75 FR 10439 - Cognitive Radio Technologies and Software Defined Radios
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... Technologies and Software Defined Radios AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... concerning the use of open source software to implement security features in software defined radios (SDRs... ongoing technical developments in cognitive and software defined radio (SDR) technologies. 2. On April 20...
Graphs for information security control in software defined networks
NASA Astrophysics Data System (ADS)
Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.
2017-07-01
Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.
Algorithm Diversity for Resilent Systems
2016-06-27
data structures. 15. SUBJECT TERMS computer security, software diversity, program transformation 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18...systematic method for transforming Datalog rules with general universal and existential quantification into efficient algorithms with precise complexity...worst case in the size of the ground rules. There are numerous choices during the transformation that lead to diverse algorithms and different
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-01-01
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller. PMID:28430155
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-04-21
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.
ERIC Educational Resources Information Center
Reis, David W.
2012-01-01
Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-20
...The Bureau of Industry and Security (BIS) maintains, as part of its Export Administration Regulations (EAR), the Commerce Control List (CCL), which identifies certain of the items subject to Department of Commerce jurisdiction. This final rule revises the CCL to implement changes made to the Wassenaar Arrangement's List of Dual-Use Goods and Technologies (Wassenaar List) maintained and agreed to by governments participating in the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (Wassenaar Arrangement, or WA) at the December 2012 WA Plenary Meeting (the Plenary). The Wassenaar Arrangement advocates implementation of effective export controls on strategic items with the objective of improving regional and international security and stability. This rule harmonizes the CCL with the changes made to the WA List at the Plenary by revising ECCNs controlled for national security reasons in each category of the CCL, except category 8, as well as amending the General Software Note, WA reporting requirements, and definitions section in the EAR. BIS is adding unilateral controls to the CCL for specific software and technology for aviation control systems, which the WA agreements removed from the WA List, i.e., EAR national security controls.
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
A taxonomy and discussion of software attack technologies
NASA Astrophysics Data System (ADS)
Banks, Sheila B.; Stytz, Martin R.
2005-03-01
Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research and a discussion of the motivation for our work. Section two contains a presents our taxonomy of software attacks and a discussion of the strategies employed and general weaknesses exploited for each attack. Section three contains a summary and suggestions for further research.
Time Synchronization Prototype, Server Upgrade Procedure Support and Remote Software Development
NASA Technical Reports Server (NTRS)
Sanders, Shania R.
2014-01-01
Networks are roadways of communication that connect devices. Like all roadways, there are rules and regulations that govern whatever (information in this case) travels along them. One type of rule that is commonly used is called a protocol. More specifically, a protocol is a standard that specifies how data should be transmitted over a network. The project outlined in this document seeks to implement one protocol in particular, Precision Time Protocol, within the Kennedy Ground Control Subsystem network at Kennedy Space Center. This document also summarizes work completed for server upgrades, remote software developer training and how all three assignments demonstrated the importance of accountability and security.
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
Using Bayesian Networks and Decision Theory to Model Physical Security
2003-02-01
Home automation technologies allow a person to monitor and control various activities within a home or office setting. Cameras, sensors and other...components used along with the simple rules in the home automation software provide an environment where the lights, security and other appliances can be...monitored and controlled. These home automation technologies, however, lack the power to reason under uncertain conditions and thus the system can
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
Performance optimization of internet firewalls
NASA Astrophysics Data System (ADS)
Chiueh, Tzi-cker; Ballman, Allen
1997-01-01
Internet firewalls control the data traffic in and out of an enterprise network by checking network packets against a set of rules that embodies an organization's security policy. Because rule checking is computationally more expensive than routing-table look-up, it could become a potential bottleneck for scaling up the performance of IP routers, which typically implement firewall functions in software. in this paper, we analyzed the performance problems associated with firewalls, particularly packet filters, propose a good connection cache to amortize the costly security check over the packets in a connection, and report the preliminary performance results of a trace-driven simulation that show the average packet check time can be reduced by a factor of 2.5 at the least.
Vehicle security encryption based on unlicensed encryption
NASA Astrophysics Data System (ADS)
Huang, Haomin; Song, Jing; Xu, Zhijia; Ding, Xiaoke; Deng, Wei
2018-03-01
The current vehicle key is easy to be destroyed and damage, proposing the use of elliptical encryption algorithm is improving the reliability of vehicle security system. Based on the encryption rules of elliptic curve, the chip's framework and hardware structure are designed, then the chip calculation process simulation has been analyzed by software. The simulation has been achieved the expected target. Finally, some issues pointed out in the data calculation about the chip's storage control and other modules.
Policy-Based Management Natural Language Parser
NASA Technical Reports Server (NTRS)
James, Mark
2009-01-01
The Policy-Based Management Natural Language Parser (PBEM) is a rules-based approach to enterprise management that can be used to automate certain management tasks. This parser simplifies the management of a given endeavor by establishing policies to deal with situations that are likely to occur. Policies are operating rules that can be referred to as a means of maintaining order, security, consistency, or other ways of successfully furthering a goal or mission. PBEM provides a way of managing configuration of network elements, applications, and processes via a set of high-level rules or business policies rather than managing individual elements, thus switching the control to a higher level. This software allows unique management rules (or commands) to be specified and applied to a cross-section of the Global Information Grid (GIG). This software embodies a parser that is capable of recognizing and understanding conversational English. Because all possible dialect variants cannot be anticipated, a unique capability was developed that parses passed on conversation intent rather than the exact way the words are used. This software can increase productivity by enabling a user to converse with the system in conversational English to define network policies. PBEM can be used in both manned and unmanned science-gathering programs. Because policy statements can be domain-independent, this software can be applied equally to a wide variety of applications.
Standardized development of computer software. Part 1: Methods
NASA Technical Reports Server (NTRS)
Tausworthe, R. C.
1976-01-01
This work is a two-volume set on standards for modern software engineering methodology. This volume presents a tutorial and practical guide to the efficient development of reliable computer software, a unified and coordinated discipline for design, coding, testing, documentation, and project organization and management. The aim of the monograph is to provide formal disciplines for increasing the probability of securing software that is characterized by high degrees of initial correctness, readability, and maintainability, and to promote practices which aid in the consistent and orderly development of a total software system within schedule and budgetary constraints. These disciplines are set forth as a set of rules to be applied during software development to drastically reduce the time traditionally spent in debugging, to increase documentation quality, to foster understandability among those who must come in contact with it, and to facilitate operations and alterations of the program as requirements on the program environment change.
2006-08-08
As required by the Medicare Prescription Drug, Improvement, and Modernization Act of 2003 (MMA), Public Law 108-173, this final rule establishes a new safe harbor under the Federal anti-kickback statute for certain arrangements involving the provision of electronic prescribing technology. Specifically, the safe harbor would protect certain arrangements involving hospitals, group practices, and prescription drug plan (PDP) sponsors and Medicare Advantage (MA) organizations that provide to specified recipients certain nonmonetary remuneration in the form of hardware, software, or information technology and training services necessary and used solely to receive and transmit electronic prescription information. In addition, in accordance with section 1128B(b)(3)(E) of the Social Security Act (the Act), this final rule creates a separate new safe harbor for certain arrangements involving the provision of nonmonetary remuneration in the form of electronic health records software or information technology and training services necessary and used predominantly to create, maintain, transmit, or receive electronic health records.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-03
..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: SSRs make available... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0068] Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66-18c and SSR 91-1c AGENCY: Social Security...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Dynamic Network Security Control Using Software Defined Networking
2016-03-24
Most importantly I thank my family for understanding, loving , and thriving in the hectic world of military spouse and children. Michael C. Todd v...RBAC poses access to objects as a user to member-of group relationship . This construct results in a set of rules to govern access to objects based...API. Agent Agent.py Event.py Message.py ModSysStatus.py Event Message ModSysStatus Event - Message - ModSysStatus Relationship Figure 12. Agent Design
76 FR 65558 - Rescission of Social Security Ruling 97-2p
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling. SUMMARY: In accordance with 20 CFR 402.35(b)(1), the Commissioner of Social Security gives notice of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-15
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-05
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...
Strengthening Software Authentication with the ROSE Software Suite
DOE Office of Scientific and Technical Information (OSTI.GOV)
White, G
2006-06-15
Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlightmore » suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects.« less
17 CFR 41.24 - Rule amendments to security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... rule amendment relating to a security futures product if the registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Rule amendments to security futures products. 41.24 Section 41.24 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0006] Social Security Ruling, SSR 13-2p...: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social..., Social Security Administration. [FR Doc. 2013-06594 Filed 3-21-13; 8:45 am] BILLING CODE 4191-02-P ...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-09
... Relating to Rule G-37, on Political Contributions and Prohibitions on Municipal Securities Business... prohibitions on municipal securities business (referred to hereafter as ``proposed rule change''). The MSRB has... securities business.\\3\\ Under Rule G-37, certain contributions to elected officials of municipal securities...
2013-12-27
In this final rule, the Office of Inspector General (OIG) amends the safe harbor regulation concerning electronic health records items and services, which defines certain conduct that is protected from liability under the Federal anti-kickback statute, section 1128B(b) of the Social Security Act (the Act). Amendments include updating the provision under which electronic health records software is deemed interoperable; removing the electronic prescribing capability requirement; extending the sunset provision until December 31, 2021; limiting the scope of protected donors to exclude laboratory companies; and clarifying the condition that prohibits a donor from taking any action to limit or restrict the use, compatibility, or interoperability of the donated items or services.
Software Security Practices: Integrating Security into the SDLC
2011-05-01
Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-28
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0057] Social Security Ruling 11-1p; Titles II... AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling (SSR) SUMMARY: We are... administrative review process. This change will allow us to more efficiently use our limited resources to handle...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0106] Social Security Ruling, SSR 13-3p; Appeal of an Initial Medical Disability Cessation Determination or Decision AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling (SSR). SUMMARY: We are giving notice of SSR 13-3p. This...
Angelow, Aniela; Schmidt, Matthias; Weitmann, Kerstin; Schwedler, Susanne; Vogt, Hannes; Havemann, Christoph; Hoffmann, Wolfgang
2008-07-01
In our report we describe concept, strategies and implementation of a central biosample and data management (CSDM) system in the three-centre clinical study of the Transregional Collaborative Research Centre "Inflammatory Cardiomyopathy - Molecular Pathogenesis and Therapy" SFB/TR 19, Germany. Following the requirements of high system resource availability, data security, privacy protection and quality assurance, a web-based CSDM was developed based on Java 2 Enterprise Edition using an Oracle database. An efficient and reliable sample documentation system using bar code labelling, a partitioning storage algorithm and an online documentation software was implemented. An online electronic case report form is used to acquire patient-related data. Strict rules for access to the online applications and secure connections are used to account for privacy protection and data security. Challenges for the implementation of the CSDM resided at project, technical and organisational level as well as at staff level.
Nordling, Jamie Koenig; Boldt, Lea J.; O'Bleness, Jessica; Kochanska, Grazyna
2015-01-01
Although attachment security has been associated with children's rule-compatible conduct, the mechanism through which attachment influences early regard for rules is not well established. We hypothesized that effortful control would mediate the link between security and indicators of children's emerging regard for rules (discomfort following rule violations, internalization of parents' and experimenter's rules, few externalizing behaviors). In a longitudinal study, the Attachment Q-Set was completed by parents, effortful control was observed, and Regard for Rules was observed and rated by parents. The proposed model fit the data well: Children's security to mothers predicted their effortful control, which in turn had a direct link to a greater Regard for Rules. Children's security with fathers did not predict effortful control. The mother-child relationship appears particularly important for positive developmental cascades of self-regulation and socialization. PMID:27158193
Efficient Web Services Policy Combination
NASA Technical Reports Server (NTRS)
Vatan, Farrokh; Harman, Joseph G.
2010-01-01
Large-scale Web security systems usually involve cooperation between domains with non-identical policies. The network management and Web communication software used by the different organizations presents a stumbling block. Many of the tools used by the various divisions do not have the ability to communicate network management data with each other. At best, this means that manual human intervention into the communication protocols used at various network routers and endpoints is required. Developing practical, sound, and automated ways to compose policies to bridge these differences is a long-standing problem. One of the key subtleties is the need to deal with inconsistencies and defaults where one organization proposes a rule on a particular feature, and another has a different rule or expresses no rule. A general approach is to assign priorities to rules and observe the rules with the highest priorities when there are conflicts. The present methods have inherent inefficiency, which heavily restrict their practical applications. A new, efficient algorithm combines policies utilized for Web services. The method is based on an algorithm that allows an automatic and scalable composition of security policies between multiple organizations. It is based on defeasible policy composition, a promising approach for finding conflicts and resolving priorities between rules. In the general case, policy negotiation is an intractable problem. A promising method, suggested in the literature, is when policies are represented in defeasible logic, and composition is based on rules for non-monotonic inference. In this system, policy writers construct metapolicies describing both the policy that they wish to enforce and annotations describing their composition preferences. These annotations can indicate whether certain policy assertions are required by the policy writer or, if not, under what circumstances the policy writer is willing to compromise and allow other assertions to take precedence. Meta-policies are specified in defeasible logic, a computationally efficient non-monotonic logic developed to model human reasoning. One drawback of this method is that at one point the algorithm starts an exhaustive search of all subsets of the set of conclusions of a defeasible theory. Although the propositional defeasible logic has linear complexity, the set of conclusions here may be large, especially in real-life practical cases. This phenomenon leads to an inefficient exponential explosion of complexity. The current process of getting a Web security policy from combination of two meta-policies consists of two steps. The first is generating a new meta-policy that is a composition of the input meta-policies, and the second is mapping the meta-policy onto a security policy. The new algorithm avoids the exhaustive search in the current algorithm, and provides a security policy that matches all requirements of the involved metapolicies.
Traffic accident in Cuiabá-MT: an analysis through the data mining technology.
Galvão, Noemi Dreyer; de Fátima Marin, Heimar
2010-01-01
The traffic road accidents (ATT) are non-intentional events with an important magnitude worldwide, mainly in the urban centers. This article aims to analyzes data related to the victims of ATT recorded by the Justice Secretariat and Public Security (SEJUSP) in hospital morbidity and mortality incidence at the city of Cuiabá-MT during 2006, using data mining technology. An observational, retrospective and exploratory study of the secondary data bases was carried out. The three database selected were related using the probabilistic method, through the free software RecLink. One hundred and thirty-nine (139) real pairs of victims of ATT were obtained. In this related database the data mining technology was applied with the software WEKA using the Apriori algorithm. The result generated 10 best rules, six of them were considered according to the parameters established that indicated a useful and comprehensible knowledge to characterize the victims of accidents in Cuiabá. Finally, the findings of the associative rules showed peculiarities of the road traffic accident victims in Cuiabá and highlight the need of prevention measures in the collision accidents for males.
78 FR 34264 - Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-07
...-AA03 Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules AGENCY: Office for... corrections address certain inadvertent errors and omissions in the HIPAA Privacy, Security, and Enforcement... (HHS or ``the Department'') published a final rule to implement changes to the HIPAA Privacy, Security...
1999-04-30
In accordance with 20 CFR 402.35(b)(1), the Commissioner of Social Security gives notice of Social Security Ruling, SSR 99-2p. This Ruling clarifies disability policy for the evaluation and adjudication of disability claims involving Chronic Fatigue Syndrome (CFS). This Ruling explains that, when it is accompanied by appropriate medical signs or laboratory findings, CFS is a medically determinable impairment that can be the basis for a finding of "disability." This Ruling ensures that all adjudicators will use the same policies and procedures in evaluating disability claims involving CFS, and provides a consolidated statement of these policies and procedures.
17 CFR 275.0-3 - References to rules and regulations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false References to rules and regulations. 275.0-3 Section 275.0-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.0-3 References to rules and...
Code of Federal Regulations, 2010 CFR
2010-04-01
... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-63949] Technical Amendments to...: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and Exchange Commission (``Commission'') is adopting technical amendments to Rule 17a-8 under the Securities...
Software security checklist for the software life cycle
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Wolfe, T. L.; Sherif, J. S.
2002-01-01
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Due to its criticality, security should be integrated as a formal approach in the software life cycle.
Secure it now or secure it later: the benefits of addressing cyber-security from the outset
NASA Astrophysics Data System (ADS)
Olama, Mohammed M.; Nutaro, James
2013-05-01
The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
NASA Astrophysics Data System (ADS)
Wang, Qiang
2017-09-01
As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.
17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...
17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...
17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...
17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Reclassification of securities... Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General... security in exchange for their existing security. Rule 145 embodies the Commission's determination that...
17 CFR 240.16b-6 - Derivative securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Derivative securities. 240.16b-6 Section 240.16b-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16b-6 - Derivative securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Derivative securities. 240.16b-6 Section 240.16b-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16c-4 - Derivative securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Derivative securities. 240.16c-4 Section 240.16c-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16a-4 - Derivative securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Derivative securities. 240.16a-4 Section 240.16a-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16a-4 - Derivative securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Derivative securities. 240.16a-4 Section 240.16a-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16a-4 - Derivative securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Derivative securities. 240.16a-4 Section 240.16a-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16c-4 - Derivative securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Derivative securities. 240.16c-4 Section 240.16c-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16a-4 - Derivative securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Derivative securities. 240.16a-4 Section 240.16a-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16c-4 - Derivative securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Derivative securities. 240.16c-4 Section 240.16c-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.16b-6 - Derivative securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Derivative securities. 240.16b-6 Section 240.16b-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.12b-3 - Title of securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Title of securities. 240.12b-3 Section 240.12b-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
Software For Monitoring A Computer Network
NASA Technical Reports Server (NTRS)
Lee, Young H.
1992-01-01
SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.
Using software security analysis to verify the secure socket layer (SSL) protocol
NASA Technical Reports Server (NTRS)
Powell, John D.
2004-01-01
nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.
Security Risks: Management and Mitigation in the Software Life Cycle
NASA Technical Reports Server (NTRS)
Gilliam, David P.
2004-01-01
A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.
17 CFR 300.502 - Claim for securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Claim for securities. 300.502 Section 300.502 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to Satisfaction...
Software Development Life Cycle Security Issues
NASA Astrophysics Data System (ADS)
Kaur, Daljit; Kaur, Parminder
2011-12-01
Security is now-a-days one of the major problems because of many reasons. Security is now-a-days one of the major problems because of many reasons. The main cause is that software can't withstand security attacks because of vulnerabilities in it which are caused by defective specifications design and implementation. We have conducted a survey asking software developers, project managers and other people in software development about their security awareness and implementation in Software Development Life Cycle (SDLC). The survey was open to participation for three weeks and this paper explains the survey results.
78 FR 66318 - Securities Investor Protection Corporation
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-05
...] Securities Investor Protection Corporation AGENCY: Securities and Exchange Commission. ACTION: Proposed rule. SUMMARY: The Securities Investor Protection Corporation (``SIPC'') filed a proposed rule change with the... satisfaction of customer claims for standardized options under the Securities Investor Protection Act of 1970...
Code of Federal Regulations, 2013 CFR
2013-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Code of Federal Regulations, 2012 CFR
2012-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Code of Federal Regulations, 2014 CFR
2014-04-01
... securities, block distributions, securities registrations and offerings, net change in corporate securities... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandoval, D. M.; Strittmatter, R. B.; Abeyta, J. D.
2004-01-01
The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access tomore » the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can accommodate several methods of positive identification including smart cards and biometrics. Currently, we have three mechanisms that provide added security for accountability and tracking purposes. One mechanism consists of a portable, hand-held inventory scanner, which allows the custodian to physically track the items that are not accessible within a particular area. The second mechanism is a radio frequency identification (RFID) consisting of a monitoring portal, which tracks and logs in a database all activity tagged of items that pass through the portals. The third mechanism consists of an electronic tagging of a flash memory device for automated inventory of CREM in storage. By modifying this USB device the user is provided with added assurance, limiting the data from being obtained from any other computer.« less
Software Security Knowledge: Training
2011-05-01
eliminating those erro~rs. It can be found at http:ffcwe.mitre.org/top25. Any programmer who writes C’Ode \\r-Vith~out betng aware of those proble ~ms a·nd...time on security. Ultimately, these reasons stem from an underlying problem in the software market . B~cause software is essentially a black·box, it is...security of software and start to effect change in the software market . Nevertheless, we still frequently get pushback when we advocate for security
17 CFR 201.104 - Business hours.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Business hours. 201.104 Section 201.104 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.104 Business hours. The Headquarters office of the Commission, at...
17 CFR 201.104 - Business hours.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Business hours. 201.104 Section 201.104 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.104 Business hours. The Headquarters office of the Commission, at...
17 CFR 201.104 - Business hours.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Business hours. 201.104 Section 201.104 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.104 Business hours. The Headquarters office of the Commission, at...
17 CFR 201.104 - Business hours.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Business hours. 201.104 Section 201.104 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.104 Business hours. The Headquarters office of the Commission, at...
17 CFR 201.104 - Business hours.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Business hours. 201.104 Section 201.104 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.104 Business hours. The Headquarters office of the Commission, at...
ERIC Educational Resources Information Center
Kramer, Aleksey
2013-01-01
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725
17 CFR 300.503 - Voidable securities transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to... right of the Securities Investor Protection Corporation, in a direct payment procedure under section 10... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Voidable securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... approve a proposed rule change of a self-regulatory organization if it finds that such proposed rule... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70848; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-20
... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Amend the...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described... Commission is publishing this notice to solicit comments on the proposed rule change from interested persons...
17 CFR 201.153 - Filing of papers: Signature requirement and effect.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Filing of papers: Signature requirement and effect. 201.153 Section 201.153 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature...
Addressing software security risk mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2003-01-01
The NASA Office of Safety and Mission Assurance (OSMA) has funded the Jet Propulsion Laboratory (JPL) with a Center Initiative, 'Reducing Software Security Risk through an Integrated Approach' (RSSR), to address this need. The Initiative is a formal approach to addressing software security in the life cycle through the instantiation of a Software Security Assessment Instrument (SSAI) for the development and maintenance life cycles.
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
NASA Technical Reports Server (NTRS)
Powell, John D.; Gilliam, David
2004-01-01
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.
Addressing software security and mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2003-01-01
Traditionally, security is viewed as an organizational and Information Technology (IIJ systems function comprising of Firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.
Addressing software security and mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2004-01-01
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.
2009-02-01
management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic
Proactive Security Testing and Fuzzing
NASA Astrophysics Data System (ADS)
Takanen, Ari
Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.
Automating Risk Analysis of Software Design Models
Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688
Automating risk analysis of software design models.
Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-04
... To Adopt FINRA Rules 4314 (Securities Loans and Borrowings), 4330 (Customer Protection--Permissible Use of Customers' Securities) and 4340 (Callable Securities) in the Consolidated FINRA Rulebook, as... loans and borrowings, permissible use of customers' securities, and callable securities as FINRA Rules...
78 FR 44729 - Disqualification of Felons and Other “Bad Actors” From Rule 506 Offerings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
...We are adopting amendments to our rules to implement Section 926 of the Dodd-Frank Wall Street Reform and Consumer Protection Act. Section 926 requires us to adopt rules that disqualify securities offerings involving certain ``felons and other `bad actors''' from reliance on Rule 506 of Regulation D. The rules must be ``substantially similar'' to Rule 262 under the Securities Act, which contains the disqualification provisions of Regulation A under the Securities Act, and must also cover matters enumerated in Section 926 of the Dodd-Frank Act (including certain state regulatory orders and bars).
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2012 CFR
2012-10-01
... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... covered entity to reasonably and appropriately implement the standards and implementation specifications...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2013 CFR
2013-10-01
... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... and appropriately implement the standards and implementation specifications as specified in this...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Futures contracts on security... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on security indexes trading on or subject to the rules of a foreign...
Formal assessment instrument for ensuring the security of NASA's networks, systems and software
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Powell, J. D.; Sherif, J.
2002-01-01
To address the problem of security for NASA's networks, systems and software, NASA has funded the Jet Propulsion Lab in conjunction with UC Davis to begin work on developing a software security assessment instrument for use in the software development and maintenance life cycle.
An ethernet/IP security review with intrusion detection applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laughter, S. A.; Williams, R. D.
2006-07-01
Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66941; File No. SR-CME-2012-06] Self-Regulatory... On March 9, 2012, Chicago Mercantile Exchange (``CME'') filed with the Securities and Exchange... Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder.\\2\\ The proposed rule change was...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-21
.... SUPPLEMENTARY INFORMATION: The Insider Trading and Securities Fraud Enforcement Act of 1988 authorized the... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 201 [Release No. 34-62921] Rescission of Rules... Trading AGENCY: Securities and Exchange Commission. ACTION: Final rule. SUMMARY: The Dodd-Frank Wall...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Withdrawal of Proposed New Rule A... Commission (the ``Commission'') a proposed rule change pursuant to Section 19(b)(1) of the Securities... municipal advisor assessments, and (ii) new Form A-11-Interim. Notice of the proposed rule change was...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-05
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2008-0050] RIN 0960-AE59... Payments for Certain Past- Due SSI Benefits AGENCY: Social Security Administration (SSA). ACTION: Final rules. SUMMARY: These final rules adopt, with some minor changes, the interim final rules with request...
17 CFR 240.14d-6 - Disclosure of tender offer information to security holders.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Disclosure of tender offer information to security holders. 240.14d-6 Section 240.14d-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and...
2013-01-25
The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.
75 FR 1566 - National Industrial Security Program Directive No. 1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part...: Information Security Oversight Office, NARA. ACTION: Proposed rule; correction. SUMMARY: This document... Management System (FDMS) number to the proposed rule for Information Security Oversight Office (ISOO...
Illegal Immigration in the United States: Implications for Rule of Law and National Security
2012-02-15
AIR WAR COLLEGE AIR UNIVERSITY ILLEGAL IMMIGRATION IN THE UNITED STATES: IMPLICATIONS FOR RULE OF LAW AND NATIONAL SECURITY By Paul A...government’s failure to strictly enforce immigration laws presents national security vulnerabilities and is subversive to the rule of law . Without...the rule of law , serious social tensions will occur that impel states and localities to fill the void left by the lack of immigration enforcement. In
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false General. 300.500 Section 300.500 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to Satisfaction of A...
78 FR 12129 - Rescission of Social Security Acquiescence Rulings 92-2(6)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0106] Rescission of Social Security Acquiescence Rulings 92-2(6) AGENCY: Social Security Administration. ACTION: Notice of Rescission of Social... accordance with 20 CFR 402.35(b)(2), 404.985(e) and 416.1485(e), the Commissioner of Social Security gives...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Enforcement and disciplinary proceedings: Availability of documents for inspection and copying. 201.230 Section 201.230 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice Initiation of Proceedings and Prehearing Rules §...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62125; File No. SR-ISE-2010-48] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by International Securities Exchange LLC To Amend ISE Rule 2102 To Provide for a Trading Pause for Individual Securities When the Price Moves Ten Percent or...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
... Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... Terms of Substance of the Proposed Rule Change The Exchange proposes to adopt ISE Rule 212 (Sales Value... supervision and regulation of the securities markets and securities professionals. To offset this obligation...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70909; File No. SR-NYSE-2013-72] Self... 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69613; File No. SR-EDGA-2013-13] Self... 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3... with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69614; File No. SR-EDGX-2013-17] Self... 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3... with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-09
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61831; File No. SR-NYSEArca-2010-20] Self... Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2... with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... Organizations; International Securities Exchange, LLC; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To List and Trade Option Contracts Overlying 10 Shares of a Security June... Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-27
... Organizations; International Securities Exchange, LLC; Notice of Withdrawal of Proposed Rule Change To List and... proposed rule change to list and trade option contracts overlying 10 shares of a security. Notice of the proposed rule change was published in the Federal Register on April 24, 2012.\\3\\ The Commission received...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69262; File No. SR-FINRA-2013-019] Self... Effectiveness of a Proposed Rule Change Relating to FINRA Rule 0180 (Application of Rules to Security-Based Swaps) April 1, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-01
... at the present time, and urged FINRA to study data collected on Asset-Backed Securities before making... to a recent rule change to the Rule 6700 Series,\\7\\ Agency Debt Securities and certain primary market... corporate debt securities;\\12\\ and \\12\\ See id. (14) In Rule 6700 Series, incorporate certain technical...
17 CFR 12.300 - Scope and applicability of rules.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Scope and applicability of rules. 12.300 Section 12.300 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS Rules Applicable to Formal Decisional Proceedings § 12.300 Scope and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
...We are adopting amendments to Rule 506 of Regulation D and Rule 144A under the Securities Act of 1933 to implement Section 201(a) of the Jumpstart Our Business Startups Act. The amendment to Rule 506 permits an issuer to engage in general solicitation or general advertising in offering and selling securities pursuant to Rule 506, provided that all purchasers of the securities are accredited investors and the issuer takes reasonable steps to verify that such purchasers are accredited investors. The amendment to Rule 506 also includes a non-exclusive list of methods that issuers may use to satisfy the verification requirement for purchasers who are natural persons. The amendment to Rule 144A provides that securities may be offered pursuant to Rule 144A to persons other than qualified institutional buyers, provided that the securities are sold only to persons that the seller and any person acting on behalf of the seller reasonably believe are qualified institutional buyers. We are also revising Form D to require issuers to indicate whether they are relying on the provision that permits general solicitation or general advertising in a Rule 506 offering. Also today, in a separate release, to implement Section 926 of the Dodd-Frank Wall Street Reform and Consumer Protection Act, we are adopting amendments to Rule 506 to disqualify issuers and other market participants from relying on Rule 506 if ``felons and other `bad actors' '' are participating in the Rule 506 offering. We are also today, in a separate release, publishing for comment a number of proposed amendments to Regulation D, Form D and Rule 156 under the Securities Act that are intended to enhance the Commission's ability to evaluate the development of market practices in Rule 506 offerings and address certain comments made in connection with implementing Section 201(a)(1) of the Jumpstart Our Business Startups Act.
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...
17 CFR 300.501 - Claim for cash.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Claim for cash. 300.501 Section 300.501 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to Satisfaction...
2008-03-01
executables. The current roadblock to detecting Type I Malware consistantly is the practice of legitimate software , such as antivirus programs, using this... Software Security Systems . . 31 3.2.2 Advantages of Hardware . . . . . . . . . . . . . 32 3.2.3 Trustworthiness of Information . . . . . . . . . 33...Towards a Hardware Security Backplane . . . . . . . . . 42 IV. Review of State of the Art Computer Security Solutions . . . . . 46 4.1 Software
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
....'' \\8\\ The rule requires prominent disclosure of the nature of the conflict, and in certain... Change To Adopt FINRA Rule 5121 (Public Offerings of Securities With Conflicts of Interest) in the... FINRA Rule 5121 (Public Offerings of Securities With Conflicts of Interest) (``Rule'') in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
...-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for, the Proposed Rule Change The...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Rules Relating to Authority To Suspend or Waive NSCC Rules and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Temporary registration as a....15Ba2-6T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Temporary registration as a....15Ba2-6T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Temporary registration as a....15Ba2-6T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Temporary registration as a....15Ba2-6T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
17 CFR 202.6 - Adoption, revision, and rescission of rules and regulations of general application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Adoption, revision, and rescission of rules and regulations of general application. 202.6 Section 202.6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.6 Adoption, revision, and rescission of rules and regulations of...
17 CFR 240.12f-5 - Exchange rules for securities to which unlisted trading privileges are extended.
Code of Federal Regulations, 2011 CFR
2011-04-01
... to which unlisted trading privileges are extended. 240.12f-5 Section 240.12f-5 Commodity and... EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-5 Exchange rules for securities to which unlisted trading privileges are extended. A national...
17 CFR 240.12f-5 - Exchange rules for securities to which unlisted trading privileges are extended.
Code of Federal Regulations, 2013 CFR
2013-04-01
... to which unlisted trading privileges are extended. 240.12f-5 Section 240.12f-5 Commodity and... EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-5 Exchange rules for securities to which unlisted trading privileges are extended. A national...
17 CFR 240.12f-5 - Exchange rules for securities to which unlisted trading privileges are extended.
Code of Federal Regulations, 2012 CFR
2012-04-01
... to which unlisted trading privileges are extended. 240.12f-5 Section 240.12f-5 Commodity and... EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-5 Exchange rules for securities to which unlisted trading privileges are extended. A national...
17 CFR 240.12f-5 - Exchange rules for securities to which unlisted trading privileges are extended.
Code of Federal Regulations, 2010 CFR
2010-04-01
... to which unlisted trading privileges are extended. 240.12f-5 Section 240.12f-5 Commodity and... EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-5 Exchange rules for securities to which unlisted trading privileges are extended. A national...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-02
.... 78o-4(b)(2)(C). In the filing, the Exchange notes its belief that the proposed rule change relating to... Organizations; International Securities Exchange, LLC; Order Granting Approval of a Proposed Rule Change To...'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to amend Rule 720, Obvious and Catastrophic...
Rule groupings: A software engineering approach towards verification of expert systems
NASA Technical Reports Server (NTRS)
Mehrotra, Mala
1991-01-01
Currently, most expert system shells do not address software engineering issues for developing or maintaining expert systems. As a result, large expert systems tend to be incomprehensible, difficult to debug or modify and almost impossible to verify or validate. Partitioning rule based systems into rule groups which reflect the underlying subdomains of the problem should enhance the comprehensibility, maintainability, and reliability of expert system software. Attempts were made to semiautomatically structure a CLIPS rule base into groups of related rules that carry the same type of information. Different distance metrics that capture relevant information from the rules for grouping are discussed. Two clustering algorithms that partition the rule base into groups of related rules are given. Two independent evaluation criteria are developed to measure the effectiveness of the grouping strategies. Results of the experiment with three sample rule bases are presented.
17 CFR 240.6a-2 - Amendments to application.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 240.6a-2 - Amendments to application.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 240.6a-2 - Amendments to application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 240.14a-17 - Electronic shareholder forums.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Electronic shareholder forums. 240.14a-17 Section 240.14a-17 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major... public comment to establish capital, margin, and segregation requirements for security-based swap dealers... soliciting comment on proposed rules and rule amendments establishing capital, margin, and segregation...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... Business October 12, 2010. I. Introduction On August 25, 2010, the Municipal Securities Rulemaking Board... contributions and prohibitions on municipal securities business. The proposed rule change was published for... prohibitions on municipal securities business.\\4\\ Under Rule G-37, certain contributions to elected officials...
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-09
... Contracts Overlying 10 Shares of a Security (``Mini-Options Contracts'') and Implementing Rule Text... contracts'') and implement rule text necessary to distinguish mini-options contracts from option contracts overlying 100 shares of a security (``standard contracts''). The text of the proposed rule change is...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
... waive FICC's rules, procedures, and regulations of the Mortgage-Backed Securities Division. II. Self... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62796; File No. SR-FICC-2010-06] Self... Proposed Rule Change To Amend Rules Relating to Authority To Waive Rules, Procedures, and Regulations of...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 41.13 Section 41.13 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
Interactive Synthesis of Code Level Security Rules
2017-04-01
Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University
5 CFR 9701.502 - Rule of construction.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.502 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.502 Rule of construction. In interpreting this...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63599; File No. SR-MSRB-2010-16] Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Amendments to Rule G-5, on Disciplinary Actions by Appropriate Regulatory Agencies, Remedial Notices by Registered Securities Associations; and Rule G-17, on Conduct...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Requirements for cancellation....17Ad-19 Section 240.17Ad-19 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 240.6a-3 - Supplemental material to be filed by exchanges.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Supplemental material to be filed by exchanges. 240.6a-3 Section 240.6a-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
17 CFR 240.6a-3 - Supplemental material to be filed by exchanges.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Supplemental material to be filed by exchanges. 240.6a-3 Section 240.6a-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
17 CFR 240.6a-3 - Supplemental material to be filed by exchanges.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Supplemental material to be filed by exchanges. 240.6a-3 Section 240.6a-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
17 CFR 240.6a-3 - Supplemental material to be filed by exchanges.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Supplemental material to be filed by exchanges. 240.6a-3 Section 240.6a-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
17 CFR 240.6a-3 - Supplemental material to be filed by exchanges.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Supplemental material to be filed by exchanges. 240.6a-3 Section 240.6a-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
...-Laws and Rules to security futures on index-linked securities such as exchange-traded notes, which are currently traded on OneChicago, LLC. Index-linked securities are non-convertible debt of a major financial... futures contracts, one or more physical commodities, currencies or debt securities, or a combination of...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
75 FR 81683 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-28
..., dealer, or underwriter (``securities-related businesses''). Rule 12d3-1 (``Exemption of acquisitions of securities issued by persons engaged in securities related businesses'' (17 CFR 270.12d3-1)) permits a fund... percent of its gross revenues from securities-related businesses, but a fund may not rely on rule 12d3-1...
78 FR 70974 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
..., dealer, or underwriter (``securities-related businesses''). Rule 12d3-1 (``Exemption of acquisitions of securities issued by persons engaged in securities related businesses'' (17 CFR 270.12d3-1)) permits a fund... percent of its gross revenues from securities-related businesses, but a fund may not rely on rule 12d3-1...
17 CFR 240.14d-2 - Commencement of a tender offer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Commencement of a tender offer. 240.14d-2 Section 240.14d-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64769; File No. SR-NSCC-2011-04] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder \\2...
17 CFR 240.14a-12 - Solicitation before furnishing a proxy statement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Solicitation before furnishing a proxy statement. 240.14a-12 Section 240.14a-12 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... registrations and offerings, net change in corporate securities outstanding, working capital of U.S... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
17 CFR 240.15b9-1 - Exemption for certain exchange members.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for certain exchange members. 240.15b9-1 Section 240.15b9-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Rule 5.2(j)(3), the Exchange's listing standards for Investment Company Units (``Units'').\\3\\ \\3\\ An Investment Company Unit is a security that represents an interest in a registered investment company that... of securities (or holds securities in another registered investment company that holds securities...
Computer software tool REALM for sustainable water allocation and management.
Perera, B J C; James, B; Kularathna, M D U
2005-12-01
REALM (REsource ALlocation Model) is a generalised computer simulation package that models harvesting and bulk distribution of water resources within a water supply system. It is a modeling tool, which can be applied to develop specific water allocation models. Like other water resource simulation software tools, REALM uses mass-balance accounting at nodes, while the movement of water within carriers is subject to capacity constraints. It uses a fast network linear programming algorithm to optimise the water allocation within the network during each simulation time step, in accordance with user-defined operating rules. This paper describes the main features of REALM and provides potential users with an appreciation of its capabilities. In particular, it describes two case studies covering major urban and rural water supply systems. These case studies illustrate REALM's capabilities in the use of stochastically generated data in water supply planning and management, modelling of environmental flows, and assessing security of supply issues.
Cyber security best practices for the nuclear industry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badr, I.
2012-07-01
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
75 FR 55295 - List of Rules To Be Reviewed Pursuant to the Regulatory Flexibility Act
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
...-3078, IC-29408; File No. S7-20-10] List of Rules To Be Reviewed Pursuant to the Regulatory Flexibility Act AGENCY: Securities and Exchange Commission. ACTION: Publication of list of rules scheduled for review. SUMMARY: The Securities and Exchange Commission is today publishing a list of rules to be...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70918; File No. SR-NYSEArca-2013-42] Self... August 20, 2013, NYSEArca, Inc. (``NYSEArca'' or the ``Exchange'') filed with the Securities and Exchange...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to amend NYSEArca Rule 6.72 to make permanent the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Withdrawal of Proposed Rule G-36... Application of Proposed Rule G-36 to Municipal Advisors September 26, 2011. On August 23, 2011, the Municipal...\\ and Rule 19b-4 thereunder,\\2\\ consisting of proposed Rule G-36 (on fiduciary duty of municipal...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... Business) and Rule G-8 (Books and Records To Be Made by Brokers, Dealers and Municipal Securities Dealers... business) and Rule G-8 (books and records to be made by brokers, dealers and municipal securities dealers...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-27
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR) 12-X(8); Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011); Whether a National Guard Technician Who.... Acquiescence Ruling 12-X(8) Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011): Whether a National Guard...
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
2010-08-22
Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63309; File No. SR-MSRB-2010-16] Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Amendments to Rule G-5, on Disciplinary Actions by Appropriate Regulatory Agencies, Remedial Notices by Registered Securities Associations; and Rule G-17, on Conduct of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62523; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to... Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... other things, clarify the scope of products proposed to be cleared, add new Rule 207(f) prohibiting FCM.... securities laws (i.e., LIFFE futures and options on equity securities) (the ``LIFFE securities products... facility for purposes of trading such products. In addition, only certain LIFFE securities products are...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71172; File No. SR-MIAX-2013-58] Self...) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby...'') filed with the Securities and Exchange Commission (``Commission'') a proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70362; File No. SR-ISE-2013-42] Self-Regulatory..., 2013, International Securities Exchange, LLC (``Exchange'') filed with the Securities and Exchange...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade options on the Nations VolDex...
17 CFR 240.36a1-2 - Exemption from SIPA for OTC derivatives dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from SIPA for OTC derivatives dealers. 240.36a1-2 Section 240.36a1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63095; File No. SR-MSRB-2010-10] Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Consisting of Amendments to Rule A-13 To Increase Transaction Assessments for Certain Municipal Securities Transactions Reported to the Board and To...
Rule groupings: An approach towards verification of expert systems
NASA Technical Reports Server (NTRS)
Mehrotra, Mala
1991-01-01
Knowledge-based expert systems are playing an increasingly important role in NASA space and aircraft systems. However, many of NASA's software applications are life- or mission-critical and knowledge-based systems do not lend themselves to the traditional verification and validation techniques for highly reliable software. Rule-based systems lack the control abstractions found in procedural languages. Hence, it is difficult to verify or maintain such systems. Our goal is to automatically structure a rule-based system into a set of rule-groups having a well-defined interface to other rule-groups. Once a rule base is decomposed into such 'firewalled' units, studying the interactions between rules would become more tractable. Verification-aid tools can then be developed to test the behavior of each such rule-group. Furthermore, the interactions between rule-groups can be studied in a manner similar to integration testing. Such efforts will go a long way towards increasing our confidence in the expert-system software. Our research efforts address the feasibility of automating the identification of rule groups, in order to decompose the rule base into a number of meaningful units.
An Analysis of Open Source Security Software Products Downloads
ERIC Educational Resources Information Center
Barta, Brian J.
2014-01-01
Despite the continued demand for open source security software, a gap in the identification of success factors related to the success of open source security software persists. There are no studies that accurately assess the extent of this persistent gap, particularly with respect to the strength of the relationships of open source software…
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-23
... Rule Change To Adopt a New Order Type March 19, 2012. Pursuant to Section 19(b)(1) of the Securities... of the Proposed Rule Change The Exchange proposes to amend Rule 715 (Types of Orders) to adopt a new order type. The text of the proposed rule change is available on the Exchange's Internet Web site at...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... to Amend MSRB Rule A-3, on Membership on the Board, To Modify the Standard of Independence for Public... Securities Exchange Act of 1934 (the ``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change consisting of amendments to MSRB Rule A-3 to modify the standard of independence for public Board members...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
... Rule Change To Amend Its Rules Related to Mini Options Traded on the Exchange March 15, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4... rule change as described in Items I and II, which items have been prepared by the Exchange. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
..., Inc. To Make a Technical Adjustment to Its Rules To Allow Sub-Penny Quoting of Certain Securities... adjustment to its rules to allow sub-penny quoting of certain securities priced less than $1.00. The text of... to make a technical adjustment its rules to allow sub-penny quoting of Investment Company Units...
78 FR 77173 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... because they effect transactions in securities futures products. The information obtained from Rule 17a-13... time complying with the rule, given that they do not do a public securities business or do not hold... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request...
17 CFR 41.32 - Continuing obligations.
Code of Federal Regulations, 2014 CFR
2014-04-01
... the Securities and Exchange Commission or with a futures association registered under section 17 of... board of trade lists a security futures product for trading; (iii) Provide the Commission with any new rules or rule amendments that relate to the trading of security futures products, including both...
Automatic Learning of Fine Operating Rules for Online Power System Security Control.
Sun, Hongbin; Zhao, Feng; Wang, Hao; Wang, Kang; Jiang, Weiyong; Guo, Qinglai; Zhang, Boming; Wehenkel, Louis
2016-08-01
Fine operating rules for security control and an automatic system for their online discovery were developed to adapt to the development of smart grids. The automatic system uses the real-time system state to determine critical flowgates, and then a continuation power flow-based security analysis is used to compute the initial transfer capability of critical flowgates. Next, the system applies the Monte Carlo simulations to expected short-term operating condition changes, feature selection, and a linear least squares fitting of the fine operating rules. The proposed system was validated both on an academic test system and on a provincial power system in China. The results indicated that the derived rules provide accuracy and good interpretability and are suitable for real-time power system security control. The use of high-performance computing systems enables these fine operating rules to be refreshed online every 15 min.
Secure software practices among Malaysian software practitioners: An exploratory study
NASA Astrophysics Data System (ADS)
Mohamed, Shafinah Farvin Packeer; Baharom, Fauziah; Deraman, Aziz; Yahya, Jamaiah; Mohd, Haslina
2016-08-01
Secure software practices is increasingly gaining much importance among software practitioners and researchers due to the rise of computer crimes in the software industry. It has become as one of the determinant factors for producing high quality software. Even though its importance has been revealed, its current practice in the software industry is still scarce, particularly in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collection purpose whilst statistical methods such as frequency, mean, and cross tabulation are used for data analysis. Outcomes from this study reveal that software practitioners are becoming increasingly aware on the importance of secure software practices, however, they lack of appropriate implementation, which could affect the quality of produced software.
76 FR 11828 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-03
... businesses''). Rule 12d3-1 (``Exemption of acquisitions of securities issued by persons engaged in securities... businesses, but a fund may not rely on rule 12d3-1 to acquire securities of its own investment adviser or any... ability to take advantage of the fund, because it is not in a position to direct the fund's securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-19
... securities laws. It is suggested that the Company consult with corporate/securities counsel in assessing its... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68053; File No. SR-NASDAQ-2012-118] Self... Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-16
... securities product (``UTP Derivative Security'') that derives its value from one or more currencies or..., proposed EDGA Rule 14.1(c)(5)(A) provides that a Restricted Market Maker in a UTP Derivative Security on... Reference Asset of that UTP Derivative Security, or any derivative instrument based on a Reference Asset of...
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Powell, J. D.
2002-01-01
This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.
5 CFR 4.3 - Prohibition against securing withdrawal from competition.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Prohibition against securing withdrawal from competition. 4.3 Section 4.3 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE RULES PROHIBITED PRACTICES (RULE IV) § 4.3 Prohibition against securing withdrawal from competition. No...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
...-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY: Securities and Exchange Commission. ACTION: Proposed rule; correction. SUMMARY: The..., October 25, 2010 / Proposed Rules#0;#0; [[Page 65442
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Rule 604, Continuing Education for Registered Persons, and To Adopt a... proposing to amend Rule 604 to clarify the current continuing education requirements for registered persons...
20 CFR 416.1141 - When the presumed value rule applies.
Code of Federal Regulations, 2011 CFR
2011-04-01
....1141 Section 416.1141 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1141 When the presumed value rule applies. The presumed value rule applies whenever we must count in-kind support and...
20 CFR 416.1131 - The one-third reduction rule.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 416.1131 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1131 The one-third reduction rule. (a) What the rule is. Instead of determining the actual dollar value of in-kind support and...
20 CFR 416.1140 - The presumed value rule.
Code of Federal Regulations, 2010 CFR
2010-04-01
....1140 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1140 The presumed value rule. (a) How we apply the presumed value rule. (1) When you receive in-kind support and maintenance and the one...
20 CFR 416.1141 - When the presumed value rule applies.
Code of Federal Regulations, 2010 CFR
2010-04-01
....1141 Section 416.1141 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1141 When the presumed value rule applies. The presumed value rule applies whenever we must count in-kind support and...
20 CFR 416.1131 - The one-third reduction rule.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 416.1131 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1131 The one-third reduction rule. (a) What the rule is. Instead of determining the actual dollar value of in-kind support and...
Security Verification Techniques Applied to PatchLink COTS Software
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Powell, John D.; Bishop, Matt; Andrew, Chris; Jog, Sameer
2006-01-01
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification instruments were developed and then piloted on PatchLink's UNIX Agent, a Commercial-Off-The-Shelf (COTS) software product, to assess the value of the instruments and the approach. The two instruments are the Flexible Modeling Framework (FMF) -- a model-based verification instrument (JPL), and a Property-Based Tester (UC Davis). Security properties were formally specified for the COTS artifact and then verified using these instruments. The results were then reviewed to determine the effectiveness of the approach and the security of the COTS product.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-10
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62019; File No. SR-NYSEArca-2010-16] Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change Amending Rule 6.37A and Rule 6.64 April 30, 2010. On March 11, 2010, NYSE Arca, Inc. (``NYSE Arca'' or ``Exchange'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... Activities; Proposed Information Collection; Comment Request; Securities Exchange Act Disclosure Rules (12 CFR Part 11) and Securities of Federal Savings Associations (12 CFR Part 194) AGENCY: Office of the... concerning its information collection titled, ``Securities Exchange Act Disclosure Rules (12 CFR part 11) and...
26 CFR 53.4941(d)-4 - Transitional rules.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Transitional rules. (a) Certain transactions involving securities acquired by a foundation before May 27, 1969... of self-dealing if such transaction is pursuant to the terms of securities of such corporation, if such terms were in existence at the time such securities were acquired by the foundation, and if such...
76 FR 35055 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... provided for in the following rule: Rule 17f-2(e) (17 CFR 240.17f-2(e)) under the Securities Exchange Act... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request, Copies Available From: U.S. Securities and Exchange Commission, Office of Investor Education and Advocacy...
17 CFR 201.411 - Commission consideration of initial decisions by hearing officers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission consideration of initial decisions by hearing officers. 201.411 Section 201.411 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice Appeal to the Commission and...
77 FR 18716 - Transportation Security Administration Postal Zip Code Change; Technical Amendment
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-28
... organizational changes and it has no substantive effect on the public. DATES: Effective March 28, 2012. FOR... No. 1572-9] Transportation Security Administration Postal Zip Code Change; Technical Amendment AGENCY: Transportation Security Administration, DHS. ACTION: Final rule. SUMMARY: This rule is a technical change to...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-25
... as Medicare Part D) premiums. This new subpart implemented changes made to the Social Security Act... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 418 [Docket No. SSA-2010-0029] RIN 0960-AH22... Coverage Premiums AGENCY: Social Security Administration. ACTION: Final rule. SUMMARY: This final rule...
76 FR 80241 - Revisions to Rules of Conduct and Standards of Responsibility for Representatives
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-23
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0016] RIN 0960-AH32 Revisions to Rules of Conduct and Standards of Responsibility for Representatives AGENCY: Social Security.... FOR FURTHER INFORMATION CONTACT: Andrew Maunz, Office of the General Counsel, Social Security...
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory
NASA Astrophysics Data System (ADS)
Cranor, Lorrie Faith
How can we make security and privacy software more usable? The first step is to study our users. Ideally, we would watch them interacting with security or privacy software in situations where they face actual risk. But everyday computer users don't sit around fiddling with security software, and subjecting users to actual security attacks raises ethical and legal concerns. Thus, it can be difficult to observe users interacting with security and privacy software in their natural habitat. At the CyLab Usable Privacy and Security Laboratory, we've conducted a wide variety of studies aimed at understanding how users think about security and privacy and how they interact with security and privacy software. In this talk I'll give a behind the scenes tour of some of the techniques we've used to study users both in the laboratory and in the wild. I'll discuss the trials and tribulations of designing and carrying out security and privacy user studies, and highlight some of our surprising observations. Find out what privacy-sensitive items you can actually get study participants to purchase, how you can observe users' responses to a man-in-the-middle attack without actually conducting such an attack, why it's hard to get people to use high tech cell phones even when you give them away, and what's actually in that box behind the couch in my office.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-28
... instrumentalities, or purchase more than 10% of the voting securities of any one issuer, with respect to 75% of the... in, or are secured by and payable from, mortgage loans on real property. The ETF will not purchase... unregistered securities, including Rule 144A securities, that are purchased directly from the issuer or in the...
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Internal risk management control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
17 CFR 260.0-3 - Definition of “rules and regulations” as used in certain sections of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of ârules and regulationsâ as used in certain sections of the Act. 260.0-3 Section 260.0-3 Commodity and Securities Exchanges... Terms Used in the Rules and Regulations § 260.0-3 Definition of “rules and regulations” as used in...
Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals
2014-10-01
of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
....'' \\5\\ The rule requires prominent disclosure of the nature of the conflict, and in certain... Change To Adopt FINRA Rule 5121 (Public Offerings of Securities With Conflicts of Interest) in the... (Public Offerings of Securities With Conflicts of Interest) as a FINRA rule in the consolidated FINRA...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-08
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Consisting of Amendments to Streamline New Issue Information Submission Requirements Under MSRB Rules G-32... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-27
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of a Proposed Rule Change To Amend Rule G-34 on CUSIP Numbers, New Issue, and Market Information Requirements September 21... consisting of amendments to Rule G-34 on CUSIP numbers, new issue, and market information requirements. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-25
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67888; File No. SR-BATS-2012-030] Self-Regulatory Organizations; BATS Exchange, Inc.; Order Granting Approval of Proposed Rule Change To Amend BATS Rule 14.11, Entitled ``Other Securities'' September 19, 2012. I. Introduction On July 20, 2012, BATS...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... Municipal Market Access System (EMMA[supreg]) December 23, 2009. On July 14, 2009, the Municipal Securities... Municipal Market Access System (EMMA[supreg]). The proposed rule change was published for comment in the... Municipal Market Access system (``EMMA'') (as amended, the ``proposed rule change''). The proposed rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-07
... purchasing of supplies. SIFMA noted that it understood why the wording of the gift prohibition for municipal... the Municipal Securities Rulemaking Board Consisting of Amendments to MSRB Rule G-20 (Gifts and... Commission a proposed rule change consisting of proposed amendments to MSRB Rule G-20 (on gifts and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69596; File No. SR-NSCC-2013-06] Self... Effectiveness of Proposed Rule Change To Modify Fees Related to Portfolio Composition File Reporting in Addendum... Portfolio Composition File Reporting in Addendum A of NSCC's Rules and Procedures (``Rules''), as described...
Open source IPSEC software in manned and unmanned space missions
NASA Astrophysics Data System (ADS)
Edwards, Jacob
Network security is a major topic of research because cyber attackers pose a threat to national security. Securing ground-space communications for NASA missions is important because attackers could endanger mission success and human lives. This thesis describes how an open source IPsec software package was used to create a secure and reliable channel for ground-space communications. A cost efficient, reproducible hardware testbed was also created to simulate ground-space communications. The testbed enables simulation of low-bandwidth and high latency communications links to experiment how the open source IPsec software reacts to these network constraints. Test cases were built that allowed for validation of the testbed and the open source IPsec software. The test cases also simulate using an IPsec connection from mission control ground routers to points of interest in outer space. Tested open source IPsec software did not meet all the requirements. Software changes were suggested to meet requirements.
Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler, Andrew B; Fehn, Amy K
2003-01-01
With the passing of the Health Insurance Portability and Accountability Act (HIPAA) privacy rule deadline and the security rule deadline looming, many covered entities are left wondering if they are doing enough to prevent privacy and security breaches and what type of exposure their organization could face in the event of a breach.
Code of Federal Regulations, 2010 CFR
2005-04-01
... 17 Commodity and Securities Exchanges 3 2005-04-01 2005-04-01 false Content. 260.10b-5 Section 260.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rule Under Section 310 § 260.10b-5 Content. (a) Each...
Code of Federal Regulations, 2010 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Content. 260.10b-5 Section 260.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rule Under Section 310 § 260.10b-5 Content. (a) Each...
Code of Federal Regulations, 2010 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Content. 260.4d-8 Section 260.4d-8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 304 § 260.4d-8 Content. (a) Each...
Code of Federal Regulations, 2010 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Content. 260.10b-5 Section 260.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rule Under Section 310 § 260.10b-5 Content. (a) Each...
Code of Federal Regulations, 2010 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Content. 260.4d-8 Section 260.4d-8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 304 § 260.4d-8 Content. (a) Each...
Code of Federal Regulations, 2010 CFR
2005-04-01
... 17 Commodity and Securities Exchanges 3 2005-04-01 2005-04-01 false Content. 260.4d-8 Section 260.4d-8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 304 § 260.4d-8 Content. (a) Each...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63955; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval of a Proposed Rule Change To Modify Qualified Contingent Cross Order Rules February 24, 2011. I. Introduction On July 14, 2010, the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70877; File No. SR-MIAX-2013-48] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend MIAX Rules 1302, 1304 and the MIAX Options Fee Schedule...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67621; File No. SR-FICC-2012-05] Self... Corporation (``FICC'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change SR-FICC-2012-05 pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'').\\1...
16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.
Code of Federal Regulations, 2010 CFR
2010-01-01
... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...
16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.
Code of Federal Regulations, 2011 CFR
2011-01-01
... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...
13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...
13 CFR 107.1580 - Special rules for In-Kind Distributions by Licensees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security as of the declaration date of the Distribution (if you are a Corporate Licensee) or the...) Participating Securities Leverage § 107.1580 Special rules for In-Kind Distributions by Licensees. (a) In-Kind Distributions while Licensee has outstanding Participating Securities. A Distribution under §§ 107.1540, 107...
16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.
Code of Federal Regulations, 2012 CFR
2012-01-01
... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...
16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.
Code of Federal Regulations, 2014 CFR
2014-01-01
... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...
16 CFR 801.13 - Aggregation of voting securities, assets and non-corporate interests.
Code of Federal Regulations, 2013 CFR
2013-01-01
... COVERAGE RULES § 801.13 Aggregation of voting securities, assets and non-corporate interests. (a) Voting... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Aggregation of voting securities, assets and non-corporate interests. 801.13 Section 801.13 Commercial Practices FEDERAL TRADE COMMISSION RULES...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-21
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Limit Up/Limit Down March 15, 2013. Pursuant to Section 19(b)(1) of the... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66965; File No. SR-NYSEARCA-2012-38] Self... Change To Amend NYSE Arca Equities Rule 5.2(j)(1), the Exchange's ``Other Securities'' Listing Standard, To Delete a Provision Providing That If a Security Listed Under the Rule Contains Redemption...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-02
... proceeding were required to file system security statements under the Commission's rules. (Security systems..., including broadband Internet access and interconnected VoIP providers, must file updates to their systems... Commission's rules, the information in the CALEA security system filings and petitions will not be made...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... rule change related to FINRA's Trading Activity Fee (``TAF'') for transactions in Covered Securities... Schedule A to the FINRA By-Laws to adjust the rate of FINRA's TAF for transactions in Covered Securities... subject to Municipal Securities Rulemaking Board reporting requirements. The rules governing the TAF also...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... Rule 5270 defines the term ``related financial instrument'' as ``any option, derivative, security-based... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70625; File No. SR-EDGA-2013-29] Self...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...
78 FR 29162 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... list and trade a new derivative securities product without submitting a proposed rule change pursuant... derivative securities products traded on the SROs, Rule 19b-4(e) requires an SRO to file a summary form, Form 19b- 4(e), to notify the Commission when the SRO begins trading a new derivative securities product...
75 FR 2435 - Addition to the List of Validated End-Users in the People's Republic of China (PRC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 748 [Docket No. 0908111226... (PRC) AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: In this final rule, the Bureau of Industry and Security (BIS) amends the Export Administration Regulations (EAR) to...
ERIC Educational Resources Information Center
Benson, Allen C.
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
New Software for Ensemble Creation in the Spitzer-Space-Telescope Operations Database
NASA Technical Reports Server (NTRS)
Laher, Russ; Rector, John
2004-01-01
Some of the computer pipelines used to process digital astronomical images from NASA's Spitzer Space Telescope require multiple input images, in order to generate high-level science and calibration products. The images are grouped into ensembles according to well documented ensemble-creation rules by making explicit associations in the operations Informix database at the Spitzer Science Center (SSC). The advantage of this approach is that a simple database query can retrieve the required ensemble of pipeline input images. New and improved software for ensemble creation has been developed. The new software is much faster than the existing software because it uses pre-compiled database stored-procedures written in Informix SPL (SQL programming language). The new software is also more flexible because the ensemble creation rules are now stored in and read from newly defined database tables. This table-driven approach was implemented so that ensemble rules can be inserted, updated, or deleted without modifying software.
Process Improvement Should Link to Security: SEPG 2007 Security Track Recap
2007-09-01
the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-18
... Rule Change Relating to Customer Fees for the Block Order Mechanism March 9, 2010. Pursuant to Section...'' or the ``ISE'') filed with the Securities and Exchange Commission the proposed rule change, as... publishing this notice to solicit comments on the proposed rule change from interested persons. \\1\\ 15 U.S.C...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65113; File No. SR-BATS-2011-028] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of Proposed Rule Change To Amend BATS Rule 11... on August 8, 2011, BATS Exchange, Inc. (the ``Exchange'' or ``BATS'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62340; File No. SR-BATS-2010-016] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of Proposed Rule Change To Amend BATS Rule 11... on June 17, 2010, BATS Exchange, Inc. (the ``Exchange'' or ``BATS'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70910; File No. SR-NYSEMKT-2013-91] Self... the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is hereby... and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II below...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70299; File No. SR-MIAX-2013-40] Self-Regulatory Organizations: Notice of Filing and Immediate Effectiveness of a Proposed Rule Change by Miami.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
...) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is...'') filed with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as... Commission is publishing this notice to solicit comments on the proposed rule change from interested persons...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... Organizations; The Options Clearing Corporation; Notice of Filing of Proposed Rule Change To Accommodate... Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice... the Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND... Commission in pamphlet form. All SEC public rules and regulations, including its Rules of Practice, are contained in title 17 of the Code of Federal Regulations, which also is available for purchase from the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69201; File No. SR-ICC-2013-03] Self-Regulatory Organizations; ICE Clear Credit LLC; Notice of Filing of Proposed Rule Change To Amend Rules Relating to..., 2013, ICE Clear Credit LLC (``ICC'') filed with the Securities and Exchange Commission (``Commission...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71032; File No. SR-ICC-2013-08] Self-Regulatory Organizations; ICE Clear Credit LLC; Notice of Withdrawal of Proposed Rule Change To Add Rules Related to the... October 25, 2013, ICE Clear Credit LLC (``ICC'') filed with the Securities and Exchange Commission...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-07
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68337; File No. SR-ICC-2012-18] Self-Regulatory Organizations; ICE Clear Credit LLC; Notice of Withdrawal of Proposed Rule Change To Add Rules Related to the... 28, 2012, ICE Clear Credit LLC (``ICC'') filed with the Securities and Exchange Commission...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66777; File No. SR-ICC-2012-04] Self-Regulatory Organizations; ICE Clear Credit LLC; Notice of Filing of Proposed Rule Change To Add Rules Related to the... April 3, 2012, ICE Clear Credit LLC (``ICC'') filed with the Securities and Exchange Commission...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 5 2013-10-01 2013-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 5 2012-10-01 2012-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 5 2014-10-01 2014-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
49 CFR 393.128 - What are the rules for securing automobiles, light trucks and vans?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 5 2011-10-01 2011-10-01 false What are the rules for securing automobiles, light... automobiles, light trucks and vans? (a) Applicability. The rules in this section apply to the transportation of automobiles, light trucks, and vans which individually weigh 4,536 kg. (10,000 lb) or less...
76 FR 33297 - Consumer Advisory Council; Notice of Meeting of the Consumer Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
..., in Dining Room E on the Terrace Level of the Martin Building. For security purposes, anyone planning.... Proposed Rules Regarding Ability to Pay for Mortgage Loans Members will discuss the Board's proposed rules... on a proposed rule that would require sponsors of asset-backed securities to retain at least 5...
78 FR 9691 - Proposed Agency Information Collection Activities; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-11
... Securities Rulemaking Board (MSRB) to promulgate rules requiring municipal security dealers to file reports..., Section 15B(c) of the Act provides that ARAs may enforce compliance with the SEC's and MSRB's rules. 15 U... other ARAs to make rules and regulations in order to implement the provisions of the Act. 15 U.S.C. 78w...
49 CFR 393.130 - What are the rules for securing heavy vehicles, equipment and machinery?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing heavy vehicles... heavy vehicles, equipment and machinery? (a) Applicability. The rules in this section apply to the transportation of heavy vehicles, equipment and machinery which operate on wheels or tracks, such as front end...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-06
... Rule Change To Adopt Gateway Fees November 30, 2012. Pursuant to Section 19(b)(1) of the Securities... below, which items have been prepared by the self- regulatory organization. The Commission is publishing... of the Proposed Rule Change The ISE proposes to adopt gateway fees. The text of the proposed rule...
Visualizing and understanding l'hopital's rule
NASA Astrophysics Data System (ADS)
Gordon, Sheldon P.
2017-11-01
This article uses dynamic software in Excel to demonstrate several ways in which graphical and numerical approaches can be introduced both to enhance student understanding of l'Hopital's Rule and to explain why the Rule actually works to give the 'right' answers. One of the approaches used is to visualize what is happening by examining the limits with both l'Hopital's Rule and the associated Taylor approximation to the function. The dynamic software allows students to experiment with the ideas.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Linger, Richard C; Pleszkoch, Mark G; Prowell, Stacy J
Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and securitymore » vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62416; File No. SR-FINRA-2010-033] Self.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder.... (``FINRA'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67533; File No. SR-CME-2012-31] Self-Regulatory.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change described in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68267; File No. SR-Phlx-2012-133] Self...) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II...
6 CFR 5.47 - Procedure in the event of an adverse ruling.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Procedure in the event of an adverse ruling. 5.47 Section 5.47 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5.47 Procedure in the event of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70358; File No. SR-FINRA-2013-031] Self...'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to amend...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67956; File No. SR-Phlx-2013-42] Self... PHLX LLC (``Exchange'' or ``PHLX'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69755; File No. SR-NASDAQ-2013-070] Self... (``Exchange'' or ``NASDAQ'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69233; File No. SR-NASDAQ-2013-028] Self... NASDAQ Stock Market LLC (``Exchange'' or ``NASDAQ'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69229; File No. SR-Phlx-2013-15] Self... (``Exchange'' or ``PHLX'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68010; File No. SR-CBOE-2012-096] Self...(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice...'' or ``CBOE'') filed with the Securities and Exchange Commission (the ``Commission'') the proposed rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65806; File No. SR-NYSEArca-2011-88] Self.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder... Arca'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65805; File No. SR-NYSEAmex-2011-89] Self... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described...
76 FR 51438 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... Rule 17f-2(e) (17 CFR 240.17f-2(e)) under the Securities Exchange Act of 1934 (15 U.S.C. 78a et seq.). Rule 17f-2(e) requires members of national securities exchanges, brokers, dealers, registered transfer... SECURITIES AND EXCHANGE COMMISSION Submission for OMB Review; Comment Request Upon Written Request...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69196] Order Granting a Limited Exemption From... to Regulation M Rule 102(e) March 20, 2013. The Securities and Exchange Commission (``Commission...\\ In connection with the Program, an MQP Company \\2\\ may list an eligible MQP Security \\3\\ on NASDAQ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69521; File No. SR-NASDAQ-2013-071] Self... Proposed Rule Change To Amend NASDAQ Rule 4763 May 6, 2013. Pursuant to Section 19(b)(1) of the Securities..., 2013, The NASDAQ Stock Market LLC (``NASDAQ'' or ``Exchange'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65917; File No. SR-Phlx-2011-143] Self... Commentary .01 to Rule 1009 Regarding Criteria for Listing an Option on an Underlying Covered Security December 8, 2011. On October 24, 2011, NASDAQ OMX PHLX LLC (``Phlx'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64424; File No. SR-FINRA-2011-023] Self... the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given... Securities and Exchange Commission (``SEC'' or ``Commission'') the proposed rule change as described in Items...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62787; File No. SR-FINRA-2010-045] Self... Effectiveness of Proposed Rule Change To Amend the Security Futures Risk Disclosure Statement August 27, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66134; File No. SR-NYSE-2011-68] Self... Proposed Rule Change Amending NYSE Rule 80C, Which Provides for Trading Pauses in Individual Securities Due... January 11, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
76 FR 79536 - Security Zones; Captain of the Port Lake Michigan; Technical Amendment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-22
... ACTION: Final rule. SUMMARY: The Coast Guard is revising the contact information for Security Zones in... Federal holidays. FOR FURTHER INFORMATION CONTACT: If you have questions on this rule, contact or email... exist in 33 CFR 165.910. Persons desiring to transit the areas of these security zones must contact the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... disseminated as required (Rule 4120(a)(9)); a halt in a Derivative Securities Product (as defined in Rule 4120... trading halt in a Derivative Security Product traded pursuant to unlisted trading privileges for which a... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69563; File No. SR-NASDAQ-2013-073] Self...
6 CFR 5.47 - Procedure in the event of an adverse ruling.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Procedure in the event of an adverse ruling. 5.47 Section 5.47 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5.47 Procedure in the event of...
6 CFR 5.47 - Procedure in the event of an adverse ruling.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Procedure in the event of an adverse ruling. 5.47 Section 5.47 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5.47 Procedure in the event of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... Proposed Rule Change Amending NYSE Rule 1000 To Increase the Price Threshold for Those Securities... threshold for those securities ineligible for automatic executions from $1,000.00 or more to $10,000.00 or...). Specifically, the Exchange believes that increasing the dollar threshold for high-priced securities would...
Evaluation of CERT Secure Coding Rules through Integration with Source Code Analysis Tools
2008-06-01
Fortify SCA 3 2.2 Compass / ROSE 6 3 Project Analysis 9 3.1 Measuring and Analysis 9 4 Results 13 4.1 Fortify Results 13 4.1.1 CERT C++ Secure...Fortify C Rules 23 Appendix B Fortify C++ Rules 35 Appendix C C Rules Implemented in Compass Rose 43 Appendix D ROSE C++ Rules 51 References...to Daniel Quinlan at Lawrence Livermore National Laboratory for all his help getting us up and running with Compass /ROSE. Thanks to our SEI editor
75 FR 79992 - End-User Exception to Mandatory Clearing of Security-Based Swaps
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission'') is proposing new Rule 3Cg-1 under the Securities Exchange Act of 1934 (``Exchange Act'') governing the exception to mandatory clearing of security-based swaps available for counterparties meeting certain conditions. The Commission is requesting comments on the proposed rule and related matters.
Capturing security requirements for software systems.
El-Hadary, Hassan; El-Kassas, Sherif
2014-07-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
Capturing security requirements for software systems
El-Hadary, Hassan; El-Kassas, Sherif
2014-01-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514
Code White: A Signed Code Protection Mechanism for Smartphones
2010-09-01
analogous to computer security is the use of antivirus (AV) software . 12 AV software is a brute force approach to security. The software ...these users, numerous malicious programs have also surfaced. And while smartphones have desktop-like capabilities to execute software , they do not...11 2.3.1 Antivirus and Mobile Phones ............................................................... 11 2.3.2
Supporting the Use of CERT (registered trademark) Secure Coding Standards in DoD Acquisitions
2012-07-01
Capability Maturity Model IntegrationSM (CMMI®) [Davis 2009]. SM Team Software Process, TSP, and Capability Maturity Model Integration are service...STP Software Test Plan TEP Test and Evaluation Plan TSP Team Software Process V & V verification and validation CMU/SEI-2012-TN-016 | 47...Supporting the Use of CERT® Secure Coding Standards in DoD Acquisitions Tim Morrow ( Software Engineering Institute) Robert Seacord ( Software
NASA Technical Reports Server (NTRS)
Nieten, Joseph L.; Burke, Roger
1992-01-01
The System Diagnostic Builder (SDB) is an automated software verification and validation tool using state-of-the-art Artificial Intelligence (AI) technologies. The SDB is used extensively by project BURKE at NASA-JSC as one component of a software re-engineering toolkit. The SDB is applicable to any government or commercial organization which performs verification and validation tasks. The SDB has an X-window interface, which allows the user to 'train' a set of rules for use in a rule-based evaluator. The interface has a window that allows the user to plot up to five data parameters (attributes) at a time. Using these plots and a mouse, the user can identify and classify a particular behavior of the subject software. Once the user has identified the general behavior patterns of the software, he can train a set of rules to represent his knowledge of that behavior. The training process builds rules and fuzzy sets to use in the evaluator. The fuzzy sets classify those data points not clearly identified as a particular classification. Once an initial set of rules is trained, each additional data set given to the SDB will be used by a machine learning mechanism to refine the rules and fuzzy sets. This is a passive process and, therefore, it does not require any additional operator time. The evaluation component of the SDB can be used to validate a single software system using some number of different data sets, such as a simulator. Moreover, it can be used to validate software systems which have been re-engineered from one language and design methodology to a totally new implementation.
Ten simple rules for making research software more robust
2017-01-01
Software produced for research, published and otherwise, suffers from a number of common problems that make it difficult or impossible to run outside the original institution or even off the primary developer’s computer. We present ten simple rules to make such software robust enough to be run by anyone, anywhere, and thereby delight your users and collaborators. PMID:28407023
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
Watzlaf, Valerie J.M.; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti
2011-01-01
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. PMID:25945177
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.
Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti
2011-01-01
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-29
... Change To Include Text in Its Options Rules Governing the Use of Its Affiliate Broker-Dealer, Archipelago Securities LLC for Outbound Routing of Option Orders, and To Adopt Text in Its Options Rules To Permit the... include text in its options rules governing the use of its affiliate broker-dealer, Archipelago Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-31
... Complex Orders May 24, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the... proposes to specify in its rules that complex orders may be entered into the Price Improvement Mechanism... of this rule filing is to specify in the Exchange's rules that complex orders may be entered into the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... second by comparing each last consolidated sale price of a security (``Trigger Trade'') during the...-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of a Proposed Rule Change Adding Rule 80C To Provide for a Trading Pause for Individual Securities When the Price Moves 10 Percent or More...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false General policy considerations, purpose and scope of rules relating to open Commission meetings. 147.1 Section 147.1 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OPEN COMMISSION MEETINGS § 147.1 General policy considerations, purpose and scope of rules...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... Effectiveness of a Proposed Rule Change To Amend the Fees Schedule February 27, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is... ``CBOE'') filed with the Securities and Exchange Commission (the ``Commission'') the proposed rule change...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... Rule Change To Amend the Fees Schedule February 27, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that... Securities and Exchange Commission (the ``Commission'') the proposed rule change as described in Items I, II...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70356; File No. SR-NYSEArca-2013-86] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List and Trade Shares.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... be made in a nondiscriminatory fashion.\\14\\ \\14\\ See NYSE Arca Equities Rule 7.45(d)(3). NYSE Arca... Securities will be required to establish and enforce policies and procedures that are reasonably designed to... other things, that the rules of a national securities exchange be designed to prevent fraudulent and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... Effectiveness of a Proposed Rule Change To Amend the Fees Schedule May 1, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby... ``CBOE'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
... Effectiveness of a Proposed Rule Change To Amend the Fees Schedule November 6, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is... ``CBOE'') filed with the Securities and Exchange Commission (the ``Commission'') the proposed rule change...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
... the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is hereby... Securities and Exchange Commission (the ``Commission'') the proposed rule change as described in Items I and... publishing this notice to solicit comments on the proposed rule change from interested persons. \\1\\ 15 U.S.C...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-18
... purchases of any NMS stock as defined in Rule 600(b)(47) of Regulation NMS \\7\\ (``designated security'') at....600(b)(47). NYSE Rule 6140(b) prohibits a member or member organization, for the purpose of creating... Commission (the ``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... restriction on the prices at which covered securities may be sold short is in effect (``Short Sale Price Test... the short sale price test restriction requirements of Rule 201 are the subject of a separate rule... a covered security,\\8\\ imposes a short sale price test.\\9\\ Amended Rule 201 became effective on May...
Tools for Administration of a UNIX-Based Network
NASA Technical Reports Server (NTRS)
LeClaire, Stephen; Farrar, Edward
2004-01-01
Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.
Software Assurance Curriculum Project Volume 2: Undergraduate Course Outlines
2010-08-01
Contents Acknowledgments iii Abstract v 1 An Undergraduate Curriculum Focus on Software Assurance 1 2 Computer Science I 7 3 Computer Science II...confidence that can be integrated into traditional software development and acquisition process models . Thus, in addition to a technology focus...testing throughout the software development life cycle ( SDLC ) AP Security and complexity—system development challenges: security failures
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-19
... Nasdaq Securities within the existing DMM and SLP framework used to trade its listed securities. The... substantially similar to the Exchange's current SLP procedures in Rule 107B--NYSE Amex Equities. See proposed..., reassign one or more Nasdaq Securities to a different DMM Unit or to a different SLP or SLPs. a. Assignment...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Content. 260.4d-8 Section 260.4d-8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 304 § 260.4d-8 Content. (a) Each application for an order under section 304(d) of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Content. 260.4d-8 Section 260.4d-8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 304 § 260.4d-8 Content. (a) Each application for an order under section 304(d) of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Content. 260.10b-5 Section 260.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rule Under Section 310 § 260.10b-5 Content. (a) Each application for a stay of a trustee's duty to...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Content. 260.10b-5 Section 260.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rule Under Section 310 § 260.10b-5 Content. (a) Each application for a stay of a trustee's duty to...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Content. 260.10b-5 Section 260.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rule Under Section 310 § 260.10b-5 Content. (a) Each application for a stay of a trustee's duty to...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Content. 260.4d-8 Section 260.4d-8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 304 § 260.4d-8 Content. (a) Each application for an order under section 304(d) of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67838; File No. SR-NYSEMKT-2012-46] Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Amending Rule 993NY by Adding a New Paragraph (c) That Addresses the Authority of the Exchange or Archipelago Securities LLC (``Arca Securities'')...
17 CFR 41.3 - Application for an exemptive order pursuant to section 4f(a)(4)(B) of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... member of the National Association of Securities Dealers, Inc.) or equivalent self-regulatory... self-regulatory organization may submit an application for an order pursuant to this section on behalf... exemption; (4) Any provision(s) of the securities laws or rules, or of the rules of a securities self...
49 CFR 393.134 - What are the rules for securing roll-on/roll-off or hook lift containers?
Code of Federal Regulations, 2011 CFR
2011-10-01
... or hook lift containers? 393.134 Section 393.134 Transportation Other Regulations Relating to... for securing roll-on/roll-off or hook lift containers? (a) Applicability. The rules in this section apply to the transportation of roll-on/roll-off or hook lift containers. (b) Securement of a roll-on...
49 CFR 393.134 - What are the rules for securing roll-on/roll-off or hook lift containers?
Code of Federal Regulations, 2010 CFR
2010-10-01
... or hook lift containers? 393.134 Section 393.134 Transportation Other Regulations Relating to... for securing roll-on/roll-off or hook lift containers? (a) Applicability. The rules in this section apply to the transportation of roll-on/roll-off or hook lift containers. (b) Securement of a roll-on...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false General rule for the acquisition and holding of employer securities and employer real property. 2550.407a-1 Section 2550.407a-1 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR FIDUCIARY RESPONSIBILITY UNDER THE...
49 CFR 393.118 - What are the rules for securing dressed lumber or similar building products?
Code of Federal Regulations, 2010 CFR
2010-10-01
... Shifting and Falling Cargo Specific Securement Requirements by Commodity Type § 393.118 What are the rules... transported using no more than one tier. Bundles carried on one tier must be secured in accordance with the... one tier. Bundles carried in more than one tier must be either: (1) Blocked against lateral movement...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69498; File No. SR-Phlx-2013-42] Self... Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is hereby given that, on April 23, 2013, NASDAQ OMX PHLX LLC (the ``Exchange'' or ``Phlx'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68009; File No. SR-C2-2012-035] Self-Regulatory... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that... Securities and Exchange Commission (the ``Commission'') the proposed rule change as described in Items I, II...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69707] Order Granting a Limited Exemption from... Pilot Pursuant to Regulation M Rule 102(e) June 6, 2013. The Securities and Exchange Commission...'s securities would constitute an indirect attempt by the issuer to induce a bid for or a purchase of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68020; File No. SR-CBOE-2012-094] Self... Change To Update Its Rule 31.10--Corporate Governance--in Order To Comply With New Rule 10C- 1 Under the Securities Exchange Act of 1934 October 9, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... rule change.\\10\\ The Commission is publishing this notice and order to solicit comments on Amendment No... securities. Under this proposal, Nasdaq would suspend trading in a security if a trade in that security is... Volatility Guard is similar in purpose to the Liquidity Replenishment Points (``LRPs'') rules that currently...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-04
... Derivative Security products under NSX Rule 15.9. Proposed Rule 11.1(c) provides for the benefit of ETP... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62601; File No. SR-NSX-2010-09] Self-Regulatory... Hours July 29, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71169; File No. SR-PHLX-2013-127] Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Modify the Definition of ``System Securities'' in PSX Rule 3301(b) December 20, 2013. Pursuant to Section 19(b)(1) of the Securities...
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
... Rule Change Relating To Amending the Direct Edge ECN Fee Schedule; Correction AGENCY: Securities and... Effectiveness of Proposed Rule Change Relating to Amending the Direct Edge ECN Fee Schedule by the International...
ARROWSMITH-P: A prototype expert system for software engineering management
NASA Technical Reports Server (NTRS)
Basili, Victor R.; Ramsey, Connie Loggia
1985-01-01
Although the field of software engineering is relatively new, it can benefit from the use of expert systems. Two prototype expert systems were developed to aid in software engineering management. Given the values for certain metrics, these systems will provide interpretations which explain any abnormal patterns of these values during the development of a software project. The two systems, which solve the same problem, were built using different methods, rule-based deduction and frame-based abduction. A comparison was done to see which method was better suited to the needs of this field. It was found that both systems performed moderately well, but the rule-based deduction system using simple rules provided more complete solutions than did the frame-based abduction system.
Modeling reliability measurement of interface on information system: Towards the forensic of rules
NASA Astrophysics Data System (ADS)
Nasution, M. K. M.; Sitompul, Darwin; Harahap, Marwan
2018-02-01
Today almost all machines depend on the software. As a software and hardware system depends also on the rules that are the procedures for its use. If the procedure or program can be reliably characterized by involving the concept of graph, logic, and probability, then regulatory strength can also be measured accordingly. Therefore, this paper initiates an enumeration model to measure the reliability of interfaces based on the case of information systems supported by the rules of use by the relevant agencies. An enumeration model is obtained based on software reliability calculation.
[Application of password manager software in health care].
Ködmön, József
2016-12-01
When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.
Approach to design neural cryptography: a generalized architecture and a heuristic rule.
Mu, Nankun; Liao, Xiaofeng; Huang, Tingwen
2013-06-01
Neural cryptography, a type of public key exchange protocol, is widely considered as an effective method for sharing a common secret key between two neural networks on public channels. How to design neural cryptography remains a great challenge. In this paper, in order to provide an approach to solve this challenge, a generalized network architecture and a significant heuristic rule are designed. The proposed generic framework is named as tree state classification machine (TSCM), which extends and unifies the existing structures, i.e., tree parity machine (TPM) and tree committee machine (TCM). Furthermore, we carefully study and find that the heuristic rule can improve the security of TSCM-based neural cryptography. Therefore, TSCM and the heuristic rule can guide us to designing a great deal of effective neural cryptography candidates, in which it is possible to achieve the more secure instances. Significantly, in the light of TSCM and the heuristic rule, we further expound that our designed neural cryptography outperforms TPM (the most secure model at present) on security. Finally, a series of numerical simulation experiments are provided to verify validity and applicability of our results.
A rule-based software test data generator
NASA Technical Reports Server (NTRS)
Deason, William H.; Brown, David B.; Chang, Kai-Hsiung; Cross, James H., II
1991-01-01
Rule-based software test data generation is proposed as an alternative to either path/predicate analysis or random data generation. A prototype rule-based test data generator for Ada programs is constructed and compared to a random test data generator. Four Ada procedures are used in the comparison. Approximately 2000 rule-based test cases and 100,000 randomly generated test cases are automatically generated and executed. The success of the two methods is compared using standard coverage metrics. Simple statistical tests showing that even the primitive rule-based test data generation prototype is significantly better than random data generation are performed. This result demonstrates that rule-based test data generation is feasible and shows great promise in assisting test engineers, especially when the rule base is developed further.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65184; File No. SR-NYSEAmex-2011-63] Self-Regulatory Organizations; NYSE Amex LLC; Notice of Filing of Proposed Rule Change Amending NYSE Amex Equities Rule 17(c)(2)(B) To Make Permanent the Pilot Program that Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62588; File No. SR-EDGA-2010-08] Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend EDGA Rule 11.12 July 29, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62587; File No. SR-EDGX-2010-08] Self-Regulatory Organizations; EDGX Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend EDGX Rule 11.12 July 29, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66656; File No. SR-NYSEArca-2012-22] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Amending NYSE Arca Equities Rule 7.45 Adding a New Paragraph (d) That Addresses the Authority of the Exchange or Archipelago Securities LLC To Cancel Orders When a...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62281; File No. SR-NYSEARCA-2010-52] Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule Change by NYSE Arca US LLC Amending NYSE Arca Equities Rule 7.11 To Set Forth How the Exchange Will Handle Order Flow During a Trading Pause for a Security Listed on...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64252; File No. SR-EDGA-2011-09] Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule To Amend EDGA Rule 11.9 To Introduce Additional Routing Options to the Rule April 7, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Ac...
17 CFR 270.22e-2 - Pricing of redemption requests in accordance with Rule 22c-1.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Pricing of redemption requests in accordance with Rule 22c-1. 270.22e-2 Section 270.22e-2 Commodity and Securities Exchanges....22e-2 Pricing of redemption requests in accordance with Rule 22c-1. An investment company shall not be...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
...)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II... solicit comments on the proposed rule change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II... solicit comments on the proposed rule change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR...
49 CFR 1503.639 - Burden of proof.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...
49 CFR 1503.639 - Burden of proof.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...
49 CFR 1503.639 - Burden of proof.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...
49 CFR 1503.639 - Burden of proof.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...
49 CFR 1503.639 - Burden of proof.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...
Redling, Bob
2007-08-01
Are you doing enough to control security and privacy at your practice? Could you cope if your organization suffered a disaster that destroyed facilities, business documents and patient records? Although Health Insurance Portability and Accountability Act (HIPAA) security and privacy rules focus on patient health information, they also point the way to a more comprehensive approach to managing risk. By using HIPAA rules as a blueprint, you can design policies and procedures to address everything from safeguarding financial information to protecting the personal safety of patients, physicians and staff.
Moving Secure Software Assurance into Higher Education: A Roadmap for Change
2011-06-02
Summarized: The Issue: 6/2/20118 Software defects are currently a fact of life Software defects are avenues of security vulnerabilities that cyber ... criminals , terrorists, or hostile nations can exploit. We (THE ENTIRE INDUSTY) need to change the way we build systems Decrease the number of defects
Statistics of software vulnerability detection in certification testing
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.
Social Software and National Security: An Initial Net Assessment
2009-04-01
networks. Government ignores this fact at its peril. Use of social software as ICT is creative and collaborative. Large corporations conduct...from the collaborative, distributed approaches promoted by responsible use of social software. Our recommendations are not exhaustive, but this... responsibilities are there for cyber security when using social software on government computers in a Web 2.0 environment? 67 This section might be
A survey of medical informatics in Belgium.
Roger, F H; Behets, M; Andre, J; de Moor, G; Sevens, C; Willems, J L
1987-01-01
The Belgian Society for Medical Informatics (MIM) organized a survey in 1986 in order to assess the present state of development of medical informatics in Belgium. Questionnaires were sent to hospitals, laboratories, private practitioners and pharmacists, as well as to social security organizations and software industries. The response rate was higher in hospitals (93%) than in any other category. Results showed a large number of computerized hospitals (93% of general acute care hospitals and 91% of psychiatric hospitals). There has been a sharp increase (+ 15%) in computerization of the admission, accounting and billing procedures since 1985, most likely in relation with administrative rules issued by the Belgian Government. The same trend (+ 20%) has been observed for computer applications in clinical laboratories, between 1984 and 1985. There is almost one computer terminal for ten beds in the hospitals with more than 200 beds in 1986. This figure exemplifies the present trend to on-line access to data. Computerized instrumental aids to medicine such as text processing, imaging or computerized interpretation of signals have known a rapid extension during recent years, although less comprehensive than administrative applications in hospitals and in social security organizations. The present state of other applications in medicine (general practice, pharmacy, etc.) was more difficult to assess as those information systems remain more pinpointed. In all medical fields, there appears to be a new rise in computer programs offered by software companies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
17 CFR 260.7a-5 - Filing of amendments; number of copies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Filing of amendments; number of copies. 260.7a-5 Section 260.7a-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 307 § 260.7a-5 Filing of amendments; number of copie...
17 CFR 260.7a-5 - Filing of amendments; number of copies.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Filing of amendments; number of copies. 260.7a-5 Section 260.7a-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 307 § 260.7a-5 Filing of amendments; number of copie...
17 CFR 260.7a-5 - Filing of amendments; number of copies.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Filing of amendments; number of copies. 260.7a-5 Section 260.7a-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 307 § 260.7a-5 Filing of amendments; number of copie...
17 CFR 260.7a-5 - Filing of amendments; number of copies.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Filing of amendments; number of copies. 260.7a-5 Section 260.7a-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 307 § 260.7a-5 Filing of amendments; number of copie...
17 CFR 260.7a-5 - Filing of amendments; number of copies.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Filing of amendments; number of copies. 260.7a-5 Section 260.7a-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, TRUST INDENTURE ACT OF 1939 Rules Under Section 307 § 260.7a-5 Filing of amendments; number of copie...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64907; File No. SR-NYSEAmex-2011-53] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64908; File No. SR-NYSEAmex-2011-52] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64904; File No. SR-NYSE-2011-34] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71168; File No. SR-BX-2013-064] Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Modify the Definition of ``System Securities'' in BX Rule 4751(b) December 20, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange...
29 CFR 2580.412-1 - Statutory provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., officer and employee of any employee welfare benefit plan or of any employee pension benefit plan subject... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 TEMPORARY BONDING RULES...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... DEPARTMENT OF THE TREASURY Office of the Comptroller of the Currency Agency Information Collection Activities: Information Collection Renewal; Comment Request; Securities Offering Disclosure Rules AGENCY... comment concerning the renewal of an information collection titled, ``Securities Offering Disclosure Rules...
ERIC Educational Resources Information Center
Jones, Robert J.; Zehner, Mark R.
1996-01-01
In late 1994, the United States Securities and Exchange Commission (SEC) issued new rules applicable to issuers of municipal securities (including school districts) concerning disclosure to the investment community. Describes how SEC's existing Rule 15c2-12 has been implemented. Discusses its purpose, jurisdiction, obligated persons, written…
17 CFR 8.02 - Implementing exchange rules.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Implementing exchange rules. 8.02 Section 8.02 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS General Provisions § 8.02 Implementing...
Crispen's Five Antivirus Rules.
ERIC Educational Resources Information Center
Crispen, Patrick Douglas
2000-01-01
Explains five rules to protect computers from viruses. Highlights include commercial antivirus software programs and the need to upgrade them periodically (every year to 18 months); updating virus definitions at least weekly; scanning attached files from email with antivirus software before opening them; Microsoft Word macro protection; and the…
Bureaucracy, Safety and Software: a Potentially Lethal Cocktail
NASA Astrophysics Data System (ADS)
Hatton, Les
This position paper identifies a potential problem with the evolution of software controlled safety critical systems. It observes that the rapid growth of bureaucracy in society quickly spills over into rules for behaviour. Whether the need for the rules comes first or there is simple anticipation of the need for a rule by a bureaucrat is unclear in many cases. Many such rules lead to draconian restrictions and often make the existing situation worse due to the presence of unintended consequences as will be shown with a number of examples.
Intrusion detection using secure signatures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, Trent Darnel; Haile, Jedediah
A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of themore » secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66218; File No. SR-NYSE-2012-01] Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule Change To Establish an NYBX Immediate-or-Cancel Order January 24, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63509; File No. SR-Phlx-2010-157] Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing of Proposed Rule Change, as Modified by Amendment No. 1, Relating to Complex Orders December 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule...
2000-11-22
This is a final rule amending the NASA FAR Supplement (NFS) to emphasize considerations of risk management, including safety, security (including information technology security), health, export control, and damage to the environment, within the acquisition process. This final rule addresses risk management within the context of acquisition planning, selecting sources, choosing contract type, structuring award fee incentives, administering contracts, and conducting contractor surveillance.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-30
... applicable Exchange listing tier into which such products fall. \\3\\ 15 U.S.C. 78f(b). \\4\\ 15 U.S.C. 78f(b)(5... on the Exchange pursuant to Rule 14.11 as Tier I securities. Exchange Rule 14.11 sets forth the... the Exchange's current rules, ETPs are not designated as either Tier I or Tier II securities. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71145; File No. SR-OC-2013-03] Self-Regulatory Organizations; OneChicago, LLC; Notice of Filing of Proposed Rule Change To Amend Rules 143 and 417 Relating to Block Trade Reporting December 19, 2013. Pursuant to Section 19(b)(7) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ notice is...
Introduction: Cybersecurity and Software Assurance Minitrack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Luanne; George, Richard; Linger, Richard C
Modern society is dependent on software systems of remarkable scope and complexity. Yet methods for assuring their security and functionality have not kept pace. The result is persistent compromises and failures despite best efforts. Cybersecurity methods must work together for situational awareness, attack prevention and detection, threat attribution, minimization of consequences, and attack recovery. Because defective software cannot be secure, assurance technologies must play a central role in cybersecurity approaches. There is increasing recognition of the need for rigorous methods for cybersecurity and software assurance. The goal of this minitrack is to develop science foundations, technologies, and practices that canmore » improve the security and dependability of complex systems.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... current and accurate information concerning the securities of BluePoint Linux Software Corp. because it...
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES...
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
Karasz, Hilary N; Eiden, Amy; Bogan, Sharon
2013-04-01
Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals' needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule.
17 CFR 230.602 - Securities exempted.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...
17 CFR 230.602 - Securities exempted.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...
17 CFR 230.602 - Securities exempted.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...
17 CFR 230.602 - Securities exempted.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities exempted. 230.602 Section 230.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business Investment...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Approving a Proposed Rule Change Consisting of Amendments To Streamline New Issue Information Submission Requirements Under MSRB Rules G-32..., and market information requirements); and the Electronic Municipal Market Access (``EMMA[supreg...
ERIC Educational Resources Information Center
Jha, Vikram; Duffy, Sean
2002-01-01
Reports the results of an evaluation of Distance Interactive Learning in Obstetrics and Gynecology (DIALOG) which is an electronic program for continuing education. Presents 10 golden rules for designing software for medical practitioners. (Contains 26 references.) (Author/YDS)
2011-08-25
Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Code of Federal Regulations, 2010 CFR
2010-10-01
... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY... of records and information that TSA has determined to be Sensitive Security Information, as defined...
Automating the design of scientific computing software
NASA Technical Reports Server (NTRS)
Kant, Elaine
1992-01-01
SINAPSE is a domain-specific software design system that generates code from specifications of equations and algorithm methods. This paper describes the system's design techniques (planning in a space of knowledge-based refinement and optimization rules), user interaction style (user has option to control decision making), and representation of knowledge (rules and objects). It also summarizes how the system knowledge has evolved over time and suggests some issues in building software design systems to facilitate reuse.
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of...
75 FR 59751 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-28
... entitled ``Brokerage Transactions on a Securities Exchange.'' The rule governs the remuneration that a... securities transactions by the fund. The rule requires a fund's board of directors to establish, and review as necessary, procedures reasonably designed to provide that the remuneration to an affiliated broker...
10 CFR 824.1 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-01-01
... OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY...) any applicable rule, regulation or order under the Act relating to the security or safeguarding of Restricted Data or other classified information, shall be subject to a civil penalty not to exceed $100,000...
17 CFR 242.402 - General provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... with Regulation T and the margin rules of the self-regulatory authorities of which the security futures... security future and related positions in accordance with the margin rules of the self-regulatory... same regulatory classification or account type and are owned by the same customer to be a single...
78 FR 36797 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
...\\ sets out a framework for the registration and regulation of national securities exchanges. Under the... regarding how the futures market operates, its rules and procedures, corporate governance, its criteria for membership, its subsidiaries and affiliates, and the security futures products it intends to trade. Rule 6a-4...
Problem Solving Software for Math Classes.
ERIC Educational Resources Information Center
Troutner, Joanne
1987-01-01
Described are 10 computer software programs for problem solving related to mathematics. Programs described are: (1) Box Solves Story Problems; (2) Safari Search; (3) Puzzle Tanks; (4) The King's Rule; (5) The Factory; (6) The Royal Rules; (7) The Enchanted Forest; (8) Gears; (9) The Super Factory; and (10) Creativity Unlimited. (RH)
Analysis of key technologies for virtual instruments metrology
NASA Astrophysics Data System (ADS)
Liu, Guixiong; Xu, Qingui; Gao, Furong; Guan, Qiuju; Fang, Qiang
2008-12-01
Virtual instruments (VIs) require metrological verification when applied as measuring instruments. Owing to the software-centered architecture, metrological evaluation of VIs includes two aspects: measurement functions and software characteristics. Complexity of software imposes difficulties on metrological testing of VIs. Key approaches and technologies for metrology evaluation of virtual instruments are investigated and analyzed in this paper. The principal issue is evaluation of measurement uncertainty. The nature and regularity of measurement uncertainty caused by software and algorithms can be evaluated by modeling, simulation, analysis, testing and statistics with support of powerful computing capability of PC. Another concern is evaluation of software features like correctness, reliability, stability, security and real-time of VIs. Technologies from software engineering, software testing and computer security domain can be used for these purposes. For example, a variety of black-box testing, white-box testing and modeling approaches can be used to evaluate the reliability of modules, components, applications and the whole VI software. The security of a VI can be assessed by methods like vulnerability scanning and penetration analysis. In order to facilitate metrology institutions to perform metrological verification of VIs efficiently, an automatic metrological tool for the above validation is essential. Based on technologies of numerical simulation, software testing and system benchmarking, a framework for the automatic tool is proposed in this paper. Investigation on implementation of existing automatic tools that perform calculation of measurement uncertainty, software testing and security assessment demonstrates the feasibility of the automatic framework advanced.
17 CFR 230.190 - Registration of underlying securities in asset-backed securities transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Registration of underlying securities in asset-backed securities transactions. 230.190 Section 230.190 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General...
The Rule of Law Effort in Afghanistan: A Success Story in the Making
2016-06-10
14415/ justice -deferred-rule-of-law-in- central-america (accessed February 14, 2016). American Bar Association, Division for Public Education . “Part I...accountability for police and other security forces. Using El Salvador as a prognostic outlook on rule of law development and justice sector reform...security and complete justice sector reforms. Afghanistan is making progress after the fall of the Taliban in 2001 with a democratic republic, laws
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false [Reserved] 1540.207 Section 1540.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security...
2008-03-01
in applications is software assurance. There are many subtle variations to the software assurance definition (Goertzel, et al ., 2007), but the DoD...Gary McGraw (2006), and Thorsten 18 Schneider (2006). Goertzel, et al . (2007), lists and compares several security-enhanced software development...detailed by Goertzel, et al ., is the Microsoft Trustworthy Computing Security Development Lifecycle (SDL), shown in the following figure: Figure 6
Non-developmental item computer systems and the malicious software threat
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software; computer system unique attributes; positive feedback to commercial computer systems vendors; and NDI (Non-Development Item) computers and software safety.
17 CFR 230.603 - Amount of securities exempted.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Amount of securities exempted. 230.603 Section 230.603 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business...
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-30
... Organizations; The Options Clearing Corporation; Order Approving Proposed Rule Change To Accommodate Certain Physically- Settled Options on U.S. Treasury Securities January 23, 2013. I. Introduction On November 30, 2012, The Options Clearing Corporation (``OCC'') filed with the Securities and Exchange Commission...
76 FR 5729 - Department of Defense Personnel Security Program (PSP)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 156 [DOD-2008-OS-0160; RIN 0790-AI42] Department of Defense Personnel Security Program (PSP) AGENCY: Department of Defense. ACTION: Proposed rule. SUMMARY: This rule would update policies and responsibilities for the Department of Defense (DoD...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... following activities associated with the conduct of municipal securities business: underwriting; trading... control policies and written procedures'' to reflect amendment to the rule. Conduct of Business ``Definitions; general standard for advertisements'' is added to the description for Rule G-21(a). ``Product...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... Rule Change Relating to Post-Trade Transparency for Agency Pass-Through Mortgage- Backed Securities... to post-trade transparency for Agency Pass-Through Mortgage-Backed Securities (``MBS'') traded in.... 78o-3(b)(6). In approving the original TRACE rules, the Commission stated that price transparency...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Approving a Proposed Rule Change To Amend the Real-Time Transaction Reporting System Information System and Subscription Service October 22...'') information system. The proposed rule change was published for comment in the Federal Register on September 12...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
...-Regulatory Organizations; The National Securities Clearing Corporation; Order Granting Approval of a Proposed Rule Change To Amend Rules Relating To the Creation of a Service To Provide Post-Trade Information... trading activity of their organizations, their correspondent firms, or both through review of post-trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-11
...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Establish an Administrative Information Subscriber (AIS) and AIS Port...-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change The Exchange is...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Alternative Income Counting Rules for Certain Blind Individuals § 416.1170 General. (a) What the alternative is. If you are blind and meet the requirements in § 416.1171, we use one of two rules to see how...
17 CFR 248.18 - Effective date; transition rule.
Code of Federal Regulations, 2010 CFR
2010-04-01
... to consumers who are your customers on July 1, 2001, if, by that date, you have established a system... you have entered into with a nonaffiliated third party to perform services for you or functions on... rule. 248.18 Section 248.18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
Toward Explaining Earlier Retirement after 1970.
ERIC Educational Resources Information Center
Ippolito, Richard A.
1990-01-01
Rule changes in the social security system and pension plans suggest that labor force participation rates for men aged 55 to 64 fell by 20 percent from 1970 through 1986 because of the increase in social security benefits and a change in private pension rules encouraging earlier retirement. (Author/JOW)
77 FR 34415 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request... collection of information provided for in Rule 17f-1(b) (17 CFR 240.17f-1(b) under the Securities Exchange... collection of information to the Office of Management and Budget (``OMB'') for extension and approval. Rule...
17 CFR 171.4 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Computation of time. 171.4 Section 171.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... computing any period of time prescribed by these rules or allowed by the Commission, the day of the act...
17 CFR 12.5 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Computation of time. 12.5 Section 12.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... general. In computing any period of time prescribed by these rules or allowed by the Commission, the...
17 CFR 230.155 - Integration of abandoned offerings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Integration of abandoned... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.155 Integration of abandoned offerings... from integration of private and registered offerings. Because of the objectives of Rule 155 and the...
76 FR 60565 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-29
... the same lien of securities of margin customers (a) with other customers without their written consent and (b) with the broker or dealer. The rule also prohibits the rehypothecation of customers' margin securities for a sum in excess of the customer's aggregate indebtedness. Pursuant to Rule 15c2-1, respondents...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-13
...-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Designation of Longer Period for Commission Action on Proposed Rule Change To Allow the Mortgage-Backed Securities Division To Provide...''), and on November 21, 2011, amended a proposed rule change to allow the Mortgage-Backed Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in Outbound... issue of the Federal Register, the IRS and the Treasury Department are issuing temporary regulations... stock transfers for certain outbound asset reorganizations. The temporary regulations also modify the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-04
... proposed rule change is consistent with the CPSS- IOSCO Recommendations for securities settlement systems (``Recommendations''). Recommendation 12, ``Protection of Customers' Securities,'' states, in relevant part... Terminal System (PTS), as participants may currently use various platforms to communicate with DTC. The...
Code of Federal Regulations, 2011 CFR
2011-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Alternative Income Counting Rules for Certain Blind Individuals § 416.1170 General. (a) What the alternative is. If you are blind and meet the requirements in § 416.1171, we use one of two rules to see how...
Code of Federal Regulations, 2014 CFR
2014-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Alternative Income Counting Rules for Certain Blind Individuals § 416.1170 General. (a) What the alternative is. If you are blind and meet the requirements in § 416.1171, we use one of two rules to see how...
Code of Federal Regulations, 2012 CFR
2012-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Alternative Income Counting Rules for Certain Blind Individuals § 416.1170 General. (a) What the alternative is. If you are blind and meet the requirements in § 416.1171, we use one of two rules to see how...
Code of Federal Regulations, 2013 CFR
2013-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Alternative Income Counting Rules for Certain Blind Individuals § 416.1170 General. (a) What the alternative is. If you are blind and meet the requirements in § 416.1171, we use one of two rules to see how...
Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon
2013-01-01
Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902
75 FR 82243 - Security Zones; Moored Cruise Ships, Port of San Diego, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-30
...The Coast Guard is establishing a temporary security zone regulation from December 21, 2010, through June 20, 2011. The security zones created by this rule will encompass all navigable waters extending from the surface to the sea floor, within a 100 yard radius around any cruise ship that is moored at any berth within the San Diego port area inside the sea buoys bounding the Port of San Diego. This temporary final rule is necessary to provide for the safety of the cruise ship, vessels, and users of the waterway. Entry into these security zones will be prohibited unless specifically authorized by the Captain of the Port (COTP) San Diego, or his or her designated representative. This rule will also suspend paragraph (b)(2) of 33 CFR 165.1108, a related regulation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...
New HIPAA rules: a guide for radiology providers.
Dresevic, Adrienne; Mikel, Clinton
2013-01-01
The Office for Civil Rights issued its long awaited final regulations modifying the HIPAA privacy, security, enforcement, and breach notification rules--the HIPAA Megarule. The new HIPAA rules will require revisions to Notice of Privacy Practices, changes to business associate agreements, revisions to HIPAA privacy and security policies and procedures, and an overall assessment of HIPAA compliance. The HIPAA Megarule formalizes the HITECH Act requirements, and makes it clear that the OCRs ramp up of HIPAA enforcement is not merely a passing trend. The new rules underscore that both covered entities and business associates must reassess and strengthen HIPAA compliance.
19 CFR 102.20 - Specific rules by tariff classification.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Specific rules by tariff classification. 102.20 Section 102.20 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY RULES OF ORIGIN Rules of Origin § 102.20 Specific rules by tariff classification. The following rules are the rules specified...
19 CFR 102.20 - Specific rules by tariff classification.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Specific rules by tariff classification. 102.20 Section 102.20 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY RULES OF ORIGIN Rules of Origin § 102.20 Specific rules by tariff classification. The following rules are the rules specified...
19 CFR 102.20 - Specific rules by tariff classification.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Specific rules by tariff classification. 102.20 Section 102.20 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY RULES OF ORIGIN Rules of Origin § 102.20 Specific rules by tariff classification. The following rules are the rules specified...
49 CFR 1520.5 - Sensitive security information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Sensitive security information. 1520.5 Section 1520.5 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF...
78 FR 44806 - Amendments to Regulation D, Form D and Rule 156
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
...The Securities and Exchange Commission, which today in separate releases amended Rule 506 of Regulation D, Form D and Rule 144A under the Securities Act of 1933 to implement Section 201(a) of the Jumpstart Our Business Startups Act and Section 926 of the Dodd- Frank Wall Street Reform and Consumer Protection Act, is publishing for comment a number of proposed amendments to Regulation D, Form D and Rule 156 under the Securities Act. These proposed amendments are intended to enhance the Commission's ability to evaluate the development of market practices in Rule 506 offerings and to address concerns that may arise in connection with permitting issuers to engage in general solicitation and general advertising under new paragraph (c) of Rule 506. Specifically, the proposed amendments to Regulation D would require the filing of a Form D in Rule 506(c) offerings before the issuer engages in general solicitation; require the filing of a closing amendment to Form D after the termination of any Rule 506 offering; require written general solicitation materials used in Rule 506(c) offerings to include certain legends and other disclosures; require the submission, on a temporary basis, of written general solicitation materials used in Rule 506(c) offerings to the Commission; and disqualify an issuer from relying on Rule 506 for one year for future offerings if the issuer, or any predecessor or affiliate of the issuer, did not comply, within the last five years, with Form D filing requirements in a Rule 506 offering. The proposed amendments to Form D would require an issuer to include additional information about offerings conducted in reliance on Regulation D. Finally, the proposed amendments to Rule 156 would extend the antifraud guidance contained in the rule to the sales literature of private funds.
Additional Security Considerations for Grid Management
NASA Technical Reports Server (NTRS)
Eidson, Thomas M.
2003-01-01
The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.
1989-12-24
training; 16 . PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...to be leased is 205. One hundred aircraft will be VFR aircraft only. One hundred and five aircraft will be instrument flight rules ( IFR ) certified, 55...of which will be IFR equipped. The other IFR -certified aircraft will be visual flight rules equipped. c. The total lease cost is based on an assumed
TMS for Instantiating a Knowledge Base With Incomplete Data
NASA Technical Reports Server (NTRS)
James, Mark
2007-01-01
A computer program that belongs to the class known among software experts as output truth-maintenance-systems (output TMSs) has been devised as one of a number of software tools for reducing the size of the knowledge base that must be searched during execution of artificial- intelligence software of the rule-based inference-engine type in a case in which data are missing. This program determines whether the consequences of activation of two or more rules can be combined without causing a logical inconsistency. For example, in a case involving hypothetical scenarios that could lead to turning a given device on or off, the program determines whether a scenario involving a given combination of rules could lead to turning the device both on and off at the same time, in which case that combination of rules would not be included in the scenario.
49 CFR 1510.5 - Imposition of security service fees.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Imposition of security service fees. 1510.5... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE FEES § 1510.5 Imposition of security service fees. (a) Each direct air...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-15
...; Proposed Amendments to Rule G-8, on Books and Records, Rule G- 9, on Record Retention, and Rule G-18, on... of proposed MSRB Rule G-43, on broker's brokers; amendments to MSRB Rule G-8, on books and records...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-29
... Amending the Mortgage-Backed Securities Division Fails Charge Rule To Reflect Recommendation of the... change is to amend the existing fails charge rule in FICC's Mortgage-Backed Securities Division (``MBSD... (``TMPG'') relating to the removal of the resolution period for fails charges.\\3\\ \\3\\ The text of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-11
... Organizations; Options Clearing Corporation; Notice of Filing of Proposed Rule Relating to Clearing Options on... 27, 2011, The Options Clearing Corporation (``OCC'') filed with the Securities and Exchange... OCC's By-Laws, clarifying that OCC will clear and treat as securities options any option contracts on...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-08
... of Amended and Restated Articles of Incorporation of Municipal Securities Rulemaking Board March 2... Restated Articles of Incorporation. The text of the proposed rule change is available on the MSRB's Web... purpose of the proposed rule change is to make changes to the Articles of Incorporation as are necessary...
75 FR 60831 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-01
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... Advisers Act of 1940.'' (15 U.S.C. 80b-1 et seq.) Rule 204A-1, the Code of Ethics Rule, requires investment... securities transactions, including transactions in any mutual fund managed by the adviser. The code of ethics...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64987; File No. SR-NYSEAMEX-2011-54] Self-Regulatory Organizations; NYSE Amex LLC; Notice of Filing of Proposed Rule Change Amending the Definition of Approved Person To Exclude Foreign Affiliates, Creating a New Definition of ``Foreign Securities Affiliate...
76 FR 65783 - Registration of Security-Based Swap Dealers and Major Security-Based Swap Participants
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... Act Rules and Forms A. Registration Application and Amendment 1. Proposed Rule 15Fb2-1 i. Form of Application ii. Senior Officer Certification iii. Electronic Filing iv. Standards for Granting or Denying Applications v. Request for Comment on Additional Registration Considerations 2. Amendments to Application...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 734, 738, 740, 742, 772, and... Based Upon a Systematic Review of the Commerce Control List: Additional Changes AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This rule amends the Export Administration...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-07
... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 [Docket No. 120320200-2296-01] RIN 0694-AF62 Editorial Corrections to the Commerce Control List of the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This final rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70360; File No. SR-BATS-2013-049] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule... the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71062; File No. SR-EDGX-2013-45] Self-Regulatory Organizations; EDGX Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71061; File No. SR-EDGA-2013-36] Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...
77 FR 35336 - Privacy and Security of Information Stored on Mobile Communications Devices
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
.... ACTION: Proposed rule. SUMMARY: This document seeks comment on the privacy and data security practices of... Practice and Procedure and Part 0 Rules of Commission Organization, Notice of Proposed Rulemaking, 25 FCC... practices of mobile wireless service providers with respect to customer information stored on their users...