, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) biological monitoring at the Nonproliferation Test and Evaluation Complex (NPTEC). The following sections of this report describe work performed under these eight areas.« less
Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study
ERIC Educational Resources Information Center
Zhao, Jensen; Zhao, Sherry Y.
2015-01-01
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Fermilab Security Site Access Request Database
Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Municipal securities...
Calendar Year 2016 Annual Groundwater Monitoring Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Copland, John R.; Jackson, Timmie Okchumpulla; Li, Jun
Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned/contractoroperated laboratory. National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., manages and operates SNL/NM for the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA). The DOE/NNSA Sandia Field Office administers the contract and oversees contractor operations at the site. Two types of groundwater surveillance monitoring are conducted at SNL/NM: (1) on a site-wide basis as part of the SNL/NM Long-Term Stewardship (LTS) Program’s Groundwater Monitoring Program (GMP) Groundwater Surveillance Task and (2) on a site-specific groundwater monitoring at LTS/Environmental Restoration (ER) Operationsmore » sites with ongoing groundwater investigations. This Annual Groundwater Monitoring Report summarizes data collected during groundwater monitoring events conducted at GMP locations and at the following SNL/NM sites through December 31, 2016: Burn Site Groundwater Area of Concern (AOC); Chemical Waste Landfill; Mixed Waste Landfill; Technical Area-V Groundwater AOC; and the Tijeras Arroyo Groundwater AOC. Environmental monitoring and surveillance programs are required by the New Mexico Environment Department (NMED) and DOE Order 436.1, Departmental Sustainability, and DOE Order 231.1B, Environment, Safety, and Health Reporting.« less
Net Zero Energy Military Installations: A Guide to Assessment and Planning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Booth, S.; Barnett, J.; Burman, K.
2010-08-01
The U.S. Department of Defense (DoD) recognizes the strategic importance of energy to its mission, and is working to reduce energy consumption and enhance energy self-sufficiency by drawing on local clean energy sources. A joint initiative formed between DoD and the U.S. Department of Energy (DOE) in 2008 to address military energy use led to a task force to examine the potential for net zero energy military installations, which would produce as much energy on site as they consume in buildings, facilities, and fleet vehicles. This report presents an assessment and planning process to examine military installations for net zeromore » energy potential. Net Zero Energy Installation Assessment (NZEIA) presents a systematic framework to analyze energy projects at installations while balancing other site priorities such as mission, cost, and security.« less
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE... § 250.1634 Site security. (a) All locations where sulphur is produced, measured, or stored shall be...
Security: Progress and Challenges
ERIC Educational Resources Information Center
Luker, Mark A.
2004-01-01
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
1980-01-01
TECHNIQUES IMPROVING RAPIDLY C-7 INDUSTRY THRUSTS IN 70s DRIVING FORCE : IMPROVE PRODUCT QUALITY * EASE MAINTENANCE, MODIFICATION IMPROVE PERFORMANCE...together a task force to make recommendations on what we should be doing about computer secur- ity. Other members of the task force came from both our...of the marketing task force mostly echoed and endorsed the user’s report. Both reports were issued in March of 1973. Notice that DoD 5200.28 had just
Context matters: the structure of task goals affects accuracy in multiple-target visual search.
Clark, Kait; Cain, Matthew S; Adcock, R Alison; Mitroff, Stephen R
2014-05-01
Career visual searchers such as radiologists and airport security screeners strive to conduct accurate visual searches, but despite extensive training, errors still occur. A key difference between searches in radiology and airport security is the structure of the search task: Radiologists typically scan a certain number of medical images (fixed objective), and airport security screeners typically search X-rays for a specified time period (fixed duration). Might these structural differences affect accuracy? We compared performance on a search task administered either under constraints that approximated radiology or airport security. Some displays contained more than one target because the presence of multiple targets is an established source of errors for career searchers, and accuracy for additional targets tends to be especially sensitive to contextual conditions. Results indicate that participants searching within the fixed objective framework produced more multiple-target search errors; thus, adopting a fixed duration framework could improve accuracy for career searchers. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
Access Control Is More than Security.
ERIC Educational Resources Information Center
Fickes, Michael
2002-01-01
Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)
Development and Application of Skill Standards for Security Practitioners
2006-07-01
Development and Application of Skill Standards for Security Practitioners Henry K. Simpson Northrop Grumman Technical Services Lynn F. Fischer...and Application of Skill Standards for Security Practitioners Henry K. Simpson, Northrop Grumman Technical Services Lynn F. Fischer, Defense...described in the present report was driven by a JSTC tasking to develop skill standards for security practitioners in seven different security
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
Effective Management of Information Security and Privacy
ERIC Educational Resources Information Center
Anderson, Alicia
2006-01-01
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Security Design Flaws That Affect Usability in Online Banking
ERIC Educational Resources Information Center
Gurlen, Stephanie
2013-01-01
As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…
Web vulnerability study of online pharmacy sites.
Kuzma, Joanne
2011-01-01
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.
Design tools for complex dynamic security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson
2007-01-01
The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systemsmore » are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.« less
2017-04-13
Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be...policy, and law . The research question is whether the Departments of Homeland Security (DHS) and Defense (DOD) have federal statutory authority to... law ); Department of Homeland Security; Department of Defense; establish standards; physical protection and security; national security 16. SECURITY
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
Koutelakis, George V.; Anastassopoulos, George K.; Lymberopoulos, Dimitrios K.
2012-01-01
Multiprotocol medical imaging communication through the Internet is more flexible than the tight DICOM transfers. This paper introduces a modular multiprotocol teleradiology architecture that integrates DICOM and common Internet services (based on web, FTP, and E-mail) into a unique operational domain. The extended WADO service (a web extension of DICOM) and the other proposed services allow access to all levels of the DICOM information hierarchy as opposed to solely Object level. A lightweight client site is considered adequate, because the server site of the architecture provides clients with service interfaces through the web as well as invulnerable space for temporary storage, called as User Domains, so that users fulfill their applications' tasks. The proposed teleradiology architecture is pilot implemented using mainly Java-based technologies and is evaluated by engineers in collaboration with doctors. The new architecture ensures flexibility in access, user mobility, and enhanced data security. PMID:22489237
Secure Infrastructure-Less Network (SINET)
2017-06-01
Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the
Bernier, Annie; Beauchamp, Miriam H; Carlson, Stephanie M; Lalonde, Gabrielle
2015-09-01
In light of emerging evidence suggesting that the affective quality of parent-child relationships may relate to individual differences in young children's executive functioning (EF) skills, the aim of this study was to investigate the prospective associations between attachment security in toddlerhood and children's EF skills in kindergarten. Mother-child dyads (N = 105) participated in 2 toddlerhood visits in their homes, when children were 15 months and 2 years of age. Mother-child attachment security was assessed with the Attachment Q-Sort during both these visits. When children were in kindergarten (ages 5-6), they were administered a battery of EF tasks, and their teachers completed the Behavior Rating Inventory of Executive Function to assess children's EF problems. The results indicated that kindergarteners who were more securely attached to their mothers in toddlerhood showed better performance on all EF tasks, and were considered by their teachers to present fewer EF problems in everyday school situations. These results held above family socioeconomic status (SES) and child age, sex, and general cognitive functioning. The fact that early attachment security uniquely predicted both teacher reports and children's objective EF task performance suggests that parent-child attachment may be a promising factor to consider in the continuing search for the social antecedents of young children's EF. (c) 2015 APA, all rights reserved).
Code of Federal Regulations, 2010 CFR
2010-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2012 CFR
2012-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2011 CFR
2011-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2014 CFR
2014-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2013 CFR
2013-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Nevada National Security Site Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
2014-09-09
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less
2009-09-01
DIFFIE-HELLMAN KEY EXCHANGE .......................14 III. GHOSTNET SETUP .........................................15 A. INSTALLATION OF OPENVPN FOR...16 3. Verifying the Secure Connection ..............16 B. RUNNING OPENVPN AS A SERVER ON WINDOWS ............17 1. Creating...Generating Server and Client Keys ............20 5. Keys to Transfer to the Client ...............21 6. Configuring OpenVPN to Use Certificates
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi
2017-08-01
Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.
77 FR 55218 - Homeland Security Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-07
... childhood arrivals program. The HSAC will also receive a report from the Sustainability and Efficiency Task Force, review and discuss the task forces' report, and formulate recommendations for the Department. The.... HSAC conference call details and the Sustainability and Efficiency Task Force report will be provided...
Security Aspects of Computer Supported Collaborative Work
1993-09-01
unstructured tasks at one end 11 and prescriptive tasks at the other. Unstructured tasks are those requiring creative input from a number of users and...collaborative technology begun to mature, it has begun to outstrip prevailing management attitudes. One barrier to telecommuting is the perception that
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
..., Including On-Site Leased Workers From Westaff, Supply Technologies, Aerotek, and Securitas Security Services..., including on-site leased workers from Westaff, Supply Technologies, Aerotek and Securitas Security Services... was amended on December 6, 2010 to include on- site leased workers from Supply Technologies. The...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 2 2014-07-01 2014-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
Addressing Information Security Risk
ERIC Educational Resources Information Center
Qayoumi, Mohammad H.; Woody, Carol
2005-01-01
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
Best Practices for the Security of Radioactive Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coulter, D.T.; Musolino, S.
2009-05-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.« less
NASA Astrophysics Data System (ADS)
Herz, A.; Herz, E.; Center, K.; George, P.; Axelrad, P.; Mutschler, S.; Jones, B.
2016-09-01
The Space Surveillance Network (SSN) is tasked with the increasingly difficult mission of detecting, tracking, cataloging and identifying artificial objects orbiting the Earth, including active and inactive satellites, spent rocket bodies, and fragmented debris. Much of the architecture and operations of the SSN are limited and outdated. Efforts are underway to modernize some elements of the systems. Even so, the ability to maintain the best current Space Situational Awareness (SSA) picture and identify emerging events in a timely fashion could be significantly improved by leveraging non-traditional sensor sites. Orbit Logic, the University of Colorado and the University of Texas at Austin are developing an innovative architecture and operations concept to coordinate the tasking and observation information processing of non - traditional assets based on information-theoretic approaches. These confirmed tasking schedules and the resulting data can then be used to "inform" the SSN tasking process. The 'Heimdall Web' system is comprised of core tasking optimization components and accompanying Web interfaces within a secure, split architecture that will for the first time allow non-traditional sensors to support SSA and improve SSN tasking. Heimdall Web application components appropriately score/prioritize space catalog objects based on covariance, priority, observability, expected information gain, and probability of detect - then coordinate an efficient sensor observation schedule for non-SSN sensors contributing to the overall SSA picture maintained by the Joint Space Operations Center (JSpOC). The Heimdall Web Ops concept supports sensor participation levels of "Scheduled", "Tasked" and "Contributing". Scheduled and Tasked sensors are provided optimized observation schedules or object tracking lists from central algorithms, while Contributing sensors review and select from a list of "desired track objects". All sensors are "Web Enabled" for tasking and feedback, supplying observation schedules, confirmed observations and related data back to Heimdall Web to complete the feedback loop for the next scheduling iteration.
2005-06-01
need for user-defined dashboard • automated monitoring of web data sources • task driven data aggregation and display Working toward automated processing of task, resource, and intelligence updates
Use of a secure Internet Web site for collaborative medical research.
Marshall, W W; Haley, R W
2000-10-11
Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.
Attention focus and self-touch in toddlers: The moderating effect of attachment security.
Ito-Jäger, Sachiyo; Howard, Amanda R; Purvis, Karyn B; Cross, David R
2017-08-01
The superior self-regulation and attention-regulation abilities of securely attached children have been repeatedly demonstrated. However, the mechanisms that allow securely attached children to exhibit higher levels of attention focus than insecurely attached (anxious-ambivalent and anxious-avoidant) children need to be explored. One possible mechanism that has been hypothesized to play a role in focusing attention is self-touch. Previous research has shown that 10-year-old children exhibit more bilateral self-touch (i.e., both hands are simultaneously moving onto each other or on the body, and both hands are in contact with each other or with the body), but not lateral self-touch (i.e., one hand is moving on the other hand or on the body, and the hand is in contact with the other hand or with the body), when they focus attention on a task. Because bilateral coordination is still developing during childhood, we expected that lateral self-touch, instead of bilateral self-touch, may be associated with attention focus for toddlers. The objectives of the present study were to examine whether securely attached toddlers exhibit more self-touch, particularly lateral self-touch, while they focus on a task than while they do not focus on a task. We expected to find that the association between lateral self-touch and attention focus is not as strong for insecurely attached toddlers. Data from forty-nine mother-child dyads were employed for analyses. The attachment classification of the children was determined using the Strange Situation. The duration of attention focus and self-touch behavior during a reading task were coded. An association between lateral self-touch and attention focus was found for children of all attachment classifications. This association was particularly strong for securely attached children. We discuss the possibility that securely attached toddlers may use lateral self-touch to regulate attention. Copyright © 2017 Elsevier Inc. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-26
... securities substitutions begin to be permitted, FICC will announce this to members by important notice. Other... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67227; File No. SR-FICC-2012-05] Self... Infrastructure Reform Task Force June 20, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of...
The Effects of Workload Transitions in a Multitasking Environment
2016-09-13
completed the NASA Task Load Index to assess subjective workload, and the shortened Dundee Stress State Questionnaire to measure subjective task-related...and the analysis of both the NASA Task Load Index and of the shortened Dundee State Questionnaire did not reveal any significant differences related...Electroencepholography (EEG), NASA Task Load Index ( NASA TLX), Dundee Stress State Questionnaire (DSSQ), Hysteresis 16. SECURITY CLASSIFICATION OF
Report #15-P-0013, November 10, 2014. Continued security breaches at some sites could impair the effectiveness of the remedy to protect human health and the environment and could expose trespassers to safety or health risks.
Parts Counterperson. Auto, Agriculture & Truck. Task List Competency Record.
ERIC Educational Resources Information Center
Minnesota Instructional Materials Center, White Bear Lake.
Developed by industry representatives and educators for use by vocational instructors, this guide focuses on the tasks and competencies necessary for a student to develop in order to secure employment as a counterperson in automobile, agriculture, and truck parts. The task list is an outline of various skills and proficiencies and covers sales,…
77 FR 59627 - Homeland Security Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... purpose of reviewing and deliberating on recommendations by the HSAC's Cyber Skills Task Force. DATES: The.... The HSAC will meet to review and deliberate on the Cyber Skills Task Force report of findings and... details and the Cyber Skills Task Force report will be provided to interested members of the public at the...
Security & Privacy Policy - Naval Oceanography Portal
Notice: This is a U.S. Government Web Site 1. This is a World Wide Web site for official information information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Information Act (FOIA) | External Link Disclaimer This is an official U.S. Navy web site. Security &
McElwain, Nancy L; Holland, Ashley S; Engle, Jennifer M; Wong, Maria S
2012-02-01
Child-mother attachment security, assessed via a modified Strange Situation procedure (Cassidy & Marvin, with the MacArthur Attachment Working Group, 1992), and parent-reported child proneness to anger were examined as correlates of observed child behavior toward mothers during a series of interactive tasks (N = 120, 60 girls). Controlling for maternal sensitivity and child gender and expressive language ability, greater attachment security, and lower levels of anger proneness were related to more child responsiveness to maternal requests and suggestions during play and snack sessions. As hypothesized, anger proneness also moderated several security-behavior associations. Greater attachment security was related to (a) more committed compliance during clean-up and snack-delay tasks for children high on anger proneness, (b) more self-assertiveness during play and snack for children moderate or high on anger proneness, and (c) more help-seeking during play and snack for children moderate or low on anger proneness. Findings further our understanding of the behavioral correlates of child-mother attachment security assessed during late toddlerhood via the Cassidy-Marvin system and underscore child anger proneness as a moderator of attachment-related differences in child behavior during this developmental period.
Krüger, Jenny K; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.
An Updated Version of the U.S. Air Force Multi-Attribute Task Battery (AF-MATB)
2014-08-01
assessing human performance in a controlled multitask environment. The most recent release of AF-MATB contains numerous improvements and additions...Strategic Behavior, MATB, Multitasking , Task Battery, Simulator, Multi-Attribute Task Battery, Automation 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...performance and multitasking strategy. As a result, a specific Information Throughput (IT) Mode was designed to customize the task to fit the Human
Managing information technology security risk
NASA Technical Reports Server (NTRS)
Gilliam, David
2003-01-01
Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.
Graphs for information security control in software defined networks
NASA Astrophysics Data System (ADS)
Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.
2017-07-01
Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.
1989-06-01
Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security
Approximation in Optimal Control and Identification of Large Space Structures.
1985-01-01
I ease I Cr ’. ’. -4 . r*_...1- UN(D aSIFIED SECURITY CLAS.’ICATION OF fHIS P^.GE REPORT DOCUMENTATION PAGE 1 REPORT SECURITY CLASSIFICATION 1...RESTRICTIVE MARKINGS UNCLASSIFIED 2 SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; distribution 2b...NOS. PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. NO Bolling AFB DC 20332-6448 61102F 2304 Al 11. TITLE IlnRCiude Security Claas.ifcation
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Feather, Martin S.
2004-01-01
Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
..., Including On-Site Leased Workers From Westaff, Supply Technologies, Aerotek, Securitas Security Services..., 2011 to include on-site leased workers from Supply Technologies, Aerotek and Securitas Security Services. The notice was published in the Federal Register on December 13, 2010 (75 FR 77666) and February...
Transformative Rendering of Internet Resources
2012-10-01
4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2014 CFR
2014-07-01
... must follow. These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Fiscal Service provides agents...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...
Building Security into Schools.
ERIC Educational Resources Information Center
Kosar, John E.; Ahmed, Faruq
2000-01-01
Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…
49 CFR 40.223 - What steps must be taken to protect the security of alcohol testing sites?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 1 2010-10-01 2010-10-01 false What steps must be taken to protect the security of alcohol testing sites? 40.223 Section 40.223 Transportation Office of the Secretary of..., Equipment and Supplies Used in Alcohol Testing § 40.223 What steps must be taken to protect the security of...
The Campus Executive's Role in Security and Liability Issues.
ERIC Educational Resources Information Center
Bromley, Max; Territo, Leonard
1986-01-01
Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)
You, Wei-Bin; He, Dong-Jin; Qin, De-Hua; Ji, Zhi-Rong; Wu, Li-Yun; Yu, Jian-An; Chen, Bing-Rong; Tan, Yong
2014-05-01
This paper proposed a new concept of ecological security for protection by a comprehensive analysis of the contents and standards of world heritage sites. A frame concept model named "Pressure-State-Control" for early warning of ecological security at world heritage mixed sites was constructed and evaluation indicators of this frame were also selected. Wuyishan Scenery District was chosen for a case study, which has been severely disturbed by natural and artificial factors. Based on the frame model of "Pressure-State-Control" and by employing extension analysis, the matter-element model was established to assess the ecological security status of this cultural and natural world heritage mixed site. The results showed that the accuracy of ecological security early warning reached 84%. Early warning rank was I level (no alert status) in 1997 and 2009, but that in 2009 had a higher possibility to convert into II level. Likewise, the early-warning indices of sensitive ranks were different between 1997 and 2009. Population density, population growth rate, area index for tea garden, cultivated land owned per capita, level of drought, and investment for ecological and environmental construction were the main limiting factors to hinder the development of ecological security from 2009 to future. In general, the status of Wuyishan Scenery District ecological security was relatively good and considered as no alert level, while risk conditions also existed in terms of a few early-warning indicators. We still need to pay more attention to serious alert indicators and adopt effective prevention and control measures to maintain a good ecological security status of this heritage site.
UAS Integration in the NAS Project Test Site Kick-off Meeting
NASA Technical Reports Server (NTRS)
Kopardekar, Parimal; Witzberger, Kevin; Hackenberg, Davis L.; Murphy, Jim
2015-01-01
This briefing was presented during the Test Site Kick Off Meeting to discuss the contract awards for Task 1 and Task 2. This briefing covered a high level overview for contract deliverables, Task 1 - UAS Traffic Management and Task 2, Live Virtual Constructive Distributed Environment.
Horn, Lisa; Huber, Ludwig; Range, Friederike
2013-01-01
Background It has been suggested that dogs display a secure base effect similar to that found in human children (i.e., using the owner as a secure base for interacting with the environment). In children, this effect influences their daily lives and importantly also their performance in cognitive testing. Here, we investigate the importance of the secure base effect for dogs in a problem-solving task. Methodology/Principal Findings Using a manipulative task, we tested dogs in three conditions, in which we varied the owner's presence and behavior (Experiment 1: “Absent owner”, “Silent owner”, “Encouraging owner”) and in one additional condition, in which the owner was replaced by an unfamiliar human (Experiment 2: “Replaced owner”). We found that the dogs' duration of manipulating the apparatus was longer when their owner was present than absent, irrespective of the owner's behavior. The presence of an unfamiliar human however did not increase their manipulation. Furthermore, the reduced manipulation during the absence of the owner was not correlated with the dog's degree of separation distress scored in a preceding attachment experiment. Conclusions/Significance Our study is the first to provide evidence for an owner-specific secure base effect in dogs that extends from attachment tests to other areas of dogs' lives and also manifests itself in cognitive testing – thereby confirming the remarkable similarity between the secure base effect in dogs and in human children. These results also have important implications for behavioral testing in dogs, because the presence or absence of the owner during a test situation might substantially influence dogs' motivation and therefore the outcome of the test. PMID:23734243
Retention in the Navy Nurse Corps
1990-12-01
SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY CLASSIFICATION l b. RESTRICTIVE MARKINGS Unclassified 2a. SECURITY...nurses from a la -ge urban hospital. A factor analysis of a questionnaire 36 containing measures of job satisfaction and performance on day and night...those observacions , and the responses to task significance questions, indicated the three respondents were physicians -r dentists. The data were then
The design and implementation of web mining in web sites security
NASA Astrophysics Data System (ADS)
Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li
2003-06-01
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.
1981-03-01
Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
System architecture for asynchronous multi-processor robotic control system
NASA Technical Reports Server (NTRS)
Steele, Robert D.; Long, Mark; Backes, Paul
1993-01-01
The architecture for the Modular Telerobot Task Execution System (MOTES) as implemented in the Supervisory Telerobotics (STELER) Laboratory is described. MOTES is the software component of the remote site of a local-remote telerobotic system which is being developed for NASA for space applications, in particular Space Station Freedom applications. The system is being developed to provide control and supervised autonomous control to support both space based operation and ground-remote control with time delay. The local-remote architecture places task planning responsibilities at the local site and task execution responsibilities at the remote site. This separation allows the remote site to be designed to optimize task execution capability within a limited computational environment such as is expected in flight systems. The local site task planning system could be placed on the ground where few computational limitations are expected. MOTES is written in the Ada programming language for a multiprocessor environment.
Security Requirements Management in Software Product Line Engineering
NASA Astrophysics Data System (ADS)
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
A security/safety survey of long term care facilities.
Acorn, Jonathan R
2010-01-01
What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.
Automated power management and control
NASA Technical Reports Server (NTRS)
Dolce, James L.
1991-01-01
A comprehensive automation design is being developed for Space Station Freedom's electric power system. A joint effort between NASA's Office of Aeronautics and Exploration Technology and NASA's Office of Space Station Freedom, it strives to increase station productivity by applying expert systems and conventional algorithms to automate power system operation. The initial station operation will use ground-based dispatches to perform the necessary command and control tasks. These tasks constitute planning and decision-making activities that strive to eliminate unplanned outages. We perceive an opportunity to help these dispatchers make fast and consistent on-line decisions by automating three key tasks: failure detection and diagnosis, resource scheduling, and security analysis. Expert systems will be used for the diagnostics and for the security analysis; conventional algorithms will be used for the resource scheduling.
Industrial Sites - An Approach to Closure
None
2018-01-16
The Environmental Management (EM) Program at the Nevada Site Office was created by the U.S. Department of Energy (DOE) to address the environmental legacy of contamination resulting from more than 50 years of nuclear weapons research, production and testing. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NSO) is responsible for remediating portions of the Nevada National Security Site (formerly the Nevada Test Site) and the Tonopah Test Range, which is within the Nevada Test and Training Range.
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
NASA Astrophysics Data System (ADS)
Buhrman, Harry; Christandl, Matthias; Schaffner, Christian
2012-10-01
A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other’s input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both parties (two-sided computation) and that is secure against a cheating Bob can be completely broken by a cheating Alice. Whereas it is known that quantum protocols for this task cannot be completely secure, our result implies that security for one party implies complete insecurity for the other. Our findings stand in stark contrast to recent protocols for weak coin tossing and highlight the limits of cryptography within quantum mechanics. We remark that our conclusions remain valid, even if security is only required to be approximate and if the function that is computed for Bob is different from that of Alice.
Complete insecurity of quantum protocols for classical two-party computation.
Buhrman, Harry; Christandl, Matthias; Schaffner, Christian
2012-10-19
A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other's input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both parties (two-sided computation) and that is secure against a cheating Bob can be completely broken by a cheating Alice. Whereas it is known that quantum protocols for this task cannot be completely secure, our result implies that security for one party implies complete insecurity for the other. Our findings stand in stark contrast to recent protocols for weak coin tossing and highlight the limits of cryptography within quantum mechanics. We remark that our conclusions remain valid, even if security is only required to be approximate and if the function that is computed for Bob is different from that of Alice.
Nevada National Security Site Environmental Report 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed
2012-09-12
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
An Integrating Framework for Interdisciplinary Military Analyses
2017-04-01
Effectiveness, System Performance, Task Prosecution, War Gaming 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES...and space for every play of the game . Called plays can be compared to collective tasks with each player responsible for executing one or more
77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725
6 CFR 27.210 - Submissions schedule.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in any subsequent Federal Register notice. (2) Security Vulnerability Assessment. Unless otherwise notified, a covered facility must complete and submit a Security Vulnerability Assessment within 90... Department's approval of the facility's Site Security Plan. (2) Security Vulnerability Assessment. Unless...
OPERATION CASTLE. The Operation Plan Number 1-53. Task Group 7.1
1984-08-31
reconnaissance. 2 MA-16 Search and rescue at Eniwetok. P- 3 3 C-54 Documentary photography. I P2V Project 6.4 control of drons ve_-sel. - - iujutc 7-4 telemetering, SFIR2V Security Patrol. 4 741 Security. PI4
75 FR 81562 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-28
... System name: Supplementary Security Income (SSI)/Office of Personnel Management (OPM) Temporary Matching... the Social Security Administration (SSA) was still part of the Department, and when OIG was tasked... Fraud Detection File, HHS/OS/OIG. Purpose: This system of records was established to facilitate the...
Job Attitudes of USAF Aircraft Maintenance Personnel.
1986-04-01
SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS UNCLASSIFIED 7. SECURITY CLASSIFICATION AUTHORITY 3. OISTRIBUTION/ AVAILABILIT " OF REPORT 1...dealt with in this paper would be rather like trying to take a drink of water out of a fire hydrant when the pressure is fully or--a task beyond the
2009-06-12
and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for
Krüger, Jenny K.; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed. PMID:27014142
Nevada National Security Site Environmental Report 2012 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy A
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2013 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
78 FR 56737 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-13
... system as the ``Organized Crime Drug Enforcement Task Forces Management Information System'' (OCDETF MIS... Task Forces Management Information System (OCDETF MIS). SECURITY CLASSIFICATION: Unclassified. SYSTEM... Office of Management and Budget (OMB) Circular No. A-130, notice is hereby given that the Department of...
NASA Astrophysics Data System (ADS)
Goldenberg, Lior; Vaidman, Lev; Wiesner, Stephen
1999-04-01
We present a two-party protocol for ``quantum gambling,'' a new task closely related to coin tossing. The protocol allows two remote parties to play a gambling game such that in a certain limit it becomes a fair game. No unconditionally secure classical method is known to accomplish this task.
COMMUNITY-SCALE MODELING FOR AIR TOXICS AND HOMELAND SECURITY
The purpose of this task is to develop and evaluate numerical and physical modeling tools for simulating ambient concentrations of airborne substances in urban settings at spatial scales ranging from <1-10 km. Research under this task will support client needs in human exposure ...
Downgrade of the Savannah River Sites FB-Line
DOE Office of Scientific and Technical Information (OSTI.GOV)
SADOWSKI, ED; YOURCHAK, RANDY; PRETZELLO MARJI
2005-07-05
This paper will discuss the Safeguards & Security (S&S) activities that resulted in the downgrade of the Savannah River Site's FB-Line (FBL) from a Category I Material Balance Area (MBA) in a Material Access Area (MAA) to a Category IV MBA in a Property Protection Area (PPA). The Safeguards activities included measurement of final product items, transferal of nuclear material to other Savannah River Site (SRS) facilities, discard of excess nuclear material items, and final measurements of holdup material. The Security activities included relocation and destruction of classified documents and repositories, decertification of a classified computer, access control changes, updatesmore » to planning documents, deactivation and removal of security systems, Human Reliability Program (HRP) removals, and information security training for personnel that will remain in the FBL PPA.« less
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
Retail E-Commerce Security Status among Fortune 500 Corporations
ERIC Educational Resources Information Center
Zhao, Jensen J.; Zhao, Sherry Y.
2012-01-01
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
NASA Astrophysics Data System (ADS)
Rehan, S. C.
This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.
Kuwait: Security, Reform, and U.S. Policy
2014-01-30
is a member of the Middle East North Africa Financial Action Task Force ( FATF ), but it has been identified by that body as having deficiencies in...Security, Reform, and U.S. Policy Congressional Research Service 24 has developed an action plan with the FATF to address the weaknesses. Some Kuwait
The Effects of Secure Attachments on Preschool Children's Conflict Management Skills.
ERIC Educational Resources Information Center
Kesner, John
This study examined the relationship between the security of children's attachment relationships to parents and teachers and how children negotiate and manage conflicts. Sixty-six preschool-aged children participated in story completion tasks regarding their attachment relationship with parents and teachers, and in hypothetical situations…
Sen. Snowe, Olympia J. [R-ME
2009-05-19
Senate - 05/19/2009 Read twice and referred to the Committee on Small Business and Entrepreneurship. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Border Enforcement Security Task Force Act of 2011
Rep. Cuellar, Henry [D-TX-28
2011-02-17
House - 02/24/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see H.R.915, which became Public Law 112-205 on 12/7/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Making Schools Safe: The Role of the Modern Business Officer.
ERIC Educational Resources Information Center
Stephens, Ronald D.
1990-01-01
School business officials are held responsible for school safety. After conducting a school security audit, the following strategies are recommended: establishing a local school security task force; forming a comprehensive crisis management plan; establishing a school communication network; and providing school staff with inservice training on…
78 FR 25723 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-02
..., assistive listening devices, materials in alternative format) should notify Munira Mwalimu at 202- 357-6938.... to review secure NAEP test materials for Science Interactive Computer Tasks (ICTs) at grades 4, 8... provided with secure items and materials which are not yet available for release to the general public...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holt, V.L.; Burgoa, B.B.
1993-12-01
This document is a site-specific work plan/health and safety checklist (WP/HSC) for a task of the Waste Area Grouping 2 Remedial Investigation and Site Investigation (WAG 2 RI&SI). Title 29 CFR Part 1910.120 requires that a health and safety program plan that includes site- and task-specific information be completed to ensure conformance with health- and safety-related requirements. To meet this requirement, the health and safety program plan for each WAG 2 RI&SI field task must include (1) the general health and safety program plan for all WAG 2 RI&SI field activities and (2) a WP/HSC for that particular field task.more » These two components, along with all applicable referenced procedures, must be kept together at the work site and distributed to field personnel as required. The general health and safety program plan is the Health and Safety Plan for the Remedial Investigation and Site Investigation of Waste Area Grouping 2 at the Oak Ridge National Laboratory, Oak Ridge, Tennessee (ORNL/ER-169). The WP/HSCs are being issued as supplements to ORNL/ER-169.« less
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Astrophysics Data System (ADS)
Nightingale, James; Wang, Qi; Grecos, Christos
2015-02-01
In recent years video traffic has become the dominant application on the Internet with global year-on-year increases in video-oriented consumer services. Driven by improved bandwidth in both mobile and fixed networks, steadily reducing hardware costs and the development of new technologies, many existing and new classes of commercial and industrial video applications are now being upgraded or emerging. Some of the use cases for these applications include areas such as public and private security monitoring for loss prevention or intruder detection, industrial process monitoring and critical infrastructure monitoring. The use of video is becoming commonplace in defence, security, commercial, industrial, educational and health contexts. Towards optimal performances, the design or optimisation in each of these applications should be context aware and task oriented with the characteristics of the video stream (frame rate, spatial resolution, bandwidth etc.) chosen to match the use case requirements. For example, in the security domain, a task-oriented consideration may be that higher resolution video would be required to identify an intruder than to simply detect his presence. Whilst in the same case, contextual factors such as the requirement to transmit over a resource-limited wireless link, may impose constraints on the selection of optimum task-oriented parameters. This paper presents a novel, conceptually simple and easily implemented method of assessing video quality relative to its suitability for a particular task and dynamically adapting videos streams during transmission to ensure that the task can be successfully completed. Firstly we defined two principle classes of tasks: recognition tasks and event detection tasks. These task classes are further subdivided into a set of task-related profiles, each of which is associated with a set of taskoriented attributes (minimum spatial resolution, minimum frame rate etc.). For example, in the detection class, profiles for intruder detection will require different temporal characteristics (frame rate) from those used for detection of high motion objects such as vehicles or aircrafts. We also define a set of contextual attributes that are associated with each instance of a running application that include resource constraints imposed by the transmission system employed and the hardware platforms used as source and destination of the video stream. Empirical results are presented and analysed to demonstrate the advantages of the proposed schemes.
SecureMA: protecting participant privacy in genetic association meta-analysis.
Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A
2014-12-01
Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
The study on network security based on software engineering
NASA Astrophysics Data System (ADS)
Jia, Shande; Ao, Qian
2012-04-01
Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
2016-09-01
independence/ dependence , evaluation apprehension, workload, stress 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER...indepen- dence/ dependence , evaluation apprehension, workload, stress IntroductIon Vigilance or sustained attention tasks require observers to maintain
DOT National Transportation Integrated Search
2012-05-16
This Communications Data Delivery System Analysis Task 2 report describes and analyzes options for Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications data delivery systems using various communication media (Dedicated Short Ra...
Cripto-1 in Mammary Gland Development and Carcinogenesis
2000-12-01
Task 4). T.O. 2 We have designed and tested a hammerhead ribozyme [21, 22] that recognizes nucleotides 12-28 of the murine CR-I mRNA and cuts after the...Growth Factors, Ribozymes 23 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF...Underexpression of CR-1 will decrease tumorigenicity of highly or moderately tumorigenic cell lines. (T.O. 2) 4. Efficient delivery of a ribozyme or
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the
2016-12-01
contends with to accomplish annual general military training requirements and mission essential tasks. Currently, there are 18 annual general military...training model that can be used to improve training effectiveness and efficiency. We believe that adjusting how reserve units conduct 11 of the 18 ...PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18 . SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY
6 CFR 27.255 - Recordkeeping requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... audit required under § 27.225(e)) or Security Vulnerability Assessment, a record of the audit, including... retain records of submitted Top-Screens, Security Vulnerability Assessments, Site Security Plans, and all...
Nevada Test Site Environmental Report 2008
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy A. Wills
2009-09-01
The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...
DOT National Transportation Integrated Search
2016-07-01
This document provides guidance material in regards to security for the CV Pilots Deployment Concept Development Phase. An approach for developing the security operational concept is presented based on identifying the impacts of security breaches reg...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... meet the following standards: (1) Address each vulnerability identified in the facility's Security Vulnerability Assessment, and identify and describe the security measures to address each such vulnerability; (2... updates, revises or otherwise alters its Security Vulnerability Assessment pursuant to § 27.215(d), the...
6 CFR 27.235 - Alternative security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The... Security Vulnerability Assessment or using the procedure specified in § 27.245 if the ASP is intended to...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...
The Arab Citizens of Israel: Motivations for Collective Action
2008-03-01
46 Jewish National Fund, “Tree Planting Center,” https://secure2.convio.net/jnf/site/ Ecommerce ?store_id=3181...2008]. ———, “Tree Planting Center,” available at https://secure2.convio.net/jnf/site/ Ecommerce ?store_id=3181&VIEW_HOMEPA GE=true
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR OFFSHORE OIL AND GAS AND SULPHUR OPERATIONS IN THE OUTER CONTINENTAL SHELF Sulphur Operations § 250.1634 Site security. (a) All locations... Regional Supervisor as soon as possible but no later than the next business day after discovery of the...
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
Participatory Design Methods for C2 Systems (Proceedings/Presentation)
2006-01-01
Cognitive Task Analysis (CTA) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES Janet E. Miller...systems to support cognitive work such as is accomplished in a network-centric -environment. Cognitive task analysis (CTA) methods are used to...of cognitive task analysis methodologies exist (Schraagen et al., 2000). However, many of these methods are skeptically viewed by a domain’s
Image Processing and Computer Aided Diagnosis in Computed Tomography of the Breast
2007-03-01
TERMS breast imaging, breast CT, scatter compensation, denoising, CAD , Cone-beam CT 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...clinical projection images. The CAD tool based on signal known exactly (SKE) scenario is under development. Task 6: Test and compare the...performances of the CAD developed in Task 5 applied to processed projection data from Task 1 with the CAD performance on the projection data without Bayesian
Defense Science Board Task Force Report on Cyber Defense Management
2016-09-01
manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am
Trends and Implications of Climate Change for National and International Security
2011-10-01
Timothy Gallaudet Office of the Oceanographer of the Navy Navy’s Climate Change Task Force Dr. Sherri Goodman, Dr. Ralph Espach and Mr. Peter...Duren Jet Propulsion Laboratory Dr. Diane Evans Jet Propulsion Laboratory CAPT Tim Gallaudet US Navy Task Force on Climate Change Mr. David Goldwyn
75 FR 77934 - Small Business Information Security Task Force
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... on them. The Task Force has until the end of 2013 to complete the report but it is hoped that the... computing technology industry itself. Mr. Aaron Berstein then volunteered to contact Microsoft to inquire into the possibility of Microsoft providing an online collaborative space software tool for use...
Broder, Hillary L
2014-11-01
Objective : This paper describes the process and outcomes of the 2013 American Cleft Palate-Craniofacial Association task force on Holistic Outcomes. The goals and membership of the task force are presented. Methods : Using internet communication, the group introduced themselves, shared ideas and information related to holistic assessment and implementation of using a validated holistic measure, the Child Oral Health Impact Profile (COHIP) at participating international sites. Results : Data from the sites were analyzed using descriptive statistics. Administration of the COHIP was successful. It varied from self-completion as well as verbal presentation due to language differences and a function of the short time period to complete collection. Additionally qualitative comments were reported by the task force site directors. Conclusions : Future directions for holistic assessment and communication among task force members and sites were discussed at the Congress and are presented in this report.
Experimental plug and play quantum coin flipping.
Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni
2014-04-24
Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Management
2011-03-01
The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Waste Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2010. This annual summary report presents data and conclusions from the FY 2010 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at themore » Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.« less
Nevada National Security Site Environmental Report 2016, Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Teaching Internet Security, Safety in Our Classrooms
ERIC Educational Resources Information Center
DeFranco, Joanna F.
2011-01-01
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Leveraging the Security -- Development Nexus in East Africa
2012-02-28
THE SECURITY-DEVELOPMENT NEXUS IN EAST AFRICA America is in a state of hypnosis . Many outside the beltway do not know, and/or care, how reckless...invariably, what policy makers are implicitly tasked to do, because America will not come out of its hypnosis at the count of three. Endnotes 1 Susan
The Emotional Climate of the Interpersonal Classroom in a Maximum Security Prison for Males.
ERIC Educational Resources Information Center
Meussling, Vonne
1984-01-01
Examines the nature, the task, and the impact of teaching in a maximum security prison for males. Data are presented concerning the curriculum design used in order to create a nonevaluative atmosphere. Inmates' reactions to self-disclosure and open communication in a prison setting are evaluated. (CT)
Obsessive-Compulsive Disorder as a Disturbance of Security Motivation
ERIC Educational Resources Information Center
Szechtman, Henry; Woody, Erik
2004-01-01
The authors hypothesize that the symptoms of obsessive-compulsive disorder (OCD), despite their apparent nonrationality, have what might be termed an epistemic origin-that is, they stem from an inability to generate the normal "feeling of knowing" that would otherwise signal task completion and terminate the expression of a security motivational…
Baird, Theodore
2017-06-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.
Baird, Theodore
2017-01-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601
Näsholm, Erika; Rohlfing, Sarah; Sauer, James D.
2014-01-01
Closed Circuit Television (CCTV) operators are responsible for maintaining security in various applied settings. However, research has largely ignored human factors that may contribute to CCTV operator error. One important source of error is inattentional blindness – the failure to detect unexpected but clearly visible stimuli when attending to a scene. We compared inattentional blindness rates for experienced (84 infantry personnel) and naïve (87 civilians) operators in a CCTV monitoring task. The task-relevance of the unexpected stimulus and the length of the monitoring period were manipulated between participants. Inattentional blindness rates were measured using typical post-event questionnaires, and participants' real-time descriptions of the monitored event. Based on the post-event measure, 66% of the participants failed to detect salient, ongoing stimuli appearing in the spatial field of their attentional focus. The unexpected task-irrelevant stimulus was significantly more likely to go undetected (79%) than the unexpected task-relevant stimulus (55%). Prior task experience did not inoculate operators against inattentional blindness effects. Participants' real-time descriptions revealed similar patterns, ruling out inattentional amnesia accounts. PMID:24465932
Nevada National Security Site Environmental Report 2011 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed.
2012-09-12
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operationsmore » on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Real-time WAMI streaming target tracking in fog
NASA Astrophysics Data System (ADS)
Chen, Yu; Blasch, Erik; Chen, Ning; Deng, Anna; Ling, Haibin; Chen, Genshe
2016-05-01
Real-time information fusion based on WAMI (Wide-Area Motion Imagery), FMV (Full Motion Video), and Text data is highly desired for many mission critical emergency or security applications. Cloud Computing has been considered promising to achieve big data integration from multi-modal sources. In many mission critical tasks, however, powerful Cloud technology cannot satisfy the tight latency tolerance as the servers are allocated far from the sensing platform, actually there is no guaranteed connection in the emergency situations. Therefore, data processing, information fusion, and decision making are required to be executed on-site (i.e., near the data collection). Fog Computing, a recently proposed extension and complement for Cloud Computing, enables computing on-site without outsourcing jobs to a remote Cloud. In this work, we have investigated the feasibility of processing streaming WAMI in the Fog for real-time, online, uninterrupted target tracking. Using a single target tracking algorithm, we studied the performance of a Fog Computing prototype. The experimental results are very encouraging that validated the effectiveness of our Fog approach to achieve real-time frame rates.
75 FR 1552 - Chemical Facility Anti-Terrorism Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... Protection Agency RMP--Risk Management Program SSP--Site Security Plan STQ--Screening Threshold Quantity SVA... Protection Agency (EPA) under the Clean Air Act's Risk Management Program (RMP) for counting-- or excluding... Safety, Information, Site Security and Fuels Regulatory Relief Act, Public Law 106-40. Cf. 72 FR 65410...
78 FR 29147 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...: Excess Comments: off-site removal only; 9,822 sf.; BDE HQ; repairs needed; asbestos; secured area....; Admin.; repairs needed; asbestos; secured area; contact Army for access/removal requirements Building...: Excess Comments: off-site removal only; 15,484 sf.; Admin.; 4 months vacant; repairs needed; asbestos...
Information Badging Information Foreign National Requirements SLAC Internal Gate Information Site Entry Form this is a SLAC-Internal page for videos on how to use the automated gates. Security Assistance The Main and holidays. See Gate Information this is a SLAC-Internal page for more information about the
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... site security? You must: (1) Protect Federal production against production loss or theft; (2) Post a... Regional Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft...) All valves on lines leaving a royalty or inventory storage tank, including load-out line valves, drain...
Based on the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA), this notice states that while you may share with the public data from OCA sections, it is illegal to disclose/distribute the sections themselves.
Yu, Rui-Feng; Yang, Lin-Dong; Wu, Xin
2017-05-01
This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.
Report of the Task Force on SSC Magnet System Test Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1984-10-01
The Task Force on SSC Magnet Systems test Site was appointed by Maury Tigner, Director of the SSC, Phase 1 in August 1984. In brief, the charge asked the Task Force to make a critical evaluation of potential test sites for a major SSC magnet System Test Facility (STF) with regard to: (1) availability of the needed space, utilities, staff and other requirements on the desired time scale; and (2) the cost of preparing the sites for the tests and for operating the facilities during the test period. The charge further suggests that, by virtue of existing facilities and availabilitymore » of experienced staff, BNL and FNAL are the two best candidate sites and that is therefore appears appropriate to restrict the considerations of the Task Force to these sites. During the subsequent deliberations of the Task Force, no new facts were revealed that altered the assumptions of the charge in this regard. The charge does not ask for a specific site recommendation for the STF. Indeed, an agreement on such a recommendation would be difficult to achieve considering the composition of the Task Force, wherein a large fraction of the membership is drawn from the two contending laboratories. Instead, we have attempted to describe the purpose of the facility, outline a productive test program, list the major facilities required, carefully review the laboratories` responses to the facility requirements, and make objective comparisons of the specific features and capabilities offered.« less
Ecological Monitoring and Compliance Program 2006 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
David C. Anderson; Paul D. Greger; Derek B. Hall
2007-03-01
The Ecological Monitoring and Compliance program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program's activities conducted by National Security Technologies LLC (NSTec) during the Calendar Year 2006. Program activities included: (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h)more » monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC). Sensitive and protected/regulated species of the NTS include 44 plants, 1 mollusk, 2 reptiles, over 250 birds, and 26 mammals protected, managed, or considered sensitive as per state or federal regulations and natural resource agencies and organizations. The threatened desert tortoise (Gopherus agassizii) is the only species on the NTS protected under the Endangered Species Act. Biological surveys for the presence of sensitive and protected/regulated species and important biological resources on which they depend were conducted for 34 projects. A total of 342.1 hectares (ha) (845.37 acres [ac]) was surveyed for these projects. Sensitive and protected/regulated species and important biological resources found included: 2 inactive tortoise burrows, 2 western burrowing owls (Athene cunicularia hypugaea), several horses (Equus caballus), 2 active predator burrows, mature Joshua trees (Yucca brevifolia), yuccas and cacti; and also 1 bird nest (2 eggs), 1 barn owl (Tyto alba) and 2 great-horned owls (Bubo virginianus). NSTec provided a written summary report of all survey findings and mitigation recommendations, where applicable. All flagged burrows were avoided during construction activities. Twenty one of the 34 projects had sites within the distribution range of the threatened desert tortoise. NNSA/NSO must comply with the terms and conditions of a permit (called a Biological Opinion) from the U.S. Fish and Wildlife Service (FWS) when conducting work in tortoise habitat. No tortoises were found in or displaced from project areas. No desert tortoises were accidentally injured or killed, nor were any captured or displaced from project sites. One desert tortoise was accidentally killed along a paved road. One site specific re-vegetation plan was submitted this year as required by the desert tortoise habitat re-vegetation plan approved in 2004. This year a total of 1.89 ha (4.69 ac) of tortoise habitat was disturbed. Re-vegetation of habitat at the Bren Tower burn was completed in the spring of 2006. In the summer of 2006, NSTec scientists prepared a Biological Assessment of the security activities that were being conducted at the Device Assembly Facility (DAF). NNSA requested a Biological Opinion from FWS in late 2006. Ecosystem mapping and data management in 2006 focused primarily on two tasks: (a) converting hardcopies of about 17 reports (EMAC annual reports and selected topical reports from 1996 to 2003) into electronic versions (Portable Document Format [PDF] files) to facilitate electronic document exchange, rapid retrieval, duplication, and printing, and (b) conducting an annual vegetation survey to determine wildland fire hazards on the NTS. Copies of the PDF documents were sent to DOE's Office of Scientific and Technical Information website in Oak Ridge, Tennessee, and the DOE National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Public Reading Facility.« less
Design and implementation of a fault-tolerant and dynamic metadata database for clinical trials
NASA Astrophysics Data System (ADS)
Lee, J.; Zhou, Z.; Talini, E.; Documet, J.; Liu, B.
2007-03-01
In recent imaging-based clinical trials, quantitative image analysis (QIA) and computer-aided diagnosis (CAD) methods are increasing in productivity due to higher resolution imaging capabilities. A radiology core doing clinical trials have been analyzing more treatment methods and there is a growing quantity of metadata that need to be stored and managed. These radiology centers are also collaborating with many off-site imaging field sites and need a way to communicate metadata between one another in a secure infrastructure. Our solution is to implement a data storage grid with a fault-tolerant and dynamic metadata database design to unify metadata from different clinical trial experiments and field sites. Although metadata from images follow the DICOM standard, clinical trials also produce metadata specific to regions-of-interest and quantitative image analysis. We have implemented a data access and integration (DAI) server layer where multiple field sites can access multiple metadata databases in the data grid through a single web-based grid service. The centralization of metadata database management simplifies the task of adding new databases into the grid and also decreases the risk of configuration errors seen in peer-to-peer grids. In this paper, we address the design and implementation of a data grid metadata storage that has fault-tolerance and dynamic integration for imaging-based clinical trials.
Posture and performance: sitting vs. standing for security screening.
Drury, C G; Hsiao, Y L; Joseph, C; Joshi, S; Lapp, J; Pennathur, P R
2008-03-01
A classification of the literature on the effects of workplace posture on performance of different mental tasks showed few consistent patterns. A parallel classification of the complementary effect of performance on postural variables gave similar results. Because of a lack of data for signal detection tasks, an experiment was performed using 12 experienced security operators performing an X-ray baggage-screening task with three different workplace arrangements. The current workplace, sitting on a high chair viewing a screen placed on top of the X-ray machine, was compared to a standing workplace and a conventional desk-sitting workplace. No performance effects of workplace posture were found, although the experiment was able to measure performance effects of learning and body part discomfort effects of workplace posture. There are implications for the classification of posture and performance and for the justification of ergonomics improvements based on performance increases.
Passport Officers’ Errors in Face Matching
White, David; Kemp, Richard I.; Jenkins, Rob; Matheson, Michael; Burton, A. Mike
2014-01-01
Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of ‘fraudulent’ photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately – though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection. PMID:25133682
Passport officers' errors in face matching.
White, David; Kemp, Richard I; Jenkins, Rob; Matheson, Michael; Burton, A Mike
2014-01-01
Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.
Examining the association between adult attachment style and cortisol responses to acute stress
Kidd, Tara; Hamer, Mark; Steptoe, Andrew
2011-01-01
Summary The quality of social relationships may contribute to variations in biological stress responses, thereby affecting health risk. The association between an important indicator of social relationships, adult attachment style, and cortisol has been relatively unexplored. The present study examined adult romantic attachment style and cortisol responses to acute laboratory stress. Salivary cortisol was measured in response to two behavioural tasks, a colour/word interference task and mirror tracing task, in 498 healthy men and women from the Heart Scan study, a subsample of the Whitehall II cohort. Participants were classified as secure, fearful, preoccupied or dismissive on the basis of responses to the Relationship Questionnaire. Cortisol output was lowest in the fearful group, followed by the preoccupied group, with both secure and dismissive groups having higher levels. The results from this study tentatively support the proposition that attachment style is a factor in determining the manifestation of HPA dysregulation. PMID:21106296
Betrayal Trauma in Youth and Negative Communication During a Stressful Task.
Jacoby, Vanessa M; Krackow, Elisa; Scotti, Joseph R
2017-03-01
Attachment-based theories and related research illustrate that emotion regulation develops in the context of a secure relationship between a child and caregiver. When a secure bond is broken, such as in the context of betrayal trauma, children fail to develop necessary emotion regulation skills which can lead to an array of relational problems. The current study examined the relations between betrayal trauma history, type of communication during a stressful interpersonal laboratory task, and emotion regulation difficulties in a sample of trauma-exposed adolescents. Results showed that adolescents with a betrayal trauma history reported more emotion regulation difficulties and exhibited more aggressive and fewer positive communication behaviors when engaged in a stressful interpersonal task with their mothers than did adolescents exposed only to nonbetrayal trauma. Emotion regulation difficulties mediated the relation between betrayal trauma history and negative communication. The clinical and developmental implications from these findings are discussed.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Code of Federal Regulations, 2013 CFR
2013-04-01
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Perceived Security Determinants in E-Commerce among Turkish University Students
ERIC Educational Resources Information Center
Yenisey, M.M.; Ozok, A.A.; Salvendy, G.
2005-01-01
Perceived security is defined as the level of security that users feel while they are shopping on e-commerce sites. The aims of this study were to determine items that positively influence this feeling of security by users during shopping, and to develop guidelines for perceived security in e-commerce. An experiment allowed users with different…
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
10 CFR 1046.14 - Access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorization for the highest level of classified matter to which they potentially have access. Security police... by the site security organization and approved by the Head of the Field Element. Security police officers shall possess a minimum of an “L” or DOE Secret access authorization. Security police officers...
NASA Astrophysics Data System (ADS)
Francisco, Glen; Brown, Todd
2012-06-01
Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.
Wildlife on the Nevada National Security Site
Longshore, Kathleen M.; Wessells, Stephen M.
2017-09-05
Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... Information Collection Activity Under OMB Review: Highway Corporate Security Review AGENCY: Transportation... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... Title: Highway Corporate Security Review. Type of Request: Extension of a currently approved collection...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
Failing to Fulfill Tasks of Social Justice Weakens Country.
ERIC Educational Resources Information Center
USA Today, 1981
1981-01-01
Presents excerpts from an interview with Walter Mondale in which the former vice president expressed fears that the United States will be weakened by current policies of removing government from the tasks of social justice. Topics discussed include social security cuts, reduction of student loans, and elimination of the legal aid program. (DB)
Teaching the Passive through Semantically Enhanced Input
ERIC Educational Resources Information Center
Little, Andrea; Fieldsend, Terry
2018-01-01
This article reports on a small, classroom-based study exploring the use of a task to teach the passive in an English for specific purposes context. The participants were 34 adult Japanese male learners, all security professionals, ranging in proficiency level from elementary to advanced. The task was designed to highlight the form--meaning…
Comparability of Essay Question Variants
ERIC Educational Resources Information Center
Bridgeman, Brent; Trapani, Catherine; Bivens-Tatum, Jennifer
2011-01-01
Writing task variants can increase test security in high-stakes essay assessments by substantially increasing the pool of available writing stimuli and by making the specific writing task less predictable. A given prompt (parent) may be used as the basis for one or more different variants. Six variant types based on argument essay prompts from a…
Preservice Teachers' Motivational Beliefs and Self-Regulation of Learning
ERIC Educational Resources Information Center
Bembenutty, Hefer
2007-01-01
Successful learners are those who engage in self-regulation of learning by using learning strategies to secure task completion. They exercise behavioral control to not only choose or plan valuable academic tasks, but also to maintain motivation and intention in the light of distracting alternatives. It was expected that teachers' self-efficacy…
Development of an Intelligent Monitoring System for Geological Carbon Sequestration (GCS) Systems
NASA Astrophysics Data System (ADS)
Sun, A. Y.; Jeong, H.; Xu, W.; Hovorka, S. D.; Zhu, T.; Templeton, T.; Arctur, D. K.
2016-12-01
To provide stakeholders timely evidence that GCS repositories are operating safely and efficiently requires integrated monitoring to assess the performance of the storage reservoir as the CO2 plume moves within it. As a result, GCS projects can be data intensive, as a result of proliferation of digital instrumentation and smart-sensing technologies. GCS projects are also resource intensive, often requiring multidisciplinary teams performing different monitoring, verification, and accounting (MVA) tasks throughout the lifecycle of a project to ensure secure containment of injected CO2. How to correlate anomaly detected by a certain sensor to events observed by other devices to verify leakage incidents? How to optimally allocate resources for task-oriented monitoring if reservoir integrity is in question? These are issues that warrant further investigation before real integration can take place. In this work, we are building a web-based, data integration, assimilation, and learning framework for geologic carbon sequestration projects (DIAL-GCS). DIAL-GCS will be an intelligent monitoring system (IMS) for automating GCS closed-loop management by leveraging recent developments in high-throughput database, complex event processing, data assimilation, and machine learning technologies. Results will be demonstrated using realistic data and model derived from a GCS site.
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Perception of personal safety in urban recreation sites
Herbert W. Schroeder; L.M. Anderson
1984-01-01
Photograph of 17 urban recreation sites in Chicago and Atlanta were evaluated by college students (n = 68) in Illinois, Georgia, and Michigan, for either perceived security, scenic quality, or both. For most raters, high visibility and developed park features significantly enhanced perceived security. Scenic quality, on the other hand, was enhanced for the majority of...
76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-17
... during site visits with security and operating officials of transit systems. The STSIs capture and... assessments during site visits with security and operating officials of transit agencies. DATES: Send your... distance passenger railroad providers operate in the United States.\\1\\ Mass transit and passenger rail...
Overview of DYMCAS, the Y-12 Material Control And Accountability System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alspaugh, D. H.
2001-07-01
This paper gives an overview of DYMCAS, the material control and accountability information system for the Y-12 National Security Complex. A common misconception, even within the DOE community, understates the nature and complexity of material control and accountability (MC and A) systems, likening them to parcel delivery systems tracking packages at various locations or banking systems that account for money, down to the penny. A major point set forth in this paper is that MC and A systems such as DYMCAS can be and often are very complex. Given accountability reporting requirements and the critical and sensitive nature of themore » task, no MC and A system can be simple. The complexity of site-level accountability systems, however, varies dramatically depending on the amounts, kinds, and forms of nuclear materials and the kinds of processing performed at the site. Some accountability systems are tailored to unique and highly complex site-level materials and material processing and, consequently, are highly complex systems. Sites with less complexity require less complex accountability systems, and where processes and practices are the same or similar, sites on the mid-to-low end of the complexity scale can effectively utilize a standard accountability system. In addition to being complex, a unique feature of DYMCAS is its integration with the site production control and manufacturing system. This paper will review the advantages of such integration, as well as related challenges, and make the point that the effectiveness of complex MC and A systems can be significantly enhanced through appropriate systems integration.« less
Fighting blind: why US Army Divisions Need a Dedicated Reconnaissance and Security Force
2017-05-25
dedicated reconnaissance and security force. By the 2003 invasion of Iraq, 3d Infantry Division employed a division cavalry squadron that integrated...26 1 Introduction 3-7 Cavalry conducted reconnaissance and security tasks ahead of and on the flank of 3d Infantry Division as the...division led Vth Corp’s attack from Kuwait to Baghdad in 2003. 3-7 Cavalry’s movements confused the enemy about 3d Infantry Division’s location and intent
2014-04-01
important data structures of RTEMS are introduced. Section 3.2.2 discusses the problems we found in RTEMS that may cause security vulnerabilities...the important data structures in RTEMS: Object, which is a critical data structure in the SCORE, tasks threads. Approved for Public Release...these important system codes. The example code shows a possibility that a user can delete a system thread. Therefore, in order to protect system
Extending AADL for Security Design Assurance of Cyber Physical Systems
2015-12-16
a detailed system architecture design of a CPS can be analyzed using AADL to prevent such types of CWEs. We divided the work into two tasks as...security modeling to CPSs, and develop a case study to show how formal modeling using AADL could be applied to a CPS to improve the security design of the... CPS . These examples of recent attacks against automobiles have been reported: A wireless device used by Progressive Insurance to gather information
Software For Computer-Security Audits
NASA Technical Reports Server (NTRS)
Arndt, Kate; Lonsford, Emily
1994-01-01
Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.
2012-09-01
and Rescue (US&R) teams be used more effectively and efficiently in the Homeland Security Enterprise ( HSE )? 1. Are there other strategies that would...allow the FEMA US&R resources to be more adaptable in the HSE ? 2. What other disciplines could be integrated with the FEMA US&R task forces to...consideration of the questions: 1. Can the FEMA US&R teams be used more effectively in the Homeland Security Enterprise ( HSE )? 2. Are there other
Believing Your Eyes: Strengthening the Reliability of Tags and Seals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.; Denlinger, Laura S.
2013-07-01
NNSA’s Office of Nonproliferation and International Security (NIS) is working together with scientific experts at the DOE national laboratories to develop the tools needed to safeguard and secure nuclear material from diversion, theft, and sabotage--tasks critical to support future arms control treaties that may involve the new challenge of monitoring nuclear weapons dismantlement. Use of optically stimulated luminescent material is one method to enhance the security and robustness of existing tamper indicating devices such as tags and seals.
Schneider-Hassloff, Henriette; Zwönitzer, Annabel; Künster, Anne K.; Mayer, Carmen; Ziegenhain, Ute; Kiefer, Markus
2016-01-01
Executive functions (EFs) – a set of cognitive control abilities – mediate resilience to stress and are associated with academic achievement and health throughout life. They are crucially linked to prefrontal cortex function as well as to other cortical and subcortical brain functions, which are maturing throughout childhood at different rates. Recent behavioral research suggested that children’s EFs were related to parenting quality and child attachment security, but the neural correlates of these associations are unknown. With this study we tested in 4- to 6-year-old healthy children (N = 27) how emotional availability (EA) of the mother-child-interaction was associated with behavioral and electrophysiological correlates of response inhibition (a core EF) in a Go/Nogo task, using event-related potential recordings (ERPs), and with behavioral performance in a Delay of Gratification (DoG) and a Head-Toes-Knees-Shoulders task (HTKS). Our data showed that the Go/Nogo task modulated children’s ERP components resembling adult electrophysiological indices of response inhibition - the N2 and P3/LPC ERPs-, but the children’s N2 and P3/LPC ERPs showed longer latencies. Higher maternal autonomy-fostering behavior and greater child responsiveness were significantly associated with smaller children’s N2 Go/Nogo effects at fronto-central and parietal sites and with greater Go/Nogo effects in the N2 time window at occipital sites, over and above children’s age and intelligence. Additionally, greater maternal sensitivity and a higher dyadic EA quality of the mother-child-interaction went along with greater occipital Go/Nogo effects in the N2 time window, but this effect clearly diminished when we controlled for children’s age and intelligence. Higher maternal autonomy-support was also positively associated with better HTKS performance, and higher dyadic EA quality went along with higher HTKS and DoG scores. However, no significant associations were found between EA variables and the behavioral response inhibition measures of the Go/Nogo task. Our results suggest that parenting qualities modulate the functionality of neural circuits involved in response inhibition, an important component of EFs. This finding, thus, indicates that parent–child interactions shape the neurocognitive development underlying EFs. PMID:27445744
Schneider-Hassloff, Henriette; Zwönitzer, Annabel; Künster, Anne K; Mayer, Carmen; Ziegenhain, Ute; Kiefer, Markus
2016-01-01
Executive functions (EFs) - a set of cognitive control abilities - mediate resilience to stress and are associated with academic achievement and health throughout life. They are crucially linked to prefrontal cortex function as well as to other cortical and subcortical brain functions, which are maturing throughout childhood at different rates. Recent behavioral research suggested that children's EFs were related to parenting quality and child attachment security, but the neural correlates of these associations are unknown. With this study we tested in 4- to 6-year-old healthy children (N = 27) how emotional availability (EA) of the mother-child-interaction was associated with behavioral and electrophysiological correlates of response inhibition (a core EF) in a Go/Nogo task, using event-related potential recordings (ERPs), and with behavioral performance in a Delay of Gratification (DoG) and a Head-Toes-Knees-Shoulders task (HTKS). Our data showed that the Go/Nogo task modulated children's ERP components resembling adult electrophysiological indices of response inhibition - the N2 and P3/LPC ERPs-, but the children's N2 and P3/LPC ERPs showed longer latencies. Higher maternal autonomy-fostering behavior and greater child responsiveness were significantly associated with smaller children's N2 Go/Nogo effects at fronto-central and parietal sites and with greater Go/Nogo effects in the N2 time window at occipital sites, over and above children's age and intelligence. Additionally, greater maternal sensitivity and a higher dyadic EA quality of the mother-child-interaction went along with greater occipital Go/Nogo effects in the N2 time window, but this effect clearly diminished when we controlled for children's age and intelligence. Higher maternal autonomy-support was also positively associated with better HTKS performance, and higher dyadic EA quality went along with higher HTKS and DoG scores. However, no significant associations were found between EA variables and the behavioral response inhibition measures of the Go/Nogo task. Our results suggest that parenting qualities modulate the functionality of neural circuits involved in response inhibition, an important component of EFs. This finding, thus, indicates that parent-child interactions shape the neurocognitive development underlying EFs.
Discrimination Report: ESTCP UXO Discrimination Study, ESTCPProject #MM-0437
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gasperikova, Erika; Smith, J. Torquil; Morrison, H. Frank
2007-12-21
The FY06 Defense Appropriation contains funding for the 'Development of Advanced, Sophisticated, Discrimination Technologies for UXO Cleanup' in the Environmental Security Technology Certification Program. In 2003, the Defense Science Board observed: 'The problem is that instruments that can detect the buried UXOs also detect numerous scrap metal objects and other artifacts, which leads to an enormous amount of expensive digging. Typically 100 holes may be dug before a real UXO is unearthed! The Task Force assessment is that much of this wasteful digging can be eliminated by the use of more advanced technology instruments that exploit modern digital processing andmore » advanced multi-mode sensors to achieve an improved level of discrimination of scrap from UXOs.' Significant progress has been made in discrimination technology. To date, testing of these approaches has been primarily limited to test sites with only limited application at live sites. Acceptance of discrimination technologies requires demonstration of system capabilities at real UXO sites under real world conditions. Any attempt to declare detected anomalies to be harmless and requiring no further investigation require demonstration to regulators of not only individual technologies, but of an entire decision making process. This discrimination study was be the first phase in what is expected to be a continuing effort that will span several years.« less
ERIC Educational Resources Information Center
Francis, Denille M.; Kaiser, Donna; Deaver, Sarah P.
2003-01-01
Presents results of a study of the graphic indicators in drawings by patients with substance abuse disorders. The Bird's Nest Drawing, an assessment task previously devised to elicit pictorial representations of attachment security, was used to examine attachment patterns of volunteers. Results showed that those with substance abuse diagnoses were…
ERIC Educational Resources Information Center
Koomen, Helma M. Y.; van Leeuwen, Mirella G. P.; van der Leij, Aryan
2004-01-01
In this study, we examined relations between kindergartner's emotional security, task involvement and achievement and teacher's supportive presence in a cognitive training setting, in which the familiarity of the teacher was varied. Participants were 48 kindergarten children (mean age = 51.65 months); 16 children were trained by their regular…
ERIC Educational Resources Information Center
Talynev, V. E.
2007-01-01
The specific character of border troops' performance of their operational and service tasks at border security posts and "hot spots" makes it necessary to analyze in depth and study the problems of how to improve the training of graduates and how to motivate the cadets enrolled in higher educational institutions of Russia's Federal…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2014-05-01
Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate andmore » recommend corrective action alternatives.« less
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.
Code of Federal Regulations, 2013 CFR
2013-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Code of Federal Regulations, 2012 CFR
2012-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Code of Federal Regulations, 2014 CFR
2014-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Ecological Monitoring and Compliance Program 2013 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Anderson, David C.; Greger, Paul D.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2013. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2013, allmore » applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2011 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, D. J.; Anderson, D. C.; Hall, D. B.
The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, monitors the ecosystem of the Nevada National Security Site and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program's activities conducted by National Security Technologies, LLC, during calendar year 2011. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test and Evaluation Complex. Duringmore » 2011, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farnham, Irene
This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impactedmore » groundwater« less
DOE's Computer Incident Advisory Capability (CIAC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schultz, E.
1990-09-01
Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less
The HEPiX Virtualisation Working Group: Towards a Grid of Clouds
NASA Astrophysics Data System (ADS)
Cass, Tony
2012-12-01
The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.
A day in the life of a monitor!
Shah, Kunal
2012-01-01
When at a site, the monitor will meet with the Study Coordinator, review the hospital medical records, use the internet database or paper to 'monitor' their data versus their medical records, issue queries, check master files, count tablets or vials, provide the update to the doctor, and so on. When not traveling, the monitor will work in the office, printing letters, filing documents collected from sites, writing reports and follow-up letters, responding to e-mails, calling sites, to follow-up on the pending action items, in addition to calling sites not visited recently, attending study teleconferences, attending study and company training programs, reading standard operating procedures, completing excel spreadsheets or company specific software systems, and so on. The monitor is loaded with all these different types of work requirements and most importantly each and every task is important and time bound. Different skill sets are required for different tasks and the monitor plays different roles, while doing different tasks. This article enlists the tasks that are required to be done by the monitor, the different roles played by the monitor while doing these tasks, analyze which is the most important day for a monitor, what are the tasks performed during this day, and what knowledge and skills are required for performing these tasks.
Device-independent two-party cryptography secure against sequential attacks
NASA Astrophysics Data System (ADS)
Kaniewski, Jędrzej; Wehner, Stephanie
2016-05-01
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.
Procedural Error and Task Interruption
2016-09-30
red for research on errors and individual differences . Results indicate predictive validity for fluid intelligence and specifi c forms of work...TERMS procedural error, task interruption, individual differences , fluid intelligence, sleep deprivation 16. SECURITY CLASSIFICATION OF: 17...and individual differences . It generates rich data on several kinds of errors, including procedural errors in which steps are skipped or repeated
Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security
2011-01-01
Irving Hill Road, Lawrence, KS 66045-7559 All rights reserved. Project Sponsor: Office of Naval Research Contract: N00014-07-1-1042 The University of... RESEARCH TASKS ........................................................................................................................................... 5...describes the research tasks and Section 4 lists published papers and personnel who worked on the project. There are two appendices. Appendix A describes
Education and Strategic Research Collaborations
Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student
NASA Astrophysics Data System (ADS)
Jakubec, M.; Skala, P.; Sedlacek, M.; Nekola, M.; Strobl, J.; Blazek, M.; Hudec, R.
2012-09-01
Astronomers often need to put several pieces of equipment together and have to deploy them at a particular location. This task could prove to be a really tough challenge, especially for distant observing facilities with intricate operating conditions, poor communication infrastructure and unreliable power source. To have this task even more complicated, they also expect secure and reliable operation in both attended and unattended mode, comfortable software with user-friendly interface and full supervision over the observation site at all times. During reconstruction of the D50 robotic telescope facility, we faced many of the issues mentioned above. To get rid of them, we based our solution on a flexible group of hardware modules controlling the equipment of the observation site, connected together by the Ethernet network and orchestrated by our management software. This approach is both affordable and powerful enough to fulfill all of the observation requirements at the same time. We quickly figured out that the outcome of this project could also be useful for other observation facilities, because they are probably facing the same issues we have solved during our project. In this contribution, we will point out the key features and benefits of the solution for observers. We will demonstrate how the solution works at our observing location. We will also discuss typical management and maintenance scenarios and how we have supported them in our solution. Finally, the overall architecture and technical aspects of the solution will be presented and particular design and technology decisions will be clarified.
2008-06-13
USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...
ERIC Educational Resources Information Center
Liesen, Joseph J.
2017-01-01
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Designing a Secure Exam Management System (SEMS) for M-Learning Environments
ERIC Educational Resources Information Center
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc
2016-01-01
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
A layered trust information security architecture.
de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon
2014-12-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.
Optimal service distribution in WSN service system subject to data security constraints.
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-08-04
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm.
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs
Wang, Lingling; Liu, Guozhu; Sun, Lijun
2017-01-01
Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620
Ergonomic evaluation of a wheelchair transportation securement system.
Ahmed, Madiha; Campbell-Kyureghyan, Naira; Frost, Karen; Bertocci, Gina
2012-01-01
The Americans with Disabilities Act (ADA) specifies guidelines covering the securement system and environment for wheeled mobility device (WhMD) passengers on the public bus system in the United States, referred to as the wheelchair tiedown and occupant restraint system (WTORS). The misuse or disuse of the WTORS system can be a source of injury for WhMD passengers riding the buses. The purpose of this study was to quantify the risks posed to the bus driver while performing the WTORS procedure using traditional ergonomic analysis methods. Four bus drivers completed the WTORS procedure for a representative passenger seated in three different WhMDs: manual wheelchair (MWC), scooter (SCTR), and power wheelchair (PWC). Potential work-related risks were identified using the four most applicable ergonomic assessment tools: PLIBEL, RULA, REBA, and iLMM. Task evaluation results revealed high levels of risk to be present to drivers during the WTORS procedure. The securement station space design and equipment layout were identified as contributing factors forcing drivers to adopt awkward postures while performing the WTORS task. These risk factors are known contributors to injury and the drivers could opt to improperly secure the passengers to avoid that risk.
Optimal Service Distribution in WSN Service System Subject to Data Security Constraints
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-01-01
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.
Wang, Lingling; Liu, Guozhu; Sun, Lijun
2017-03-24
Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.
ERIC Educational Resources Information Center
Zimmerman, Don; Paschal, Dawn Bastian
2009-01-01
In an exploratory study, participants (n = 18) completed 11 usability tasks to assess ease of use of two Web sites, and then a Web site perception questionnaire for each. Participants rated both Web sites positively, but 25% and 36% could not complete all tasks; doing so required more than a minute to complete. (Contains 2 figures and 7 tables.)
NASA Astrophysics Data System (ADS)
Gonzalez, Elias; Kish, Laszlo B.
2016-03-01
As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.
Shomaker, Lauren B.; Furman, Wyndol
2010-01-01
This study examined how current parent-adolescent relationship qualities and adolescents’ representations of relationships with parents were related to friendship interactions in 200 adolescent-close friend dyads. Adolescents and friends were observed discussing problems during a series of structured tasks. Negative interactions with mothers were significantly related to adolescents’ greater conflict with friends, poorer focus on tasks, and poorer communication skills. Security of working models (as assessed by interview) was significantly associated with qualities of friendship interactions, whereas security of attachment styles (as assessed by questionnaire) was not. More dismissing (vs. secure) working models were associated with poorer focus on problem discussions and weaker communication skills with friends, even after accounting for gender differences and current parent-adolescent relationship qualities. We discuss possible mechanisms for the observed links between dimensions of parent-adolescent relationships and friendships. We also consider methodological and conceptual differences between working model and style measures of attachment representations. PMID:20174459
Security Event Recognition for Visual Surveillance
NASA Astrophysics Data System (ADS)
Liao, W.; Yang, C.; Yang, M. Ying; Rosenhahn, B.
2017-05-01
With rapidly increasing deployment of surveillance cameras, the reliable methods for automatically analyzing the surveillance video and recognizing special events are demanded by different practical applications. This paper proposes a novel effective framework for security event analysis in surveillance videos. First, convolutional neural network (CNN) framework is used to detect objects of interest in the given videos. Second, the owners of the objects are recognized and monitored in real-time as well. If anyone moves any object, this person will be verified whether he/she is its owner. If not, this event will be further analyzed and distinguished between two different scenes: moving the object away or stealing it. To validate the proposed approach, a new video dataset consisting of various scenarios is constructed for more complex tasks. For comparison purpose, the experiments are also carried out on the benchmark databases related to the task on abandoned luggage detection. The experimental results show that the proposed approach outperforms the state-of-the-art methods and effective in recognizing complex security events.
Secure voice for mobile satellite applications
NASA Technical Reports Server (NTRS)
Vaisnys, Arvydas; Berner, Jeff
1990-01-01
The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.
Safety and Environment- Masterplan 2020 of DLR's Rocket Test Center Lampoldhausen
NASA Astrophysics Data System (ADS)
Haberzettl, Andreas; Dommers, Michael
2013-09-01
The German Aerospace Center DLR is the German research institute with approximately 7000 employees in 16 domestic locations. Among the research priorities of the German Aerospace Center DLR includes aerospace, energy and transport. DLR is institutionally supported by federal and state governments.Next funding sources arise in the context of third-party funds business (contract research and public contracts and subsidiaries). Main activities of the test center Lampoldshausen are testing of ARIANE's main and upper stage engines in the frame of ESA contracts.In the last years the test center of the DLR in Lampoldshausen has grown strongly, so that the number of employees is actually of about 230. The testing department is mainly responsible for rocket combustion testing according to customer requirements.Two kinds of test facilities are operated, sea level test benches and the altitude simulation test facilities.In addition to the DLR's growth also the activities of the industrial partner ASTRIUM has been elevated so that actually nearly 600 employees are present on site Lampoldshausen.The management of the site in relation to safety and security requires special measures with special respect to the presence of more people inside the testing area in order to guarantee trouble-free and safe experimental operation onsite the DLR's test plants. In order to meet with the future needs of continuing growth, the security and safety requirements have to be adopted.This report gives comprehensive outlook information about future possible scenarios of our coming tasks.Main driving force for future requests is the evolution of the rocket ARIANE. The testing of the new upper stage test facility for ARIANE 5 midlife evolution has been started. A new test position P5.2 is foreseen to perform the qualification of the new upper stage with the VINCI engine. This project will be very complex, in parallel running operation processes will require special procedures related to the overall safety of the test center.The site of Lampoldshausen with its test and supply facilities is subject to the restrictions of the German law BundesImissionsSchutzGesetz (derived from the European SEVESO-II directive) and its relevant ordinances, especially the Hazardous Incident Ordinance. Because of the complex framework effort which guarantees safety and security, Lampoldshausen has invested in people and processes in order to respect the restrictions of all relevant laws and ordinances as well as to guarantee the protection of people and the environment.Therefor a very special Master plan has been developed, with the goal to rearrange the complete testing area in order to be able to divide the area in certain sectors (testing range, technology and bureau) so that future testing enterprises will not affect almost free testing activities inside the site as it is in the present status.The paper provides comprehensive information related to the planned innovations including detailed background facts related to the foreseen safety and security standard applications.
Do medical residents perform patient-centered medical home tasks? A mixed-methods study
Block, Lauren; LaVine, Nancy; Verbsky, Jennifer; Sagar, Ankita; Smith, Miriam A.; Lane, Susan; Conigliaro, Joseph; Chaudhry, Saima A.
2017-01-01
ABSTRACT Background: Increasingly, residents are being trained in Patient-centered Medical Home (PCMH) settings. A set of PCMH entrustable professional activities (EPAs) for residents has been defined but not evaluated in practice. Objective: To understand whether residents trained at PCMH sites reported higher likelihood of engaging in PCMH tasks than those training in non-PCMH sites. Design: Survey and nominal group data from post-graduate trainees at three residency programs. Results: A total of 179 residents responded (80% response). Over half (52%) cared for patients at PCMH sites. Residents at PCMH sites were more likely to report engaging in tasks in the NCQA domains of enhancing access and continuity (p < 0.01 for 4/11 tasks), planning and managing care (p < 0.01 for 3/4 tasks), providing self-care and community support (p < 0.01 for 3/5 tasks), and identifying and managing patient populations (p < 0.01 for 1/6 tasks), but were not more likely to report tracking and coordinating care or measuring and improving performance. Residents at PCMH sites were more likely to report working with medical assistants (p < 0.01), but not other healthcare professionals. Qualitative data showed staff teamwork and continuity of care as facilitators of patient-centered care, and technological problems and office inefficiencies as barriers to care. Conclusions: Residents trained at PCMH sites were more likely to engage in tasks in several NCQA domains, but not care coordination and quality assessment. Similar facilitators and barriers to trainee provision of patient-centered care were cited regardless of PCMH status. Curricula on PCMH principles and workflows that foster continuity and communication may help to inform residents on PCMH tenets and incorporate residents into team-based care. Abbreviations: EPA: Entrustable professional activity; GIM: General Internal Medicine; NCQA: National Center for Quality Assurance; PCMH: Patient-centered medical home PMID:28758564
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
2011-10-01
Propulsion Laboratory Dr. Diane Evans Jet Propulsion Laboratory CAPT Tim Gallaudet US Navy Task Force on Climate Change Mr. David Goldwyn State...Ashley Moran Strauss Center, University of Texas, Austin DOD’s (Minerva) Climate Change and African Political Stability Project CAPT Timothy ... Gallaudet Office of the Oceanographer of the Navy Navy’s Climate Change Task Force Dr. Sherri Goodman, Dr. Ralph Espach and Mr. Peter MacKenzie CNA
2013-11-01
different types of tasks, the associated costs of task switching also increase (Squire et al., 2006). Task switching costs may be increased with higher...switching costs as well, particularly when managing robot teams of increasing size (Squire et al., 2006). 1.3 Individual Differences The effects of...Research: Ready to Deliver the Promises. Mind 2003, 2 (3), 4. Jian, J.; Bisantz, A. M.; Drury , C. G. Foundations for an Empirically Determined Scale
Geyer, John; Myers, Kathleen; Vander Stoep, Ann; McCarty, Carolyn; Palmer, Nancy; DeSalvo, Amy
2011-10-01
Clinical trials with multiple intervention locations and a single research coordinating center can be logistically difficult to implement. Increasingly, web-based systems are used to provide clinical trial support with many commercial, open source, and proprietary systems in use. New web-based tools are available which can be customized without programming expertise to deliver web-based clinical trial management and data collection functions. To demonstrate the feasibility of utilizing low-cost configurable applications to create a customized web-based data collection and study management system for a five intervention site randomized clinical trial establishing the efficacy of providing evidence-based treatment via teleconferencing to children with attention-deficit hyperactivity disorder. The sites are small communities that would not usually be included in traditional randomized trials. A major goal was to develop database that participants could access from computers in their home communities for direct data entry. Discussed is the selection process leading to the identification and utilization of a cost-effective and user-friendly set of tools capable of customization for data collection and study management tasks. An online assessment collection application, template-based web portal creation application, and web-accessible Access 2007 database were selected and customized to provide the following features: schedule appointments, administer and monitor online secure assessments, issue subject incentives, and securely transmit electronic documents between sites. Each tool was configured by users with limited programming expertise. As of June 2011, the system has successfully been used with 125 participants in 5 communities, who have completed 536 sets of assessment questionnaires, 8 community therapists, and 11 research staff at the research coordinating center. Total automation of processes is not possible with the current set of tools as each is loosely affiliated, creating some inefficiency. This system is best suited to investigations with a single data source e.g., psychosocial questionnaires. New web-based applications can be used by investigators with limited programming experience to implement user-friendly, efficient, and cost-effective tools for multi-site clinical trials with small distant communities. Such systems allow the inclusion in research of populations that are not usually involved in clinical trials.
Nevada National Security Site-Directed Research and Development FY 2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Howard Bender, comp.
2012-04-25
This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less
Hopkins, Joyce; Gouze, Karen R; Lavigne, John V
2013-01-01
The aim of this study was to develop a multiple-level-of-analysis model of preschool attachment security and to determine the processes (direct and indirect) whereby factors from different domains (e.g., stress and parenting) are related to attachment during this period. This study examined the direct and indirect effects of stress, family conflict, caregiver depression symptoms, and parenting on attachment security in a large (N = 796) and diverse sample of 4-year-olds. This study used the 3-Boxes Task to assess aspects of parenting critical to sensitivity in the preschool period, labeling this construct sensitivity/scaffolding. Parent-report questionnaires were used to assess stress, conflict, caregiver depressive symptoms, parent support/engagement, and parent hostility/coercion. Direct observation (3-Boxes Task) was used to assess sensitivity/scaffolding and attachment (Attachment Q-Sort) based on a 2½-3 hour home visit. Results of structural equation modeling indicated a good overall fit for the model. Among the parenting variables, sensitivity/scaffolding had the strongest effect on attachment. Depressive symptoms had both direct and indirect effects (mediated by parenting). The effects of stress and family conflict were mediated by caregiver depression symptoms and parenting. These data show that a developmentally appropriate measure of sensitivity plays a significant role in attachment security in preschoolers. Thus, strategies designed to enhance sensitivity/scaffolding may increase child resilience by enhancing attachment security.
Counterfactual quantum certificate authorization
NASA Astrophysics Data System (ADS)
Shenoy H., Akshata; Srikanth, R.; Srinivas, T.
2014-05-01
We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.
Automating security monitoring and analysis for Space Station Freedom's electric power system
NASA Technical Reports Server (NTRS)
Dolce, James L.; Sobajic, Dejan J.; Pao, Yoh-Han
1990-01-01
Operating a large, space power system requires classifying the system's status and analyzing its security. Conventional algorithms are used by terrestrial electric utilities to provide such information to their dispatchers, but their application aboard Space Station Freedom will consume too much processing time. A new approach for monitoring and analysis using adaptive pattern techniques is presented. This approach yields an on-line security monitoring and analysis algorithm that is accurate and fast; and thus, it can free the Space Station Freedom's power control computers for other tasks.
Automating security monitoring and analysis for Space Station Freedom's electric power system
NASA Technical Reports Server (NTRS)
Dolce, James L.; Sobajic, Dejan J.; Pao, Yoh-Han
1990-01-01
Operating a large, space power system requires classifying the system's status and analyzing its security. Conventional algorithms are used by terrestrial electric utilities to provide such information to their dispatchers, but their application aboard Space Station Freedom will consume too much processing time. A novel approach for monitoring and analysis using adaptive pattern techniques is presented. This approach yields an on-line security monitoring and analysis algorithm that is accurate and fast; and thus, it can free the Space Station Freedom's power control computers for other tasks.
Aviation Security: Slow Progress in Addressing Long-Standing Screener Performance Problems
2000-03-16
aviation security , in particular airport screeners. Securing an air transportation system the size of this nation’s-with hundreds of airports, thousands of aircraft, and tens of thousands of flights daily carrying millions of passengers and pieces of baggage-is a difficult task. Events over the past decade have shown that the threat of terrorism against the United States is an ever-present danger. Aviation is an attractive target for terrorists, and because the air transportation system is critical to the nation’s well-being, protecting it is an important
Security Verification Techniques Applied to PatchLink COTS Software
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Powell, John D.; Bishop, Matt; Andrew, Chris; Jog, Sameer
2006-01-01
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification instruments were developed and then piloted on PatchLink's UNIX Agent, a Commercial-Off-The-Shelf (COTS) software product, to assess the value of the instruments and the approach. The two instruments are the Flexible Modeling Framework (FMF) -- a model-based verification instrument (JPL), and a Property-Based Tester (UC Davis). Security properties were formally specified for the COTS artifact and then verified using these instruments. The results were then reviewed to determine the effectiveness of the approach and the security of the COTS product.
42 CFR 73.14 - Incident response.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., security breaches (including information systems), severe weather and other natural disasters, workplace... locations, (10) Site security and control, (11) Procedures for emergency evacuation, including type of...
Chen, Cory K; Waters, Harriet Salatas; Hartman, Marilyn; Zimmerman, Sheryl; Miklowitz, David J; Waters, Everett
2013-01-01
This study explores links between adults' attachment representations and the task of caring for elderly parents with dementia. Participants were 87 adults serving as primary caregivers of a parent or parent-in-law with dementia. Waters and Waters' ( 2006 ) Attachment Script Assessment was adapted to assess script-like attachment representation in the context of caring for their elderly parent. The quality of adult-elderly parent interactions was assessed using the Level of Expressed Emotions Scale (Cole & Kazarian, 1988 ) and self-report measures of caregivers' perception of caregiving as difficult. Caregivers' secure base script knowledge predicted lower levels of negative expressed emotion. This effect was moderated by the extent to which participants experienced caring for elderly parents as difficult. Attachment representations played a greater role in caregiving when caregiving tasks were perceived as more difficult. These results support the hypothesis that attachment representations influence the quality of care that adults provide their elderly parents. Clinical implications are discussed.
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Identify and describe how security measures selected by the facility will address the applicable risk-based... explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes identified by the Department; (3) Identify and describe how security measures selected and utilized by the...
Information Security and the Internet.
ERIC Educational Resources Information Center
Doddrell, Gregory R.
1996-01-01
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
Ecological Monitoring and Compliance Program 2010 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, D.J.; Anderson, D.C.; Hall, D.B.
The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2010. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test andmore » Evaluation Complex (NPTEC). During 2010, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2012 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Anderson, David C.; Greger, Paul D.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2012. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring ofmore » the Nonproliferation Test and Evaluation Complex (NPTEC). During 2012, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Patel, Mitesh S; Patel, Neha; Small, Dylan S; Rosin, Roy; Rohrbach, Jeffrey I; Stromberg, Nathaniel; Hanson, C William; Asch, David A
2016-08-01
Changes in the medium of communication from paging to mobile secure text messaging may change clinical care, but the effects of these changes on patient outcomes have not been well examined. To evaluate the association between inpatient medicine service adoption of mobile secure text messaging and patient length of stay and readmissions. Observational study. Patients admitted to medicine services at the Hospital of the University of Pennsylvania (intervention site; n = 8995 admissions of 6484 patients) and Penn Presbyterian Medical Center (control site; n = 6799 admissions of 4977 patients) between May 1, 2012, and April 30, 2014. Mobile secure text messaging. Change in length of stay and 30-day readmissions, comparing patients at the intervention site to the control site before (May 1, 2012 to April 30, 2013) and after (May 1, 2013 to April 30, 2014) the intervention, adjusting for time trends and patient demographics, comorbidities, insurance, and disposition. During the pre-intervention period, the mean length of stay ranged from 4.0 to 5.0 days at the control site and from 5.2 to 6.7 days at the intervention site, but trends were similar. In the first month after the intervention, the mean length of stay was unchanged at the control site (4.7 to 4.7 days) but declined at the intervention site (6.0 to 5.4 days). Trends were mostly similar during the rest of the post-intervention period, ranging from 4.4 to 5.6 days at the control site and from 5.4 to 6.5 days at the intervention site. Readmission rates varied significantly within sites before and after the intervention, but overall trends were similar. In adjusted analyses, there was a significant decrease in length of stay for the intervention site relative to the control site during the post-intervention period compared to the pre-intervention period (-0.77 days ; 95 % CI, -1.14, -0.40; P < 0.001). There was no significant difference in the odds of readmission (OR, 0.97; 95 % CI: 0.81, 1.17; P = 0.77). These findings were supported by multiple sensitivity analyses. Compared to a control group over time, hospitalized medical patients on inpatient services whose care providers and staff were offered mobile secure text messaging showed a relative decrease in length of stay and no change in readmissions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brasser, Thomas; Hertes, Uwe; Meyer, Thorsten
2013-07-01
Within the scope of 'Nuclear Security of Radioactive Sources', the German government implemented the modernization of Ukrainian State Production Company's transport and storage facility for radioactive sources (TSF) in Kiev. The overall management of optimizing the physical protection of the storage facility (including the construction of a hot cell for handling the radioactive sources) is currently carried out by the German Federal Foreign Office (AA). AA jointly have assigned Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, Germany's leading expert institution in the area of nuclear safety and waste management, to implement the project and to ensure transparency by financial andmore » technical monitoring. Sealed radioactive sources are widely used in industry, medicine and research. Their life cycle starts with the production and finally ends with the interim/long-term storage of the disused sources. In Ukraine, IZOTOP is responsible for all radioactive sources throughout their life cycle. IZOTOP's transport and storage facility (TSF) is the only Ukrainian storage facility for factory-fresh radioactive sources up to an activity of about 1 million Ci (3.7 1016 Bq). The TSF is specially designed for the storage and handling of radioactive sources. Storage began in 1968, and is licensed by the Ukrainian state authorities. Beside the outdated state of TSF's physical protection and the vulnerability of the facility linked with it, the lack of a hot cell for handling and repacking radioactive sources on the site itself represents an additional potential hazard. The project, financed by the German Federal Foreign Office, aims to significantly improve the security of radioactive sources during their storage and handling at the TSF site. Main tasks of the project are a) the modernization of the physical protection of the TSF itself in order to prevent any unauthorized access to radioactive sources as well as b) the construction of a hot cell to reduce the number of transports of radioactive sources within the city of Kiev. In future, the new established hot cell at IZOTOP's transport and storage facility will be useful for identification and characterization of orphan/disused radioactive sources. The projects implemented are performed in accordance with international recommendations (e. g. IAEA) and national normative documents and will make a crucial contribution towards an improved safety and security management of radioactive sources in Ukraine. (authors)« less
ERIC Educational Resources Information Center
Hamilton, Vance E., Comp.
A State Task Force on Rural Health was formed (January 1973) by the State Rural Development Committee to identify and analyze major rural health problems in North Carolina and to recommend alleviation strategies. The Task Force submitted open-ended questionnaires to members of the County Rural Development Panels to secure their perceptions of…
2008-12-01
time- on-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a...Modernizing The Marine Corps’ CH- 53 Super Stallion Helicopter,” Thesis, NPS (December 2001). HIGH LEVEL OF IMPORTANCE LOW 62 TASKS
NASA Astrophysics Data System (ADS)
Everett, M. E.; Udphuay, S.; Warden, R.
2007-05-01
The 1944 D-Day invasion site at Pointe du Hoc, Normandy, France is an important WWII battlefield and cultural resource but is at risk from chalk cliff collapse. The American Battle Monuments Commission tasked us to evaluate the geohazard to the observation post and other cliff-side buildings of historical significance. Geophysical multi-electrode resistivity profiling is used to study cliff stability and the condition of the observation- post foundations. Preliminary 2-D geological interpretations are provided of individual profiles. The copious steel, concrete and void spaces at the site renders hydrogeological interpretation challenging but tractable. The cliff face appears to be relatively intact and well-drained. Several routes taken by groundwater into fractures within the chalk were identified mainly on the western side of the site. The eastern side is drier and somewhat sheltered from the Atlantic storms but may contain large void spaces that could efficiently transmit groundwater flow during heavy precipitation events, thereby imperiling the major antiaircraft gun emplacement occupied by Col. Rudder in the early days of the Allied invasion. The forward German observation post perched close to the sea stack, which now hosts the U.S. Ranger memorial, may be moving with the soil and not securely anchored to bedrock. A complex failure mechanism is identified as a combination of groundwater dissolution of the fractured chalk and sea wave attack at the cliff base.
Discrimination Report ESTCP Project #MM-0437
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gasperikova, Erika
2008-10-01
The FY06 Defense Appropriation contains funding for the 'Development of Advanced, Sophisticated, and Discrimination Technologies for UXO Cleanup' in the Environmental Security Technology Certification Program. In 2003, the Defense Science Board observed: 'The...problem is that instruments that can detect the buried UXOs also detect numerous scrap metal objects and other artifacts, which leads to an enormous amount of expensive digging. Typically 100 holes may be dug before a real UXO is unearthed. The Task Force assessment is that much of this wasteful digging can be eliminated by the use of more advanced technology instruments that exploit modern digital processing andmore » advanced multi-mode sensors to achieve an improved level of discrimination of scrap from UXOs'. Significant progress has been made in discrimination technology. To date, testing of these approaches has been primarily limited to test sites with only limited application at live sites. Acceptance of discrimination technologies requires demonstration of system capabilities at UXO sites under real world conditions. FE Warren Air Force Base (AFB) in Cheyenne, WY is one such site. The demonstration objective was to determine the discrimination capabilities, cost and reliability of the Berkeley UXO Discriminator (BUD) in discrimination of UXO from scrap metal in real life conditions. Lawrence Berkeley National Laboratory performed a detection and discrimination survey of the Priority 1 area ({approx}5 acres) of the FE Warren AFB. The data included a system characterization with the emplaced calibration items and targets in the Geophysical Prove Out (GPO) area.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
..., Security Vulnerability Assessment, and Site Security Plan, through which the Department will collect and analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean...
The MANPAD Threat to Civilian Airliners
2006-03-03
PAGES: 19 KEY TERMS: Homeland Security; Non-Proliferation; Airport Security CLASSIFICATION: Unclassified This paper investigates strategic approaches...technological solutions and law enforcement operations to provide a competent airport security perimeter.”18 To combat this ominous threat of MANPADS...sites for phone and computer tips should be established with access for airport security , local and federal law enforcement, as well as intelligence
Defense.gov - Special Report - Travels With Gates
/Photos Leaders DoD Web Sites Contact Us Shangri-La Dialogue: Asia Security Summit Alaska Visit  June Shangri-La Dialogue on Asia Security Summit, Singapore, May 30, 2009. DoD photo by U.S. Air Force Master Robert M. Gates opened the ÂShangri-La Dialogue Asia security summit outlining broad security issues
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
Globalized Security Reshaping America’s Defense Trade Policy
2001-04-01
AU/SCHOOL/NNN/2001-04 THE ATLANTIC COUNCIL OF THE UNITED STATES AIR UNIVERSITY NATIONAL DEFENSE FELLOWSHIP PROGRAM GLOBALIZED SECURITY RESHAPING...Author(s) Sullivan, Shannon M. Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) Air University Maxwell...Makins, President of the Atlantic Council of the United States, did appreciate these factors , and he steered me into what became a fascinating
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2014-12-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada. The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 567 based on the implementation of the corrective actions. The corrective actions implemented at CAU 567 were developed based on an evaluation of analytical data from the CAI, the assumed presence of COCs at specific locations, and the detailed and comparative analysis of the CAAs. The CAAs weremore » selected on technical merit focusing on performance, reliability, feasibility, safety, and cost. The implemented corrective actions meet all requirements for the technical components evaluated. The CAAs meet all applicable federal and state regulations for closure of the site. Based on the implementation of these corrective actions, the DOE, National Nuclear Security Administration Nevada Field Office provides the following recommendations: • No further corrective actions are necessary for CAU 567. • The Nevada Division of Environmental Protection issue a Notice of Completion to the DOE, National Nuclear Security Administration Nevada Field Office for closure of CAU 567. • CAU 567 be moved from Appendix III to Appendix IV of the FFACO.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2013-11-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.
Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A
2017-03-01
The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC sites. Results suggest the WIC SEBTC model deserves strong consideration. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-09-28
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-01-01
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042
Task delegation to physician extenders--some comparisons.
Glenn, J K; Goldman, J
1976-01-01
This study uses a task delegation questionnaire to compare 1973 physician extender practices in seven primary care-oriented sites with a physician attitude survey made in 1969. One additional site using no physician extenders was included as a control. The study involves both major types of physician extenders (physician assistants and nurse practitioners) in ambulatory practices with at least one year of experience in using such personnel. With minor exceptions, actual task delegation patterns conform with the 1969 attitudes of physicians as to which tasks "could and should" be delegated to physician extenders. PMID:2022
Hollingworth, William; Devine, Emily Beth; Hansen, Ryan N; Lawless, Nathan M; Comstock, Bryan A; Wilson-Norton, Jennifer L; Tharp, Kathleen L; Sullivan, Sean D
2007-01-01
Electronic prescribing has improved the quality and safety of care. One barrier preventing widespread adoption is the potential detrimental impact on workflow. We used time-motion techniques to compare prescribing times at three ambulatory care sites that used paper-based prescribing, desktop, or laptop e-prescribing. An observer timed all prescriber (n = 27) and staff (n = 42) tasks performed during a 4-hour period. At the sites with optional e-prescribing >75% of prescription-related events were performed electronically. Prescribers at e-prescribing sites spent less time writing, but time-savings were offset by increased computer tasks. After adjusting for site, prescriber and prescription type, e-prescribing tasks took marginally longer than hand written prescriptions (12.0 seconds; -1.6, 25.6 CI). Nursing staff at the e-prescribing sites spent longer on computer tasks (5.4 minutes/hour; 0.0, 10.7 CI). E-prescribing was not associated with an increase in combined computer and writing time for prescribers. If carefully implemented, e-prescribing will not greatly disrupt workflow.
NASA Astrophysics Data System (ADS)
Chowdhury, Md Mukul
With the increased practice of modularization and prefabrication, the construction industry gained the benefits of quality management, improved completion time, reduced site disruption and vehicular traffic, and improved overall safety and security. Whereas industrialized construction methods, such as modular and manufactured buildings, have evolved over decades, core techniques used in prefabrication plants vary only slightly from those employed in traditional site-built construction. With a focus on energy and cost efficient modular construction, this research presents the development of a simulation, measurement and optimization system for energy consumption in the manufacturing process of modular construction. The system is based on Lean Six Sigma principles and loosely coupled system operation to identify the non-value adding tasks and possible causes of low energy efficiency. The proposed system will also include visualization functions for demonstration of energy consumption in modular construction. The benefits of implementing this system include a reduction in the energy consumption in production cost, decrease of energy cost in the production of lean-modular construction, and increase profit. In addition, the visualization functions will provide detailed information about energy efficiency and operation flexibility in modular construction. A case study is presented to validate the reliability of the system.
77 FR 19408 - Reinstate Index to Chapter III in 20 CFR
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0018] Reinstate Index to Chapter III in 20 CFR AGENCY: Social Security Administration. ACTION: Notice; correction. SUMMARY: The Social Security... Chapter III in Title 20 of the Code of Federal Regulations. The document contains a misprinted Web site...
78 FR 13897 - Final Revision and Publication of the 2012 Form M-1, Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-01
... DEPARTMENT OF LABOR Employee Benefits Security Administration RIN 1210-AB51 Final Revision and Publication of the 2012 Form M-1, Notice AGENCY: Employee Benefits Security Administration, Department of... Security Administration's (EBSA) Web site at www.dol.gov/ebsa . The revised form is substantively different...
75 FR 68395 - Agency Self-Evaluation Under Section 504 of the Rehabilitation Act of 1973
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
...-800-325- 0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0069] Agency Self-Evaluation Under Section 504 of the Rehabilitation Act of 1973 AGENCY: Social Security Administration. ACTION: Notice and request...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0029] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0030] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... Secure Solutions USA, SBM Management Services, LP, ALSCO Portland Industrial, VWR International, Inc... G4S Secure Solutions USA, SBM Management Services, LP, Alsco Portland Industrial, VWR International... workers from Express Temporaries, Aerotek Commercial Staffing, G4S Secure Solutions USA, SBM Management...
ERIC Educational Resources Information Center
National Bureau of Standards (DOC), Washington, DC.
These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…
76 FR 16531 - Technical Correction for Neurological Listing Cross-Reference
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-24
... 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2011-0019] RIN 0960-AH33 Technical Correction for Neurological Listing Cross-Reference AGENCY: Social Security Administration. ACTION: Final...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2012 CFR
2012-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2014 CFR
2014-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE U.S. TREASURY SECURITIES...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2013 CFR
2013-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
75 FR 10328 - Wolf Creek Nuclear Operating Corporation, Wolf Creek Generating Station; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... Plan, Safeguards Contingency Plan, and Cyber Security Plan referred to collectively hereafter as... its security plans. Pursuant to 10 CFR 51.32, ``Finding of no significant impact,'' the Commission has... by designing and implementing comprehensive site security programs. The amendments to 10 CFR 73.55...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Billings, Jay J.; Bonior, Jason D.; Evans, Philip G.
Securely transferring timing information in the electrical grid is a critical component of securing the nation's infrastructure from cyber attacks. One solution to this problem is to use quantum information to securely transfer the timing information across sites. This software provides such an infrastructure using a standard Java webserver that pulls the quantum information from associated hardware.
Convolutional neural networks and face recognition task
NASA Astrophysics Data System (ADS)
Sochenkova, A.; Sochenkov, I.; Makovetskii, A.; Vokhmintsev, A.; Melnikov, A.
2017-09-01
Computer vision tasks are remaining very important for the last couple of years. One of the most complicated problems in computer vision is face recognition that could be used in security systems to provide safety and to identify person among the others. There is a variety of different approaches to solve this task, but there is still no universal solution that would give adequate results in some cases. Current paper presents following approach. Firstly, we extract an area containing face, then we use Canny edge detector. On the next stage we use convolutional neural networks (CNN) to finally solve face recognition and person identification task.
Wireless physical layer security
NASA Astrophysics Data System (ADS)
Poor, H. Vincent; Schaefer, Rafael F.
2017-01-01
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
Wireless physical layer security.
Poor, H Vincent; Schaefer, Rafael F
2017-01-03
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
Wireless physical layer security
Schaefer, Rafael F.
2017-01-01
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211
Proposal for founding mistrustful quantum cryptography on coin tossing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian; Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol BS34 8QZ,
2003-07-01
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process, or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multiparty computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signaling constraints into account. The best that can be hoped for, in general, aremore » quantum protocols which are computationally secure against quantum attack. Here a method is described for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin-tossing protocol. No security proof is attempted, but reasons are sketched why these protocols might resist quantum computational attack.« less
D'Souza, Clive; Paquet, Victor L; Lenker, James A; Steinfeld, Edward
2017-11-13
Low ridership of public transit buses among wheeled mobility device users suggests the need to identify vehicle design conditions that are either particularly accommodating or challenging. The objective of this study was to determine the effects of low-floor bus interior seating configuration and passenger load on wheeled mobility device user-reported difficulty, overall acceptability and design preference. Forty-eight wheeled mobility users evaluated three interior design layouts at two levels of passenger load (high vs. low) after simulating boarding and disembarking tasks on a static full-scale low-floor bus mockup. User self-reports of task difficulty, acceptability and design preference were analyzed across the different test conditions. Ramp ascent was the most difficult task for manual wheelchair users relative to other tasks. The most difficult tasks for users of power wheelchairs and scooters were related to interior circulation, including moving to the securement area, entry and positioning in the securement area and exiting the securement area. Boarding and disembarking at the rear doorway was significantly more acceptable and preferred compared to the layouts with front doorways. Understanding transit usability barriers, perceptions and preferences among wheeled mobility users is an important consideration for clinicians who recommend mobility-related device interventions to those who use public transportation. Implications for Rehabilitation In order to maximize community participation opportunities for wheeled mobility users, clinicians should consider potential public transit barriers during the processes of wheelchair device selection and skills training. Usability barriers experienced by wheeled mobility device users on transit vehicles differ by mobility device type and vehicle configurations. Full-scale environment simulations are an effective means of identifying usability barriers and design needs in people with mobility impairments and may provide an alternative model for determining readiness for using fixed route buses or eligibility for paratransit.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
...The Department of Energy (DOE or Department) proposes to revise the regulation governing the standards for medical, physical performance, training, and access authorizations for protective force (PF) personnel employed by contractors providing security services to the Department. The existing version of this regulation was promulgated in 1993 and substantial portions of the regulation date to the mid- 1980s. Since 1993 DOE policy has placed greater reliance upon technology, vehicular response, and increased firepower and, correspondingly, has reduced its reliance upon the ability of PF personnel to perform the running tasks required in the current regulation. Furthermore, this shift in emphasis has placed a greater premium upon the retention of mature, tactically experienced, and technically sophisticated personnel, particularly since these personnel represent a considerable investment by DOE in security background investigations and training. The proposed revisions bring DOE PF medical and physical readiness requirements in line with these tactical and organizational priorities. The proposed revisions reduce the exposure of the PF population to injuries related to physical readiness testing. They would create a PF readiness classification designed specifically to encourage the retention of experienced personnel. The revisions would further ensure that PF personnel would be evaluated on a case-by-case basis on their ability to perform the essential functions of their positions without posing a direct threat to themselves or site personnel, the facility, or the general public. The proposed revisions would further ensure that reasonable accommodations would be considered before a determination is made that an individual cannot perform the essential functions of a particular position. The proposed rule also would provide for new medical review processes for PF personnel disqualified from medical certification. The proposed rule would ensure that DOE PF medical and physical readiness requirements would be compliant with the Americans with Disabilities Act (ADA) of 1990, as amended by the Americans with Disabilities Amendment Act of 2009 (ADAAA), the Privacy Act and DOE implementing regulations, and changes in DOE policy regarding PF operations made since the publication of the last version of this rule. In addition, the proposed rule would promote operational efficiency through greater emphasis on aligning training with mission-essential tasks and the increased use of simulation technologies. Finally, the proposed revision would update the regulation to reflect organizational changes in the Office of Health, Safety and Security and the creation of the National Nuclear Security Administration (NNSA).
A Layered Trust Information Security Architecture
de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon
2014-01-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490
Weathering the Storm. Leading Your Organization Through a Pandemic
2006-11-01
tasks and can perform them. Proportionate Absenteeism : If your organization’s work can be accomplished over the Internet, then office absenteeism ...reassured that, as basic as they appear, non-medical interventions represent concrete actions that can reduce transmission of the virus. If used...if necessary. Identify those tasks that can be done remotely—via the Internet—and establish secure websites. Proportionate Absenteeism : If your
Neural and Behavioral Sequelae of Blast-Related Traumatic Brain Injury
2012-09-01
fMRI, DTI , cognition 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a...techniques [task-activated functional MRI (fMRI) and diffusion tensor imaging ( DTI )] to gain a comprehensive understanding of the neural changes...orthopedic injuries. We accomplished this goal by conducting advanced neuroimaging (task-activated fMRI and DTI fiber tracking) and neurobehavioral
2013-10-21
Platform for Testing a Space Robotic System to Perform Contact Tasks in Zero- Gravity Environment 5a. CONTRACT NUMBER FA9453-11-1-0306 5b...SUBJECT TERMS Microgravity, zero gravity , test platform, simulation, gravity offloading 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...4 3.3 Principle of Gravity Offloading
2016-10-01
adults with spinal cord injuries, quality of life, mixed methods, dyads, veterans, civilians, ecological intervention development 16. SECURITY...existing literature in order to provide a foundation for the development of ecologically valid interventions to bolster support and quality of life...civilians, ecological intervention development 3. ACCOMPLISHMENTS Major Goals For year two, we articulated six major tasks, with associated sub-tasks
The Secure Distributed Operating System Design Project
1988-06-01
a di- verse group of people . Its organization isolates different aspects of the project, such as expected results, preliminary results, and technical...modeled after these procedures. " Automation: computers are commonly used to automate tasks previously performed by people ; many of these tasks are... people commonly con- sidered the threats anticipated to the system and mechanisms that are used to prevent those threats. Both hardware and software
Reference Models for Multi-Layer Tissue Structures
2016-09-01
simulation, finite element analysis 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC...Physiologically realistic, fully specimen-specific, nonlinear reference models. Tasks. Finite element analysis of non-linear mechanics of cadaver...models. Tasks. Finite element analysis of non-linear mechanics of multi-layer tissue regions of human subjects. Deliverables. Partially subject- and
Security from Within: Independent Review of the Washington Navy Yard Shooting
2013-11-01
2012 report, the Defense Science Board (DSB) Task Force reviewing the Fort Hood shooting recommended “a threat management approach employing...mental health research findings into clinical practice. 103 The field of implementation science offers several models for establishing and supporting...December 29, 2008, http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf. 47 Defense Science Board. “Task Force Report
2016-09-01
manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
Event-related brain potentials preceding speech and nonspeech oral movements of varying complexity.
Wohlert, A B
1993-10-01
Cortical preparation for movement is reflected in the readiness potential (RP) waveform preceding voluntary limb movements. In the case of oral movements, the RP may be affected by the complexity or linguistic nature of the tasks. In this experiment, EEG potentials before a nonspeech task (lip pursing), a speech-like task (lip rounding), and single word production were recorded from scalp electrodes placed at the cranial vertex (Cz) and over the left and right motor strips (C3' and C4'). Seven right-handed female subjects produced at least 70 repetitions of the three tasks, in each of five repeated sessions. EEG records were averaged with respect to EMG onset at the lip. The word task, as opposed to the other tasks, was associated with greater negative amplitude in the RP waveform at the vertex site. Differences between the waveforms recorded at the right- and left-hemisphere sites were insignificant. Although intersubject variability was high, individuals had relatively stable patterns of response across sessions. Results suggest that the RP recorded at the vertex site is sensitive to changes in task complexity. The RP did not reflect lateralized activity indicative of hemispheric dominance.
Combat Trains Command Post (CTCP) Operations
2016-10-28
organization inclusive of logistical, administrative, and maintenance functions. The squadron’s ability to conduct sustained reconnaissance and security...evolving problem as the troop 1SG had the responsibility to tie in all disabled vehicles awaiting parts into the security plan. The crews of those...sand bags. Once the task organization with inclusion of the UMCP was finalized, a standard Class IV package needed to be identified prior to line of
Helicopters: The Platform of Choice for Defense and Development
2013-04-25
FID effort by facilitating the IDAD tasks of balanced development, security, neutralization, and mobilization. In order to prevent instability...security, neutralization, and mobilization. In order to prevent instability inside a Host Nation (HN), it is important to build cohesive IDAD and...derived from the H -53 (arguably the oldest, biggest, and most cost-prohibitive platform of this type) compared to STOL-capable 4-9 passenger fixed wing
Self Managing the Consequences of Major Limb Trauma
2007-03-01
rehabilitation to the community – whether that be in the military or 15. SUBJECT TERMS Self Management, Trauma, Online Learning 16. SECURITY...Task # 1). The Flash platform was chosen based on its high level of market penetration (greater than 98% in the U.S.A.), ease of integration with...management system to facilitate seamless transitions between lessons, online chats, message boards, and evaluation questionnaires using a single security
Environmental Security in the Danube River Basin: Policy Implications for the United States
1999-01-01
United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review
2015-12-01
use of social network analysis (SNA) has allowed the military to map dark networks of terrorist organizations and selectively target key elements...data to improve SC. 14. SUBJECT TERMS social network analysis, dark networks, light networks, dim networks, security cooperation, Southeast Asia...task may already exist. Recently, the use of social network analysis (SNA) has allowed the military to map dark networks of terrorist organizations
Implications of the Budgeting Process on State-of-the-Art (SOA) Extensions.
1987-12-01
CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPORT Approved for public release; Zb DECLASSiFICATION1DOWNGRADING SCHEDULE Distribution is...PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO NO ACCESSION NO 11. TITLE (Include Security Classification ) IMPLICATIONS OF THE BUDGETING PROCESS ON STATE...20 DISTRIBUTIONAVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0 UNCLASSIFIED,UNLIMI"ED 0 SAME AS RPT QJ DTIC USERS UNCLASSIFIED 22a
CHIPS. Volume 27, Number 2, April-June 2009
2009-07-01
unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Navy Network Enterprise 9 CARS Task Force Shortens Original Timeline – Reducing the number of Navy legacy networks to improve security and save...NETWARCOM and edited from the original article published in the Winter 2008-2009 edition of Info Domain. “A plan of action and milestones (POA&M) for
Provision of healthcare in a remote base of operations in southern Chad.
Hickey, J P
2010-09-01
The Irish Defence Forces maintained a presence in south eastern Chad under the authority of the United Nations Security Council from January 2008 until May 2010, operating in a peace support role as the lead contingent in a multinational battalion. In September 2009 the task of establishing a forward operating base in a remote location within the area of operations was ordered by mission headquarters. Irish and Finnish troops duly deployed and began the task of establishing a safe and secure base from which to operate. This involved securing the location, installing accommodation, electricity, lighting and facilities for ablutions, removing natural hazards, establishing secure communications and ensuring rapid access and egress in the event of hostile contact or emergency. The incidence of disease at this location was low, with the notable exception of a limited outbreak of gastroenteritis. The high standard of engineering work carried out around the camp, especially the latrines, washing facilities and other hygiene measures, significantly contributed to minimising the transmission of infectious disease. The past experiences of the Defence Forces in Congo, Lebanon, East Timor, Eritrea and Liberia have led to a high standard of forward planning and logistical awareness within the organisation which served personnel well in this latest mission. Copyright © 2010 Elsevier Ltd. All rights reserved.
Martin, Meredith J.; Sturge-Apple, Melissa L.; Davies, Patrick T.; Romero, Christine V.; Buckholz, Abigail
2017-01-01
Drawing on a two-wave, multimethod, multi-informant design, this study provides the first test of a process model of spillover specifying why and how disruptions in the coparenting relationship influence the parent–adolescent attachment relationship. One hundred ninety-four families with an adolescent aged 12–14 (M age = 12.4) were followed for 1 year. Mothers and adolescents participated in two experimental tasks designed to elicit behavioral expressions of parent and adolescent functioning within the attachment relationship. Using a novel observational approach, maternal safe haven, secure base, and harshness (i.e., hostility and control) were compared as potential unique mediators of the association between conflict in the coparenting relationship and adolescent problems. Path models indicated that, although coparenting conflicts were broadly associated with maternal parenting difficulties, only secure base explained the link to adolescent adjustment. Adding further specificity to the process model, maternal secure base support was uniquely associated with adolescent adjustment through deficits in adolescents’ secure exploration. Results support the hypothesis that coparenting disagreements undermine adolescent adjustment in multiple domains specifically by disrupting mothers’ ability to provide a caregiving environment that supports adolescent exploration during a developmental period in which developing autonomy is a crucial stage-salient task. PMID:28401834
ERIC Educational Resources Information Center
Stump, William P.
1983-01-01
An integrated electronic system combines individual monitoring and control functions into one economical unit that earns a rapid payback by automatically managing and controlling energy usage, building systems, and security and maintenance tasks. (MLF)
Nevada National Security Site Environmental Report 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less
2017-05-01
ER D C/ EL T R- 17 -7 Environmental Security Technology Certification Program (ESTCP) Evaluation of Uncertainty in Constituent Input...Environmental Security Technology Certification Program (ESTCP) ERDC/EL TR-17-7 May 2017 Evaluation of Uncertainty in Constituent Input Parameters...Environmental Evaluation and Characterization Sys- tem (TREECS™) was applied to a groundwater site and a surface water site to evaluate the sensitivity
Private quantum computation: an introduction to blind quantum computing and related protocols
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.
2017-06-01
Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of securing computation rather than communication. These protocols address the task of securely delegating quantum computation to an untrusted device while maintaining the privacy, and in some instances the integrity, of the computation. We present a review of the progress to date in this emerging area.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holt, V.L.; Baron, L.A.
1994-05-01
This report provides specific details and requirements for the WAG 2 remedial investigation and site investigation Ecological Assessment Task, Kingfisher Study, including information that will contribute to safe completion of the project. The report includes historical background; a site map; project organization; task descriptions and hazard evaluations; controls; and monitoring, personal protective equipment, decontamination, and medical surveillance program requirements. The report also includes descriptions of site personnel and their certifications as well as suspected WAG 2 contaminants and their characteristics. The primary objective of the WAG 2 Kingfisher Study is to assess the feasibility of using kingfishers as biological monitorsmore » of contaminants on the Oak Ridge Reservation (ORR). Kingfisher sample collection will be used to determine the levels of contaminants and degree of bioaccumulation within a common piscivorous bird feeding on contaminated fish from streams on the ORR.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory, Louis
This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. This report summarizes the 1st quarter of fiscal year (FY) 2017 low-level radioactive waste (LLW), mixed low-level radioactive waste (MLLW) and classified non-radioactive (CNR) shipments. There were no shipments sent for offsite treatment from a NNSS facility and returned to the NNSS this quarter of FY2017.
A Design of a Surgical Site Verification System.
Shen, Biyu; He, Yan; Chen, Haoyang
2017-01-01
Patient security is a significant issue in medical research and clinical practice at present. The Surgical Verification System (Patent Number: ZL 201420079273.5) is designed to recognize and check surgical sites of patients so as to ensure operation security and decrease the risk for practitioners. Composition: (1) Operating Room Server, (2) Label Reader, (3) E-Label, (4) Surgical Site Display, (5) Ward Client, (6) Label Rader-Writer, and (7) Acousto-Optic Alarm. If the Surgical identification, the surgical site, and so on are incorrect, a flashing label control will appear when the alarm rings. You can specify a sound to play for the alarm, a picture to draw, and a message to send. It is a user-friendly system.
Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills
2013-02-24
Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.
2013-07-01
Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively. (authors)« less
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
Department of the Navy For Policy
Policy DEPARTMENT OF THE NAVY For Policy Search this site... Search Policy Security Skip navigation links Security Expand Security Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: - Policy Page Content Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: Enterprise OPM
Brase, Gary L; Vasserman, Eugene Y; Hsu, William
2017-01-01
Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and these tasks were followed by a behavioral likelihood rating. As in previous research, consistent use of natural frequencies promoted correct Bayesian reasoning. There was little indication, however, that any of the alternative mental models generated consistently better understanding or reasoning over the actual cybersecurity context. There was some evidence that different models had some effects on patterns of responses, including the behavioral likelihood ratings, but these effects were small, as compared to the effect of the numerical format manipulation. This points to a need to improve the content of actual internet security warnings, rather than working to change the models users have of warnings.
Brase, Gary L.; Vasserman, Eugene Y.; Hsu, William
2017-01-01
Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and these tasks were followed by a behavioral likelihood rating. As in previous research, consistent use of natural frequencies promoted correct Bayesian reasoning. There was little indication, however, that any of the alternative mental models generated consistently better understanding or reasoning over the actual cybersecurity context. There was some evidence that different models had some effects on patterns of responses, including the behavioral likelihood ratings, but these effects were small, as compared to the effect of the numerical format manipulation. This points to a need to improve the content of actual internet security warnings, rather than working to change the models users have of warnings. PMID:29163304
United States European Command
Organization The Region History Media Library Articles Press Releases Photos Videos Documents Blog Posts Us Press Releases Site Policies Site Translation (Disclaimer) EUCOM's disclaimer regarding this . More in Site Policies External Links Privacy and Security Accessibility/Section 508 Site Translation
NASA Astrophysics Data System (ADS)
Trejo-Gómez, E.; Nuñez-Cornu, F.; Suarez-Plascencia, C.; Chavez-Dagostino, R.
2006-12-01
The Atlas of Natural Hazards in Puerto Vallarta (ARN) and the Ecological Territorial Order Program (POET), are documents needed to carry out recommendations to the municipal adminitrations for tasks such as the preservation and recoverment of important zones conserning the natural environment in Puerto Vallarta. These tasks can improve the quality level of life and offer security to the financial investors of this tourist destiny. Both documents are generated with the support of HABITAT Program by the Secretary's of Social Development (SEDESOL) and City Council of Puerto Vallarta. The purpose of this work is to recommend the implementation of a Geographical Information System with the ARN and POET, that responds to the necessities of the municipal goverment in areas like State and Municipal Civil Defense, Urban Planning, Tourism and Ecology. The study has a surface of 340.75 square kilometers and the initial information corresponds to a restitution of year 2000; on graphic scale 1:20,000. At the moment, we have alredy included the descriptions of geology, morphology, seismology, hydrology, type of vegetation, flora and fauna with protected and endemic species. By means of field work, we have related 266 sites with geophysical and hydrometereological hazards. The practices performed by the population in these sites increase their own risk. We have also delimited hazard zones by rock fall, flows and floods along the routes. The valuation is obtained like Affectation-Surface including consolidated houses of different surplus values. In the future, it will be necessary to keep updated the ARN and quantify the information of risks caussed by natural hazards in Puerto Vallarta.
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the provisioning of services or products (e.g., research and development, engineering, manufacturing... Policies are available at the NASA IT Security Policy Web site at: http://www.nasa.gov/offices/ocio...
Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carilli, Jhon T.; Krenzien, Susan K.
2013-07-01
The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)
18. SITE BUILDING 002 SCANNER BUILDING VIEW OF ...
18. SITE BUILDING 002 - SCANNER BUILDING - VIEW OF SITE SECURITY OFFICE ACCESS DOOR FROM EXTERIOR OF OFFICE. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
Kim, Bo-Ram; Stifter, Cynthia A.; Philbrook, Lauren E.; Teti, Douglas M.
2014-01-01
The present study examines the influences of mothers’ emotional availability towards their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants’ emotion regulation strategy use at 12 and 18 months. Infants’ emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants’ emotion regulation strategies, infant attachment security had direct relations with infants’ orienting towards the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. PMID:24995668
NASA Astrophysics Data System (ADS)
Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.
2017-10-01
The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.
AFB Directory of Services Listings
... 520) 770-3268 (TDD/TTY) Arizona Department of Economic Security: Rehabilitation Services Administration 1789 West Jefferson Street, ... Arizona Division Aging and Adult Services Department of Economic Security 1789 W. Jefferson, Site Code 950A-2SW ...
Social Media and the U.S. Army: Maintaining a Balance
2011-05-19
Facebook is the largest and most popular social media site in the Western world. The site was originally created in February 2004 by Mark Zuckerberg and...twenty-something person’s concern pertains only to keeping his activities from his parents’ view. Facebook founder Mark Zuckerberg stated this...Security is more than the marking , handling, and classifying of information. It is different from traditional security in that the Army wants to
2005-06-01
Should a disaster or violence strike numerous sites in the City, our 54 officer would possibly be soley (sic) responsible for responding to an...the ability to interact efficiently with other first responders . 59 3. The New York State Courts would have, on site a well trained, dedicated...AS CERTIFIED FIRST RESPONDERS ASSISTING IN HOMELAND SECURITY AND COMMUNITY EMERGENCY PREPAREDNESS by Jewel E. Williams June 2005
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-01-01
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller. PMID:28430155
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-04-21
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.
Real-Time Distributed Algorithms for Visual and Battlefield Reasoning
2006-08-01
High-Level Task Definition Language, Graphical User Interface (GUI), Story Analysis, Story Interpretation, SensIT Nodes 16. SECURITY...or more actions to be taken in the event the conditions are satisfied. We developed graphical user interfaces that may be used to express such...actions to be taken in the event the conditions are satisfied. We developed graphical user interfaces that may be used to express such task
The Funding Of Boko Haram And Nigerias Actions To Stop It
2016-12-01
Group against Money Laundering in West Africa GSCF Global Security Contingency Fund ISIS Islamic State of Iraq and Syria JTF joint task force...78. 5 Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) and the Financial Action Task Force (FATF) believed that...has failed to address deficiencies such as money laundering and terrorist financing within its banks.96 Having a financial intelligence unit within a
Report Task Force on Women in the Military
1988-01-01
Education, Training, Equal Opportunity, Assignments. SECURITY CLASSIFICATION OF THIS PAGE ODEPARTMENT OF DEFENSE REPORT TASK FORCE4I ON WOMEN LN THE...ensure that instruction occurs at all levels of the organization; and, DoD review equal opportu- nity lessons learned for use in combating bixual...Servicewomen becoming full and equal members of their units. Each Service should be required to report the results of these evalua- tions and corrective
Assessed and Experimentally Provided Social Support.
1983-10-18
concerning attachment have encouraged research into the supportive role of social relationships among both adults and children (Bowlby 1969, 1980...irrelevant material than did those low in SSQS. It may be that the task material had less motivating quality for people who feel secure in their social ... relationships . They may have allowed their minds to wander because the task appeared so easy to them. The results concerning the interaction between
Unconditional security from noisy quantum storage
NASA Astrophysics Data System (ADS)
Wehner, Stephanie
2010-03-01
We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).
1989-01-01
FEB 2 2 1990 Stephen Walter Andrews, D.M.D. The University of North Carolina at Chapel Hill Department of Orthodontics School of Dentistry 1989 Robert...PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) (UNCLASSIFIED) SURFACE MODIFICATION OF ORTHODONTIC ...Previous editions are obsolete. SECURITY CLASSIFICATION OF THIS PAGE AFIT/CI "OVERPRINT" SURFACE MODIFICATION OF ORTHODONTIC BRACKET MODELS VIA ION
1980-09-01
CLASSIFICATION OF THIS PAGE (Uffi Pat* jfntered) READ INSTRUCTIONSREPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM AH -8- -21 12 . GOVT ACCESSION NO. 3. RECIPIENT’S...appliration of that specification. - DDO ,JA11473- K Unclassified t ,9 SECURITY CLASSIFICATION OF THIS PAGG Rnh DM- Entered) U nclassified SECURITY...codes .............................. 52 12 Sample data sheet for use in user analysis ............... 54 13 Sample data sheet G for use in user analysis
1992-04-03
10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) ASEAN...region is a consequence of the stability, coordination and team work of ASEAN. With a reduction of U.S. forces presence in the area, the key to securing...fastest-growing regions in the world today. The stability in the region is a consequence of the stability, coordination and team work of ASEAN. With a
Will Japan Become a Military Superpower?
1993-04-15
SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK ý;NiT ELEMENT NO. NO. NO. CCESSiON NO 11. TITLE (Include Security Ciassification) Will Japan Become a... competition , Japan can no longer continue with status quo. Security relationships within the Asia-Pacific region are changing. The end of the Cold War...of the work on the aircraft while Mitsubishi would pick up the remaining 60 percent. This aircraft will use leading-edge technology. Japan wants to
Measuring Operational Resilience Using the CERT(Registered) Resilience Management Model
2010-09-01
such as ISO 27002 [ ISO 2005]) and then measure the implementation and performance of practices contained in the standard. This checklist-based ap...Security techniques – Code of practice for information security management. ISO /IEC 27002 :2005, June 2005. Also known as ISO /IEC 17799:2005. [ ISO 2007...Table 23: ISO 15939 Process Activities and Tasks 54 Table 24: CERT-RMM Measurement and Analysis Process Area Goals and Practices 55 CMU/SEI
Utilization of Integrated Assessment Modeling for determining geologic CO2 storage security
NASA Astrophysics Data System (ADS)
Pawar, R.
2017-12-01
Geologic storage of carbon dioxide (CO2) has been extensively studied as a potential technology to mitigate atmospheric concentration of CO2. Multiple international research & development efforts, large-scale demonstration and commercial projects are helping advance the technology. One of the critical areas of active investigation is prediction of long-term CO2 storage security and risks. A quantitative methodology for predicting a storage site's long-term performance is critical for making key decisions necessary for successful deployment of commercial scale projects where projects will require quantitative assessments of potential long-term liabilities. These predictions are challenging given that they require simulating CO2 and in-situ fluid movements as well as interactions through the primary storage reservoir, potential leakage pathways (such as wellbores, faults, etc.) and shallow resources such as groundwater aquifers. They need to take into account the inherent variability and uncertainties at geologic sites. This talk will provide an overview of an approach based on integrated assessment modeling (IAM) to predict long-term performance of a geologic storage site including, storage reservoir, potential leakage pathways and shallow groundwater aquifers. The approach utilizes reduced order models (ROMs) to capture the complex physical/chemical interactions resulting due to CO2 movement and interactions but are computationally extremely efficient. Applicability of the approach will be demonstrated through examples that are focused on key storage security questions such as what is the probability of leakage of CO2 from a storage reservoir? how does storage security vary for different geologic environments and operational conditions? how site parameter variability and uncertainties affect storage security, etc.
User Vulnerability and its Reduction on a Social Networking Site
2014-01-01
social networking sites bring about new...and explore other users’ profiles and friend networks. Social networking sites have reshaped business models [Vayner- chuk 2009], provided platform... social networking sites is to enable users to be more social, user privacy and security issues cannot be ignored. On one hand, most social networking sites
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-06
...-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2013-0023] RIN 0960-AH59... Disability Determinations and Compassionate Allowances AGENCY: Social Security Administration. ACTION: Final...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Shridharani, Sachin M.; Stapleton, Sahael M.; Redett, Richard J.; Magarakis, Michael; Rosson, Gedge D.
2010-01-01
Background: The primary objective of this study is to report a novel technique that uses the gastrointestinal anastomosis (GIA) stapler for harvesting and securing the gracilis muscle in facial reanimation surgery. Methods: We conducted a retrospective chart review with 18 consecutive patients who underwent gracilis muscle flap transfer with or without the use of a GIA stapler. Results: Of 11 operations with the GIA stapler, one patient developed a hematoma (donor site) and another required drainage of an abscess (recipient site). Of 8 operations without the use of the stapler, one patient had total flap failure and three required drainage of an abscess (2 recipient sites and 1 donor site). These differences trended toward improvement but were not statistically different. Conclusions: The use of the GIA stapler is a fast, safe technique. Larger studies are, however, warranted to further examine this novel approach in order to test precisely what factors of increased efficiency occur, the amount of suture pull-through, and overall tension capable of being applied to the secured staple line. PMID:20396379
Nevada National Security Site Environmental Report Summary 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS andmore » offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and centers that support the National Security/Defense mission include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility (DAF), National Criticality Experiments Research Center (NCERC) located in the DAF, Joint Actinide Shock Physics Experimental Research (JASPER) Facility, Dense Plasma Focus (DPF) Facility located in the Los Alamos Technical Facility (LATF), and the Radiological/ Nuclear Countermeasures Test and Evaluation Complex (RNCTEC). Facilities that support the Environmental Management mission include the Area 5 Radioactive Waste Management Complex (RWMC) and the Area 3 Radioactive Waste Management Site (RWMS), which has been in cold standby since 2006.« less
Converting an intranet site to the cloud: using CampusGuides to refresh a library portal.
Osterhaus Trzasko, Leah C; Farrell, Ann M; Rethlefsen, Melissa L
2012-01-01
After a major redesign project in 2002, Mayo Clinic Libraries' heavily used intranet portal remained largely static. Library staff were unable to make substantive design changes or introduce tools that would make the content more dynamic. CampusGuides offered a practical, user-friendly, web-based solution to add dynamic content to the library site. A task force was formed both to establish design and style guidelines that would integrate with the library site and to plan the conversion of content to CampusGuides. Converting intranet site content to CampusGuides gave the task force the opportunity to examine, re-imagine, and revitalize site content.
Population-based learning of load balancing policies for a distributed computer system
NASA Technical Reports Server (NTRS)
Mehra, Pankaj; Wah, Benjamin W.
1993-01-01
Effective load-balancing policies use dynamic resource information to schedule tasks in a distributed computer system. We present a novel method for automatically learning such policies. At each site in our system, we use a comparator neural network to predict the relative speedup of an incoming task using only the resource-utilization patterns obtained prior to the task's arrival. Outputs of these comparator networks are broadcast periodically over the distributed system, and the resource schedulers at each site use these values to determine the best site for executing an incoming task. The delays incurred in propagating workload information and tasks from one site to another, as well as the dynamic and unpredictable nature of workloads in multiprogrammed multiprocessors, may cause the workload pattern at the time of execution to differ from patterns prevailing at the times of load-index computation and decision making. Our load-balancing policy accommodates this uncertainty by using certain tunable parameters. We present a population-based machine-learning algorithm that adjusts these parameters in order to achieve high average speedups with respect to local execution. Our results show that our load-balancing policy, when combined with the comparator neural network for workload characterization, is effective in exploiting idle resources in a distributed computer system.
On chaos synchronization and secure communication.
Kinzel, W; Englert, A; Kanter, I
2010-01-28
Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems. This journal is © 2010 The Royal Society
Retirement security: It's not just about the money.
James, Jacquelyn Boone; Matz-Costa, Christina; Smyer, Michael A
2016-01-01
Retirement security is not just about the money. Although there are many guidelines for financial security, there are few for crafting a rewarding life in the new era of longevity and health. With the meaning of "retirement" being actively redefined, there is a gap between what older adults want and need and what their employers and policymakers are offering. Retirement security in its broadest sense requires programs and policies that encourage and support flexible work that allow some choice and control over when, where, and how work gets done, and which work tasks are assumed by which employees or work teams, self-employment, and formal and informal volunteer work. This article has 3 purposes: (a) to summarize the current context of retirement, (b) to identify barriers to psychological security in later life, and (c) to suggest how psychologists can support the rewriting of the retirement chapter for future retirees. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
NASA Astrophysics Data System (ADS)
Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique
Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.
33 CFR 106.262 - Security measures for newly-hired employees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... following information on the new hire into the Coast Guard's Homeport Web site (http://homeport.uscg.mil): (i) Full legal name, including middle name if one exists; (ii) Date of birth; (iii) Social security...
33 CFR 106.262 - Security measures for newly-hired employees.
Code of Federal Regulations, 2011 CFR
2011-07-01
... following information on the new hire into the Coast Guard's Homeport Web site (http://homeport.uscg.mil): (i) Full legal name, including middle name if one exists; (ii) Date of birth; (iii) Social security...
Nevada Test Site Waste Acceptance Criteria (NTSWAC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
NNSA /NSO Waste Management Project
This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, Nevada Test Site Waste Acceptance Criteria (NTSWAC). The NTSWAC provides the requirements, terms, and conditions under which the Nevada Test Site will accept low-level radioactive (LLW) and LLW Mixed Waste (MW) for disposal.
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
Secure Genomic Computation through Site-Wise Encryption
Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu
2015-01-01
Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients’ genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds. PMID:26306278
Secure Genomic Computation through Site-Wise Encryption.
Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu
2015-01-01
Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients' genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds.
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun
2009-10-07
The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less
2009-07-01
Arthur tasked LaPlante with planning the NEO and proposing a contingency task force to execute the mission. LaPlante sum- moned Moser to a meeting on...evacuations, although the shortage of staff to operate the ECC severely hindered the process. Security remained marginal , despite arrival of the Navy and...augmentation of the evacuation force had been denied, Oates utilized not only some of McAleer’s Marines but members of the embassy staff to provide
National Security Reform 2010: A Mid-Term Assessment
2011-08-01
5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic...Minuteman Me- morial Building in Washington, DC. In addition, our Bush School staff performed nu- merous tasks in planning and executing the confer...more clearly. Carafano conclud- ed by stating that the government should build an ef- fective construct for the whole of government, and the nation’s
Measurement of Forces and Moments Transmitted to the Residual Limb
2009-08-01
prosthesis alignment, socket pressure, gait, force and moment sensors 16. SECURITY CLASSIFICATION OF: U 17. LIMITATION OF ABSTRACT 18. NUMBER... prosthesis to measure the forces and moments at the base of the socket and to use these measurements to estimate the forces transmitted to the residual limb...BODY – EACH TASK IN STATEMENT OF WORK Task 1. To instrument a transtibial prosthesis with a tri-axial transducer to measure the forces and
2014-06-13
5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army Command and General Staff...Division-North NATO North Atlantic Treaty Organization NGO Non-Governmental Organization NSC National Security Council OHR Office of the High...for Iraq Reconstruction TF Task Force UK United Kingdom UN United Nations UNHCR United Nations High Commissioner for Refugees UNMIBH United
The Fatal Five? Five Factors That Enhance Effectiveness of Stability Operations
2014-05-22
Conflict METL Mission Essential Task List MSG Military Support Group NSS National Security Strategy OOTW Operations Other Than War PDF...Revolutionary War. However, despite the propensity for the military to conduct this type of operation, the U.S. Army has a mixed record of executing stability...the U.S. Army has a mixed record of executing stability tasks. This monograph identifies five factors that contribute to the effectiveness of
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mark Burmeister and Patrick Matthews
2012-11-01
The corrective action sites (CASs) within CAU 465 are located within Areas 6 and 27 of the NNSS. CAU 465 comprises the following CASs: • 00-23-01, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie site. • 00-23-02, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Dog site. • 00-23-03, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie Prime and Anja sites. • 06-99-01, Hydronuclear, located in Area 6 of the NNSS and known as the Trailer 13 site. The purpose of this CRmore » is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 465 were met. From September 2011 through July 2012, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 465: Hydronuclear, Nevada National Security Site, Nevada.« less
European Approaches to Homeland Security and Counterterrorism
2006-07-24
departmental Counterterrorism Strategy (known as CONTEST) centered on the “ 4Ps ” of prevent, pursue, protect, and prepare. Prevention work seeks to address...largely flowed from the “ 4Ps ” of prevent, pursue, protect, and prepare in the UK’s 2004 cross-departmental counterterrorism strategy (CONTEST), which...Homeland Security and Counterterrorism 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER
Integrating Security in Real-Time Embedded Systems
2017-04-26
b) detect any intrusions/a ttacks once tl1ey occur and (c) keep the overall system safe in the event of an attack. 4. Analysis and evaluation of...beyond), we expanded our work in both security integration and attack mechanisms, and worked on demonstrations and evaluations in hardware. Year I...scheduling for each busy interval w ith the calculated arrival time w indow. Step 1 focuses on the problem of finding the quanti ty of each task
2008-01-01
S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Air Force Academy,Institute...for National Security Studies,USAFA,CO,80840 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10...SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR/MONITOR’S REPORT NUMBER( S ) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution
Educating Special Forces Junior Leaders for a Complex Security Environment
2009-07-01
Security Environment 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK...UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Joint Special Operations University,357 Tully Street Alison Building,Hurlburt Field,FL...32544 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR
2009-01-01
command system.2 The United States Southern Command, responsible for Department of Defense planning, coordination, and operations in Central America ...South America and i waters, formed its Joint Interagency Task Force South to enable it to conduct coordinated illicit trafficking operations. ts y...Collin Powell and Secretary of Defense Donald Rumsfeld, the National Security Council has at times been a place for policy to come to die under the
Perimeter security alarm system based on fiber Bragg grating
NASA Astrophysics Data System (ADS)
Zhang, Cui; Wang, Lixin
2010-11-01
With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.
Auditing Albaha University Network Security using in-house Developed Penetration Tool
NASA Astrophysics Data System (ADS)
Alzahrani, M. E.
2018-03-01
Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Programs
2010-10-04
The Nevada National Security Site (NNSS) is located approximately 105 km (65 mi) northwest of Las Vegas, Nevada. The U.S. Department of Energy National Nuclear Security Administration Nevada Site Office (NNSA/NSO) is the federal lands management authority for the NNSS and National Security Technologies, LLC (NSTec) is the Management and Operations contractor. Access on and off the NNSS is tightly controlled, restricted, and guarded on a 24-hour basis. The NNSS is posted with signs along its entire perimeter. NSTec is the operator of all solid waste disposal sites on the NNSS. The Area 5 Radioactive Waste Management Site (RWMS) ismore » the location of the permitted facility for the Solid Waste Disposal Site (SWDS). The Area 5 RWMS is located near the eastern edge of the NNSS (Figure 1), approximately 26 km (16 mi) north of Mercury, Nevada. The Area 5 RWMS is used for the disposal of low-level waste (LLW) and mixed low-level waste. Many areas surrounding the RWMS have been used in conducting nuclear tests. The site will be used for the disposal of regulated Asbestiform Low-Level Waste (ALLW), small quantities of low-level radioactive hydrocarbon-burdened (LLHB) media and debris, LLW, LLW that contains Polychlorinated Biphenyl (PCB) Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water, and small quantities of LLHB demolition and construction waste (hereafter called permissible waste). Waste containing free liquids, or waste that is regulated as hazardous waste under the Resource Conservation and Recovery Act (RCRA) or state-of-generation hazardous waste regulations, will not be accepted for disposal at the site. Waste regulated under the Toxic Substances Control Act (TSCA) that will be accepted at the disposal site is regulated asbestos-containing materials (RACM) and PCB Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water. The term asbestiform is used throughout this document to describe RACM. The disposal site will be used as a depository of permissible waste generated both on site and off site. All generators designated by NNSA/NSO will be eligible to dispose regulated ALLW at the Asbestiform Low-Level Waste Disposal Site in accordance with the DOE/NV-325, Nevada National Security Site Waste Acceptance Criteria (NNSSWAC, current revision). Approval will be given by NNSA/NSO to generators that have successfully demonstrated through process knowledge (PK) and/or sampling and analysis that the waste is low-level, contains asbestiform material, or contains PCB Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water, or small quantities of LLHB demolition and construction waste and does not contain prohibited waste materials. Each waste stream will be approved through the Radioactive Waste Acceptance Program (RWAP), which ensures that the waste meets acceptance requirements outlined in the NNSSWAC.« less
Kim, Bo-Ram; Stifter, Cynthia A; Philbrook, Lauren E; Teti, Douglas M
2014-11-01
The present study examines the influences of mothers' emotional availability toward their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants' emotion regulation strategy use at 12 and 18 months. Infants' emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants' emotion regulation strategies, infant attachment security had direct relations with infants' orienting toward the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. Copyright © 2014 Elsevier Inc. All rights reserved.
Application of Lightweight Formal Methods to Software Security
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Powell, John D.; Bishop, Matt
2005-01-01
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which species security properties in a library that can be reused by 2 instruments and their methodologies developed for the National Aeronautics and Space Administration (NASA) at the Jet Propulsion Laboratory (JPL) are described herein The Flexible Modeling Framework (FMF) is a model based verijkation instrument that uses Promela and the SPIN model checker. The Property Based Tester (PBT) uses TASPEC and a Text Execution Monitor (TEM). They are used to reduce vulnerabilities and unwanted exposures in software during the development and maintenance life cycles.
A secure distributed logistic regression protocol for the detection of rare adverse drug events
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-01-01
Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-05-01
There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Defense.gov Special Report: The Cyber Domain - Security and Operations
U.S. Air Force National Guard U.S. Coast Guard All DOD Sites Military/DOD Social Media Sites Register : Email Email Icon: RSS Feeds RSS Feeds Icon: Widgets Widgets MORE SOCIAL MEDIA SITES »
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
A security architecture for interconnecting health information systems.
Gritzalis, Dimitris; Lambrinoudakis, Costas
2004-03-31
Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.
Thermic sealing in femoral catheterisation: First experience with the Secure Device.
Sacherer, Michael; Kolesnik, Ewald; von Lewinski, Friederike; Verheyen, Nicolas; Brandner, Karin; Wallner, Markus; Eaton, Deborah M; Luha, Olev; Zweiker, Robert; von Lewinski, Dirk
2018-04-03
Devices currently used to achieve hemostasis of the femoral artery following percutaneous cardiac catheterization are associated with vascular complications and remnants of artificial materials are retained at the puncture site. The SECURE arterial closure device induces hemostasis by utilizing thermal energy, which causes collagen shrinking and swelling. In comparison to established devices, it has the advantage of leaving no foreign material in the body following closing. This study was designed to evaluate the efficacy and safety of the SECURE device to close the puncture site following percutaneous cardiac catheterization. The SECURE device was evaluated in a prospective non-randomized single-centre trial with patients undergoing 6 F invasive cardiac procedures. A total of 67 patients were enrolled and the device was utilized in 63 patients. 50 diagnostic and 13 interventional cases were evaluated. Femoral artery puncture closure was performed immediately after completion of the procedure. Time to hemostasis (TTH), time to ambulation (TTA) and data regarding short-term and 30-day clinical follow-up were recorded. Mean TTH was 4:30 ± 2:15 min in the overall observational group. A subpopulation of patients receiving anticoagulants had a TTH of 4:53 ± 1:43 min. There were two access site complications (hematoma > 5 cm). No major adverse events were identified during hospitalization or at the 30 day follow-up. The new SECURE device demonstrates that it is feasible in diagnostic and interventional cardiac catheterization. With respect to safety, the SECURE device was non-inferior to other closure devices as tested in the ISAR closure trial.
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Using software security analysis to verify the secure socket layer (SSL) protocol
NASA Technical Reports Server (NTRS)
Powell, John D.
2004-01-01
nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
SPIDERS Bi-Directional Charging Station Interconnection Testing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, M.
2013-09-01
The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bender, Howard A.
This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected inmore » FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The 85-acre Bofors Nobel site contains an active specialty chemical production plant in Egelston Township, Muskegon County, Michigan. Site features include an unused landfill. The ROD amends a 1990 ROD written by the state, which consisted of onsite incineration and onsite landfilling of lagoon area soil, construction of RCRA-type secure landfill cells to hold non-incinerated material and ash from the incinerated sludge. The selected amended remedial action for the site includes excavating and containing approximately 767,000 cubic yards of untreated sludge and soil in onsite RCRA-type secure landfill cells constructed as part of the original remedial action. The ROD Amendmentmore » does not address any issue associated with ground water treatment.« less
Prado-Leon, Lilia R; Celis, Alfredo; Avila-Chaurand, Rosalio
2005-01-01
The objective of this study was to quantify and assess whether lifting tasks in the workplace are a risk factor in lumbar spondyloarthrosis etiology. A case-control study was performed with 231 workers, 18-55 years old, insured by the Mexican Social Security Institute (IMSS, according to its designation in Spanish). A multivariate analysis using conditional logistical regression showed that lifting tasks, combined with driving tasks, are associated with this illness (OR = 7.3; 95% CI 1.7-31.4). The daily frequency of lifting as it interacts with work as a driver resulted in a greater risk (OR = 10.4; 95% CI 2.0-52.5). The load weight, daily task-hours and cumulative time showed a dose-response relationship. The attributable risk for lifting tasks was 0.83, suggesting that 83% of lumbar spondyloarthrosis development could be prevented if risk factors were eliminated by ergonomic redesign of the task.
At-sea demonstration of RF sensor tasking using XML over a worldwide network
NASA Astrophysics Data System (ADS)
Kellogg, Robert L.; Lee, Tom; Dumas, Diane; Raggo, Barbara
2003-07-01
As part of an At-Sea Demonstration for Space and Naval Warfare Command (SPAWAR, PMW-189), a prototype RF sensor for signal acquisition and direction finding queried and received tasking via a secure worldwide Automated Data Network System (ADNS). Using extended mark-up language (XML) constructs, both mission and signal tasking were available for push and pull Battlespace management. XML tasking was received by the USS Cape St George (CG-71) during an exercise along the Gulf Coast of the US from a test facility at SPAWAR, San Diego, CA. Although only one ship was used in the demonstration, the intent of the software initiative was to show that a network of different RF sensors on different platforms with different capabilitis could be tasked by a common web agent. A sensor software agent interpreted the XML task to match the sensor's capability. Future improvements will focus on enlarging the domain of mission tasking and incorporate report management.
Ecological Monitoring and Compliance Program 2015 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Ostler, W. Kent; Anderson, David C.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2015. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2015, all applicable laws, regulations, andmore » permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2016 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek; Perry, Jeanette; Ostler, W. Kent
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2016. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2016, all applicable laws, regulations, andmore » permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory, Louis
2014-12-02
This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annualmore » summaries for FY 2014.« less
EU-US standards harmonization task group report : status of ITS security standards.
DOT National Transportation Integrated Search
1998-07-01
This document assembles best practices and presents practical advice on how to acquire the software components of Intelligent Transportation Systems (ITS). The intended audience is the customers--project leaders, technical contract managers, de...
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
EU-US standards harmonization task group report : testing for ITS security.
DOT National Transportation Integrated Search
1996-03-01
THE INVEHICLE SAFETY ADVISORY AND WARNING SYSTEM (IVSAWS) IS A FEDERAL HIGHWAY ADMINISTRATION EFFORT TO DEVELOP' A NATIONWIDE VEHICULAR INFORMATION SYSTEM THAT PROVIDES DRIVERS WITH ADVANCE, SUPPLEMENTAL NOTIFICATION OF DANGEROUS ROAD CONDITIONS USIN...
Transportation users' views of quality
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Hawaii energy strategy project 2: Fossil energy review. Task 2: Fossil energy in Hawaii
DOE Office of Scientific and Technical Information (OSTI.GOV)
Breazeale, K.; Yamaguchi, N.D.; Keeville, H.
1993-12-01
In Task 2, the authors establish a baseline for evaluating energy use in Hawaii, and examine key energy and economic indicators. They provide a detailed look at fossil energy imports by type, current and possible sources of oil, gas and coal, quality considerations, and processing/transformation. They present time series data on petroleum product consumption by end-use sector, though they caution the reader that the data is imperfect. They discuss fuel substitutability to identify those end-use categories that are most easily switched to other fuels. They then define and analyze sequential scenarios of fuel substitution in Hawaii and their impacts onmore » patterns of demand. They also discuss energy security--what it means to Hawaii, what it means to neighboring economies, whether it is possible to achieve energy security. 95 figs., 48 tabs.« less
2006-10-25
at this site: Timestamp IP Address Description Severity 2003 Sep 03 14:52:28 150.24.11.1 Security-Trojan- Sub7 18 2003 Sep 03 14:52:33...150.24.11.2 Security-Trojan- Sub7 18 2003 Sep 03 14:52:38 150.24.11.3 Security-Trojan- Sub7 18 4. The Security Analyst clicks on one of the lines in this...table: Severity Parameter Name Value Descriptive Details Location 3 HMCS Iroquois Type of Incident 2 Security-Trojan- Sub7 Asset Type 1 Workstation
77 FR 46773 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request, Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... specified financial information to the Commission and post it on their corporate Web sites, if any, in...
Defense Science Board Task Force Report: Predicting Violent Behavior
2012-08-01
Sciences Projects . Washington, DC: U.S. Department of Homeland Security, August 2009. http://www.dhs.gov/files/programs/gc_1218480185439.shtm Randazzo...5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...Defense Science Board (DSB),OUSD(AT&L) Room 3B888A,The Pentagon,Washington,DC,20310 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING
The Status of Older Women in Illinois Today: A Report by the Task Force on Older Women in Illinois.
ERIC Educational Resources Information Center
Illinois State Dept. on Aging, Springfield.
This document contains the report of an Illinois task force formed to examine issues that make it different to grow older as a woman than as a man and to develop a set of recommendations to help meet the needs of women in Illinois. The focus is on housing, health care, and economic security of older women. It is noted that over 1,300 older women…
Descriptive Model of Generic WAMS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauer, John F.; DeSteese, John G.
The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.
The DISAM Journal of International Security Assistance Management. Volume 3, Number 4
2010-03-01
enough to help create jobs and build up the UAE industry . Still, for the near term, the United States stands to benefi t from several major projects ... PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Institute of Security Assistance...it was amazing to see what industry brought to the table as far as platforms and capabilities. Industry has made it clear that they can build the
Machine Learning in Intrusion Detection
2005-07-01
machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate
The New European Security Calculus: Implications for the U.S. Army
1991-01-03
Iberian and Levantine allies) is anxious that "peace" in Central Europe could work to decouple its security concerns from its northern neighbors. 10 4...altered political climate in Europe, the U.S. Army must be proactive in changing its force and command and control structures to meet both its new...relocated to the Kola Peninsula . "The main task of these planes is to attack targets from the rear, and their range makes it possible for them to reach
Enduring Attraction: America’s Dependence On and Need to Secure Its Supply of Permanent Magnets
2011-02-16
124,000 tons. For the time being, the delta is bridged using materials stock-piled at various commercial mines around the world . This will not suffice...AIR WAR COLLEGE AIR UNIVERSITY ENDURING ATTRACTION: AMERICA’S DEPENDENCE ON AND NEED TO SECURE ITS SUPPLY OF PERMANENT MAGNETS by...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Air University,Air War College,325 Chennault Circle
Hardware implementation of Lorenz circuit systems for secure chaotic communication applications.
Chen, Hsin-Chieh; Liau, Ben-Yi; Hou, Yi-You
2013-02-18
This paper presents the synchronization between the master and slave Lorenz chaotic systems by slide mode controller (SMC)-based technique. A proportional-integral (PI) switching surface is proposed to simplify the task of assigning the performance of the closed-loop error system in sliding mode. Then, extending the concept of equivalent control and using some basic electronic components, a secure communication system is constructed. Experimental results show the feasibility of synchronizing two Lorenz circuits via the proposed SMC.
2013-03-01
5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...meet conditions on the ground, according to U.S. officials. For example , the Department of State (State) delayed committing Foreign Military...agencies measure program performance. For example , GAO found in 2011 that the IMET program evaluation efforts had few of the elements commonly
2015-03-24
5b. GRANT NUMBER: 5c. PROGRAM ELEMENT NUMBER: 6. AUTHOR(S): Jonathan Shedler, Eric L. Lang 5d. PROJECT NUMBER: 5e. TASK NUMBER: 5f...national security interests and represents an example of the law of unintended consequences. Inclusion of the question likely serves to undermine...certain positions. For example , a person who suffers from epilepsy and experiences uncontrolled seizures is not suited to be a pilot. He or she may
1984-01-01
of the leadership styles and effectiveness of the security police officers studied. General Research Questions In exploring the relationship between...to do a task; B. Psycholo&c Maturity is the willins- 26 ness or motivation to do the job. 16. Four Specific Leadership Styles : A. A-Telling Style is...background, (1973) knowledge, and experience fac- tors. Vroom25 Leaders can be taught to en- • (1976) large their leadership styles and to match the