Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
Global Security Sciences Home - Global Security Sciences
Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
System security in the space flight operations center
NASA Technical Reports Server (NTRS)
Wagner, David A.
1988-01-01
The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.
Network security system for health and medical information using smart IC card
NASA Astrophysics Data System (ADS)
Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki
1998-07-01
A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.
77 FR 32111 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... or fraud, or harm to the security or integrity of this system or other systems or programs (whether... to comment. FCC/MB-2 System Name: Broadcast Station Public Inspection Files. Security Classification: The FCC's Security Operations Center (SOC) has not assigned a security classification to this system...
DOT National Transportation Integrated Search
2013-07-29
The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...
NASA Astrophysics Data System (ADS)
Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji
2018-02-01
Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.
Health information security: a case study of three selected medical centers in iran.
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-03-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.
DOT National Transportation Integrated Search
1998-05-01
This handbook has been sponsored by the Federal Transit Administration (FTA) and the Volpe National Transportation Systems Center (Volpe Center) to (1) explain the security requirements specified in FTA's State Safety Oversight Rule (49 CFR Par 659),...
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.
Disruptive Ideas for Power Grid Security and Resilience With DER
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Erfan
This presentation by Erfan Ibrahim was prepared for NREL's 2017 Cybersecurity and Reslience Workshop on distributed energy resource (DER) best practices. The presentation provides an overview of NREL's Cyber-Physical Systems Security and Resilience R&D Center, the Center's approach to cybersecurity, and disruptive ideas for power grid security and resilience with DER.
Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.
ERIC Educational Resources Information Center
Adams, Shawn
1998-01-01
Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…
Health Information Security: A Case Study of Three Selected Medical Centers in Iran
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-01-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients’ electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts’ points of view. Results and discussion Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of “verification and system design, user access management, access control system”, Al Zahra Hospital in two indicators of “access management and network access control” and Amin Hospital in “equipment safety and system design”. In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place. PMID:23572861
75 FR 68849 - Privacy Act of 1974: System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
... processing of personal information is conducted within established FAA computer security regulations. A risk... SECURITY CLASSIFICATION: Sensitive, unclassified SYSTEM LOCATION: Federal Aviation Administration (FAA... Enforcement Centers of the Drug Abatement Division; Office of Security and Hazardous Materials; Flight...
2017-12-01
Information Systems Center of Expertise (RS/GIS CX) (CEERD-RZR), U.S. Army Engineer Research and Development Center, Cold Regions Research and...GIS Geographic Information Systems GPS Global Positioning System HH Handheld IWR U.S. Army Engineer Institute for Water Resources n/a Not...Applicable NAE U.S. Army New England Regulatory District RS/GIS Remote Sensing/Geographic Information Systems SD Secure Digital SDHC Secure Digital High
Security enhancement study for the U.S. motorcoach industry : executive summary
DOT National Transportation Integrated Search
2003-05-01
The Security Enhancement Study for the U.S. Motorcoach Industry was commissioned by the Federal Motor Carrier Safety Administration (FMCSA) and conducted by the John A. Volpe National Transportation Systems Center (Volpe Center). It was prepared to i...
Transportation Secure Data Center | NREL
Data Center The Transportation Secure Data Center (TSDC) provides free access to detailed transportation data from a variety of travel surveys and studies. Data include global positioning system (GPS demographics. Learn more about the TSDC. Cleansed Data by State and Region Use the map to access cleansed data
Anatomy of a Security Operations Center
NASA Technical Reports Server (NTRS)
Wang, John
2010-01-01
Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.
Sandia National Laboratories: National Security Missions: International
Programs Environmental Responsibility Environmental Management System Pollution Prevention History 60 ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
State of Maryland Intelligent Transportation Systems: Security and Implementation Recommendations.
DOT National Transportation Integrated Search
1997-11-01
At the direction of the Volpe National Transportation Systems Center of the US Department of Transportation (US DOT), a two-phase study of the security vulnerability of Maryland Intelligent Transportation Systems (ITS) was conducted from July until N...
1989-08-01
Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales
ERIC Educational Resources Information Center
Forman, Evan M.; Davies, Patrick T.
2005-01-01
Background: Although delineating the processes by which children appraise the family as a source of security from their collective experiences in the family subsystem has assumed center stage in many conceptualizations of child development, the dearth of measures of child adaptation in the family system has hindered empirical advances. Therefore,…
Masys, D. R.; Baker, D. B.
1997-01-01
The Internet's World-Wide Web (WWW) provides an appealing medium for the communication of health related information due to its ease of use and growing popularity. But current technologies for communicating data between WWW clients and servers are systematically vulnerable to certain types of security threats. Prominent among these threats are "Trojan horse" programs running on client workstations, which perform some useful and known function for a user, while breaching security via background functions that are not apparent to the user. The Patient-Centered Access to Secure Systems Online (PCASSO) project of SAIC and UCSD is a research, development and evaluation project to exploit state-of-the-art security and WWW technology for health care. PCASSO is designed to provide secure access to clinical data for healthcare providers and their patients using the Internet. PCASSO will be evaluated for both safety and effectiveness, and may provide a model for secure communications via public data networks. PMID:9357644
76 FR 58007 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-19
... Social Security Act (the Act). The system of records will contain personally identifiable information... and Medicaid Innovation, Centers for Medicare & Medicaid Services, 7500 Security Boulevard, Mailstop... Social Security Act (the Act) (42 U.S.C. 1395 et seq.) by adding new section 1899 to the Act to establish...
The hack attack - Increasing computer system awareness of vulnerability threats
NASA Technical Reports Server (NTRS)
Quann, John; Belford, Peter
1987-01-01
The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki
2011-03-01
We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.
A DICOM based radiotherapy plan database for research collaboration and reporting
NASA Astrophysics Data System (ADS)
Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.
2014-03-01
Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.
78 FR 16837 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... listed under ``COMMERCE/ PAT-TM-20 Customer Call Center, Assistance and Satisfaction Survey Records... notices. The amended Privacy Act system of records notice, ``COMMERCE/PAT- TM-20 Customer Call Center... name: Customer Call Center, Assistance and Satisfaction Survey Records. Security classification...
77 FR 25774 - Order of Suspension of Trading; In the Matter of Berman Center, Inc., Cyberkinetics...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-01
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; In the Matter of Berman Center, Inc., Cyberkinetics Neurotechnology Systems, Inc., and Java Detour, Inc. April 27... information concerning the securities of Java Detour, Inc. because it has not filed any periodic reports since...
Volpe engineers use biometrics to help ease border crush
DOT National Transportation Integrated Search
1997-01-01
Using technology previously reserved for military and other high security applications, engineers from the Safety and Security Systems Division of the Volpe Center have developed a number of automated biometric systems to speed the processing of freq...
Sandia National Laboratories: National Security Missions: International
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
77 FR 29616 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
.... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...
Security for safety critical space borne systems
NASA Technical Reports Server (NTRS)
Legrand, Sue
1987-01-01
The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.
US Capitol Security - Our Nation's Capitol - A Safe Place for All?
DOT National Transportation Integrated Search
2000-08-01
This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... operations center for the Department of Homeland Security.'' Through the NOC, OPS provides real-time...-003 Operations Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records... System of Records.'' The DHS/OPS-003 Operations Collection, Planning, Coordination, Reporting, Analysis...
The safety and security of distribution systems has come under reassessment in the past year. Several chemical and biological agents have been identified that might constitute a credible threat against water supply systems. There have also been a few reported threats against wate...
14 CFR 1212.605 - Safeguarding information in systems of records.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Safeguarding information in systems of records. 1212.605 Section 1212.605 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... system manager in a written plan approved by the Center Security Officer or Center Information Technology...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-24
... Information Management System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of modification to... Enforcement Support Center Alien Criminal Response Information Management System of Records (73 FR 74739... Enforcement Support Center (LESC) Alien Criminal Response Information Management (ACRIMe) System (73 FR 74739...
Secure Remote Access Issues in a Control Center Environment
NASA Technical Reports Server (NTRS)
Pitts, Lee; McNair, Ann R. (Technical Monitor)
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
NASA Technical Reports Server (NTRS)
1986-01-01
The Johnson Space Center Management Information System (JSCMIS) is an interface to computer data bases at NASA Johnson which allows an authorized user to browse and retrieve information from a variety of sources with minimum effort. This issue gives requirements definition and design specifications for versions 2.1 and 2.1.1, along with documented test scenario environments, and security object design and specifications.
A secure communication using cascade chaotic computing systems on clinical decision support.
Koksal, Ahmet Sertol; Er, Orhan; Evirgen, Hayrettin; Yumusak, Nejat
2016-06-01
Clinical decision support systems (C-DSS) provide supportive tools to the expert for the determination of the disease. Today, many of the support systems, which have been developed for a better and more accurate diagnosis, have reached a dynamic structure due to artificial intelligence techniques. However, in cases when important diagnosis studies should be performed in secret, a secure communication system is required. In this study, secure communication of a DSS is examined through a developed double layer chaotic communication system. The developed communication system consists of four main parts: random number generator, cascade chaotic calculation layer, PCM, and logical mixer layers. Thanks to this system, important patient data created by DSS will be conveyed to the center through a secure communication line.
Utilizing Regional Centers in Sustaining Upgraded Russian Federation Ministry of Defense Sites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kaldenbach, Karen Yvonne; Chainikov, General Vladimir; Fedorov, General Victor
2010-01-01
Since the mid-1990s the governments of the United States (U.S.) and the Russian Federation (RF) have been collaborating on nonproliferation projects, particularly in the protection of nuclear material through the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). To date, this collaboration has resulted in upgrades to more than 72 RF Ministry of Defense (MOD) sensitive sites and facilities. These upgrades include physical protection systems (PPS), facilities to ensure material remains secure in various configurations, and infrastructure to support, maintain, and sustain upgraded sites. Significant effort on the part of both governments has also been expended to ensure thatmore » personnel obtain the necessary skills and training to both operate and maintain the security systems, thereby ensuring long term sustainability. To accomplish this, initial vendor training on physical protection systems was provided to key personnel, and an approved training curriculum was developed to teach the skills of operating, managing, administering, and maintaining the installed physical protection systems. This approach also included documentation of the processes and procedures to support infrastructure, requisite levels of maintenance and testing of systems and equipment, lifecycle management support, inventory systems and spare parts caches. One of the core components in the U.S. exit strategy and full transition to the RF MOD is the development and utilization of regional centers to facilitate centralized training and technical support to upgraded MOD sites in five regions of the RF. To date, two regional centers and one regional classroom facility are functional, and two additional regional centers are currently under construction. This paper will address the process and logistics of regional center establishment and the future vision for integrated regional center support by the RF MOD.« less
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Payable Contract Information Construction & Facilities Contract Audit Sandia's Economic Impact
MOD control center automated information systems security evolution
NASA Technical Reports Server (NTRS)
Owen, Rich
1991-01-01
The role of the technology infusion process in future Control Center Automated Information Systems (AIS) is highlighted. The following subject areas are presented in the form of the viewgraphs: goals, background, threat, MOD's AISS program, TQM, SDLC integration, payback, future challenges, and bottom line.
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
NASA Astrophysics Data System (ADS)
Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Williams, M.; Smith, K. D.
2012-12-01
The Nevada Seismological Laboratory (NSL) manages time-series data and high-throughput IP telemetry for the National Center for Nuclear Security (NCNS) Source Physics Experiment (SPE), underway on the Nevada National Security Site (NNSS). During active-source experiments, SPE's heterogeneous systems record over 350 channels of a variety of data types including seismic, infrasound, acoustic, and electro-magnetic. During the interim periods, broadband and short period instruments record approximately 200 channels of continuous, high-sample-rate seismic data. Frequent changes in sensor and station configurations create a challenging meta-data environment. Meta-data account for complete operational histories, including sensor types, serial numbers, gains, sample rates, orientations, instrument responses, data-logger types etc. To date, these catalogue 217 stations, over 40 different sensor types, and over 1000 unique recording configurations (epochs). Facilities for processing, backup, and distribution of time-series data currently span four Linux servers, 60Tb of disk capacity, and two data centers. Bandwidth, physical security, and redundant power and cooling systems for acquisition, processing, and backup servers are provided by NSL's Reno data center. The Nevada System of Higher Education (NSHE) System Computer Services (SCS) in Las Vegas provides similar facilities for the distribution server. NSL staff handle setup, maintenance, and security of all data management systems. SPE PIs have remote access to meta-data, raw data, and CSS3.0 compilations, via SSL-based transfers such as rsync or secure-copy, as well as shell access for data browsing and limited processing. Meta-data are continuously updated and posted on the Las Vegas distribution server as station histories are better understood and errors are corrected. Raw time series and refined CSS3.0 data compilations with standardized formats are transferred to the Las Vegas data server as available. For better data availability and station monitoring, SPE is beginning to leverage NSL's wide-area digital IP network with nine SPE stations and six Rock Valley area stations that stream continuous recordings in real time to the NSL Reno data center. These stations, in addition to eight regional legacy stations supported by National Security Technologies (NSTec), are integrated with NSL's regional monitoring network and constrain a high-quality local earthquake catalog for NNSS. The telemetered stations provide critical capabilities for SPE, and infrastructure for earthquake response on NNSS as well as southern Nevada and the Las Vegas area.
About the Transportation Secure Data Center | Transportation Secure Data
Center | NREL About the Transportation Secure Data Center About the Transportation Secure Data Center The Transportation Secure Data Center (TSDC) makes vital transportation data broadly available large, colorful map of the United States. NREL data experts and engineers analyze large sets of complex
Code of Federal Regulations, 2010 CFR
2010-04-01
... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Privacy of Individuals and Systems of Records... Information and Privacy Act Operations, SEC, Operations Center, 6432 General Green Way, Alexandria, VA 22312...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Privacy of Individuals and Systems of Records... Information and Privacy Act Operations, SEC, Operations Center, 6432 General Green Way, Alexandria, VA 22312...
Information Systems Security Products and Services Catalogue.
1992-01-01
pricing information on the Motorola Portable DES Receiver Station and Portable DES Base Station, contact Motorola. The PX-300- S ranges in cost from...C2 Paul Smith (612) 482-2776 Tom Latterner (301) 220-3400 Jeffrey S . Bell (215) 986-6864 John Haggard (312) 714-7604 4-2d.2 GENERAL-PURPOSE...primary software security mechanism of the SCOMP system is the security kernel, based on the Center-approved Bell -LaPadula model of the software portion
Addressing the Challenges of Collective Security in West Africa: In View of Recent Conflicts
2017-06-09
Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Understanding that achieving peace and security is a primary condition for an economic ...condition for an economic integration, ECOWAS has developped various approachs in resolving crises and overcoming threats within West Africa. Using...System CS Collective Security CSO Civil Society Organizations CSS Center for Security Studies EAC East Africa Community ECCAS Economic Community of
Software To Secure Distributed Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines
The Ambulatory Care Workload Management System for Nursing Reference Manual
1991-05-31
MEDICAL DATA SERVICES CENTER BETHESDA, MARYLAND 2088Q-506. 91-03029 SECuRItY CLASSIFICATION OF THIS PAGEr REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY...ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION Naval Medical Data Servics (If applicable) Center 6c. ADDRESS (City, State, and ZIPCode) 7b...staffing methodology developed for emergency and ambulatory care departments in naval medical treatment facilities . The staffing model translates varying
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.
Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities havemore » received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.« less
The USEPA's National Homeland Security Research Center (NHSRC)Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle recently evaluated the performance of the Science Applications International Co...
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry
Sandia National Laboratories: National Security Missions: International
Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia
Risk and Infrastructure Science Center - Global Security Sciences
delivers scientific tools and methodologies to inform decision making regarding the most challenging Sciences ASD Accelerator Systems AES APS Engineering Support XSD X-ray Science Physical Sciences and Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
Remote video assessment for missile launch facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.; Stewart, W.A.
1995-07-01
The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less
Cyber Security: Big Data Think II Working Group Meeting
NASA Technical Reports Server (NTRS)
Hinke, Thomas; Shaw, Derek
2015-01-01
This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.
Sandia National Laboratories: National Security Missions: Defense Systems
Technology Partnerships Business, Industry, & Non-Profits Government Universities Center for Development Agreement (CRADA) Strategic Partnership Projects, Non-Federal Entity (SPP/NFE) Agreements New leadership for the national security community by delivering cutting-edge experimental and operational sensor
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
NASA Technical Reports Server (NTRS)
2002-01-01
When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.
48 CFR 1804.470-4 - Contract clause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... clause. (a) Insert the clause at 1852.204-76, Security Requirements for Unclassified Information...— (1) Have physical or electronic access to NASA's computer systems, networks, or IT infrastructure; or... Security Manager before granting any waivers to paragraph (b) of the clause; and (2) The Center Chief of...
IT Security Support for Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
McLain, Jeffrey
2013-01-01
During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.
A Cloud Computing Based Patient Centric Medical Information System
NASA Astrophysics Data System (ADS)
Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko
This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.
Railroad infrastructure trespassing detection systems research in Pittsford, New York
DOT National Transportation Integrated Search
2006-08-01
The U.S. Department of Transportations Volpe National Transportation Systems Center, under the direction of the Federal Railroad Administration, conducted a 3-year demonstration of an automated prototype railroad infrastructure security system on ...
75 FR 43709 - Privacy Act of 1974; New and Revised Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... Title XVIII of the Social Security Act for qualified railroad retirement beneficiaries. ROUTINE USES OF... representative or his/her survivors, the Social Security Administration, the Centers for Medicare & Medicaid... for information regarding an individual's record should be in writing, including the full name, Social...
2002-07-01
Knowledge From Data .................................................. 25 HIGH-CONFIDENCE SOFTWARE AND SYSTEMS Reliability, Security, and Safety for...NOAA’s Cessna Citation flew over the 16-acre World Trade Center site, scanning with an Optech ALSM unit. The system recorded data points from 33,000...provide the data storage and compute power for intelligence analysis, high-performance national defense systems , and critical scientific research • Large
1990-10-04
methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted
2011-08-25
Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational
Protecting clinical data on Web client computers: the PCASSO approach.
Masys, D. R.; Baker, D. B.
1998-01-01
The ubiquity and ease of use of the Web have made it an increasingly popular medium for communication of health-related information. Web interfaces to commercially available clinical information systems are now available or under development by most major vendors. To the extent that such interfaces involve the use of unprotected operating systems, they are vulnerable to security limitations of Web client software environments. The Patient Centered Access to Secure Systems Online (PCASSO) project extends the protections for person-identifiable health data on Web client computers. PCASSO uses several approaches, including physical protection of authentication information, execution containment, graphical displays, and monitoring the client system for intrusions and co-existing programs that may compromise security. PMID:9929243
1983-05-15
20816 ArthurD littleInc 180527 08 SECURITY CLA IFICATIO-4 or TWISt PAGE MN-n hofa, Ent*rod " REPORT DOCUMENTATION PAGE DEFORr rOfINT -rCTIOR I. RE"PORT...PAGES Bethesda, MD 20816 _ 1 14. MONITORING AGENCY NAME & ADDRESS(If dlilerent from Controlling Office) IS. SECURITY CLASS. (of thle re"ep) ISO. DECL ASSI
Park, Yu Rang; Yoon, Young Jo; Koo, HaYeong; Yoo, Soyoung; Choi, Chang-Min; Beck, Sung-Ho
2018-01-01
Background Clinical trials pose potential risks in both communications and management due to the various stakeholders involved when performing clinical trials. The academic medical center has a responsibility and obligation to conduct and manage clinical trials while maintaining a sufficiently high level of quality, therefore it is necessary to build an information technology system to support standardized clinical trial processes and comply with relevant regulations. Objective The objective of the study was to address the challenges identified while performing clinical trials at an academic medical center, Asan Medical Center (AMC) in Korea, by developing and utilizing a clinical trial management system (CTMS) that complies with standardized processes from multiple departments or units, controlled vocabularies, security, and privacy regulations. Methods This study describes the methods, considerations, and recommendations for the development and utilization of the CTMS as a consolidated research database in an academic medical center. A task force was formed to define and standardize the clinical trial performance process at the site level. On the basis of the agreed standardized process, the CTMS was designed and developed as an all-in-one system complying with privacy and security regulations. Results In this study, the processes and standard mapped vocabularies of a clinical trial were established at the academic medical center. On the basis of these processes and vocabularies, a CTMS was built which interfaces with the existing trial systems such as the electronic institutional review board health information system, enterprise resource planning, and the barcode system. To protect patient data, the CTMS implements data governance and access rules, and excludes 21 personal health identifiers according to the Health Insurance Portability and Accountability Act (HIPAA) privacy rule and Korean privacy laws. Since December 2014, the CTMS has been successfully implemented and used by 881 internal and external users for managing 11,645 studies and 146,943 subjects. Conclusions The CTMS was introduced in the Asan Medical Center to manage the large amounts of data involved with clinical trial operations. Inter- and intraunit control of data and resources can be easily conducted through the CTMS system. To our knowledge, this is the first CTMS developed in-house at an academic medical center side which can enhance the efficiency of clinical trial management in compliance with privacy and security laws. PMID:29691212
NASA Technical Reports Server (NTRS)
Gunawan, Ryan A.
2016-01-01
With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.
ERIC Educational Resources Information Center
Deese, Stephanie
The Workforce Investment Act of 1998 provided states with a great amount of flexibility in the implementation of a system-wide approach to job training and workforce development. The legislation consolidated employment and training services into a one-stop system that is known as JobLink Career Centers in North Carolina. This document presents…
Disruptive Ideas for IT/OT Security in Energy Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martin, Maurice
Presentation on disruptive ideas for IT and OT cybersecurity in energy systems, presented by Power Systems Engineering Center Researcher Maurice Martin. This presentation was prepared for the Florida Institute for Cybersecurity Research Conference on March 1, 2018.
Subscribe to the Transportation Secure Data Center Newsletter |
Newsletter Subscribe to the Transportation Secure Data Center Newsletter Subscribe to receive via email the Transportation Secure Data Center (TSDC) newsletter. Email Address Subscribe Newsletter
A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security President's Export Council; Subcommittee on... Administration (PECSEA) will meet on June 4, 2013, 9:30 a.m. (pacific daylight time), at Boeing Defense, Space and Security, Space and Intelligence Systems, Building S24, Conference Center, 2020 East Imperial...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... and certified investigative data remains secured in the e-QIP system until the next time the... respondent will be allowed to update information and certify that data. In this instance, time to complete... Administration (FAA), and commenters from the public and OPM. Five advocacy groups, the Bazelon Center for Mental...
Management of Library Security. SPEC Kit 247 and SPEC Flyer 247.
ERIC Educational Resources Information Center
Soete, George J., Comp.; Zimmerman, Glen, Comp.
This SPEC (Systems and Procedures Exchange Center) Kit and Flyer reports results of a survey conducted in January 1999 that examined how ARL (Association of Research Libraries) member libraries assure the safety and security of persons, library materials, physical facilities, furnishings, computer equipment, etc. Forty-five of the 122 ARL member…
2006-09-01
data transform set contains : the security protocol (AH and/or ESP, connection mode (tunnel or transport), encryption information (DES, 3DES, AES...Management Information Base, version 2) objects are variables that contain data about the system. They are defined as part of the Simple Network...Avon Park was configured for access on the concentrator. c. Security Association (SA) • A security association contains all of the information
Mobile health requires mobile security: challenges, solutions, and standardization.
Pharow, Peter; Blobel, Bernd
2008-01-01
Extended communication and advanced cooperation in a permanently growing healthcare and welfare domain require a well-defined set of security services provided by an interoperable security infrastructure based on international and European standards. Any communication and collaboration procedure requires a purpose. But such legal purpose-binding is definitely not the only aspect to carefully be observed and investigated. More and more, aspects of security, safety, privacy, ethics, and quality reach importance while discussing about future-proof health information systems and health networks - regardless whether local, regional or even pan-European networks. During the course of the current paradigm change from an organization-centered to a process-related and to a person-centered health system, different new technologies including mobile solutions need to be applied in order to meet challenges arising from both legal and technical circumstances. Beside the typical Information and Communication Technology systems and applications, the extended use of modern technologies includes large medical devices like, e.g., MRI and CT but also small devices like sensors worn by a person or included in clothing. Security and safety are on top of the priority list. The paper addresses the identification of some specific aspects like mobile technology and safety when moving both IT and people towards mobile health aiming at increasing citizens and patients awareness, confidence, and acceptance in future mobile care - a world often still beyond the horizon.
A novel water poverty index model for evaluation of Chinese regional water security
NASA Astrophysics Data System (ADS)
Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.
2017-08-01
This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.
Sandia National Laboratories: National Security Missions: Defense Systems
; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1985-07-01
The report presents the results of a feasibility study for the National Load Dispatch Center and Global Communications System Project in Guatemala. The project consists of a communication system which will provide Institute Nacional de Electrificacion (INDE) operations personnel direct voice access to all major power system facilities. In addition, a modern computer based load dispatch center has been configured on a secure and reliable basis to provide automatic generation control of all major interconnected generating plants within Guatemala.
DOD Security Cooperation: An Overview of Authorities and Issues
2016-08-23
Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic
Integrating Distributed Homogeneous and Heterogeneous Databases: Prototypes. Volume 3.
1987-12-01
Integrating Distributed3 Institute of Teholg Homogeneous and -Knowledge-Based eeokn usDtb e: Integrated Information Pooye Systems Engineering Pooye (KBIISE...Transportation Systems Center, December 1987 Broadway, NIA 02142 13. NUMBER OF PAGES IT ~ *n~1~ ArFre 218 Pages 14. kW rSi dTfrn front N Gr~in Office) IS...SECURITY CLASS. (of thie report) Transportation Systems Center, Unclassified Broadway, MA 02142 I5a. DECLASSIFICATION/ DOWNGRADING SCHEDULE 16. DISTRIBUTION
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.
Evaluation of Participant Needs in a Regional Center for Security Studies
ERIC Educational Resources Information Center
Schmoker, Oliver E., III.
2009-01-01
This research study was implemented within the subject headquarters of a regional center, an organization responsible for security cooperation in Europe and Eurasia. The focus of the study was the center's program of security education. This program was designed to support evolving security objectives of foreign countries in order to increase the…
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Měsíček, Libor; Choi, Jongsun
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.
Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
Security warning method and system for worker safety during live-line working
NASA Astrophysics Data System (ADS)
Jiang, Chilong; Zou, Dehua; Long, Chenhai; Yang, Miao; Zhang, Zhanlong; Mei, Daojun
2017-09-01
Live-line working is an essential part in the operations in an electric power system. Live-line workers are required to wear shielding clothing. Shielding clothing, however, acts as a closed environment for the human body. Working in a closed environment for a long time can change the physiological responses of the body and even endanger personal safety. According to the typical conditions of live-line working, this study synthesizes environmental factors related to shielding clothing and the physiological factors of the body to establish the heart rate variability index RMSSD and the comprehensive security warning index SWI. On the basis of both indices, this paper proposes a security warning method and system for the safety live-line workers. The system can monitor the real-time status of workers during live-line working to provide security warning and facilitate the effective safety supervision by the live operation center during actual live-line working.
New secure communication-layer standard for medical image management (ISCL)
NASA Astrophysics Data System (ADS)
Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki
1999-07-01
This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.
AF-TRUST, Air Force Team for Research in Ubiquitous Secure Technology
2010-07-26
Charles Sutton, J. D. Tygar, and Kai Xia. Book chapter in Jeffrey J. P. Tsai and Philip S. Yu (eds.) Machine Learning in Cyber Trust: Security, Privacy...enterprise, tactical, embedded systems and command and control levels. From these studies, commissioned by Dr . Sekar Chandersekaran of the Secretary of the...Data centers avoid IP Multicast because of a series of problems with the technology. • Dr . Multicast (the MCMD), a system that maps traditional I PMC
PCASSO: a design for secure communication of personal health information via the internet.
Baker, D B; Masys, D R
1999-05-01
The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.
1989-01-01
Center, Panama City 314 Diver Training Building Addition 4,300 4 ,300 50 180 Subtotal 4,300 4,300 Navy Experimental Diving Unit 182 Panama City 347 ...Air Force 001 Security Training Center 4,500 4,500 100 345 Subtotal .4,500 4,500 TOTAL FOR TAS 28,220 28,220 Virginia Naval SecuritY Goui Activity 347 ...Building Addition 4,300 C NEDU Panama City, FL 347 Underwater Equipment Support Complex 2,900 C NPWC Pensacola, FL 109 Wastewater Transfer System 2,100 C
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)
2003-01-01
The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.
Implementation of Medical Information Exchange System Based on EHR Standard
Han, Soon Hwa; Kim, Sang Guk; Jeong, Jun Yong; Lee, Bi Na; Choi, Myeong Seon; Kim, Il Kon; Park, Woo Sung; Ha, Kyooseob; Cho, Eunyoung; Kim, Yoon; Bae, Jae Bong
2010-01-01
Objectives To develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems. Methods To assure that patient's medical information can be effectively exchanged under different system environments, we adopted the standardized data transfer methods and terminologies suggested by the Center for Interoperable Electronic Healthcare Record (CIEHR) of Korea in order to guarantee interoperability. Regarding information security, MIES followed the security guidelines suggested by the CIEHR of Korea. This study aimed to develop essential security systems for the implementation of online services, such as encryption of communication, server security, database security, protection against hacking, contents, and network security. Results The registry server managed information exchange as well as the registration information of the clinical document architecture (CDA) documents, and the CDA Transfer Server was used to locate and transmit the proper CDA document from the relevant repository. The CDA viewer showed the CDA documents via connection with the information systems of related hospitals. Conclusions This research chooses transfer items and defines document standards that follow CDA standards, such that exchange of CDA documents between different systems became possible through ebXML. The proposed MIES was designed as an independent central registry server model in order to guarantee the essential security of patients' medical information. PMID:21818447
Implementation of Medical Information Exchange System Based on EHR Standard.
Han, Soon Hwa; Lee, Min Ho; Kim, Sang Guk; Jeong, Jun Yong; Lee, Bi Na; Choi, Myeong Seon; Kim, Il Kon; Park, Woo Sung; Ha, Kyooseob; Cho, Eunyoung; Kim, Yoon; Bae, Jae Bong
2010-12-01
To develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems. To assure that patient's medical information can be effectively exchanged under different system environments, we adopted the standardized data transfer methods and terminologies suggested by the Center for Interoperable Electronic Healthcare Record (CIEHR) of Korea in order to guarantee interoperability. Regarding information security, MIES followed the security guidelines suggested by the CIEHR of Korea. This study aimed to develop essential security systems for the implementation of online services, such as encryption of communication, server security, database security, protection against hacking, contents, and network security. The registry server managed information exchange as well as the registration information of the clinical document architecture (CDA) documents, and the CDA Transfer Server was used to locate and transmit the proper CDA document from the relevant repository. The CDA viewer showed the CDA documents via connection with the information systems of related hospitals. This research chooses transfer items and defines document standards that follow CDA standards, such that exchange of CDA documents between different systems became possible through ebXML. The proposed MIES was designed as an independent central registry server model in order to guarantee the essential security of patients' medical information.
ERIC Educational Resources Information Center
Tartt-Walker, Sheba Hollywood
2014-01-01
In light of the paradigm shift from teacher-centered to learner-centered instruction occurring globally, the need for committed teachers is critical. Due to the influx of foreign nationals securing positions in the U.S. educational system, the teacher workforce has become more diverse. This diversity manifests a broad range of beliefs and values…
78 FR 68828 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-15
..., ``Security and Counterintelligence Records'' and LDIA 0900, ``Accounts Receivable, Indebtedness and Claims...: Federal Docket Management System Office, 4800 Mark Center Drive; East Tower, 2nd Floor, Suite 02G09..., and telephone number.'' * * * * * LDIA 0900 System name: Accounts Receivable, Indebtedness and Claims...
Crowley, Rebecca S; Castine, Melissa; Mitchell, Kevin; Chavan, Girish; McSherry, Tara; Feldman, Michael
2010-01-01
The authors report on the development of the Cancer Tissue Information Extraction System (caTIES)--an application that supports collaborative tissue banking and text mining by leveraging existing natural language processing methods and algorithms, grid communication and security frameworks, and query visualization methods. The system fills an important need for text-derived clinical data in translational research such as tissue-banking and clinical trials. The design of caTIES addresses three critical issues for informatics support of translational research: (1) federation of research data sources derived from clinical systems; (2) expressive graphical interfaces for concept-based text mining; and (3) regulatory and security model for supporting multi-center collaborative research. Implementation of the system at several Cancer Centers across the country is creating a potential network of caTIES repositories that could provide millions of de-identified clinical reports to users. The system provides an end-to-end application of medical natural language processing to support multi-institutional translational research programs.
Self-Protecting Security for Assured Information Sharing
2015-08-29
by Author Sophia Novitzky (Senior), Virginia Tech Mahalia Sapp (Senior), Virginia Tech Performance Sensitivity in Vertical Geothermal Energy...Harvesting Systems 9:15 AM, Annapolis Room, Student Center Residential geothermal energy systems have the potential to provide a cost-effective, low
CERT Resilience Management Model, Version 1.0
2010-05-01
practice such as ISO 27000 , COBIT, or ITIL. If you are a member of an established process improvement community, particularly one centered on CMMI...Systems Audit and Control Association ISO International Organization for Standardization ISSA Information Systems Security Association IT
Sandia National Laboratories: Sandia National Laboratories: Missions:
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
1996-01-01
Russia, by was someone higher up in the security that didn’t want to Austria, or by anyone else. But, I do believe that we must provide it. The Civil...Center to develop informed protective action the national security of many states, including Russia. recommendations to protect public health and...part played by the RSDM in the systems mentioned above). of the national security . The next, also very important role of the RSDM, is First, the
Park, Yu Rang; Yoon, Young Jo; Koo, HaYeong; Yoo, Soyoung; Choi, Chang-Min; Beck, Sung-Ho; Kim, Tae Won
2018-04-24
Clinical trials pose potential risks in both communications and management due to the various stakeholders involved when performing clinical trials. The academic medical center has a responsibility and obligation to conduct and manage clinical trials while maintaining a sufficiently high level of quality, therefore it is necessary to build an information technology system to support standardized clinical trial processes and comply with relevant regulations. The objective of the study was to address the challenges identified while performing clinical trials at an academic medical center, Asan Medical Center (AMC) in Korea, by developing and utilizing a clinical trial management system (CTMS) that complies with standardized processes from multiple departments or units, controlled vocabularies, security, and privacy regulations. This study describes the methods, considerations, and recommendations for the development and utilization of the CTMS as a consolidated research database in an academic medical center. A task force was formed to define and standardize the clinical trial performance process at the site level. On the basis of the agreed standardized process, the CTMS was designed and developed as an all-in-one system complying with privacy and security regulations. In this study, the processes and standard mapped vocabularies of a clinical trial were established at the academic medical center. On the basis of these processes and vocabularies, a CTMS was built which interfaces with the existing trial systems such as the electronic institutional review board health information system, enterprise resource planning, and the barcode system. To protect patient data, the CTMS implements data governance and access rules, and excludes 21 personal health identifiers according to the Health Insurance Portability and Accountability Act (HIPAA) privacy rule and Korean privacy laws. Since December 2014, the CTMS has been successfully implemented and used by 881 internal and external users for managing 11,645 studies and 146,943 subjects. The CTMS was introduced in the Asan Medical Center to manage the large amounts of data involved with clinical trial operations. Inter- and intraunit control of data and resources can be easily conducted through the CTMS system. To our knowledge, this is the first CTMS developed in-house at an academic medical center side which can enhance the efficiency of clinical trial management in compliance with privacy and security laws. ©Yu Rang Park, Young Jo Yoon, HaYeong Koo, Soyoung Yoo, Chang-Min Choi, Sung-Ho Beck, Tae Won Kim. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 24.04.2018.
Physical Security Modeling for the Shipboard Nuclear Weapons Security Program,
1982-04-01
I AOA1IR 396 NAVAL SURFACE WEAPONS CENTER SILVER SPRING MO F/G 15/3 PHYSICAL SECURITY MODELING FOR THE SHIPROARD NUCLEAR WEAPONS SE--ETEEU) APR A2 E ...WEAPONS SECURITY )PROGRAM 0% BY E . G. JACOUES D. L BARTUSEK R. W. MONROE M. S. SCHWARTZ WEAPONS SYSTEMS DEPARTMENT 1 APRIL 1982 A4pm lvW for p uic r...ASSIPICATIO N O F Tb IS PAGE t’W "mu Dat e E DLeT R)....... t READ W~STRUCTIoNs’ REPORT DOCUMENTATION PAGE BEFORE COMPLETNG FORM4 . REPiQRT NUM1e[i ja. VT
Visual identification system for homeland security and law enforcement support
NASA Astrophysics Data System (ADS)
Samuel, Todd J.; Edwards, Don; Knopf, Michael
2005-05-01
This paper describes the basic configuration for a visual identification system (VIS) for Homeland Security and law enforcement support. Security and law enforcement systems with an integrated VIS will accurately and rapidly provide identification of vehicles or containers that have entered, exited or passed through a specific monitoring location. The VIS system stores all images and makes them available for recall for approximately one week. Images of alarming vehicles will be archived indefinitely as part of the alarming vehicle"s or cargo container"s record. Depending on user needs, the digital imaging information will be provided electronically to the individual inspectors, supervisors, and/or control center at the customer"s office. The key components of the VIS are the high-resolution cameras that capture images of vehicles, lights, presence sensors, image cataloging software, and image recognition software. In addition to the cameras, the physical integration and network communications of the VIS components with the balance of the security system and client must be ensured.
Transportation Secure Data Center Newsletter | Transportation Secure Data
Travel Study: A pilot study conducted February-March 2015, the In the Moment Travel Study used an Transportation Study: In February and March 2014, Resource Systems Group, Inc., conducted the Heartland in Motion Transportation Study for the Madison County Council of Governments. The study included a household travel survey
Designing a Secure Exam Management System (SEMS) for M-Learning Environments
ERIC Educational Resources Information Center
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc
2016-01-01
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Famine Early Warning Systems and Their Use of Satellite Remote Sensing Data
NASA Technical Reports Server (NTRS)
Brown, Molly E.; Essam, Timothy; Leonard, Kenneth
2011-01-01
Famine early warning organizations have experience that has much to contribute to efforts to incorporate climate and weather information into economic and political systems. Food security crises are now caused almost exclusively by problems of food access, not absolute food availability, but the role of monitoring agricultural production both locally and globally remains central. The price of food important to the understanding of food security in any region, but it needs to be understood in the context of local production. Thus remote sensing is still at the center of much food security analysis, along with an examination of markets, trade and economic policies during food security analyses. Technology including satellite remote sensing, earth science models, databases of food production and yield, and modem telecommunication systems contributed to improved food production information. Here we present an econometric approach focused on bringing together satellite remote sensing and market analysis into food security assessment in the context of early warning.
Marshall Space Flight Center Test Capabilities
NASA Technical Reports Server (NTRS)
Hamilton, Jeffrey T.
2005-01-01
The Test Laboratory at NASA's Marshall Space Flight Center has over 50 facilities across 400+ acres inside a secure, fenced facility. The entire Center is located inside the boundaries of Redstone Arsenal, a 40,000 acre military reservation. About 150 Government and 250 contractor personnel operate facilities capable of all types of propulsion and structural testing, from small components to engine systems and structural strength, structural dynamic and environmental testing. We have tremendous engineering expertise in research, evaluation, analysis, design and development, and test of space transportation systems, subsystems, and components.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
2015-01-01
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
Continuous Security and Configuration Monitoring of HPC Clusters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garcia-Lomeli, H. D.; Bertsch, A. D.; Fox, D. M.
Continuous security and configuration monitoring of information systems has been a time consuming and laborious task for system administrators at the High Performance Computing (HPC) center. Prior to this project, system administrators had to manually check the settings of thousands of nodes, which required a significant number of hours rendering the old process ineffective and inefficient. This paper explains the application of Splunk Enterprise, a software agent, and a reporting tool in the development of a user application interface to track and report on critical system updates and security compliance status of HPC Clusters. In conjunction with other configuration managementmore » systems, the reporting tool is to provide continuous situational awareness to system administrators of the compliance state of information systems. Our approach consisted of the development, testing, and deployment of an agent to collect any arbitrary information across a massively distributed computing center, and organize that information into a human-readable format. Using Splunk Enterprise, this raw data was then gathered into a central repository and indexed for search, analysis, and correlation. Following acquisition and accumulation, the reporting tool generated and presented actionable information by filtering the data according to command line parameters passed at run time. Preliminary data showed results for over six thousand nodes. Further research and expansion of this tool could lead to the development of a series of agents to gather and report critical system parameters. However, in order to make use of the flexibility and resourcefulness of the reporting tool the agent must conform to specifications set forth in this paper. This project has simplified the way system administrators gather, analyze, and report on the configuration and security state of HPC clusters, maintaining ongoing situational awareness. Rather than querying each cluster independently, compliance checking can be managed from one central location.« less
Grants Document-Generation System
NASA Technical Reports Server (NTRS)
Hairell, Terri; Kreymer, Lev; Martin, Greg; Sheridan, Patrick
2008-01-01
The Grants Document-Generation System (GDGS) software allows the generation of official grants documents for distribution to the appropriate parties. The documents are created after the selection and entry of specific data elements and clauses. GDGS is written in Cold Fusion that resides on an SQL2000 database and is housed on-site at Goddard Space Flight Center. It includes access security written around GSFC's (Goddard Space Flight Center's) LIST system, and allows for the entry of Procurement Request information necessary for the generation of the resulting Grant Award.
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M. Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Objectives Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. Methods As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Results Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. Discussion This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Conclusion Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance. PMID:23569581
Secure scalable disaster electronic medical record and tracking system.
Demers, Gerard; Kahn, Christopher; Johansson, Per; Buono, Colleen; Chipara, Octav; Griswold, William; Chan, Theodore
2013-10-01
Electronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability. Report As the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures. A secure prehospital triage EMR improves documentation quality during disaster drills.
NASA Astrophysics Data System (ADS)
Xie, Chang; Wen, Jing; Liu, Wenying; Wang, Jiaming
With the development of intelligent dispatching, the intelligence level of network control center full-service urgent need to raise. As an important daily work of network control center, the application of maintenance scheduling intelligent arrangement to achieve high-quality and safety operation of power grid is very important. By analyzing the shortages of the traditional maintenance scheduling software, this paper designs a power grid maintenance scheduling intelligence arrangement supporting system based on power flow forecasting, which uses the advanced technologies in maintenance scheduling, such as artificial intelligence, online security checking, intelligent visualization techniques. It implements the online security checking of maintenance scheduling based on power flow forecasting and power flow adjusting based on visualization, in order to make the maintenance scheduling arrangement moreintelligent and visual.
2008-05-30
CAPE CANAVERAL, Fla. -- In the NASA News Center at NASA's Kennedy Space Center, Shuttle Crew Escape System Manager KC Chhipwadia describes for the media the elements of the helmet that is part of the launch and entry suit (seen on the table) used by shuttle crews during their missions. He is holding onto the bar that latches to secure the closed visor. The helmet provides oxygen when needed plus a communication system. Photo credit: NASA/Amanda Diller
NASA Astrophysics Data System (ADS)
Vastianos, George E.; Argyreas, Nick D.; Xilouris, Chris K.; Thomopoulos, Stelios C. A.
2015-05-01
The field of Homeland Security focuses on the air, land, and sea borders surveillance in order to prevent illegal activities while facilitating lawful travel and trade. The achievement of this goal requires collaboration of complex decentralized systems and services, and transfer of huge amount of information between the remote surveillance areas and the command & control centers. It becomes obvious that the effectiveness of the provided security depends highly on the available communication capabilities between the interconnected areas. Although nowadays the broadband communication between remote places is presumed easy because of the extensive infrastructure inside residential areas, it becomes a real challenge when the required information should be acquired from locations where no infrastructure is available such as mountain or sea areas. The Integrated Systems Lab of NCSR Demokritos within the PERSEUS FP7- SEC-2011-261748 project has developed a wireless broadband telecommunication system that combines different communication channels from subGHz to microwave frequencies and provides secure IP connectivity between sea surveillance vessels and the Command and Control Centers (C3). The system was deployed in Fast Patrol Boats of the Hellenic Coast Guard that are used for maritime surveillance in sea boarders and tested successfully in two demonstration exercises for irregular migration and smuggling scenarios in the Aegean Archipelagos. This paper describes in detail the system architecture in terms of hardware and software and the evaluation measurements of the system communication capabilities.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
...-01] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health... the National Cybersecurity Center of Excellence (NCCoE) in the Secure Exchange of Electronic Health... accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE will bring...
DOT National Transportation Integrated Search
1991-12-09
The System Safety & Security Division at The Volpe National Transportation System Center (VNTSC), Cambridge, MA is participating in an overall risk assessment study on the safety of High Speed Magnetic Levitation Transportation Systems ("MagLev"). Tr...
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
2015-05-13
STONIX is a program for configuring UNIX and Linux computer operating systems. It applies configurations based on the guidance from publicly accessible resources such as: NSA Guides, DISA STIGs, the Center for Internet Security (CIS), USGCB and vendor security documentation. STONIX is written in the Python programming language using the QT4 and PyQT4 libraries to provide a GUI. The code is designed to be easily extensible and customizable.
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.
Orion Stage Adapter (OSA) Offload
2018-04-04
NASA Kennedy Space Center security officers prepare to escort the Orion Stage Adapter (OSA), secured on a flatbed transporter, along State Road 3 to the Space Station Processing Facility (SSPF) at NASA's Kennedy Space Center in Florida. The OSA is the second flight-hardware section of the agency's Space Launch System (SLS) rocket to arrive at Kennedy. The OSA will connect the Orion spacecraft to the upper part of the SLS, the interim cryogenic propulsion stage (ICPS). Both the OSA and ICPS are being stored for processing in the SSPF in preparation for Exploration Mission-1, the first uncrewed, integrated launch of the SLS rocket and Orion spacecraft.
ERIC Educational Resources Information Center
Monroe, Eula Ewing
The Professional Development Center Network (PDC), a consortium of twenty public school districts, parochial schools, and Western Kentucky University, seeks to identify and secure resources to assist in the design and delivery of activities appropriate to the educational development of individual staff members through the online Information…
Energy Department Launches National Fuel Cell Technology Evaluation Center
technologies by strengthening data collection from fuel cell systems and components operating under real-world also houses one of the most energy efficient data centers in the world. NFCTEC will use a secure work proprietary hydrogen and fuel cell technologies in real-world operation since 2004. To date, NREL has
33 CFR 165.1121 - Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Center Industrial Pier, San Diego, CA. 165.1121 Section 165.1121 Navigation and Navigable Waters COAST... Guard District § 165.1121 Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. (a) Location. The following area is a security zone: the waters of San Diego Bay extending approximately 100...
Electronic patient record and archive of records in Cardio.net system for telecardiology.
Sierdziński, Janusz; Karpiński, Grzegorz
2003-01-01
In modern medicine the well structured patient data set, fast access to it and reporting capability become an important question. With the dynamic development of information technology (IT) such question is solved via building electronic patient record (EPR) archives. We then obtain fast access to patient data, diagnostic and treatment protocols etc. It results in more efficient, better and cheaper treatment. The aim of the work was to design a uniform Electronic Patient Record, implemented in cardio.net system for telecardiology allowing the co-operation among regional hospitals and reference centers. It includes questionnaires for demographic data and questionnaires supporting doctor's work (initial diagnosis, final diagnosis, history and physical, ECG at the discharge, applied treatment, additional tests, drugs, daily and periodical reports). The browser is implemented in EPR archive to facilitate data retrieval. Several tools for creating EPR and EPR archive were used such as: XML, PHP, Java Script and MySQL. The separate question is the security of data on WWW server. The security is ensured via Security Socket Layer (SSL) protocols and other tools. EPR in Cardio.net system is a module enabling the co-work of many physicians and the communication among different medical centers.
MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
2014-01-01
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
Local Integration of the National Atmospheric Release Advisory Center with Cities (LINC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ermak, D L; Tull, J E; Mosley-Rovi, R
The objective of the ''Local Integration of the National Atmospheric Release Advisory Center with Cities'' (LINC) program is to demonstrate the capability for providing local government agencies with an advanced operational atmospheric plume prediction capability, which can be seamlessly integrated with appropriate federal agency support for homeland security applications. LINC is a Domestic Demonstration and Application Program (DDAP) funded by the Chemical and Biological National Security Program (CBNP), which is part of the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). LINC will make use of capabilities that have been developed the CBNP, and integrated into the National Atmosphericmore » Release Advisory Center (NARAC) at Lawrence Livermore National Laboratory (LLNL). NARAC tools services will be provided to pilot study cities and counties to map plumes from terrorism threats. Support to these local agencies will include training and customized support for exercises, special events, and general emergencies. NARAC provides tools and services that map the probable spread of hazardous material which have been accidentally or intentionally released into the atmosphere. Primarily supported by the DOE, NARAC is a national support and resource center for planning, real-time assessment and detailed studies of incidents involving a wide variety of hazards, including radiological, chemical, or biological releases. NARAC is a distributed system, providing modeling and geographical information tools for use on an end user's computer system, as well as real-time access to global meteorological and geographical databases and advanced three-dimensional model predictions.« less
Cameras Reveal Elements in the Short Wave Infrared
NASA Technical Reports Server (NTRS)
2010-01-01
Goodrich ISR Systems Inc. (formerly Sensors Unlimited Inc.), based out of Princeton, New Jersey, received Small Business Innovation Research (SBIR) contracts from the Jet Propulsion Laboratory, Marshall Space Flight Center, Kennedy Space Center, Goddard Space Flight Center, Ames Research Center, Stennis Space Center, and Langley Research Center to assist in advancing and refining indium gallium arsenide imaging technology. Used on the Lunar Crater Observation and Sensing Satellite (LCROSS) mission in 2009 for imaging the short wave infrared wavelengths, the technology has dozens of applications in military, security and surveillance, machine vision, medical, spectroscopy, semiconductor inspection, instrumentation, thermography, and telecommunications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinn, D J
This month's issue has the following articles: (1) Homeland Security Begins Abroad--Commentary by John C. Doesburg; (2) Out of Harm's Way--New physical protection and accountability systems, together with a focus on security, safeguard nuclear materials in the Russian Federation; (3) A Calculated Journey to the Center of the Earth--Determining the permeability of partially melted metals in a mineral matrix unlocks secrets about the formation of Earth's core; (4) Wireless That Works--Communication technologies using ultrawideband radar are improving national security; and (5) Power to the People--Edward Teller envisioned safe and plentiful nuclear power for peaceful applications.
Overview Webinar | Transportation Secure Data Center | NREL
Overview Webinar Overview Webinar This webinar focuses on the Transportation Secure Data Center (TSDC), which serves as a secure area for archiving and accessing detailed transportation data from a
DOE Office of Scientific and Technical Information (OSTI.GOV)
Begoli, Edmon; Boehmann, Brant; DeNap, Frank A
In 2003 a joint effort between the U.S. Department of Homeland Security (DHS) and the U.S. Department of Justice created state and metropolitan intelligence fusion centers. These fusion centers were an effort to share law enforcement, disaster, and terrorism related information and intelligence between state and local jurisdictions and to share terrorism related intelligence between state and local law enforcement agencies and various federal entities. In 2006, DHS commissioned the Oak Ridge National Laboratory to establish and manage a groundbreaking program to assist local, state, and tribal leaders in developing the tools and methods required to anticipate and forestall terroristmore » events and to enhance disaster response. This program, called the Southeast Region Research Initiative (SERRI), combines science and technology with validated operational approaches to address regionally unique requirements and suggest regional solutions with the potential for national application. In 2009, SERRI sponsored the Multistate Sharing Initiative (MSSI) to assist state and metropolitan intelligence fusion centers with sharing information related to a wider variety of state interests than just terrorism. While these fusion centers have been effective at sharing data across organizations within their respective jurisdictions, their organizational structure makes bilateral communication with federal entities convenient and also allows information to be further disbursed to other local entities when appropriate. The MSSI-developed Suspicious Activity Report (SAR) sharing system allows state-to-state sharing of non-terrorism-related law enforcement and disaster information. Currently, the MSSI SAR system is deployed in Alabama, Kentucky, Tennessee, and South Carolina. About 1 year after implementation, cognizant fusion center personnel from each state were contacted to ascertain the status of their MSSI SAR systems. The overwhelming response from these individuals was that the MSSI SAR system was an outstanding success and contributed greatly to the security and resiliency of their states. At least one state commented that SERRI's implementation of the MSSI SAR actually 'jump started' and accelerated deployment and acceptance of the Nationwide Suspicious Activity Reporting Initiative (NSI). While all states were enthusiastic about their systems, South Carolina and Tennessee appeared to be the heaviest users of their respective systems. With NSI taking the load of sharing SARs with other states, Tennessee has redeployed the MSSI SAR system within Tennessee to allow SAR sharing between state and local organizations including Tennessee's three Homeland Security Regions, eleven Homeland Security Districts, and more than 500 police and sheriff offices, as well as with other states. In one success story from South Carolina, the Economy SAR System was used to compile similar SARs from throughout the state which were then forwarded to field liaison officers, emergency management personnel, and law enforcement officers for action.« less
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
Code of Federal Regulations, 2014 CFR
2014-07-01
... designated by the Department of Homeland Security and the NSA as a national center of excellence. IA. For the purpose of this part, the term “IA” includes computer security, network security, cybersecurity, cyber... the Department of Homeland Security and the NSA as a national center of excellence. CAE-R. An...
Code of Federal Regulations, 2013 CFR
2013-07-01
... designated by the Department of Homeland Security and the NSA as a national center of excellence. IA. For the purpose of this part, the term “IA” includes computer security, network security, cybersecurity, cyber... the Department of Homeland Security and the NSA as a national center of excellence. CAE-R. An...
Code of Federal Regulations, 2012 CFR
2012-07-01
... designated by the Department of Homeland Security and the NSA as a national center of excellence. IA. For the purpose of this part, the term “IA” includes computer security, network security, cybersecurity, cyber... the Department of Homeland Security and the NSA as a national center of excellence. CAE-R. An...
Instrumentation, Control, and Intelligent Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-09-01
Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less
Railroad infrastructure trespass detection performance guidelines
DOT National Transportation Integrated Search
2011-01-01
The U.S. Department of Transportations John A. Volpe National Transportation Systems Center, under the direction of the Federal Railroad Administration, conducted a 3-year demonstration of an automated prototype railroad infrastructure security sy...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR § 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... January 2004 (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
Alternative IT Sourcing: A Discussion of Privacy, Security, and Risk
ERIC Educational Resources Information Center
Petersen, Rodney
2011-01-01
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Security Primitives for Reconfigurable Hardware-Based Systems
2010-05-01
work, we propose security primitives using ideas centered around the notion of “moats and drawbridges .” The primitives encompass four design properties...Santa Bar- bara, CA 93106; email: sherwood@cs.ucsb.edu; R. Kastner, Department of Computer Science and Engineering , University of California, San...fingerprint reader), the other to control the ethernet IP core—and an AES encryption engine used by both of the processor cores. These cores are all implemented
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
NASA's Super Guppy aircraft has been closed and secured at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The Orion Exploration Mission-1 (EM-1) structural test article is secured inside the Super Guppy and will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Computer Center Reference Manual. Volume 1
1990-09-30
Unlimited o- 0 0 91o1 UNCLASSI FI ED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE...with connection to INTERNET ) (host tables allow transfer to some other networks) OASYS - the DTRC Office Automation System The following can be reached...and buffers, two windows, and some word processing commands. Advanced editing commands are entered through the use of a command line. EVE las its own
2010-03-19
network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional Fusion Center...of reports; the I&A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .73 As part of its...comprehensive information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network
From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans
2014-06-01
Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any
High Fidelity Simulations of Large-Scale Wireless Networks (Plus-Up)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Onunkwo, Uzoma
Sandia has built a strong reputation in scalable network simulation and emulation for cyber security studies to protect our nation’s critical information infrastructures. Georgia Tech has preeminent reputation in academia for excellence in scalable discrete event simulations, with strong emphasis on simulating cyber networks. Many of the experts in this field, such as Dr. Richard Fujimoto, Dr. George Riley, and Dr. Chris Carothers, have strong affiliations with Georgia Tech. The collaborative relationship that we intend to immediately pursue is in high fidelity simulations of practical large-scale wireless networks using ns-3 simulator via Dr. George Riley. This project will have mutualmore » benefits in bolstering both institutions’ expertise and reputation in the field of scalable simulation for cyber-security studies. This project promises to address high fidelity simulations of large-scale wireless networks. This proposed collaboration is directly in line with Georgia Tech’s goals for developing and expanding the Communications Systems Center, the Georgia Tech Broadband Institute, and Georgia Tech Information Security Center along with its yearly Emerging Cyber Threats Report. At Sandia, this work benefits the defense systems and assessment area with promise for large-scale assessment of cyber security needs and vulnerabilities of our nation’s critical cyber infrastructures exposed to wireless communications.« less
Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari
2008-11-01
This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.
Halftoning Algorithms and Systems.
1996-08-01
TERMS 15. NUMBER IF PAGESi. Halftoning algorithms; error diffusions ; color printing; topographic maps 16. PRICE CODE 17. SECURITY CLASSIFICATION 18...graylevels for each screen level. In the case of error diffusion algorithms, the calibration procedure using the new centering concept manifests itself as a...Novel Centering Concept for Overlapping Correction Paper / Transparency (Patent Applied 5/94)I * Applications To Error Diffusion * To Dithering (IS&T
General View looking forward along the centerline of the Orbiter ...
General View looking forward along the centerline of the Orbiter Discovery looking into the payload bay with a payload in the process of being secured into place. This photograph was taken in the Orbiter Processing Facility at Kennedy Space Center. - Space Transportation System, Orbiter Discovery (OV-103), Lyndon B. Johnson Space Center, 2101 NASA Parkway, Houston, Harris County, TX
Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs
NASA Astrophysics Data System (ADS)
Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei
2017-10-01
Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.
Report of the Defense Science Board Task Force on Basic Research
2012-01-01
Applied Research Navy $2.5 Laboratory University of Maryland, College Park: Center for National Security $18.7 Advanced Study of Language Agency ( NSA ...Stevens Institute of Technology: Systems ASD{R&E) and $7.2 Engineering Research Center NSA DOD Federally Funded Research and Development Centers...Navy USD(AT&L) Army USD(AT&L) Air Force Air Force USD(AT&L) NSA USD(AT&L) USD(AT&L) FFRDCs that are sponsored by agencies other than DOD
A Hybrid Authentication and Authorization Process for Control System Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.
2010-08-25
Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less
Secure Payload Access to the International Space Station
NASA Technical Reports Server (NTRS)
Pitts, R. Lee; Reid, Chris
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Automated Library System Specifications.
1986-06-01
University), LIS (Georqetown Universitv Medical Center) 20 DiSTRI3UT!ON.. AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION :UNCLASSIFIED...Interface) acquisitions, patron access catalo. (Boolean search), authority Afiles, zana ~ezient reports. Serials control expected in 1985. INDIVIDUALIZATIOI
Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.
Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima
2014-02-01
This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making. © 2013 Chinese Cochrane Center, West China Hospital of Sichuan University and Wiley Publishing Asia Pty Ltd.
Putting the Medical Library Online: Electronic Bulletin Boards. . . and Beyond.
ERIC Educational Resources Information Center
Kittle, Paul W.
1985-01-01
Describes use of microcomputers with system called "TBBS" ("The Bread Board System") at Loma Linda University Medical Center to allow users enhanced services from home, whether library facilities are open or not. Flexibility and security, dialing into medical library, and suggestions for setting up similar computerized…
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.
76 FR 1521 - Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0423] RIN 1625-AA87 Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The Coast Guard is removing a security zone on the navigable waters of San Diego...
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
Underwater magnetic gradiometer for magnetic anomaly detection, localization, and tracking
NASA Astrophysics Data System (ADS)
Kumar, S.; Sulzberger, G.; Bono, J.; Skvoretz, D.; Allen, G. I.; Clem, T. R.; Ebbert, M.; Bennett, S. L.; Ostrom, R. K.; Tzouris, A.
2007-04-01
GE Security and the Naval Surface Warfare Center, Panama City (NSWC-PC) have collaborated to develop a magnetic gradiometer, called the Real-time Tracking Gradiometer or RTG that is mounted inside an unmanned underwater vehicle (UUV). The RTG is part of a buried mine hunting platform being developed by the United States Navy. The RTG has been successfully used to make test runs on mine-like targets buried off the coast of Florida. We will present a general description of the system and latest results describing system performance. This system can be also potentially used for other applications including those in the area of Homeland Security.
Education and Strategic Research Collaborations
Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student
Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2014-01-01
This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.
2015-01-01
NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.
Shin, Peter; Jacobs, Feygele
2012-01-01
Since taking office, President Obama has made substantial investments in promoting the diffusion of health information technology (IT). The objective of the national health IT program is, generally, to enable health care providers to better manage patient care through secure use and sharing of health information. Through the use of technologies including electronic health records, providers can better maintain patient care information and facilitate communication, often improving care outcomes. The recent tornado in Joplin, MO highlights the importance of health information technology in the health center context, and illustrates the importance of secure electronic health information systems as a crucial element of disaster and business continuity planning. This article examines the experience of a community health center in the aftermath of the major tornado that swept through the American Midwest in the spring of 2011, and provides insight into the planning for disaster survival and recovery as it relates to patient records and health center data.
Shin, Peter; Jacobs, Feygele
2012-01-01
Since taking office, President Obama has made substantial investments in promoting the diffusion of health information technology (IT). The objective of the national health IT program is, generally, to enable health care providers to better manage patient care through secure use and sharing of health information. Through the use of technologies including electronic health records, providers can better maintain patient care information and facilitate communication, often improving care outcomes. The recent tornado in Joplin, MO highlights the importance of health information technology in the health center context, and illustrates the importance of secure electronic health information systems as a crucial element of disaster and business continuity planning. This article examines the experience of a community health center in the aftermath of the major tornado that swept through the American Midwest in the spring of 2011, and provides insight into the planning for disaster survival and recovery as it relates to patient records and health center data. PMID:23569622
A cryptologic based trust center for medical images.
Wong, S T
1996-01-01
To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.
A cryptologic based trust center for medical images.
Wong, S T
1996-01-01
OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857
District of Columbia Motor Carrier Management and Threat Assessment Study
DOT National Transportation Integrated Search
2004-08-01
DDOT asked the Volpe National Transportation Systems Center (Volpe) to conduct an : analysis of existing truck traffic conditions in the District, successful truck management : practices from other areas, stakeholder interests and opinions, and secur...
Florida public transportation anti-terrorism resource guide
DOT National Transportation Integrated Search
2001-10-01
The Center for Urban Transportation (CUTR) at the University of South Florida (USF) assembled this guide to provide public transit agencies in Florida with information on current resources available to assist them with improving system security and g...
Data privacy considerations in Intensive Care Grids.
Luna, Jesus; Dikaiakos, Marios D; Kyprianou, Theodoros; Bilas, Angelos; Marazakis, Manolis
2008-01-01
Novel eHealth systems are being designed to provide a citizen-centered health system, however the even demanding need for computing and data resources has required the adoption of Grid technologies. In most of the cases, this novel Health Grid requires not only conveying patient's personal data through public networks, but also storing it into shared resources out of the hospital premises. These features introduce new security concerns, in particular related with privacy. In this paper we survey current legal and technological approaches that have been taken to protect a patient's personal data into eHealth systems, with a particular focus in Intensive Care Grids. However, thanks to a security analysis applied over the Intensive Care Grid system (ICGrid) we show that these security mechanisms are not enough to provide a comprehensive solution, mainly because the data-at-rest is still vulnerable to attacks coming from untrusted Storage Elements where an attacker may directly access them. To cope with these issues, we propose a new privacy-oriented protocol which uses a combination of encryption and fragmentation to improve data's assurance while keeping compatibility with current legislations and Health Grid security mechanisms.
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Futami, Fumio
2014-10-01
To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.
Next Generation Space Surveillance System-of-Systems
NASA Astrophysics Data System (ADS)
McShane, B.
2014-09-01
International economic and military dependence on space assets is pervasive and ever-growing in an environment that is now congested, contested, and competitive. There are a number of natural and man-made risks that need to be monitored and characterized to protect and preserve the space environment and the assets within it. Unfortunately, today's space surveillance network (SSN) has gaps in coverage, is not resilient, and has a growing number of objects that get lost. Risks can be efficiently and effectively mitigated, gaps closed, resiliency improved, and performance increased within a next generation space surveillance network implemented as a system-of-systems with modern information architectures and analytic techniques. This also includes consideration for the newest SSN sensors (e.g. Space Fence) which are born Net-Centric out-of-the-box and able to seamlessly interface with the JSpOC Mission System, global information grid, and future unanticipated users. Significant opportunity exists to integrate legacy, traditional, and non-traditional sensors into a larger space system-of-systems (including command and control centers) for multiple clients through low cost sustainment, modification, and modernization efforts. Clients include operations centers (e.g. JSpOC, USSTRATCOM, CANSPOC), Intelligence centers (e.g. NASIC), space surveillance sensor sites (e.g. AMOS, GEODSS), international governments (e.g. Germany, UK), space agencies (e.g. NASA), and academic institutions. Each has differing priorities, networks, data needs, timeliness, security, accuracy requirements and formats. Enabling processes and technologies include: Standardized and type accredited methods for secure connections to multiple networks, machine-to-machine interfaces for near real-time data sharing and tip-and-queue activities, common data models for analytical processing across multiple radar and optical sensor types, an efficient way to automatically translate between differing client and sensor formats, data warehouse of time based space events, secure collaboration tools for international coalition space operations, shared concept-of-operations, tactics, techniques, and procedures.
Nuclear Energy Experiments to the Center for Global Security and Cooperation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Osborn, Douglas M.
2015-06-01
This is to serve as verification that the Center 6200 experimental pieces supplied to the Technology Training and Demonstration Area within the Center of Global Security and Cooperation are indeed unclassified unlimited released for viewing.
Tier 1 and Tier 3 eAdjudication Business Rule Validation
2018-04-01
Approved for Public Distribution Defense Personnel and Security Research Center Office of People Analytics OPA-2018-038 PERSEREC-TR-18-06 April...Northrop Grumman Technology Services Leissa C. Nelson, Ph.D. Susan C. Reed Defense Personnel and Security Research Center Office of People Analytics...Defense Personnel and Security Research Center Office of People Analytics 400 Gigling Road, Seaside, CA 93955 OPA-2018-038 PERSEREC-TR-06 April
The Asia-Pacific: A Region in Transition
2004-01-01
NAME(S) AND ADDRESS(ES) Asia-Pacific Center for Security Studies ,2058 Maluhia Road ,Honolulu,HI,96815 8. PERFORMING ORGANIZATION REPORT NUMBER 9...Center for Security Studies Reprint permission: Contact the editors at 2058 Maluhia Road, Honolulu, HI 96815 All views expressed in the chapters of...this book are those of the authors and do not necessarily reflect the views of the Asia-Pacific Center for Security Studies (APCSS) or any
Controlling multiple security robots in a warehouse environment
NASA Technical Reports Server (NTRS)
Everett, H. R.; Gilbreath, G. A.; Heath-Pastore, T. A.; Laird, R. T.
1994-01-01
The Naval Command Control and Ocean Surveillance Center (NCCOSC) has developed an architecture to provide coordinated control of multiple autonomous vehicles from a single host console. The multiple robot host architecture (MRHA) is a distributed multiprocessing system that can be expanded to accommodate as many as 32 robots. The initial application will employ eight Cybermotion K2A Navmaster robots configured as remote security platforms in support of the Mobile Detection Assessment and Response System (MDARS) Program. This paper discusses developmental testing of the MRHA in an operational warehouse environment, with two actual and four simulated robotic platforms.
Security aspects of space operations data
NASA Technical Reports Server (NTRS)
Schmitz, Stefan
1993-01-01
This paper deals with data security. It identifies security threats to European Space Agency's (ESA) In Orbit Infrastructure Ground Segment (IOI GS) and proposes a method of dealing with its complex data structures from the security point of view. It is part of the 'Analysis of Failure Modes, Effects Hazards and Risks of the IOI GS for Operations, including Backup Facilities and Functions' carried out on behalf of the European Space Operations Center (ESOC). The security part of this analysis has been prepared with the following aspects in mind: ESA's large decentralized ground facilities for operations, the multiple organizations/users involved in the operations and the developments of ground data systems, and the large heterogeneous network structure enabling access to (sensitive) data which does involve crossing organizational boundaries. An IOI GS data objects classification is introduced to determine the extent of the necessary protection mechanisms. The proposal of security countermeasures is oriented towards the European 'Information Technology Security Evaluation Criteria (ITSEC)' whose hierarchically organized requirements can be directly mapped to the security sensitivity classification.
Sandia National Laboratories: Integrated Military Systems
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
Sandia National Laboratories: News: Image Gallery
Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Abramovo Counterterrorism Training Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hayes, Christopher M; Ross, Larry; Lingenfelter, Forrest E
2011-01-01
The U.S. government has been assisting the Russian Federation (RF) Ministry of Defense (MOD) for many years with nuclear weapons transportation security (NWTS) through the provision of specialized guard escort railcars and cargo railcars with integrated physical security and communication systems, armored transport vehicles, and armored escort vehicles. As a natural continuation of the NWTS program, a partnership has been formed to construct a training center that will provide counterterrorism training to personnel in all branches of the RF MOD. The Abramovo Counterterrorism Training Center (ACTC) is a multinational, multiagency project with funding from Canada, RF and the U.S. Departmentsmore » of Defense and Energy. ACTC will be a facility where MOD personnel can conduct basic through advanced training in various security measures to protect Category IA material against the threat of terrorist attack. The training will enhance defense-in-depth principles by integrating MOD guard force personnel into the overall physical protection systems and improving their overall response time and neutralization capabilities. The ACTC project includes infrastructure improvements, renovation of existing buildings, construction of new buildings, construction of new training facilities, and provision of training and other equipment. Classroom training will be conducted in a renovated training building. Basic and intermediate training will be conducted on three different security training areas where various obstacles and static training devices will be constructed. The central element of ACTC, where advanced training will be held, is the 'autodrome,' a 3 km road along which various terrorist events can be staged to challenge MOD personnel in realistic and dynamic nuclear weapons transportation scenarios. This paper will address the ACTC project elements and the vision for training development and integrating this training into actual nuclear weapons transportation operations.« less
Continuation of research in software for space operations support
NASA Technical Reports Server (NTRS)
Collier, Mark D.
1989-01-01
Software technologies relevant to workstation executives are discussed. Evaluations of problems, potential or otherwise, seen with IBM's Workstation Executive (WEX) 2.5 preliminary design and applicable portions of the 2.5 critical design are presented. Diverse graphics requirements of the Johnson Space Center's Mission Control Center Upgrade (MCCU) are also discussed. The key is to use tools that are portable, compatible with the X window system, and best suited to the requirements of the associated application. This will include a User Interface Language (UIL), an interactive display builder, and a graphic plotting/modeling system. Work sheets are provided for POSIX 1003.4 real-time extensions and the requirements for the Center's automated information systems security plan, referred to as POSIX 1003.6, are discussed.
Development of a consortium for water security and safety: Planning for an early warning system
Clark, R.M.; Adam, N.R.; Atluri, V.; Halem, M.; Vowinkel, E.F.; ,
2004-01-01
The events of September 11, 2001 have raised concerns over the safety and security of the Nation's critical infrastructure including water and waste water systems. In June 2002, the U.S. EPA's Region II Office (New York City), in response to concerns over water security, in collaboration with Rutgers University agreed to establish a Regional Drinking Water Security and Safety Consortium (RDWSSC). Members of the consortium include: Rutgers University's Center for Information Management, Integration and Connectivity (CIMIC), American Water (AW), the Passaic Valley Water Commission (PVWC), the North Jersey District Water Supply Commission (NJDWSC), the N.J. Department of Environmental Protection, the U.S. Geological Survey (USGS), and the U.S. Environmental Protection Agencies, Region II Office. In December of 2002 the consortium members signed a memorandum of understanding (MOU) to pursue activities to enhance regional water security. Development of an early warning system for source and distributed water was identified as being of primary importance by the consortium. In this context, an early warning system (EWS) is an integrated system of monitoring stations located at strategic points in a water utilities source waters or in its distribution system, designed to warn against contaminants that might threaten the health and welfare of drinking water consumers. This paper will discuss the consortium's progress in achieving these important objectives.
Orion Returns to KSC after Successful Mission
2014-12-18
NASA's Orion crew module, enclosed in its crew module transportation fixture and secured on a flatbed truck passes by the Space Shuttle Atlantis building at the Kennedy Space Center Visitor Complex on its way to the entrance gate to Kennedy Space Center in Florida. Orion made the overland trip from Naval Base San Diego in California. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
Roadmap to Secure Control Systems in the Water Sector
2008-03-01
solutions for ICS security. The purposes of this roadmap are as follows: • Define a consensus-based framework that articulates strategies of owners and...each failure is manageable in itself • Be used as ransomware 400,000 persons, and was estimated by the Center for Disease Control (CDC) to cost a total...and focused efforts. The water sector has developed and will pursue a set of strategic goals articulating these ambitions. These goals will help
Translations on Eastern Europe, Scientific Affairs, Number 563
1977-12-11
Security Class (This Report) l"*ri:*.SSIFi5P 20. Security Class (This JNCLASSIFIED Pa« 21. No. of Pages 28 22. Price KORM NT1S- 35 (REV. 3...Information Science Association (at the request of the ZSM [Mini- computer System Works] MERA Research and Development Center). The software...the packaging industry will grow at an average rate of 12 percent/year and in Romania will continue to be significant ( 35 percent in 1975, 30.3
2013-02-27
signed certification by supervisors that they understand and intend to comply with reporting policy. Recent psychological research suggests that the...intend to comply with reporting policy. Recent psychological research suggests that the additional step of requiring a signed acknowledgment may make...prepared by the Defense Personnel Security Research Center (PERSEREC) as part of an effort to design and pilot test the proposed system. This report was
Richmond, Alyson L; Sobelson, Robyn K; Cioffi, Joan P
2014-01-01
The importance of a competent and prepared national public health workforce, ready to respond to threats to the public's health, has been acknowledged in numerous publications since the 1980s. The Preparedness and Emergency Response Learning Centers (PERLCs) were funded by the Centers for Disease Control and Prevention in 2010 to continue to build upon a decade of focused activities in public health workforce preparedness development initiated under the Centers for Public Health Preparedness program (http://www.cdc.gov/phpr/cphp/). All 14 PERLCs were located within Council on Education for Public Health (CEPH) accredited schools of public health. These centers aimed to improve workforce readiness and competence through the development, delivery, and evaluation of targeted learning programs designed to meet specific requirements of state, local, and tribal partners. The PERLCs supported organizational and community readiness locally, regionally, or nationally through the provision of technical consultation and dissemination of specific, practical tools aligned with national preparedness competency frameworks and public health preparedness capabilities. Public health agencies strive to address growing public needs and a continuous stream of current and emerging public health threats. The PERLC network represented a flexible, scalable, and experienced national learning system linking academia with practice. This system improved national health security by enhancing individual, organizational, and community performance through the application of public health science and learning technologies to frontline practice.
Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.
The neoliberal political economy and erosion of retirement security.
Polivka, Larry; Luo, Baozhen
2015-04-01
The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Safeguards and security research and development: Progress report, October 1994--September 1995
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rutherford, D.R.; Henriksen, P.W.
The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IVmore » is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.« less
General view of the flight deck of the Orbiter Discovery ...
General view of the flight deck of the Orbiter Discovery looking forward from behind the commander's seat looking towards the pilot's station. Note the numerous Velcro pads located throughout the crew compartment, used to secure frequently used items when in zero gravity. This image was taken at Kennedy Space Center. - Space Transportation System, Orbiter Discovery (OV-103), Lyndon B. Johnson Space Center, 2101 NASA Parkway, Houston, Harris County, TX
2004-09-08
KENNEDY SPACE CENTER, FLA. - The work to clean up and secure the roof of the Processing Control Center which sustained damage from Hurricane Frances is under way. The storm's path over Florida took it through Cape Canaveral and KSC property during Labor Day weekend. Located in Launch Complex 39, the facility houses some of the staff and computers responsible for Launch Processing System (LPS) software development, launch team training, and LPS maintenance.
2004-09-08
KENNEDY SPACE CENTER, FLA. - KSC employees secure the roof of the Processing Control Center which sustained damage from Hurricane Frances. The storm's path over Florida took it through Cape Canaveral and KSC property during Labor Day weekend. Located in Launch Complex 39 adjacent to the Vehicle Assembly Building (background right), the facility houses some of the staff and computers responsible for Launch Processing System (LPS) software development, launch team training, and LPS maintenance.
2004-09-08
KENNEDY SPACE CENTER, FLA. - KSC employees begin the work to clean up and secure the roof of the Processing Control Center which sustained damage from Hurricane Frances. The storm's path over Florida took it through Cape Canaveral and KSC property during Labor Day weekend. Located in Launch Complex 39, the facility houses some of the staff and computers responsible for Launch Processing System (LPS) software development, launch team training, and LPS maintenance.
Laser Imaging Video Camera Sees Through Fire, Fog, Smoke
NASA Technical Reports Server (NTRS)
2015-01-01
Under a series of SBIR contracts with Langley Research Center, inventor Richard Billmers refined a prototype for a laser imaging camera capable of seeing through fire, fog, smoke, and other obscurants. Now, Canton, Ohio-based Laser Imaging through Obscurants (LITO) Technologies Inc. is demonstrating the technology as a perimeter security system at Glenn Research Center and planning its future use in aviation, shipping, emergency response, and other fields.
Yu, Hwan-Jeu; Lai, Hong-Shiee; Chen, Kuo-Hsin; Chou, Hsien-Cheng; Wu, Jin-Ming; Dorjgochoo, Sarangerel; Mendjargal, Adilsaikhan; Altangerel, Erdenebaatar; Tien, Yu-Wen; Hsueh, Chih-Wen; Lai, Feipei
2013-08-01
Pancreaticoduodenectomy (PD) is a major operation with high complication rate. Thereafter, patients may develop morbidity because of the complex reconstruction and loss of pancreatic parenchyma. A well-designed database is very important to address both the short-term and long-term outcomes after PD. The objective of this research was to build an international PD database implemented with security and clinical rule supporting functions, which made the data-sharing easier and improve the accuracy of data. The proposed system is a cloud-based application. To fulfill its requirements, the system comprises four subsystems: a data management subsystem, a clinical rule supporting subsystem, a short message notification subsystem, and an information security subsystem. After completing the surgery, the physicians input the data retrospectively, which are analyzed to study factors associated with post-PD common complications (delayed gastric emptying and pancreatic fistula) to validate the clinical value of this system. Currently, this database contains data from nearly 500 subjects. Five medical centers in Taiwan and two cancer centers in Mongolia are participating in this study. A data mining model of the decision tree analysis showed that elderly patients (>76 years) with pylorus-preserving PD (PPPD) have higher proportion of delayed gastric emptying. About the pancreatic fistula, the data mining model of the decision tree analysis revealed that cases with non-pancreaticogastrostomy (PG) reconstruction - body mass index (BMI)>29.65 or PG reconstruction - BMI>23.7 - non-classic PD have higher proportion of pancreatic fistula after PD. The proposed system allows medical staff to collect and store clinical data in a cloud, sharing the data with other physicians in a secure manner to achieve collaboration in research. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Sandia National Laboratories: Sandia Enabled Communications and
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry
Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that
Autonomous Satellite Operations Via Secure Virtual Mission Operations Center
NASA Technical Reports Server (NTRS)
Miller, Eric; Paulsen, Phillip E.; Pasciuto, Michael
2011-01-01
The science community is interested in improving their ability to respond to rapidly evolving, transient phenomena via autonomous rapid reconfiguration, which derives from the ability to assemble separate but collaborating sensors and data forecasting systems to meet a broad range of research and application needs. Current satellite systems typically require human intervention to respond to triggers from dissimilar sensor systems. Additionally, satellite ground services often need to be coordinated days or weeks in advance. Finally, the boundaries between the various sensor systems that make up such a Sensor Web are defined by such things as link delay and connectivity, data and error rate asymmetry, data reliability, quality of service provisions, and trust, complicating autonomous operations. Over the past ten years, researchers from the NASA Glenn Research Center (GRC), General Dynamics, Surrey Satellite Technology Limited (SSTL), Cisco, Universal Space Networks (USN), the U.S. Geological Survey (USGS), the Naval Research Laboratory, the DoD Operationally Responsive Space (ORS) Office, and others have worked collaboratively to develop a virtual mission operations capability. Called VMOC (Virtual Mission Operations Center), this new capability allows cross-system queuing of dissimilar mission unique systems through the use of a common security scheme and published application programming interfaces (APIs). Collaborative VMOC demonstrations over the last several years have supported the standardization of spacecraft to ground interfaces needed to reduce costs, maximize space effects to the user, and allow the generation of new tactics, techniques and procedures that lead to responsive space employment.
Trusted Data Communication and Security Issues in Gnss Network of Turkey
NASA Astrophysics Data System (ADS)
Bakici, S.; Erkek, B.; Manti, V.; Altekin, A.
2017-11-01
There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr), Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department's specialists since 2005. TUSAGA-Aktif (CORS-Tr) System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.
Fitzmaurice, Arthur G; Mahar, Michael; Moriarty, Leah F; Bartee, Maureen; Hirai, Mitsuaki; Li, Wenshu; Gerber, A Russell; Tappero, Jordan W; Bunnell, Rebecca
2017-12-01
The Global Health Security Agenda (GHSA), a partnership of nations, international organizations, and civil society, was launched in 2014 with a mission to build countries' capacities to respond to infectious disease threats and to foster global compliance with the International Health Regulations (IHR 2005). The US Centers for Disease Control and Prevention (CDC) assists partner nations to improve IHR 2005 capacities and achieve GHSA targets. To assess progress through these CDC-supported efforts, we analyzed country activity reports dating from April 2015 through March 2017. Our analysis shows that CDC helped 17 Phase I countries achieve 675 major GHSA accomplishments, particularly in the cross-cutting areas of public health surveillance, laboratory systems, workforce development, and emergency response management. CDC's engagement has been critical to these accomplishments, but sustained support is needed until countries attain IHR 2005 capacities, thereby fostering national and regional health protection and ensuring a world safer and more secure from global health threats.
Mahar, Michael; Moriarty, Leah F.; Bartee, Maureen; Hirai, Mitsuaki; Li, Wenshu; Gerber, A. Russell; Tappero, Jordan W.; Bunnell, Rebecca
2017-01-01
The Global Health Security Agenda (GHSA), a partnership of nations, international organizations, and civil society, was launched in 2014 with a mission to build countries’ capacities to respond to infectious disease threats and to foster global compliance with the International Health Regulations (IHR 2005). The US Centers for Disease Control and Prevention (CDC) assists partner nations to improve IHR 2005 capacities and achieve GHSA targets. To assess progress through these CDC-supported efforts, we analyzed country activity reports dating from April 2015 through March 2017. Our analysis shows that CDC helped 17 Phase I countries achieve 675 major GHSA accomplishments, particularly in the cross-cutting areas of public health surveillance, laboratory systems, workforce development, and emergency response management. CDC’s engagement has been critical to these accomplishments, but sustained support is needed until countries attain IHR 2005 capacities, thereby fostering national and regional health protection and ensuring a world safer and more secure from global health threats. PMID:29155676
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...
A Healthy Approach to Fitness Center Security.
ERIC Educational Resources Information Center
Sturgeon, Julie
2000-01-01
Examines techniques for keeping college fitness centers secure while maintaining an inviting atmosphere. Building access control, preventing locker room theft, and suppressing causes for physical violence are discussed. (GR)
Not-for-profits' role in a reformed system.
Clinton, H R
1994-06-01
As head of the White House task force that helped to craft President Bill Clinton's healthcare reform proposal (the Health Security Act), First Lady Hillary Rodham Clinton demonstrated her determination that reform result in a system that has caring and service at its center. In an address a year ago at the Catholic Health Association assembly, she stressed the administration's goal of providing the security of healthcare coverage to everyone in the United States. Saying the current complex, disjointed system "fragments the care people receive," the First Lady applauded programs that reach out to underserved populations and strengthen the country's healthcare infrastructure. In this interview with Health Progress, Mrs. Clinton discusses tough issues in achieving the system she envisions and the role of Catholic healthcare organizations in a reformed system. Here are her remarks.
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
A Web-based telemedicine system for diabetic retinopathy screening using digital fundus photography.
Wei, Jack C; Valentino, Daniel J; Bell, Douglas S; Baker, Richard S
2006-02-01
The purpose was to design and implement a Web-based telemedicine system for diabetic retinopathy screening using digital fundus cameras and to make the software publicly available through Open Source release. The process of retinal imaging and case reviewing was modeled to optimize workflow and implement use of computer system. The Web-based system was built on Java Servlet and Java Server Pages (JSP) technologies. Apache Tomcat was chosen as the JSP engine, while MySQL was used as the main database and Laboratory of Neuro Imaging (LONI) Image Storage Architecture, from the LONI-UCLA, as the platform for image storage. For security, all data transmissions were carried over encrypted Internet connections such as Secure Socket Layer (SSL) and HyperText Transfer Protocol over SSL (HTTPS). User logins were required and access to patient data was logged for auditing. The system was deployed at Hubert H. Humphrey Comprehensive Health Center and Martin Luther King/Drew Medical Center of Los Angeles County Department of Health Services. Within 4 months, 1500 images of more than 650 patients were taken at Humphrey's Eye Clinic and successfully transferred to King/Drew's Department of Ophthalmology. This study demonstrates an effective architecture for remote diabetic retinopathy screening.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roseman, Mallory; Zikry, Fareeda
Lawrence Livermore National Laboratory’s Center for Global Security Research hosted a workshop to investigate why some consistently predicted threats from science and technology (S&T) have not manifested with the impacts to international security as forecasted. During the workshop, “Dogs That Haven’t Barked: Towards an Understanding of the Absence of Expected Technological Threats,” participants used two specific cases to focus the discussion: biotechnology and man-portable air defense systems (MANPADS).
A Technique for Removing an Important Class of Trojan Horses from High-Order Languages
1988-01-01
A Technique for Removing an Important Class of Trojan Horses from High Order Languages∗ John McDermott Center for Secure Information Technology...Ken Thompson described a sophisticated Trojan horse attack on a compiler, one that is undetectable by any search of the compiler source code. The...object of the compiler Trojan horse is to modify the semantics of the high order language in a way that breaks the security of a trusted system generated
Space and Missile Systems Center Standard: Space Flight Pressurized Systems
2015-02-28
24 5.7.2 Fire Resistant Fluids ......................................................................................... 24 5.7.3...connections. 5.1.7 Threaded Parts [5.1.7-1] All threaded parts in components shall be securely locked to resist uncoupling forces by acceptable safe... Resistant Fluids [5.7.2-1] Fire resistant or flame proof hydraulic fluid shall be used where the system design can expose hydraulic fluid to potential
Proceedings of the Center for National Software Studies Workshop on Trustworthy Software
2004-05-10
just the de - velopment cost) to achieve a sustained level of software trustworthiness. • Reforming the procurement process. We could reform the...failure or breach of security. Some examples include software used in safety systems of nuclear power plants, transportation systems, medical devices...issue in many vital systems, including those found in transportation , telecommunications, utilities, health care, and financial services. Any lack of
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
DOT National Transportation Integrated Search
2009-08-01
Every day almost a million shipments of hazardous materials move safely and securely along our nations transportation system, via any combination of modes. Only a small fraction of total shipments interrupt their planned journey due to an incident...
Pre-stressed thermal protection systems
NASA Technical Reports Server (NTRS)
Dunn, T. J. (Inventor)
1984-01-01
A hexagonal protective and high temperature resistant system for the Space Shuttle Orbiter consists of a multiplicity of pockets formed by hexagonally oriented spacer bars secured on the vehicle substructure. A packing of low density insulating batt material 18 in each pocket, and a thin protective panel of laterally resilient advanced carbon-carbon material surmounting the peripherals bars and packing. Each panel has three stepped or offset lips on contiguous edges. At the center of each pocket is a fully insulated stanchion secured to and connecting the substructure and panel for flexing the panel toward the substructure and thereby prestressing the panel and forcing the panel edges firmly against the spacer bars.
Web-Altairis: An Internet-Enabled Ground System
NASA Technical Reports Server (NTRS)
Miller, Phil; Coleman, Jason; Gemoets, Darren; Hughes, Kevin
2000-01-01
This paper describes Web-Altairis, an Internet-enabled ground system software package funded by the Advanced Automation and Architectures Branch (Code 588) of NASA's Goddard Space Flight Center. Web-Altairis supports the trend towards "lights out" ground systems, where the control center is unattended and problems are resolved by remote operators. This client/server software runs on most popular platforms and provides for remote data visualization using the rich functionality of the VisAGE toolkit. Web-Altairis also supports satellite commanding over the Internet. This paper describes the structure of Web-Altairis and VisAGE, the underlying technologies, the provisions for security, and our experiences in developing and testing the software.
Aerial of the Orion EFT-1 Arrival at KSC
2014-12-18
An aerial view near NASA's Kennedy Space Center Visitor Complex reveals the Orion crew module, enclosed in its crew module transportation fixture and secured on a flatbed truck on the NASA Causeway that leads to the entrance gate to Kennedy Space Center in Florida. Orion made the 2,700 mile overland trip from Naval Base San Diego in California. The spacecraft was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
Aerial of the Orion EFT-1 Arrival at KSC
2014-12-18
An aerial view near NASA's Kennedy Space Center Visitor Complex reveals the Orion crew module, enclosed in its crew module transportation fixture and secured on a flatbed truck that is proceeding along the NASA Causeway to the entrance gate to Kennedy Space Center in Florida. Orion made the 2,700 mile overland trip from Naval Base San Diego in California. The spacecraft was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
Aerial of the Orion EFT-1 Arrival at KSC
2014-12-18
An aerial view near NASA's Kennedy Space Center Visitor Complex reveals the Orion crew module, enclosed in its crew module transportation fixture and secured on a flatbed truck that is proceeding onto the NASA Causeway that leads to the entrance gate to Kennedy Space Center in Florida. Orion made the 2,700 mile overland trip from Naval Base San Diego in California. The spacecraft was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
Protecting clinical data in PACS, teleradiology systems, and research environments
NASA Astrophysics Data System (ADS)
Meissner, Marion C.; Collmann, Jeff R.; Tohme, Walid G.; Mun, Seong K.
1997-05-01
As clinical data is more widely stored in electronic patient record management systems and transmitted over the Internet and telephone lines, it becomes more accessible and therefore more useful, but also more vulnerable. Computer systems such as PACS, telemedicine applications, and medical research networks must protect against accidental or deliberate modification, disclosure, and violation of patient confidentiality in order to be viable. Conventional wisdom in the medical field and among lawmakers legislating the use of electronic medical records suggests that, although it may improve access to information, an electronic medical record cannot be as secure as a traditional paper record. This is not the case. Information security is a well-developed field in the computer and communications industry. If medical information systems, such as PACS, telemedicine applications, and research networks, properly apply information security techniques, they can ensure the accuracy and confidentiality of their patient information and even improve the security of their data over a traditional paper record. This paper will elaborate on some of these techniques and discuss how they can be applied to medical information systems. The following systems will be used as examples for the analysis: a research laboratory at Georgetown University Medical Center, the Deployable Radiology system installed to support the US Army's peace- keeping operation in Bosnia, a kidney dialysis telemedicine system in Washington, D.C., and various experiences with implementing and integrating PACS.
Energy Optimization Audit at Humphreys Engineer Center
2008-09-01
EPDM (ethylene propylene diene M- class [ rubber ]). Doors There are three pairs of doors to the interior terrace (Figure 6) and exit with a high...System EISA Energy Independence and Security Act EPAct Energy Policy Act EPDM EPDM (ethylene propylene diene M-class [ rubber ]) ERDC Engineer
46 CFR 56.50-20 - Pressure relief piping.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PIPING SYSTEMS AND... authorized by the Marine Safety Center. (b) Discharge lines (reproduces 122.6.2(d)). Discharge lines from pressure-relieving safety devices shall be designed to facilitate drainage. (c) Stop valves. Stop valves...
46 CFR 56.50-20 - Pressure relief piping.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PIPING SYSTEMS AND... authorized by the Marine Safety Center. (b) Discharge lines (reproduces 122.6.2(d)). Discharge lines from pressure-relieving safety devices shall be designed to facilitate drainage. (c) Stop valves. Stop valves...
41 CFR 102-192.80 - How do we develop written security policies and plans?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...) Operating procedures; (d) Plan to provide a visible mail screening operation; (e) Training mail center...) Managing threats; (h) Communications plan; (i) Occupant Emergency Plan (OEP); (j) Continuity of Operations...
TECHcitement: Advances in Technological Education, 2006
ERIC Educational Resources Information Center
American Association of Community Colleges (NJ1), 2006
2006-01-01
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
1998-06-25
KENNEDY SPACE CENTER, FLA. -- Sgt. Mark Hines, of Kennedy Space Center (KSC) Security, checks out equipment used to operate the Forward Looking Infrared Radar (FLIR) installed on NASA's Huey UH-1 helicopter. The helicopter has also been outfitted with a portable global positioning satellite (GPS) system to support Florida's Division of Forestry as they fight the brush fires which have been plaguing the state as a result of extremely dry conditions and lightning storms. The FLIR includes a beach ball-sized infrared camera that is mounted on the helicopter's right siderail and a real-time television monitor and recorder installed inside. While the FLIR collects temperature data and images, the GPS system provides the exact coordinates of the fires being observed and transmits the data to the firefighters on the ground. KSC's security team routinely uses the FLIR equipment prior to Shuttle launch and landing activities to ensure that the area surrounding the launch pad and runway are clear of unauthorized personnel. KSC's Base Operations Contractor, EG&G Florida, operates the NASA-owned helicopter
1998-06-25
KENNEDY SPACE CENTER, FLA. -- NASA's Huey UH-1 helicopter lands at the Shuttle Landing Facility to pick up Kennedy Space Center (KSC) Security personnel who operate the Forward Looking Infrared Radar (FLIR) installed on board. The helicopter has also been outfitted with a portable global positioning satellite (GPS) system to support Florida's Division of Forestry as they fight the brush fires which have been plaguing the state as a result of extremely dry conditions and lightning storms. The FLIR includes a beach ball-sized infrared camera that is mounted on the helicopter's right siderail and a real-time television monitor and recorder installed inside. While the FLIR collects temperature data and images, the GPS system provides the exact coordinates of the fires being observed and transmits the data to the firefighters on the ground. KSC's security team routinely uses the FLIR equipment prior to Shuttle launch and landing activities to ensure that the area surrounding the launch pad and runway are clear of unauthorized personnel. KSC's Base Operations Contractor, EG&G Florida, operates the NASA-owned helicopter
Orion is Taken From Ship & Put in Shipping Container
2014-12-10
The Orion crew module has been lowered and secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover is being lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts.
Orion is Taken From Ship & Put in Shipping Container
2014-12-10
The Orion crew module has been secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover has been lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts.
Climate risk and food security in Mali: A historical perspective on adaptation
NASA Astrophysics Data System (ADS)
Giannini, Alessandra; Krishnamurthy, P. Krishna; Cousin, Rémi; Labidi, Naouar; Choularton, Richard J.
2017-02-01
We combine socioeconomic data from a large-scale household survey with historical climate data to map the climate sensitivity of availability and access dimensions of food security in Mali, and infer the ways in which at-risk communities may have been impacted by persistent climatic shift. Thirty years after 1982-1984, the period of most intense drought during the protracted late 20th century drying of the Sahel, the impact of drought on livelihoods and food security is still recognizable in the Sahelian center of Mali. This impact is expressed in the larger fraction of households in this Sahelian center of the country—the agro-ecological transition between pastoralism in the north, and sedentary agriculture in the south—who practice agriculture but not livestock raising, despite environmental conditions that are suitable to their combination. These households have lower food security and rely more frequently on detrimental nutrition-based coping strategies, such as reducing the quantity or quality of meals. In contrast, the more food secure households show a clear tendency toward livelihood diversification away from subsistence agriculture. These households produce less of what they consume, yet spend less on food in proportion. The analysis points to the value of interdisciplinary research—in this case bridging climate science and vulnerability analysis—to gain a dynamical understanding of complex systems, understanding which may be exploited to address real-world challenges, offering lessons about food security and local adaptation strategies in places among the most vulnerable to climate.
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. Technicians monitor the progress as the second panel is being moved to join the first panel on the storage stand. To the right is the Launch Abort system secured on a work stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
Military Interoperable Digital Hospital Testbed (MIDHT)
2013-01-01
users of the PACS system in terms of viewing images originating from Miners and Meyersdale are Emergency Medicine and Trauma physicians. This...conditions, over the counter/ herbal medications, physician list, and emergency contacts. Through secure messaging with their physician, patients...et al. (1999). Impact of a patient-centered, computer- based health information/support system. American Journal of Preventive Medicine , 16(1), 1- 9
Sayed-Hossein Sadeghi; Troy R. Peters; Mohammad Z. Amini; Sparkle L. Malone; Hank W. Loescher
2015-01-01
The increased need for water and food security requires the development of new approaches to save water through irrigation management strategies, particularly for center pivot irrigation. To do so entails monitoring of the dynamic variation in wind drift and evaporation losses (WDELs) of irrigation systems under different weather conditions and for relatively long time...
Administrator, National Security Education Program
1993-01-19
1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993
ERIC Educational Resources Information Center
Hecquet, Ignace; And Others
Principles are outlined that are used as a basis for the system of pricing the services of the Computer Centre. The system illustrates the use of a management method to secure better utilization of university resources. Departments decide how to use the appropriations granted to them and establish a system of internal prices that reflect the cost…
2015-09-01
15 4. Commander, Naval Regional Maintenance Center .................. 15 5 . Private Ship Repair Industry...TURBINE EXHAUST SYSTEM MAINTENANCE STRATEGY FOR THE CG-47 TICONDEROGA CLASS CRUISER 5 . FUNDING NUMBERS 6. AUTHOR(S) Sparks, Robert D. 7. PERFORMING...condition-based maintenance, condition-directed, failure finding, fault tree analysis 15 . NUMBER OF PAGES 133 16. PRICE CODE 17. SECURITY
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi
2009-08-01
The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.
2004-03-10
KENNEDY SPACE CENTER, FLA. - At the Astrotech Space Operations processing facilities, NASA’s MESSENGER spacecraft is secure after transfer to the work stand. There employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will perform an initial state-of-health check. Then processing for launch can begin, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched May 11 on a six-year mission aboard a Boeing Delta II rocket. Liftoff is targeted for 2:26 a.m. EDT on Tuesday, May 11.
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
2015-10-03
a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14], while Stoll et al. explain the...4673-7599-3/15/$31.00 c©2015 IEEE 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC) [14] J. R. Goodall , A. A. Ozok, W. G. Lutters, P...Visualization for Cyber Security, pages 91–98. IEEE, 2005. [19] A. Komlodi, P. Rheingans, U. Ayachit, J. Goodall , and A. Joshi. A user- centered look at
2009-01-01
activities within the patrol area. Maintenance of the Minuteman III weapon system requires maintenance and security teams travel to one or more of 150...launch facilities, all of which are geograph- ically isolated from major population centers. Travel time from F. E. Warren AFB, the main support base...the F. E. Warren AFB work center to make travel preparations, and ends after all maintenance actions are completed, or once the team arrives at one
Facility Will Help Transition Models Into Operations
NASA Astrophysics Data System (ADS)
Kumar, Mohi
2009-02-01
The U.S. National Oceanic and Atmospheric Administration's Space Weather Prediction Center (NOAA SWPC), in partnership with the U.S. Air Force Weather Agency (AFWA), is establishing a center to promote and facilitate the transition of space weather models to operations. The new facility, called the Developmental Testbed Center (DTC), will take models used by researchers and rigorously test them to see if they can withstand continued use as viable warning systems. If a model used in a space weather warning system crashes or fails to perform well, severe consequences can result. These include increased radiation risks to astronauts and people traveling on high-altitude flights, national security vulnerabilities from the loss of military satellite communications, and the cost of replacing damaged military and commercial spacecraft.
Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R
2014-01-01
Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Conclusions Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users’ experiences in a representative sample to validate qualitative findings. PMID:24610454
Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R
2014-03-06
The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users' experiences in a representative sample to validate qualitative findings.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MARINE PORTABLE TANKS AND CARGO HANDLING..., U.S. Coast Guard Marine Safety Center, receives an application for approval on or before May 1, 1991. (b) Subpart F of this part also applies to portable tanks and to cargo-handling systems for portable...
41 CFR 102-81.30 - What information must job applicants at child care centers reveal?
Code of Federal Regulations, 2011 CFR
2011-01-01
... job applicants at child care centers reveal? 102-81.30 Section 102-81.30 Public Contracts and Property... PROPERTY 81-SECURITY Security § 102-81.30 What information must job applicants at child care centers reveal... on the job application. Employment at a child care facility means any position that involves work...
The aspects of safety in future care settings.
Pharow, Peter; Blobel, Bernd G M E; Savastano, Mario
2007-01-01
Communication and cooperation processes in the growing healthcare and welfare domain require a well-defined set of security services provided by a standards-based interoperable security infrastructure. Any communication and collaboration procedures require a verifiable purpose. Without such a purpose for communicating with each other, there's no need to communicate at all. But security is not the only aspect that needs to carefully be investigated. More and more, aspects of safety, privacy, and quality get importance while discussing about future-proof health information systems and health networks--regardless whether local, regional and national ones or even pan-European networks. The patient needs to be moved into the center of each care process. During the course of the current paradigm change from an organization centered via a process-related to a person-centered healthcare and welfare system approach, different new technologies need to be applied in order to meet the new challenges arising from both legal and technical circumstances. International organizations like WHO, UNESCO and the European Parliament increasingly aim at enhancing the safety aspect in future care settings, and so do many projects and studies. Beside typical information and communication devices, extended use of modern IT technology in healthcare and welfare includes large medical devices like, e.g., CT, X-ray and MR but also very tiny devices like sensors worn or implemented in a person's clothing. Safety gets on top of the nations priority list for several reasons. The paper aims at identifying some of these reasons along with possible solutions on how to increase patient's awareness, confidence, and acceptance in future care settings.
Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal
2011-01-01
In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less
Security for Multimedia Space Data Distribution over the Internet
NASA Technical Reports Server (NTRS)
Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)
1995-01-01
Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.
NASA Technical Reports Server (NTRS)
Metcalf, David
1995-01-01
Multimedia Information eXchange (MIX) is a multimedia information system that accommodates multiple data types and provides consistency across platforms. Information from all over the world can be accessed quickly and efficiently with the Internet-based system. I-NET's MIX uses the World Wide Web and Mosaic graphical user interface. Mosaic is available on all platforms used at I-NET's Kennedy Space Center (KSC) facilities. Key information system design concepts and benefits are reviewed. The MIX system also defines specific configuration and helper application parameters to ensure consistent operations across the entire organization. Guidelines and procedures for other areas of importance in information systems design are also addressed. Areas include: code of ethics, content, copyright, security, system administration, and support.
1984-04-01
Directorate (Code 6032) V NAVAL AIR DEVELOPMENT CENTER Warminster, PA 18974 and I David A. Fender KETRON. INC. Warminster, PA 18974 DTlC APRIL 1984 ELECTE FINAL...A. D’Aulerio N62269-81-Z-0206 David A. Fender Task No. 630-1944 9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMEN1T PROJECT, TASKAREA A...0102LF01401UNCLASSIFIED SECURITY CLAWFICATION OF TNIS PAGE (011t1 Die pewed) UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE w JIMu D#& Ent:ed) 9. Continued Louis A
European Service Module-Structural Test Article Load onto Transp
2017-06-21
The Orion service module structural test article for Exploration Mission-1 (EM-1), built by the European Space Agency, is prepared for shipment to Lockheed Martin's Denver facility to undergo testing. Inside the Neil Armstrong Operations and Checkout Building high bay at NASA's Kennedy Space Center in Florida, workers secure the protective covering around the module and a crane lifts the module, secured on stand, for the move to the transport truck. The Orion spacecraft will launch atop the agency's Space Launch System rocket on EM-1 in 2019.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2011 CFR
2011-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO), Columbus, Ohio; the Personnel Investigations Center (PIC) and National Computer Center (NCC) in Baltimore, Maryland; Office of Industrial Security International Europe (OISI-E), located in Brussels, Belgium with a...
IT Data Mining Tool Uses in Aerospace
NASA Technical Reports Server (NTRS)
Monroe, Gilena A.; Freeman, Kenneth; Jones, Kevin L.
2012-01-01
Data mining has a broad spectrum of uses throughout the realms of aerospace and information technology. Each of these areas has useful methods for processing, distributing, and storing its corresponding data. This paper focuses on ways to leverage the data mining tools and resources used in NASA's information technology area to meet the similar data mining needs of aviation and aerospace domains. This paper details the searching, alerting, reporting, and application functionalities of the Splunk system, used by NASA's Security Operations Center (SOC), and their potential shared solutions to address aircraft and spacecraft flight and ground systems data mining requirements. This paper also touches on capacity and security requirements when addressing sizeable amounts of data across a large data infrastructure.
NASA Astrophysics Data System (ADS)
Liu, Zhengjun; Chen, Hang; Blondel, Walter; Shen, Zhenmin; Liu, Shutian
2018-06-01
A novel image encryption method is proposed by using the expanded fractional Fourier transform, which is implemented with a pair of lenses. Here the centers of two lenses are separated at the cross section of axis in optical system. The encryption system is addressed with Fresnel diffraction and phase modulation for the calculation of information transmission. The iterative process with the transform unit is utilized for hiding secret image. The structure parameters of a battery of lenses can be used for additional keys. The performance of encryption method is analyzed theoretically and digitally. The results show that the security of this algorithm is enhanced markedly by the added keys.
Engage States on Energy Assurance and Energy Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kara Colton; John Ratliff; Sue Gander
2008-09-30
The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less
Optimal service distribution in WSN service system subject to data security constraints.
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-08-04
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm.
Optimal Service Distribution in WSN Service System Subject to Data Security Constraints
Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong
2014-01-01
Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346
SoS Lablet; Perpetually Available and Secure Information Systems
2015-11-16
settings, people simply err on the safe side and do a lot less sharing, which explains why all pull -based location sharing applications have failed so...number of data centers is raising concerns about their power consumption. Through an NSF GOALI Bruce Krogh and I have investigated the problem by
EPA's National Homeland Security Research Center (Office of Research and Development) and Water Protection Task Force (Office of Water) have jointly developed a draft analytical guide that may be used by laboratories to plan for and provide support to a drinking water utility...
Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li
2018-06-01
State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.
Return to work after renal transplantation: a study of the Brazilian Public Social Security System.
Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D
2014-12-15
Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-07
...; Potomac Center North, 500 12th Street SW., Washington, DC 20536; Contact Telephone Number (202) 732-4292... Homeland Security; Potomac Center North, 500 12th Street SW., Washington, DC 20536; Telephone: (202) 732... Security; Potomac Center North, 500 12th Street SW., Washington, DC 20536; Telephone: (202) 732-4292 (not a...
Management Overview of System Technical Support Plan for the FIREFINDER System Support Center.
1980-08-06
34.. /b , UNCLASSIFIED SECU ITY CLASSIFICATION OF THIS PAGE (When Data Entered) READ INSTRUCTIONSREPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM I. REPORT...Evaluation Agency USASA U.S. Army Security Agency UTM Universal Transverse Mercator V Volts V&V Verification and Validation VCSA Vice-Chief of Staff, Army VDD... classification , configuration audits, and so forth. INSTR 5010.27 Management of Automatic Data System 9 November 1971 Development Establishes uniform
Columbia River System Analysis Model - Phase 1
1991-10-01
Reach reservoirs due to the impact of APPENDIX D 6 Wenatchee River flows and additional inflow downstream of Rocky Reach. An inflow link terminates at...AD-A246 639I 11 11111 till11 1 111 US Army Corps of Engineers Hydrologic Engineering Center Columbia River System Analysis Model - Phase I Libby...WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) Columbia River System Analysis - Phase I 12. PERSONAL AUTHOR(S
Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It featuresmore » millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.« less
2014-12-10
SAN DIEGO, Calif. -- The Orion crew module has been secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover has been lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts. For more information, visit www.nasa.gov/orion Photo credit: NASA/Cory Huston
2014-12-10
SAN DIEGO, Calif. -- The Orion crew module has been lowered and secured in the crew module transportation fixture at the Mole Pier at Naval Base San Diego in California. The fixture has been secured on the back of a flatbed truck and the cover is being lowered over the spacecraft. Orion is being prepared for the overland trip back to NASA's Kennedy Space Center in Florida. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. NASA, the U.S. Navy and Lockheed Martin coordinated efforts to recover Orion. The Ground Systems Development and Operations Program led the recovery, offload and pre-transportation efforts. For more information, visit www.nasa.gov/orion Photo credit: NASA/Cory Huston
(Congressional Interest) Institute for Science, Space and Security (ISSS)
2012-03-19
Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees
(Congressional Interest) Network Information and Space Security Center
2011-09-30
Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of
VAB Platform K(2) Lift & Install into Highbay 3
2016-03-07
Work is underway to secure the second half of the K-level work platforms for NASA’s Space Launch System (SLS) rocket in High Bay 3 inside the Vehicle Assembly Building at NASA's Kennedy Space Center in Florida. The platform is being secured into position on tower E, about 86 feet above the floor. The K work platforms will provide access to NASA's Space Launch System (SLS) core stage and solid rocket boosters during processing and stacking operations on the mobile launcher. The Ground Systems Development and Operations Program is overseeing upgrades and modifications to High Bay 3 to support processing of the SLS and Orion spacecraft. A total of 10 levels of new platforms, 20 platform halves altogether, will surround the SLS rocket and Orion spacecraft.
NASA Technical Reports Server (NTRS)
Moon, James
2004-01-01
My name is James Moon and I am a senor at Tennessee State University where my major is Aeronautical and Industrial Technology with a concentration in industrial electronics. I am currently serving my internship in the Engineering and Technical Services Directorate at the Glenn Research Center (GRC). The Engineering and Technical Service Directorate provides the services and infrastructure for the Glenn Research Center to take research concepts to reality. They provide a full range of integrated services including engineering, advanced prototyping and testing, facility management, and information technology for NASA, industry, and academia. Engineering and Technical Services contains the core knowledge in Information Technology (IT). This includes data systems and analysis, inter and intranet based systems design and data security. Including the design and development of embedded real-time sohare applications for flight and supporting ground systems, Engineering and Technical Services provide a wide range of IT services and products specific to the Glenn Research Center research and engineering community.
"Security Theater" in the Pediatric Wing: The Case for RFID Protection for Infants in Hospitals
NASA Astrophysics Data System (ADS)
Wyld, David C.
In a typical year, five infants are abducted by strangers from hospitals. These are devastating events for the families involved and for the health care facilities' staff and executives. This article looks at the nature of newborn and infant abductions, analyzing data on these kidnappings from the FBI and from the National Center for Missing & Exploited Children. Then, the article examines the potential for RFID (radio frequency identification) based systems to improve security in the pediatric area of hospitals, providing an overview of the technology on the market today for infant protection. The article concludes with an analysis of the ROI (return on investment) equation for health care administrators to consider in weighing their options on how to prevent a statistically unlikely, but potentially cataclysmic occurrence, at their facility. In the end, RFID-based infant protection systems can be seen as a form of "security theater," serving as a "palliative countermeasure" that will indeed work - both substantively and psychologically - to promote a more secure hospital environment for moms and their newborns.
Gonder, Jeffrey; Burton, Evan; Murakami, Elaine
2015-12-29
Despite the significant effort and expense to collect high-resolution Global Positioning System (GPS) data in travel surveys, privacy concerns often lead to its underutilization. This paper describes development of the Transportation Secure Data Center (TSDC) to address this dilemma of providing data access while preserving privacy. Furthermore, the TSDC operating structure was developed in consultation with an advisory committee and includes: a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using amore » variety of tools and reference information.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...
Best Practices for the Security of Radioactive Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coulter, D.T.; Musolino, S.
2009-05-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.« less
Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership
NASA Astrophysics Data System (ADS)
Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya
CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.
Guide to the NITRD Program FY 2004-FY 2005. Supplement to the President’s Budget for FY 2005
2004-12-01
electronic medical records systems . At the core of such systems is the concept of a secure, patient-centered electronic health record ( EHR ) that: 1...support the development of an NHII that includes an Electronic Health Record System ( EHRS ). The EHRS will be a longitudinal collection of electronic... health information for and about persons. It will allow electronic access to person- and population-level information by authorized users. The system
20 CFR 416.913 - Medical and other evidence of your impairment(s).
Code of Federal Regulations, 2010 CFR
2010-04-01
...(s). 416.913 Section 416.913 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... judge and Appeals Council levels, and at the reviewing official, administrative law judge, and Decision... teachers, counselors, early intervention team members, developmental center workers, and daycare center...
47 CFR 0.192 - Emergency Response Interoperability Center.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Organization Public Safety and Homeland Security Bureau § 0.192 Emergency Response Interoperability Center. (a... Public Safety and Homeland Security Bureau to develop, recommend, and administer policy goals, objectives... and procedures for the 700 MHz public safety broadband wireless network and other public safety...
47 CFR 0.192 - Emergency Response Interoperability Center.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Organization Public Safety and Homeland Security Bureau § 0.192 Emergency Response Interoperability Center. (a... Public Safety and Homeland Security Bureau to develop, recommend, and administer policy goals, objectives... and procedures for the 700 MHz public safety broadband wireless network and other public safety...
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the
Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security
2012-12-01
Reserve Board, “Major Foreign Holders of Treasury Securities ,” 15 May 2012. http://www.treasury.gov/resource-center/ data -chart- center/tic/Documents...Coupled with numerous cyber -attacks and theft of intelligence, China could be performing dry runs and gaining intelligence on every occasion for the...THE U.S. DEBT AND ITS IMPLICATIONS FOR NATIONAL DEFENSE AND SECURITY by Nicholas C. Malokofsky December 2012 Thesis Advisor: Carolyn
Developing a Standard Method for Link-Layer Security of CCSDS Space Communications
NASA Technical Reports Server (NTRS)
Biggerstaff, Craig
2009-01-01
Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.
Secure data exchange between intelligent devices and computing centers
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2005-03-01
The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.
Load Balancing in Stochastic Networks: Algorithms, Analysis, and Game Theory
2014-04-16
SECURITY CLASSIFICATION OF: The classic randomized load balancing model is the so-called supermarket model, which describes a system in which...P.O. Box 12211 Research Triangle Park, NC 27709-2211 mean-field limits, supermarket model, thresholds, game, randomized load balancing REPORT...balancing model is the so-called supermarket model, which describes a system in which customers arrive to a service center with n parallel servers according
Systems Engineering: From Dream to Reality
2011-04-01
at the 23rd Systems and Software Technology Conference (SSTC), 16-19 May 2011, Salt Lake City, UT. Sponsored in part by the USAF. U.S. Government or...Simulation, and Enterprise Security. Prior to this, he was Senior Research Scientist and Principal Member of the Technical Staff at AEgis Technologies ...Software Professional Development Program at AFIT He was a consultant for . the Software Technology Support Center for six years. Dr. Cook has a
Weyand, Jonathan S; Junck, Emily; Kang, Christopher S; Heiner, Jason D
2017-04-01
Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from < 20,000 to 100,000 patients and represented the entire spectrum of practice environments, including critical access hospitals and a regional quaternary referral medical center. Thirty-four of 75 (45%) reported the current level of security was inadequate, based on the general consensus of their ED staff. Nearly two-thirds (63%) of EDs had 24-hour security personnel coverage, while 28% reported no assigned security personnel. Security personnel training was provided by 45% of hospitals or healthcare systems. Sixty-nine of 78 (88%) respondents witnessed or heard about violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient's family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments.
experience and expertise in energy projects ranging from 50 kW to 150 MW across distribution and transmission security for Department of Defense Transmission and distribution system design. Education B.S., Energy Working in the Engineering and Modeling Group of NREL's Integrated Applications Center under the Energy
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-06
... docket number DHS- 2011-0016, by one of the following methods: Federal e-Rulemaking Portal: http://www... institutions for transcript purposes will only take place upon the request of the student. In accordance with... Management Agency/National Emergency Training Center-017 Student Application and Registration Records system...
ERIC Educational Resources Information Center
Boyken, J. Clarine J.
Designed to preserve the rich heritage of the rural school system which passed from the education scene in the 1930's and 1940's, this narrative, part history and part nostalgia, describes the author's own elementary education and the secure community life centered in the one room Spring Valley School in Hamilton County, Iowa, in the early decades…
2007-04-05
KENNEDY SPACE CENTER, FLA. -- In Orbiter Processing Facility bay 2, workers secure the orbiter boom sensor system in Endeavour's payload bay. The orbiter is scheduled to fly on mission STS-118 to the International Space Station in the summer of 2007. It will deliver the third starboard truss segment, S5. Photo credit: NASA/Troy Cryder
1998-06-25
KENNEDY SPACE CENTER, FLA. -- Sgt. Mark Hines, of Kennedy Space Center (KSC) Security, points out a view of a fire on the Forward Looking Infrared Radar (FLIR) video screen to Greg Dunn, of Florida's Division of Forestry, as KSC pilots fly NASA's Huey UH-1 helicopter over fires burning in Volusia County, Florida. The FLIR includes a beach-ball sized infrared camera that is mounted on the helicopter's right siderail and a real-time TV monitor and recorder installed inside. The helicopter has also been outfitted with a portable global positioning satellite (GPS) system to support the Division of Forestry as they fight the brush fires which have been plaguing the state as a result of extremely dry conditions and lightning storms. While the FLIR collects temperature data and images, the GPS system provides the exact coordinates of the fires being observed and transmits the data to the firefighters on the ground. KSC's security team routinely uses the FLIR equipment prior to Shuttle launch and landing activities to ensure that the area surrounding the launch pad and runway are clear of unauthorized personnel. KSC's Base Operations Contractor, EG&G Florida, operates the NASA-owned helicopter.
SELF-CENTERING POSITIVE LOCKING GRAPNEL
Hopper, C.G.
1961-07-01
A grapnel used for remotely securing a load to be hoisted is described. The grapnel of the invention is generally conical in shape with a plurality of semi-open bores laterally disposed about the device. The bores meet at the apex of the grapnel and there provde a securing pocket for a spherical member. A load provided with a rigid support rod having a spherical member at its end can be secured by directing the spherical member down one of the bores and into the securing pocket. The major advantsges of the invention reside in the self- centering and positive locking features.
The Arab Citizens of Israel: Motivations for Collective Action
2008-03-01
46 Jewish National Fund, “Tree Planting Center,” https://secure2.convio.net/jnf/site/ Ecommerce ?store_id=3181...2008]. ———, “Tree Planting Center,” available at https://secure2.convio.net/jnf/site/ Ecommerce ?store_id=3181&VIEW_HOMEPA GE=true
75 FR 69673 - Agency Forms Undergoing Paperwork Reduction Act Review
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [30-Day 11-0636... Project Centers for Disease Control and Prevention (CDC) Secure Communications Network (Epi-X) (OMB No... Secure Communication Network (Epi-X))--Revision--Office of Public Health Preparedness and Response (OPHPR...
Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Paulsen, Phillip E.
2004-01-01
The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and mitigation of potential equipment malfunctions. As an additional benefit, team advancements were incorporated into open standards, ensuring technology transfer. Low-cost, commercial products incorporating the new technology are already available. Furthermore, these products are fully interoperable with legacy network technology equipment currently being used throughout the world.
2016-12-16
Construction workers wearing safety harnesses and tethered lines assist with the installation of the second half of the B-level work platforms, B north, for NASA’s Space Launch System (SLS) rocket, high up in the Vehicle Assembly Building (VAB) at NASA’s Kennedy Space Center in Florida. They are securing the large bolts that hold the platform securely in place on the north side of High Bay 3. The B platforms are the ninth of 10 levels of work platforms that will surround and provide access to the SLS rocket and Orion spacecraft for Exploration Mission 1. The Ground Systems Development and Operations Program is overseeing upgrades and modifications to VAB High Bay 3, including installation of the new work platforms, to prepare for NASA’s Journey to Mars.
NASA Technical Reports Server (NTRS)
Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric
2005-01-01
This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.
Janus, Katharina; Amelung, Volker E; Baker, Laurence C; Gaitanides, Michael; Schwartz, Friedrich W; Rundall, Thomas G
2008-12-01
Our study assesses how work-related monetary and nonmonetary factors affect physicians' job satisfaction at three academic medical centers in Germany and the United States, two countries whose differing health care systems experience similar problems in maintaining their physician workforce. We used descriptive statistics and factor and correlation analyses to evaluate physicians' responses to a self-administered questionnaire. Our study revealed that German physician respondents were less satisfied overall than their U.S. counterparts. In both countries, participation in decision making that may affect physicians' work was an important correlate of satisfaction. In Germany other important factors were opportunities for continuing education, job security, extent of administrative work, collegial relationships, and access to specialized technology. In the U.S. sample, job security, financial incentives, interaction with colleagues, and cooperative working relationships with colleagues and management were important predictors of overall job satisfaction. The implications of these findings for the development of policies and management tactics to increase physician job satisfaction in German and U.S. academic medical centers are discussed.
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
2015-08-07
have rarely linked these methods to a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14... Goodall , W. Lutters, and A. Komlodi. The work of intrusion detec- tion: rethinking the role of security analysts. AMCIS 2004 Proceed- ings, 2004. [14] J. R... Goodall , A. A. Ozok, W. G. Lutters, P. Rheingans, and A. Kom- lodi. A user-centered approach to visualizing network traffic for intru- sion
WebCIS: large scale deployment of a Web-based clinical information system.
Hripcsak, G; Cimino, J J; Sengupta, S
1999-01-01
WebCIS is a Web-based clinical information system. It sits atop the existing Columbia University clinical information system architecture, which includes a clinical repository, the Medical Entities Dictionary, an HL7 interface engine, and an Arden Syntax based clinical event monitor. WebCIS security features include authentication with secure tokens, authorization maintained in an LDAP server, SSL encryption, permanent audit logs, and application time outs. WebCIS is currently used by 810 physicians at the Columbia-Presbyterian center of New York Presbyterian Healthcare to review and enter data into the electronic medical record. Current deployment challenges include maintaining adequate database performance despite complex queries, replacing large numbers of computers that cannot run modern Web browsers, and training users that have never logged onto the Web. Although the raised expectations and higher goals have increased deployment costs, the end result is a far more functional, far more available system.
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. The first panel is secured on a storage stand while the second panel is being lowered by crane onto the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas
2006-06-01
One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed C-band (5091- to 5150-MHz) airport surface communication system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents an initial high-level safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the C-band communication system after the profile is finalized and system rollout timing is determined. A security risk assessment has been performed by NASA as a parallel activity. While safety analysis is concerned with a prevention of accidental errors and failures, the security threat analysis focuses on deliberate attacks. Both processes identify the events that affect operation of the system; and from a safety perspective the security threats may present safety risks.
Robertson, R L; Castro, C E; Gómez, L C; Gwynne, G; Tinajero Baca, C L; Zschock, D K
1991-10-01
The present study will examine three common premises in the field of international public health: that the primary care services offered by agencies of the Ministries of Health (MH) are less costly than those offered by Social Security institutions, that the former services are inferior to the latter, and that funds are distributed more equitably by the MH centers among their various recipient populations. The 1986 study compared the costs, quality, and equity of the services in 15 primary care centers in Ecuador--eight Ministry of Health centers and seven rural Social Security (RSS) centers--examining budgetary data from 1985 and obtaining information through a questionnaire and interviews with the personnel at those centers. Average costs were calculated by standardized accounting techniques, and it was confirmed that for several important services, especially medical consultations, these costs were much lower in the Ministry centers than in the Social Security centers. However, no differences in the cost of dental care were detected. The evaluation of quality, based on an analysis of the production structure and process, did not yield uniform results. On the one hand, the distribution of personnel and the allocation of funds for drugs and other supplies indicated that the RSS agencies provided better quality services. On the other hand, a questionnaire revealed that the MH health workers' knowledge of various principles of primary care was superior to that of the RSS workers. Upon comparing the per capita budget of the two types of entities, it was confirmed that the Ministry of Health had more equitable per capita coverage than rural Social Security. The implications of these findings for Ecuador and other developing countries are discussed and several recommendations made.
Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O.
2013-02-01
Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors,more » active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.« less
2016 California Vehicle Survey | Transportation Secure Data Center |
Transportation Secure Data Center | NREL 6 California Vehicle Survey 2016 California Vehicle Survey The 2016 California Vehicle Survey of residential and commercial light-duty fleet owners in vehicle (PEV) owners. Data Collection Agency The California Energy Commission conducted the survey
Functions of the Department of Defense and Its Major Components
2010-12-21
Information Center (DTIC),” August 19, 2005 (ax) DoD Directive 5105.72, “Defense Technology Security Administration ( DTSA ),” July 28, 2005 (ay) DoD...Information Center (DTIC). See DoDD 5105.73 (Reference (aw)). (4) Defense Technology Security Administration ( DTSA ). See DoDD 5105.72
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0059] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid Services (CMS))--Match Number 1076 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0022] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid Services (CMS))--Match Number 1076 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...
Wireless networks of opportunity in support of secure field operations
NASA Astrophysics Data System (ADS)
Stehle, Roy H.; Lewis, Mark
1997-02-01
Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.
Web-based self-management for patients with multiple sclerosis: a practical, randomized trial.
Miller, Deborah M; Moore, Shirley M; Fox, Robert J; Atreja, Ashish; Fu, Alex Z; Lee, Jar-Chi; Saupe, Welf; Stadtler, Maria; Chakraborty, Swati; Harris, C M; Rudick, Richard A
2011-01-01
No studies have addressed the use of electronic personal health records (e-PHRs) for self-management in complex neurological disorders. We assessed and tested an Internet-based self-management system that utilized the e-PHR and determined its impact on self-assessed well-being, clinician-assessed well-being, and healthcare utilization in patients with multiple sclerosis (MS). Subjects were randomized to usual care (a secure Web-based messaging system) or active intervention, which included secure messaging, self-monitoring, self-management of MS symptoms, and communication about upcoming clinic visits. Computers and Internet access were provided. Subjects were included if they had MS, lived within the county or region surrounding our MS center, had at least two appointments at our center in the previous 12 months, and demonstrated basic typing and computer skills. Study duration was 12 months. Of 220 subjects completing informed consent, 206 met the inclusion criteria. At the study's end, 83 subjects remained in the usual care group and 84 in the enhanced care group. Both groups used the available system components. The groups did not significantly differ on the primary endpoints or healthcare utilization. Self-management support is an emerging aspect of chronic care management. We established the feasibility of conducting a randomized, controlled trial using e-PHRs for patient self-management. We did not find that e-PHR-enabled self-management augmented multidisciplinary MS center-based care, possibly because the differences between interventions were not great enough.
Orion Washdown & Arrival at LASF
2014-12-18
NASA's Orion spacecraft arrives inside the Launch Abort System Facility at Kennedy Space Center in Florida. The spacecraft was transported 2,700 miles overland from Naval Base San Diego in California, on a flatbed truck secured in its crew module transportation fixture for the trip. During its first flight test, Orion completed a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
Orion Washdown & Arrival at LASF
2014-12-18
NASA's Orion spacecraft arrives at the Launch Abort System Facility at Kennedy Space Center in Florida. The spacecraft was transported 2,700 miles overland from Naval Base San Diego in California, on a flatbed truck secured in its crew module transportation fixture for the trip. During its first flight test, Orion completed a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
2012-07-31
CAPE CANAVERAL, Fla. - Technicians secure connections for a crane which will be used to set up NASA's Morpheus lander, a vertical test bed vehicle, at its launch position along the runway at the Shuttle Landing Facility, or SLF, at the Kennedy Space Center in Florida. Morpheus is designed to demonstrate new green propellant propulsion systems and autonomous landing and an Autonomous Landing and Hazard Avoidance Technology, or ALHAT, system. Checkout of the prototype lander has been ongoing at NASA’s Johnson Space Center in Houston in preparation for its first free flight. The SLF site will provide the lander with the kind of field necessary for realistic testing. Project Morpheus is one of 20 small projects comprising the Advanced Exploration Systems, or AES, program in NASA’s Human Exploration and Operations Mission Directorate. AES projects pioneer new approaches for rapidly developing prototype systems, demonstrating key capabilities and validating operational concepts for future human missions beyond Earth orbit. For more information on Project Morpheus, visit http://www.nasa.gov/centers/johnson/exploration/morpheus/index.html Photo credit: NASA/Dimitri Gerondidakis
NASA Technical Reports Server (NTRS)
Swenson, Paul
2017-01-01
Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and allows components to aggregate data across multiple homogeneous or heterogeneous satellites or payloads - The highly-successful Goddard Science and Planetary Operations Control Center (SPOCC) utilizes GMSEC as the hub for it's automation and situational awareness capability Shifts focus towards getting GS to a final configuration-managed baseline, as well as multi-mission / big-picture capabilities that help increase situational awareness, promote cross-mission sharing and establish enhanced fleet management capabilities across all levels of the enterprise.
A Component-Based Approach for Securing Indoor Home Care Applications
Estévez, Elisabet
2017-01-01
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home. PMID:29278370
A Component-Based Approach for Securing Indoor Home Care Applications.
Agirre, Aitor; Armentia, Aintzane; Estévez, Elisabet; Marcos, Marga
2017-12-26
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
1984-06-20
AD-A162 ±88 FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL 1/1 SYSTEM IN THE DEFENS (U) DEFENSE COMMUNICATIONS AGENCY WASHINGTON DC TECHNICAL...NATIONAL BUREAU OF STANDARDS- 1963-A 0FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL SYSTEM IN THE DEFENSE COMMUNICATIONS 0AGENCY TECHNICAL AND...ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED/UNLIMITED R1 SAME AS RPT. 0 DTIC USERS 0 UNCLASSIFIED 22&. NAME OF RESPONSIBLE INDIVIDUAL 22b
Terahertz Tools Advance Imaging for Security, Industry
NASA Technical Reports Server (NTRS)
2010-01-01
Picometrix, a wholly owned subsidiary of Advanced Photonix Inc. (API), of Ann Arbor, Michigan, invented the world s first commercial terahertz system. The company improved the portability and capabilities of their systems through Small Business Innovation Research (SBIR) agreements with Langley Research Center to provide terahertz imaging capabilities for inspecting the space shuttle external tanks and orbiters. Now API s systems make use of the unique imaging capacity of terahertz radiation on manufacturing floors, for thickness measurements of coatings, pharmaceutical tablet production, and even art conservation.
1997-05-01
Safeguarding patient records has always been a major concern for hospitals, but it has taken on added importance with increasing computerization that makes it easier for employees to browse medical charts, usually to check on the condition of a fellow worker, friend, or neighbor. In an effort to make records more secure, two hospitals--the University of Wisconsin Hospital and Clinics, Madison, and Beth Israel-Deaconess Medical Center, Boston, MA--have included an audit trail in their computer security systems to let them know who is accessing them. Such methods to safeguard electronic records and better protect patients' privacy were strongly recommended in March 1997 by a panel of the National Research Council, an arm of the National Academy of Sciences. In this report, we'll present details of how these hospitals are proceeding.
2017-11-09
The Orion crew access arm, secured on a stand, is being prepared for its move from a storage location at NASA's Kennedy Space Center in Florida, to the mobile launcher (ML) tower near the Vehicle Assembly Building at the center. The crew access arm will be installed at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.
2011-05-01
communications and on computer networks—its Global Information Grid—which are potentially jeopardized by the millions of denial-of-service attacks, hacking ...Director,a National Security Agency Chief of Staff Joint Operations Center Defense Information Systems Agency Command Center J1 J2 J3 J4 J5 J6 J7 J8...DC Joint Staff • J39, Operations, Pentagon, Washington, DC • J5 , Strategic Plans and Policy, Pentagon, Washington, DC U.S. Strategic Command • J882
2004-08-05
KENNEDY SPACE CENTER, FLA. - Center Director Jim Kennedy addresses guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Shea, S; Sengupta, S; Crosswell, A; Clayton, P D
1992-01-01
The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.
Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach
NASA Technical Reports Server (NTRS)
Roy, Sandip; Sridhar, Banavar
2016-01-01
Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure, and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.
Robustness of Feedback Systems with Several Modelling Errors
1990-06-01
Patterson AFB, OH 45433-6553 to help us maintain a current mailing list. Copies of this report should not be returned unless return is required by security...Wright Research (If applicable) and Development Center WRDC/FIGC F33615-88-C-3601 8c. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS...feedback systems with several sources of modelling uncertainty. We assume that each source of uncertainty is modelled as a stable unstructured
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASAs Federal Law Enforcement Training Academys firing range has been upgraded to include a rifle-grade shoot house, a portable, tactical shoot-back trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, pistol-grade shoot house, obstacle course and rappel tower. NASAs Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Openness of patients' reporting with use of electronic records: psychiatric clinicians' views
Blackford, Jennifer Urbano; Rosenbloom, S Trent; Seidel, Sandra; Clayton, Ellen Wright; Dilts, David M; Finder, Stuart G
2010-01-01
Objectives Improvements in electronic health record (EHR) system development will require an understanding of psychiatric clinicians' views on EHR system acceptability, including effects on psychotherapy communications, data-recording behaviors, data accessibility versus security and privacy, data quality and clarity, communications with medical colleagues, and stigma. Design Multidisciplinary development of a survey instrument targeting psychiatric clinicians who recently switched to EHR system use, focus group testing, data analysis, and data reliability testing. Measurements Survey of 120 university-based, outpatient mental health clinicians, with 56 (47%) responding, conducted 18 months after transition from a paper to an EHR system. Results Factor analysis gave nine item groupings that overlapped strongly with five a priori domains. Respondents both praised and criticized the EHR system. A strong majority (81%) felt that open therapeutic communications were preserved. Regarding data quality, content, and privacy, clinicians (63%) were less willing to record highly confidential information and disagreed (83%) with including their own psychiatric records among routinely accessed EHR systems. Limitations single time point; single academic medical center clinic setting; modest sample size; lack of prior instrument validation; survey conducted in 2005. Conclusions In an academic medical center clinic, the presence of electronic records was not seen as a dramatic impediment to therapeutic communications. Concerns regarding privacy and data security were significant, and may contribute to reluctances to adopt electronic records in other settings. Further study of clinicians' views and use patterns may be helpful in guiding development and deployment of electronic records systems. PMID:20064802
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-06
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare and Medicaid Services (CMS))--Match Number 1094 AGENCY: Social Security Administration (SSA). ACTION: Notice of a new computer matching program that will expire...
77 FR 51981 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-28
... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2012-0016] Proposed Collection; Comment Request AGENCY: United States Security Forces Center, Headquarters, DoD. ACTION: Notice. In compliance with Section 3506(c)(2)(A) of the Paperwork Reduction Act of 1995, the Office of the United States Security Forces Center, Headquarters...
Seed Planting in Veggie Pillows
2017-08-08
Seeds are secured in plant pillows for the Veggie plant growth system inside a laboratory in the Space Station Processing Facility at NASA's Kennedy Space Center in Florida. The plant pillows, containing Outredgeous lettuce, Mizuna Mustard and Waldmann's green lettuce seeds, were packed for delivery to Veggie on SpaceX's 12th commercial resupply services mission to the International Space Station.
Seed Planting in Veggie Pillows
2017-08-08
Seeds are secured in plant pillows for the Veggie plant growth system inside a laboratory in the Space Station Processing Facility at NASA's Kennedy Space Center in Florida. The plant pillows, containing Outredgeous lettuce, Mizuna Mustard and Waldmann's green lettuce, were packed for delivery to Veggie on SpaceX's 12th commercial resupply services mission to the International Space Station.
National Security Personnel System (NSPS) 2008 Evaluation Report
2009-05-15
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson... Operations Tempo (Wartime Ops Tempo) ...................................................................................... 3‐5 3.4.4. Personnel Center...5‐11 5.6.2. Operation and Administration of Implementation Team...................................................................... 5‐11 5.6.3
2016-09-07
Tim Linn, chief system engineer with Lockheed Martin, discusses the unique design of the OSIRIS-REx spacecraft during a NASA Social with social media followers in the Operations Support Building II at NASA’s Kennedy Space Center in Florida. The presentation took place before launch of the agency’s Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx spacecraft.
Orion Returns to KSC after Successful Mission
2014-12-18
NASA's Orion crew module, enclosed in its crew module transportation fixture and secured on a flatbed truck nears the entrance gate to Kennedy Space Center in Florida. Orion made the overland trip from Naval Base San Diego in California. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
Software For Monitoring A Computer Network
NASA Technical Reports Server (NTRS)
Lee, Young H.
1992-01-01
SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.
49 CFR 1580.105 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615-5150. (c...
Information Management and the Biological Warfare Threat
2002-03-01
24 2. Scientific-Security Paradigm Interaction........................................ 25 3. Business - Security Paradigm...policies of openness and guardedness and discuss the three paradigms (scientific, business , security ) as a developing factor for information sharing...Trade Center. 3. Business - Security Paradigm Interaction Gene patenting (discussed previously) is utilized by business to protect their
Security Station and Front Entrance to hospital property, looking northeast ...
Security Station and Front Entrance to hospital property, looking northeast - U.S. Veterans Hospital, Jefferson Barracks, Security Station & Front Gate, VA Medical Center, Jefferson Barracks Division 1 Jefferson Barracks Drive, Saint Louis, Independent City, MO
75 FR 29797 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-27
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Comment Request The Social Security Administration (SSA) publishes a list of information collection packages requiring... . (SSA) Social Security Administration, DCBFM, Attn: Director, Center for Reports Clearance, 1333 Annex...
Potential terrorist uses of highway-borne hazardous materials.
DOT National Transportation Integrated Search
2010-01-01
The Department of Homeland Security (DHS) has requested that the Mineta Transportation Institutes National Transportation Security Center of Excellence (MTI NTSCOE) provide any research it has or insights it can provide on the security risks creat...
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-01-01
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller. PMID:28430155
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.
Lin, Zhaowen; Tao, Dan; Wang, Zhenji
2017-04-21
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.
Internet-based monitoring and benchmarking in ambulatory surgery centers.
Bovbjerg, V E; Olchanski, V; Zimberg, S E; Green, J S; Rossiter, L F
2000-08-01
Each year the number of surgical procedures performed on an outpatient basis increases, yet relatively little is known about assessing and improving quality of care in ambulatory surgery. Conventional methods for evaluating outcomes, which are based on assessment of inpatient services, are inadequate in the rapidly changing, geographically dispersed field of ambulatory surgery. Internet-based systems for improving outcomes and establishing benchmarks may be feasible and timely. Eleven freestanding ambulatory surgery centers (ASCs) reported process and outcome data for 3,966 outpatient surgical procedures to an outcomes monitoring system (OMS), during a demonstration period from April 1997 to April 1999. ASCs downloaded software and protocol manuals from the OMS Web site. Centers securely submitted clinical information on perioperative process and outcome measures and postoperative patient telephone interviews. Feedback to centers ranged from current and historical rates of surgical and postsurgical complications to patient satisfaction and the adequacy of postsurgical pain relief. ASCs were able to successfully implement the data collection protocols and transmit data to the OMS. Data security efforts were successful in preventing the transmission of patient identifiers. Feedback reports to ASCs were used to institute changes in ASC staffing, patient care, and patient education, as well as for accreditation and marketing. The demonstration also pointed out shortcomings in the OMS, such as the need to simplify hardware and software installation as well as data collection and transfer methods, which have been addressed in subsequent OMS versions. Internet-based benchmarking for geographically dispersed outpatient health care facilities, such as ASCs, is feasible and likely to play a major role in this effort.
NASA Astrophysics Data System (ADS)
Guo, Bing; Documet, Jorge; Liu, Brent; King, Nelson; Shrestha, Rasu; Wang, Kevin; Huang, H. K.; Grant, Edward G.
2006-03-01
The paper describes the methodology for the clinical design and implementation of a Location Tracking and Verification System (LTVS) that has distinct benefits for the Imaging Department at the Healthcare Consultation Center II (HCCII), an outpatient imaging facility located on the USC Health Science Campus. A novel system for tracking and verification of patients and staff in a clinical environment using wireless and facial biometric technology to monitor and automatically identify patients and staff was developed in order to streamline patient workflow, protect against erroneous examinations and create a security zone to prevent and audit unauthorized access to patient healthcare data under the HIPAA mandate. This paper describes the system design and integration methodology based on initial clinical workflow studies within a clinical environment. An outpatient center was chosen as an initial first step for the development and implementation of this system.
Belard, Arnaud; Dolney, Derek; Zelig, Tochner; McDonough, James; O'Connell, John
2011-06-01
Proton radiotherapy is a relatively scarce treatment modality in radiation oncology, with only nine centers currently operating in the United States. Funded by Public Law 107-248, the University of Pennsylvania and the Walter Reed Army Medical Center have developed a remote proton radiation therapy solution with the goals of improving access to proton radiation therapy for Department of Defense (DoD) beneficiaries while minimizing treatment delays and time spent away from home/work (time savings of up to 3 weeks per patient). To meet both Health Insurance Portability and Accountability Act guidelines and the more stringent security restrictions imposed by the DoD, our program developed a hybrid remote proton radiation therapy solution merging a CITRIX server with a JITIC-certified (Joint Interoperability Test Command) desktop videoconferencing unit. This conduit, thoroughly tested over a period of 6 months, integrates both institutions' radiation oncology treatment planning infrastructures into a single entity for DoD patients' treatment planning and delivery. This telemedicine solution enables DoD radiation oncologists and medical physicists the ability to (1) remotely access a proton therapy treatment planning platform, (2) transfer patient plans securely to the University of Pennsylvania patient database, and (3) initiate ad-hoc point-to-point and multipoint videoconferences to dynamically optimize and validate treatment plans. Our robust and secure remote treatment planning solution grants DoD patients not only access to a state-of-the-art treatment modality, but also participation in the treatment planning process by Walter Reed Army Medical Center radiation oncologists and medical physicists. This telemedicine system has the potential to lead to a greater integration of military treatment facilities and/or satellite clinics into regional proton therapy centers.
Virtualized Multi-Mission Operations Center (vMMOC) and its Cloud Services
NASA Technical Reports Server (NTRS)
Ido, Haisam Kassim
2017-01-01
His presentation will cover, the current and future, technical and organizational opportunities and challenges with virtualizing a multi-mission operations center. The full deployment of Goddard Space Flight Centers (GSFC) Virtualized Multi-Mission Operations Center (vMMOC) is nearly complete. The Space Science Mission Operations (SSMO) organizations spacecraft ACE, Fermi, LRO, MMS(4), OSIRIS-REx, SDO, SOHO, Swift, and Wind are in the process of being fully migrated to the vMMOC. The benefits of the vMMOC will be the normalization and the standardization of IT services, mission operations, maintenance, and development as well as ancillary services and policies such as collaboration tools, change management systems, and IT Security. The vMMOC will also provide operational efficiencies regarding hardware, IT domain expertise, training, maintenance and support.The presentation will also cover SSMO's secure Situational Awareness Dashboard in an integrated, fleet centric, cloud based web services fashion. Additionally the SSMO Telemetry as a Service (TaaS) will be covered, which allows authorized users and processes to access telemetry for the entire SSMO fleet, and for the entirety of each spacecrafts history. Both services leverage cloud services in a secure FISMA High and FedRamp environment, and also leverage distributed object stores in order to house and provide the telemetry. The services are also in the process of leveraging the cloud computing services elasticity and horizontal scalability. In the design phase is the Navigation as a Service (NaaS) which will provide a standardized, efficient, and normalized service for the fleet's space flight dynamics operations. Additional future services that may be considered are Ground Segment as a Service (GSaaS), Telemetry and Command as a Service (TCaaS), Flight Software Simulation as a Service, etc.
A Career Cluster in Law, Public Safety, Corrections and Security
ERIC Educational Resources Information Center
Reese, Susan
2007-01-01
This article describes a program at Great Plains Technology Center that is not only serving its community's needs but it is also serving as a national pilot site. When Oklahoma's Great Plains Technology Center began developing its Law, Public Safety, Corrections and Security Cluster in 2003, the National Partnership for Careers in Law, Public…
2003-07-24
KENNEDY SPACE CENTER, FLA. - Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.
360 PORT MDA - A Strategy to Improve Port Security
2006-09-01
Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than
Managing medical and insurance information through a smart-card-based information system.
Lambrinoudakis, C; Gritzalis, S
2000-08-01
The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Center Director Jim Kennedy practices firing on the new range. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Cyber Security and Reliability in a Digital Cloud
2013-01-01
a higher utilization of servers, lower professional support staff needs, economies of scale for the physical facility, and the flexibility to locate...as a system, the DoD can achieve the economies of scale typically associated with large data centers. Recommendation 3: The DoD CIO and DISA...providers will help set standards for secure cloud computing across the economy . Recommendation 7: The DoD CIO and DISA should participate in the
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
Timely response to secure messages from primary care patients.
Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R
2013-01-01
To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.
Collaborative Workshop on Handling, Management, and ...
Report The Water Environment Research Foundation (WERF), in partnership with the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) and the National Science Foundation (NSF), hosted an expert workshop on November 17 and 18, 2015, in Alexandria, Virginia, to engage with subject matter experts and wastewater utility stakeholders on a number of topics surrounding high consequence pathogens in wastewater collection and treatment systems, should such pathogens enter the systems as a result of an emergency situation.
Understand the Big Picture So You Can Plan for Network Security
ERIC Educational Resources Information Center
Cervone, Frank
2005-01-01
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
2006-06-30
KENNEDY SPACE CENTER, FLA. - In the Space Station Processing Facility at NASA's Kennedy Space Center, flight crew systems technician Troy Mann and flight crew systems manager Jim Blake secure the storage boxes holding the food containers that will be stowed on Space Shuttle Discovery for the flight of mission STS-121. The containers hold meals prepared for the mission crew. Astronauts select their own menus from a large array of food items. Astronauts are supplied with three balanced meals, plus snacks. Foods flown on space missions are researched and developed at the Space Food Systems Laboratory at the Johnson Space Center (JSC) in Houston, which is staffed by food scientists, dietitians and engineers. Foods are analyzed through nutritional analysis, sensory evaluation, storage studies, packaging evaluations and many other methods. Each astronaut’s food is stored aboard the space shuttle and is identified by a colored dot affixed to each package. Launch of Space Shuttle Discovery on mission STS-121 is scheduled for July 1. Photo credit: NASA/Jack Pfaller
Design and build a compact Raman sensor for identification of chemical composition
NASA Astrophysics Data System (ADS)
Garcia, Christopher S.; Abedin, M. Nurul; Ismail, Syed; Sharma, Shiv K.; Misra, Anupam K.; Sandford, Stephen P.; Elsayed-Ali, Hani
2008-04-01
A compact remote Raman sensor system was developed at NASA Langley Research Center. This sensor is an improvement over the previously reported system, which consisted of a 532 nm pulsed laser, a 4-inch telescope, a spectrograph, and an intensified CCD camera. One of the attractive features of the previous system was its portability, thereby making it suitable for applications such as planetary surface explorations, homeland security and defense applications where a compact portable instrument is important. The new system was made more compact by replacing bulky components with smaller and lighter components. The new compact system uses a smaller spectrograph measuring 9 x 4 x 4 in. and a smaller intensified CCD camera measuring 5 in. long and 2 in. in diameter. The previous system was used to obtain the Raman spectra of several materials that are important to defense and security applications. Furthermore, the new compact Raman sensor system is used to obtain the Raman spectra of a diverse set of materials to demonstrate the sensor system's potential use in the identification of unknown materials.
Design and Build a Compact Raman Sensor for Identification of Chemical Composition
NASA Technical Reports Server (NTRS)
Garcia, Christopher S.; Abedin, M. Nurul; Ismail, Syed; Sharma, Shiv K.; Misra, Anupam K.; Sandford, Stephen P.; Elsayed-Ali, Hani
2008-01-01
A compact remote Raman sensor system was developed at NASA Langley Research Center. This sensor is an improvement over the previously reported system, which consisted of a 532 nm pulsed laser, a 4-inch telescope, a spectrograph, and an intensified charge-coupled devices (CCD) camera. One of the attractive features of the previous system was its portability, thereby making it suitable for applications such as planetary surface explorations, homeland security and defense applications where a compact portable instrument is important. The new system was made more compact by replacing bulky components with smaller and lighter components. The new compact system uses a smaller spectrograph measuring 9 x 4 x 4 in. and a smaller intensified CCD camera measuring 5 in. long and 2 in. in diameter. The previous system was used to obtain the Raman spectra of several materials that are important to defense and security applications. Furthermore, the new compact Raman sensor system is used to obtain the Raman spectra of a diverse set of materials to demonstrate the sensor system's potential use in the identification of unknown materials.
Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.
2017-01-01
Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from < 20,000 to 100,000 patients and represented the entire spectrum of practice environments, including critical access hospitals and a regional quaternary referral medical center. Thirty-four of 75 (45%) reported the current level of security was inadequate, based on the general consensus of their ED staff. Nearly two-thirds (63%) of EDs had 24-hour security personnel coverage, while 28% reported no assigned security personnel. Security personnel training was provided by 45% of hospitals or healthcare systems. Sixty-nine of 78 (88%) respondents witnessed or heard about violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498
Abernethy, Amy P; Wheeler, Jane L; Courtney, Paul K; Keefe, Francis J
2011-03-01
The advancement of translational behavioral medicine will require that we discover new methods of managing large volumes of data from disparate sources such as disease surveillance systems, public health systems, and health information systems containing patient-centered data informed by behavioral and social sciences. The term "liquidity," when applied to data, refers to its availability and free flow throughout human/computer interactions. In seeking to achieve liquidity, the focus is not on creating a single, comprehensive database or set of coordinated datasets, nor is it solely on developing the electronic health record as the "one-stop shopping" source of health-related data. Rather, attention is on ensuring the availability of secure data through the various methods of collecting and storing data currently existent or under development-so that these components of the health information infrastructure together support a liquid data system. The value of accessible, interoperable, high-volume, reliable, secure, and contextually appropriate data is becoming apparent in many areas of the healthcare system, and health information liquidity is currently viewed as an important component of a patient-centered healthcare system. The translation from research interventions to behavioral and psychosocial indicators challenges the designers of healthcare systems to include this new set of data in the correct context. With the intention of advancing translational behavioral medicine at the local level, "on the ground" in the clinical office and research institution, this commentary discusses data liquidity from the patient's and clinician's perspective, requirements for a liquid healthcare data system, and the ways in which data liquidity can support translational behavioral medicine.
Seed Planting in Veggie Pillows
2017-08-08
Matt Romeyn, a NASA biologist, secures seeds in plant pillows for the Veggie plant growth system inside a laboratory in the Space Station Processing Facility at NASA's Kennedy Space Center in Florida. The plant pillows, containing Outredgeous lettuce, Mizuna Mustard and Waldmann's green lettuce seeds, were packed for delivery to Veggie on SpaceX's 12th commercial resupply services mission to the International Space Station.
Department of Defense Base Closure and Realignment Report
1993-03-01
European NATO allies wili continue to grapple with shaping 3n evolving regional security framework capable of crisis management and conflict prevention, as...Personnel, Arlington, Virginia (including the Office of Military Manpower Management . Arlington, Virg;uda) Naval Air Systems Command, Arlington, Virginia...Hawaii Enlisted Personnel Management Center, New Orleans, Louisiana Naval Computer & Telecommunications Station, New Orleans, Louisiana Naval Air Station
Integration of Training Civilian and Military Disaster Responders
2011-09-01
Personal hygiene including foot care, hydration, and nutrition will be covered. The appropriate clothing and footwear will be discussed, including how...policy proposals , for review by civilian health system leaders, National Guard command staff, and both the Departments of Homeland Security and...for healthcare emergency response planning. Journal of Business Continuity and Emergency Preparedness, 1(4). Center for Disease Control and
1983-09-26
Q.. 5401 Westbard Avenue Bethesda, Maryland 20816 Arthur D Little, Inc c3 11 07 100 SECURITY CLASS:FICAT;ON Of THIS PAGE ,n Date Entered) REPORT...OFFICE NAME AND ADDRESS 12. REPORT CATE TRIMIS PROGRAM OFFICE September 26, 1983 5401 Westbard Avenue 13. NUMBER OF PAGES Bethesda, Maryland 20816 44
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
Internet-Based Solutions for a Secure and Efficient Seismic Network
NASA Astrophysics Data System (ADS)
Bhadha, R.; Black, M.; Bruton, C.; Hauksson, E.; Stubailo, I.; Watkins, M.; Alvarez, M.; Thomas, V.
2017-12-01
The Southern California Seismic Network (SCSN), operated by Caltech and USGS, leverages modern Internet-based computing technologies to provide timely earthquake early warning for damage reduction, event notification, ShakeMap, and other data products. Here we present recent and ongoing innovations in telemetry, security, cloud computing, virtualization, and data analysis that have allowed us to develop a network that runs securely and efficiently.Earthquake early warning systems must process seismic data within seconds of being recorded, and SCSN maintains a robust and resilient network of more than 350 digital strong motion and broadband seismic stations to achieve this goal. We have continued to improve the path diversity and fault tolerance within our network, and have also developed new tools for latency monitoring and archiving.Cyberattacks are in the news almost daily, and with most of our seismic data streams running over the Internet, it is only a matter of time before SCSN is targeted. To ensure system integrity and availability across our network, we have implemented strong security, including encryption and Virtual Private Networks (VPNs).SCSN operates its own data center at Caltech, but we have also installed real-time servers on Amazon Web Services (AWS), to provide an additional level of redundancy, and eventually to allow full off-site operations continuity for our network. Our AWS systems receive data from Caltech-based import servers and directly from field locations, and are able to process the seismic data, calculate earthquake locations and magnitudes, and distribute earthquake alerts, directly from the cloud.We have also begun a virtualization project at our Caltech data center, allowing us to serve data from Virtual Machines (VMs), making efficient use of high-performance hardware and increasing flexibility and scalability of our data processing systems.Finally, we have developed new monitoring of station average noise levels at most stations. Noise monitoring is effective at identifying anthropogenic noise sources and malfunctioning acquisition equipment. We have built a dynamic display of results with sorting and mapping capabilities that allow us to quickly identify problematic sites and areas with elevated noise.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
Pathway to Support the Sustainable National Health Information System
NASA Astrophysics Data System (ADS)
Sahavechaphan, Naiyana; Phengsuwan, Jedsada; U-Ruekolan, Suriya; Aroonrua, Kamron; Ponhan, Jukrapong; Harnsamut, Nattapon; Vannarat, Sornthep
Heath information across geographically distributed healthcare centers has been recognized as an essential resource that drives an efficient national health-care plan. There is thus a need for the National Health Information System (NHIS) that provides the transparent and secure access to health information from different healthcare centers both on demand and in a time efficient manner. As healthiness is the ultimate goal of people and nation, we believe that the NHIS should be sustainable by taking the healthcare center and information consumer perspectives into account. Several issues in particular must be resolved altogether: (i) the diversity of health information structures among healthcare centers; (ii) the availability of health information sharing from healthcare centers; (iii) the efficient information access to various healthcare centers; and (iv) the privacy and privilege of heath information. To achieve the sustainable NHIS, this paper details our work which is divided into 3 main phases. Essentially, the first phase focuses on the application of metadata standard to enable the interoperability and usability of health information across healthcare centers. The second phase moves forward to make information sharing possible and to provide an efficient information access to a large number of healthcare centers. Finally, in the third phase, the privacy and privilege of health information is promoted with respect to access rights of information consumers.
Rep. Hanabusa, Colleen W. [D-HI-1
2013-12-23
House - 01/24/2014 Referred to the Subcommittee on Readiness. (All Actions) Notes: For further action, see H.R.3979, which became Public Law 113-291 on 12/19/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
2003-07-24
KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.
Emergency Operations Center at Johnson Space Center
NASA Technical Reports Server (NTRS)
Caylor, Gary C.
1997-01-01
In June 1966, at the start of the Gulf Coast hurricane season, the Johnson Space Center (JSC) celebrated the opening of its new 4,000-square foot, state-of-the-art Emergency Operations Center (EOC). The new EOC has been upgraded and enhanced to support a wide spectrum of emergencies affecting JSC and neighboring communities. One of the main features of the EOC is its premier computerized dispatch center. The new system unites many of JSC's critical emergency functions into one integrated network. It automatically monitors fire alarms, security entrances, and external cameras. It contains the JSC inventory of hazardous materials, by building and room, and can call up Material Safety Data Sheets for most of the generic hazardous materials used on-site. The EOC is available for community use during area emergencies such as hurricanes and is a welcome addition to the Clear Lake/Galveston Bay Area communities' emergency response resources.
Lessons learned: mobile device encryption in the academic medical center.
Kusche, Kristopher P
2009-01-01
The academic medical center is faced with the unique challenge of meeting the multi-faceted needs of both a modern healthcare organization and an academic institution, The need for security to protect patient information must be balanced by the academic freedoms expected in the college setting. The Albany Medical Center, consisting of the Albany Medical College and the Albany Medical Center Hospital, was challenged with implementing a solution that would preserve the availability, integrity and confidentiality of business, patient and research data stored on mobile devices. To solve this problem, Albany Medical Center implemented a mobile encryption suite across the enterprise. Such an implementation comes with complexities, from performance across multiple generations of computers and operating systems, to diversity of application use mode and end user adoption, all of which requires thoughtful policy and standards creation, understanding of regulations, and a willingness and ability to work through such diverse needs.
An Experimental Seismic Data and Parameter Exchange System for Tsunami Warning Systems
NASA Astrophysics Data System (ADS)
Hoffmann, T. L.; Hanka, W.; Saul, J.; Weber, B.; Becker, J.; Heinloo, A.; Hoffmann, M.
2009-12-01
For several years GFZ Potsdam is operating a global earthquake monitoring system. Since the beginning of 2008, this system is also used as an experimental seismic background data center for two different regional Tsunami Warning Systems (TWS), the IOTWS (Indian Ocean) and the interim NEAMTWS (NE Atlantic and Mediterranean). The SeisComP3 (SC3) software, developed within the GITEWS (German Indian Ocean Tsunami Early Warning System) project, capable to acquire, archive and process real-time data feeds, was extended for export and import of individual processing results within the two clusters of connected SC3 systems. Therefore not only real-time waveform data are routed to the attached warning centers through GFZ but also processing results. While the current experimental NEAMTWS cluster consists of SC3 systems in six designated national warning centers in Europe, the IOTWS cluster presently includes seven centers, with another three likely to join in 2009/10. For NEAMTWS purposes, the GFZ virtual real-time seismic network (GEOFON Extended Virtual Network -GEVN) in Europe was substantially extended by adding many stations from Western European countries optimizing the station distribution. In parallel to the data collection over the Internet, a GFZ VSAT hub for secured data collection of the EuroMED GEOFON and NEAMTWS backbone network stations became operational and first data links were established through this backbone. For the Southeast Asia region, a VSAT hub has been established in Jakarta already in 2006, with some other partner networks connecting to this backbone via the Internet. Since its establishment, the experimental system has had the opportunity to prove its performance in a number of relevant earthquakes. Reliable solutions derived from a minimum of 25 stations were very promising in terms of speed. For important events, automatic alerts were released and disseminated by emails and SMS. Manually verified solutions are added as soon as they become available. The results are also promising in terms of accuracy since epicenter coordinates, depth and magnitude estimates were sufficiently accurate from the very beginning, and usually do not differ substantially from the final solutions. In summary, automatic seismic event processing has shown to work well as a first step for starting a Tsunami Warning process. However, for the secured assessment of the tsunami potential of a given event, 24/7-manned regional TWCs are mandatory for reliable manual verification of the automatic seismic results. At this time, GFZ itself provides manual verification only when staff is available, not on a 24/7 basis, while the actual national tsunami warning centers have all a reliable 24/7 service.
2004-03-22
KENNEDY SPACE CENTER, FLA. -- At the Astrotech Space Operations processing facilities, workers secure NASA’s MESSENGER spacecraft on a test stand. Once in place, employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will begin final processing for launch, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched aboard a Boeing Delta II rocket no earlier than July 30 on a six-year mission to study the planet Mercury.
2004-03-22
KENNEDY SPACE CENTER, FLA. -- At the Astrotech Space Operations processing facilities, workers secure NASA’s MESSENGER spacecraft on a test stand. Once in place, employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will begin final processing for launch, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched aboard a Boeing Delta II rocket no earlier than July 30 on a six-year mission to study the planet Mercury.
2004-03-22
KENNEDY SPACE CENTER, FLA. -- At the Astrotech Space Operations processing facilities, workers secure NASA’s MESSENGER spacecraft on a test stand. Once in place, employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will begin final processing for launch, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched aboard a Boeing Delta II rocket no earlier than July 30 on a six-year mission to study the planet Mercury.
2017-11-09
The Orion crew access arm is secured in a storage location at NASA's Kennedy Space Center in Florida. The access arm will be prepared for its move to the mobile launcher (ML) tower near the Vehicle Assembly Building at the center. The crew access arm will be installed at about the 274-foot level on the tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower.
2017-11-10
The Orion crew access arm is secured on a flatbed transporter for its move from a storage location at NASA's Kennedy Space Center in Florida to the mobile launcher (ML) tower near the Vehicle Assembly Building at the center. The crew access arm will be installed at about the 274-foot level on the mobile launcher tower. It will rotate from its retracted position and interface with the Orion crew hatch location to provide entry to the Orion crew module. The Ground Systems Development and Operations Program is overseeing installation of umbilicals and launch accessories on the ML tower to prepare for Exploration Mission-1.
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2011-06-01
The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.
Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now
Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
20 CFR 638.528 - Social Security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
20 CFR 638.528 - Social Security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 3 2012-04-01 2012-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
20 CFR 638.528 - Social Security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive
2017-01-01
Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components. PMID:29155668
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians monitor the progress as a crane lifts the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. The second panel is being lifted by crane and technicians are monitoring the progress as it is being moved to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility while technicians prepare to lift the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
Merrill, Rebecca D; Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive
2017-12-01
Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components.
Implementation of medical monitor system based on networks
NASA Astrophysics Data System (ADS)
Yu, Hui; Cao, Yuzhen; Zhang, Lixin; Ding, Mingshi
2006-11-01
In this paper, the development trend of medical monitor system is analyzed and portable trend and network function become more and more popular among all kinds of medical monitor devices. The architecture of medical network monitor system solution is provided and design and implementation details of medical monitor terminal, monitor center software, distributed medical database and two kind of medical information terminal are especially discussed. Rabbit3000 system is used in medical monitor terminal to implement security administration of data transfer on network, human-machine interface, power management and DSP interface while DSP chip TMS5402 is used in signal analysis and data compression. Distributed medical database is designed for hospital center according to DICOM information model and HL7 standard. Pocket medical information terminal based on ARM9 embedded platform is also developed to interactive with center database on networks. Two kernels based on WINCE are customized and corresponding terminal software are developed for nurse's routine care and doctor's auxiliary diagnosis. Now invention patent of the monitor terminal is approved and manufacture and clinic test plans are scheduled. Applications for invention patent are also arranged for two medical information terminals.
An Interoperable, Agricultural Information System Based on Satellite Remote Sensing Data
NASA Technical Reports Server (NTRS)
Teng, William; Chiu, Long; Doraiswamy, Paul; Kempler, Steven; Liu, Zhong; Pham, Long; Rui, Hualan
2005-01-01
Monitoring global agricultural crop conditions during the growing season and estimating potential seasonal production are critically important for market development of US. agricultural products and for global food security. The Goddard Space Flight Center Earth Sciences Data and Information Services Center Distributed Active Archive Center (GES DISC DAAC) is developing an Agricultural Information System (AIS), evolved from an existing TRMM Online Visualization and Analysis System (TOVAS), which will operationally provide satellite remote sensing data products (e.g., rainfall) and services. The data products will include crop condition and yield prediction maps, generated from a crop growth model with satellite data inputs, in collaboration with the USDA Agricultural Research Service. The AIS will enable the remote, interoperable access to distributed data, by using the GrADS-DODS Server (GDS) and by being compliant with Open GIS Consortium standards. Users will be able to download individual files, perform interactive online analysis, as well as receive operational data flows. AIS outputs will be integrated into existing operational decision support systems for global crop monitoring, such as those of the USDA Foreign Agricultural Service and the U.N. World Food Program.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bushmelev, Vadim; Viktorov, Vladimir; Zhikharev, Stanislav
2008-01-01
The All-Russian Scientific Research Institute of Experimental Physics (VNIIEF), founded in 1946 at the historic village of Sarov, in Nizhniy Novgorod Oblast, is the largest nuclear research center in the Rosatom complex. In the framework of international collaboration, the United States (US) Department of Energy/National Nuclear Security Agency, in cooperation with US national laboratories, on the one hand, Rosatom and VNIIEF on the other hand, have focused their cooperative efforts to upgrade the existing material protection control and accountability system to prevent unauthorized access to the nuclear material. In this paper we will discuss the present status of material controlmore » and accounting (MC&A) system upgrades and the preliminary results from a pilot program on the MC&A system performance testing that was recently conducted at one technical area.« less
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
2005-12-06
KENNEDY SPACE CENTER, FLA. -- Inside NASA Kennedy Space Center’s Orbiter Processing Facility Bay 1, workers secure the overhead crane to the sling placed round the forward reaction control system that will be installed on Atlantis. When ready, the shuttle equipment will be lifted for installation. The forward reaction control system is located in the forward fuselage nose area. During ascent of the space shuttle, it provides the thrust for attitude (rotational) maneuvers (pitch, yaw and roll) and for small velocity changes along the orbiter axis (translation maneuvers).
Single photon quantum cryptography.
Beveratos, Alexios; Brouri, Rosa; Gacoin, Thierry; Villing, André; Poizat, Jean-Philippe; Grangier, Philippe
2002-10-28
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature. The single photon pulses are emitted on demand by a single nitrogen-vacancy color center in a diamond nanocrystal. The quantum bit error rate is less that 4.6% and the secure bit rate is 7700 bits/s. The overall performances of our system reaches a domain where single photons have a measurable advantage over an equivalent system based on attenuated light pulses.
Orion EFT-1 Heat Shield Move from LASF to VAB Highbay 2
2017-04-26
The Orion heat shield from Exploration Flight Test-1, secured on a transporter, arrives at the Vehicle Assembly Building (VAB) at NASA's Kennedy Space Center in Florida. The heat shield was moved from the Launch Abort System Facility. The heat shield is being transferred from the Orion Program to the Ground Systems Development and Operations Program, Landing and Recovery Operations. In the VAB, the heat shield will be integrated with the Orion ground test article and used for future underway recovery testing.
2004-09-22
KENNEDY SPACE CENTER, FLA. - Workers attempt to secure the roof of the Tile Shop in the Thermal Protection System Facility (TPSF) in preparation for Hurricane Jeanne, which is expected to impact Central Florida Sunday. The TPSF, which creates the TPS tiles, blankets and all the internal thermal control systems for the Space Shuttles, lost approximately 35 percent of its roof during Hurricane Frances, which blew across Central Florida Sept. 4. Jeanne is the fourth hurricane in 45 days to make landfall somewhere in the state.
Orion EFT-1 Heat Shield Move from LASF to VAB Highbay 2
2017-04-26
Inside the Launch Abort System Facility at NASA's Kennedy Space Center in Florida, the Orion heat shield from Exploration Flight Test-1 is secured on a transporter and ready for its move to the Vehicle Assembly Building (VAB). The heat shield is being transferred from the Orion Program to the Ground Systems Development and Operations Program, Landing and Recovery Operations. In the VAB, the heat shield will be integrated with the Orion ground test article and used for future underway recovery testing.
Orion EFT-1 Heat Shield Move from LASF to VAB Highbay 2
2017-04-26
The Orion heat shield from Exploration Flight Test-1, secured on a transporter, departs the Launch Abort System Facility at NASA's Kennedy Space Center in Florida, for its move to the Vehicle Assembly Building (VAB). The heat shield is being transferred from the Orion Program to the Ground Systems Development and Operations Program, Landing and Recovery Operations. In the VAB, the heat shield will be integrated with the Orion ground test article and used for future underway recovery testing.
High sensitivity broadband 360GHz passive receiver for TeraSCREEN
NASA Astrophysics Data System (ADS)
Wang, Hui; Oldfield, Matthew; Maestrojuán, Itziar; Platt, Duncan; Brewster, Nick; Viegas, Colin; Alderman, Byron; Ellison, Brian N.
2016-05-01
TeraSCREEN is an EU FP7 Security project aimed at developing a combined active, with frequency channel centered at 360 GHz, and passive, with frequency channels centered at 94, 220 and 360 GHz, imaging system for border controls in airport and commercial ferry ports. The system will include automatic threat detection and classification and has been designed with a strong focus on the ethical, legal and practical aspects of operating in these environments and with the potential threats in mind. Furthermore, both the passive and active systems are based on array receivers with the active system consisting of a 16 element MIMO FMCW radar centered at 360 GHz with a bandwidth of 30 GHz utilizing a custom made direct digital synthesizer. The 16 element passive receiver system at 360 GHz uses commercial Gunn diode oscillators at 90 GHz followed by custom made 90 to 180 GHz frequency doublers supplying the local oscillator for 360 GHz sub-harmonic mixers. This paper describes the development of the passive antenna module, local oscillator chain, frequency mixers and detectors used in the passive receiver array of this system. The complete passive receiver chain is characterized in this paper.
SSBRP User Operations Facility (UOF) Overview and Development Strategy
NASA Technical Reports Server (NTRS)
Picinich, Lou; Stone, Thom; Sun, Charles; Windrem, May; Givens, John J. (Technical Monitor)
1995-01-01
This paper will present the Space Station Biological Research Project (SSBRP) User Operations Facility (UOF) architecture and development strategy. A major element of the UOF at NASA Ames Research Center, the Communication and Data System (CDS) will be the primary focus of the discussions. CDS operational, telescience, security, and development objectives will be discussed along with CDS implementation strategy. The implementation strategy discussions will include: Object Oriented Analysis & Design, System & Software Prototyping, and Technology Utilization. A CDS design overview that includes: CDS Context Diagram, CDS Architecture, Object Models, Use Cases, and User Interfaces will also be presented. CDS development brings together "cutting edge" technologies and techniques such as: object oriented development, network security, multimedia networking, web-based data distribution, JAVA, and graphical user interfaces. Use of these "cutting edge" technologies and techniques translates directly to lower development and operations costs.
Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rizy, D Tom
2009-01-01
PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis,more » resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.« less
Security Management and Safeguards Office
NASA Technical Reports Server (NTRS)
Bewley, Nathaniel M.
2004-01-01
The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.
ERIC Educational Resources Information Center
Rozalski, Michael; Drasgow, Erik; Drasgow, Fritz; Yell, Mitchell
2009-01-01
The purpose of this study was to examine the relationships among students' disruptive and violent behavior and staff's use of proactive and reactive strategies in a secure residential treatment center serving delinquent adolescent males. One hundred hours of observational data were collected, and linear regression models were used to explore the…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] A.G. Volney Center, Inc. (f/k/a Buddha Steel, Inc.), China Green Material Technologies, Inc., China Tractor Holdings, Inc., and Franklin Towers Enterprises, Inc.; Order of Suspension of Trading September 18, 2013. It appears to the Securities and Exchange Commission that there is a lack of...
Indicators of Suicide Found on Social Networks: Phase 2
2015-10-01
Engagement in Sport and Suicide Risk. Archives of Suicide Research . 11(4), pp375-390. Chioqueta, A. P. & Stiles, T. C. (2007). The relationship between...Approved for Public Distribution: Distribution Unlimited Defense Personnel and Security Research Center Defense Manpower Data Center Technical...Report 15-04 October 2015 Indicators of Suicide Found on Social Networks: Phase 2 Andrée E. Rose Defense Personnel and Security Research
2002-06-28
The Space Shuttle Endeavour, mounted securely atop one of NASA's modified Boeing 747 Shuttle Carrier Aircraft, left NASA's Dryden Flight Research Center at Edwards Air Force Base in Southern California at sunrise on Friday, June 28.
Security Assessment Simulation Toolkit (SAST) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.
2009-11-15
The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less
Genevieve S. Metson; David M. Iwaniec; Lawrence A. Baker; Elena M. Bennett; Daniel L. Childers; Dana Cordell; Nancy B. Grimm; J. Morgan Grove; Daniel A. Nidzgorski; Stuart White
2015-01-01
Phosphorus (P) is an essential fertilizer for agricultural production but is also a potent aquatic pollutant. Current P management fails to adequately address both the issue of food security due to P scarcity and P pollution threats to water bodies. As centers of food consumption and waste production, cities transport and store much P and thus provide important...
Analysis and Representation of Miscellaneous Electric Loads in NEMS
2017-01-01
Miscellaneous Electric Loads (MELs) comprise a growing portion of delivered energy consumption in residential and commercial buildings. Miscellaneous end uses—including televisions, personal computers, security systems, data center servers, and many other devices—have continued to penetrate into building-related market segments. Part of this proliferation of devices and equipment can be attributed to increased service demand for entertainment, computing, and convenience appliances.
Foreign Language Analysis and Recognition (FLARE) Progress
2015-02-01
Copies may be obtained from the Defense Technical Information Center (DTIC) (http://www.dtic.mil). AFRL- RH -WP-TR-2015-0007 HAS BEEN REVIEWED AND IS... retrieval (IR). 15. SUBJECT TERMS Automatic speech recognition (ASR), information retrieval (IR). 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...to the Haystack Multilingual Multimedia Information Extraction and Retrieval (MMIER) system that was initially developed under a prior work unit
2004-09-22
KENNEDY SPACE CENTER, FLA. - In the Reusable Launch Vehicle (RLV) Hangar, workers secure stretch sheets of plastic over racks of equipment in preparation for the arrival of Hurricane Jeanne, expected to impact Central Florida Sunday. This is the fourth hurricane in 45 days to make landfall somewhere in the state. The Thermal Protection System (TPS) Facility suffered extensive damage from Hurricane Frances, causing the relocation of equipment to the RLV.
Secure and lightweight network admission and transmission protocol for body sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Zhang, Pingxin
2013-05-01
A body sensor network (BSN) is a wireless network of biosensors and a local processing unit, which is commonly referred to as the personal wireless hub (PWH). Personal health information (PHI) is collected by biosensors and delivered to the PWH before it is forwarded to the remote healthcare center for further processing. In a BSN, it is critical to only admit eligible biosensors and PWH into the network. Also, securing the transmission from each biosensor to PWH is essential not only for ensuring safety of PHI delivery, but also for preserving the privacy of PHI. In this paper, we present the design, implementation, and evaluation of a secure network admission and transmission subsystem based on a polynomial-based authentication scheme. The procedures in this subsystem to establish keys for each biosensor are communication efficient and energy efficient. Moreover, based on the observation that an adversary eavesdropping in a BSN faces inevitable channel errors, we propose to exploit the adversary's uncertainty regarding the PHI transmission to update the individual key dynamically and improve key secrecy. In addition to the theoretical analysis that demonstrates the security properties of our system, this paper also reports the experimental results of the proposed protocol on resource-limited sensor platforms, which show the efficiency of our system in practice.
Socioeconomic Data and Applications Center | SEDAC
Themes * Agriculture * Climate * Conservation * Governance * Hazards * Health * Infrastructure * Land Use satellite imagery. Agriculture and Food Security Theme - Agriculture and Food Security Find data sets, maps , map services, featured uses of data and other resources related to Agriculture and Food Security
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.203... concerns. (a) Applicability. This section applies to: (1) Each passenger railroad carrier, including each... potential threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615...
Special report. New products that improve officer performance, safety.
1991-12-01
The need for products that improve performance of security officers is counterbalanced these days by budgetary constraints. While this may limit major investments in security systems and personnel, less costly improvements or innovations might be worth considering. In this report, we will discuss four advances that may be valuable not only in hospital security, but in other industries as well. One of them, a smoke filter, was originally developed for the hotel industry. Another, a drug detection device, may replace the use of undercover agents or drug-sniffing' dogs in certain circumstances. The third new product is an economical patrol vehicle for parking facilities which might replace more costly vehicles such as golf carts or cars. The fourth product, a roving CCTV camera, is actually being tested at a Midwest medical center and may allow you to monitor areas of parking garages with cameras instead of officers on patrol.
Climate change, resource use and food security in midcentury under a range of plausible scenarios
NASA Astrophysics Data System (ADS)
Wiebe, K.
2016-12-01
Achieving and maintaining food security at local, national and global scales is challenged by changes in population, income and climate, among other socioeconomic and biophysical drivers. Assessing these challenges and possible solutions over the coming decades requires a systematic and multidisciplinary approach. The Global Futures and Strategic Foresight program, a CGIAR initiative led by the International Food Policy Research Institute in collaboration with the 14 other CGIAR research centers, is working to improve tools and conduct ex ante assessments of promising technologies, investments and policies under alternative global futures to inform decision making in the CGIAR and its partners. Alternative socioeconomic and climate scenarios are explored using an integrated system of climate, water, crop and economic models. This presentation will share findings from recent projections of food production and prices to 2050 at global and regional scales, together with their potential implications for land and water use, food security, nutrition and health.
Review of the 2015 Drug Supply Chain Security Act
Brechtelsbauer, Erich D.; Pennell, Benjamin; Durham, Mary; Hertig, John B.; Weber, Robert J.
2016-01-01
The integrity of the pharmaceutical supply chain is threatened by medication counterfeiting, importation of unapproved and substandard drugs, and grey markets – all of which have the potential to distribute drug products with the potential for serious harm. On November 27, 2013, President Obama signed into law Title II of the Drug Quality and Security Act, now known as the Drug Supply Chain Security Act (DSCSA). Over the next 10 years, the DSCSA will require the pharmaceutical supply chain to implement medication tracking and tracing; serialization, verification, and detection of suspicious products; and strict guidelines for wholesaler licensing and reporting. This article reviews the important aspects of the DSCSA and outlines the role of health-system pharmacy leaders in ensuring compliance to the DSCSA. By verifying that medication supplies are free from adulteration and tampering, the DSCSA serves as a foundational law to ensure quality in providing patient-centered pharmacy services. PMID:27354753
Asia-Pacific Center for Security Studies Annual Report 2010
2010-01-01
focused symposium in the Maldives on combating terrorism involving officials from five South Asia nations; • A series of discussion periods in China on U.S...priorities and best practices among high-level security officials from the Republic of the Philippines, Sri Lanka, the Maldives and Mongolia; • A...international security featured as prominently in 2010 in so wide a range of security-related discussions: whether traditional security ( sinking of the
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marco Carvalho; Richard Ford
2012-05-14
Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-criticalmore » monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).« less
2008-05-03
CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, dawn reveals the arrival of space shuttle Discovery, secured atop the mobile launch platform below, at Launch Pad 39A to begin prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder
2008-05-03
CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, space shuttle Discovery, secured atop the mobile launch platform below, arrives at Launch Pad 39A to begin prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder
2008-05-03
CAPE CANAVERAL, Fla. -- This aerial view of NASA's Kennedy Space Center shows space shuttle Discovery, secured atop a mobile launch platform as it is moved into position at Launch Pad 39A to prepare for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder
2008-05-03
CAPE CANAVERAL, Fla. -- At NASA's Kennedy Space Center, the sun rises upon the arrival of space shuttle Discovery, secured atop the mobile launch platform below, at Launch Pad 39A to begin prelaunch processing for the STS-124 mission. The 3.4-mile journey from the Vehicle Assembly Building began at 11:47 p.m. on May 2. The shuttle arrived at the launch pad at 4:25 a.m. EDT May 3 and was secured, or hard down, by 6:06 a.m. On the 13-day mission, Discovery and its crew will deliver the Japan Aerospace Exploration Agency's Japanese Experiment Module – Pressurized Module and the Japanese Remote Manipulator System. Launch is targeted for May 31. Photo credit: NASA/Troy Cryder
Proposing Telecardiology Services on Cloud for Different Medical Institutions: A Model of Reference.
de la Torre-Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Rodrigues, Joel J P C
2017-08-01
For a cloud-based telecardiology solution to be established in any scenario, it is necessary to ensure optimum levels of security, as patient's data will not be in the same place from where access is gained. The main objective of this article is to present a secure, cloud-based solution for a telecardiology service in different scenarios: a hospital, a health center in a city, and a group of health centers in a rural area. iCanCloud software is used to simulate the scenarios. The first scenario will be a city hospital with over 220,000 patients at its emergency services, and ∼1 million outpatient consultations. For the health center in a city, it serves ∼107,000 medical consultations and 16,700 pediatric consultations/year. In the last scenario, a group of health centers in a rural area serve an average 437.08 consultations/month and around 15.6 a day. Each one of the solutions proposed shares common features including the following: secure authentication through smart cards, the use of StorageGRID technology, and load balancers. For all cases, the cloud is private and the estimated price of the solution would cost around 450 €/month. Thanks to the research conducted in this work, it has been possible to provide an adapted solution in the form of a telecardiology service for a hospital, city health center, and rural health centers that offer security, privacy, and robustness, and is also optimum for a large number of cloud requests.
National Center for Nuclear Security - NCNS
None
2018-01-16
As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.
Field studies of safety security rescue technologies through training and response activities
NASA Astrophysics Data System (ADS)
Murphy, Robin R.; Stover, Sam
2006-05-01
This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.
Compact Microscope Imaging System Developed
NASA Technical Reports Server (NTRS)
McDowell, Mark
2001-01-01
The Compact Microscope Imaging System (CMIS) is a diagnostic tool with intelligent controls for use in space, industrial, medical, and security applications. The CMIS can be used in situ with a minimum amount of user intervention. This system, which was developed at the NASA Glenn Research Center, can scan, find areas of interest, focus, and acquire images automatically. Large numbers of multiple cell experiments require microscopy for in situ observations; this is only feasible with compact microscope systems. CMIS is a miniature machine vision system that combines intelligent image processing with remote control capabilities. The software also has a user-friendly interface that can be used independently of the hardware for post-experiment analysis. CMIS has potential commercial uses in the automated online inspection of precision parts, medical imaging, security industry (examination of currency in automated teller machines and fingerprint identification in secure entry locks), environmental industry (automated examination of soil/water samples), biomedical field (automated blood/cell analysis), and microscopy community. CMIS will improve research in several ways: It will expand the capabilities of MSD experiments utilizing microscope technology. It may be used in lunar and Martian experiments (Rover Robot). Because of its reduced size, it will enable experiments that were not feasible previously. It may be incorporated into existing shuttle orbiter and space station experiments, including glove-box-sized experiments as well as ground-based experiments.
Forging a poison prevention and control system: report of an Institute of Medicine committee.
Guyer, Bernard; Mavor, Anne
2005-01-01
The Committee forged a vision for a national poison prevention and control system that broadly integrates the current network of poison control centers with state and local public health departments responsible for monitoring populations. Implementing the Committee's recommendations, however, will require leadership from the Congress and the federal agencies to whom the report is addressed: HRSA and CDC. The next steps include amendments to existing legislation to establish the national system and to secure federal funding to assure stability of the system and systematic oversight by the federal agencies to hold all parties accountable for the performance of the system.
2014-12-18
CAPE CANAVERAL, Fla. -- NASA's Orion spacecraft arrives at the Launch Abort System Facility at Kennedy Space Center in Florida. The spacecraft was transported 2,700 miles overland from Naval Base San Diego in California, on a flatbed truck secured in its crew module transportation fixture for the trip. During its first flight test, Orion completed a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts. For more information, visit www.nasa.gov/orion. Photo credit: NASA/Kim Shiflett
2014-12-18
CAPE CANAVERAL, Fla. -- NASA's Orion spacecraft arrives inside the Launch Abort System Facility at Kennedy Space Center in Florida. The spacecraft was transported 2,700 miles overland from Naval Base San Diego in California, on a flatbed truck secured in its crew module transportation fixture for the trip. During its first flight test, Orion completed a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts. For more information, visit www.nasa.gov/orion. Photo credit: NASA/Kim Shiflett
Orion Washdown & Arrival at LASF
2014-12-18
NASA's Orion crew module, enclosed in its crew module transportation fixture and secured on a flatbed truck, leaves the Multi-Operation Support Building and is being transported to the Launch Abort System Facility at NASA's Kennedy Space Center in Florida. Orion was transported 2,700 miles overland from Naval Base San Diego in California. Orion was recovered from the Pacific Ocean after completing a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts.
2014-12-18
CAPE CANAVERAL, Fla. -- NASA's Orion spacecraft arrives at the Launch Abort System Facility at Kennedy Space Center in Florida. The spacecraft was transported 2,700 miles overland from Naval Base San Diego in California, on a flatbed truck secured in its crew module transportation fixture for the trip. During its first flight test, Orion completed a two-orbit, four-and-a-half hour mission Dec. 5 to test systems critical to crew safety, including the launch abort system, the heat shield and the parachute system. The Ground Systems Development and Operations Program led the recovery, offload and transportation efforts. For more information, visit www.nasa.gov/orion. Photo credit: NASA/Kim Shiflett
2004-08-05
KENNEDY SPACE CENTER, FLA. - Dave Saleeba, assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters, speaks to guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 2 2012-10-01 2012-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 42 Public Health 2 2014-10-01 2014-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 2 2013-10-01 2013-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 2 2011-10-01 2011-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
Security Controls Hurt Research, NAS Warns.
ERIC Educational Resources Information Center
Kolata, Gina
1982-01-01
A National Academy of Sciences (NAS) report found no evidence that leaks of technical information from universities or other research centers have damaged national security. However, in areas where control is warranted, decisions should be based on criteria. These criteria and issues related to security control and technological transfer are…
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
2005-06-01
as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined
Finding Effective Responses Against Cyber Attacks for Divided Nations
2015-12-01
Coordination Center LTE Long Term Evolution MAC Media Access Control MCRC Master Control and Reporting Center MEI Ministry of Electronics...satellites that aid Internet connections. Individual users can access the Internet via not only a wired connection up to 1 Gbps, but also by 4G LTE ...operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public
Security practices and regulatory compliance in the healthcare industry.
Kwon, Juhee; Johnson, M Eric
2013-01-01
Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.
Security practices and regulatory compliance in the healthcare industry
Kwon, Juhee; Johnson, M Eric
2013-01-01
Objective Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. Design We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. Measurement We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Results Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Conclusions Hospitals in the highest level of compliance were significantly managing third parties’ breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption. PMID:22955497
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian
2017-01-01
NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.
Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future
NASA Astrophysics Data System (ADS)
Missal, D.
2012-09-01
The Intelligence Reform and Terrorism Prevention Act, passed by Congress in 2004, established the expectation that the "vast intelligence enterprise" of the United States would become more unified, coordinated, and effective. This law charged the intelligence community and government agencies to integrate foreign intelligence and domestic US intelligence components to reduce gaps in understanding threats to our national security and to improve our reaction. This intelligence strategy — designed to provide more comprehensive and accurate intelligence analysis—substantially increases requirements for secure data sharing capabilities. An information system must be Certified & Accredited (C&A) by the appropriate Accreditation Authority in accordance with each Authority's prescribed compliance requirements and governance. Cross-Domain Solutions (CDSs) can provide the ability to share data between multiple operating domains (e.g. among users on Top Secret and Secret networks). However, sharing sensitive data across security domains and networks has been impeded by both technical and cultural challenges. A viable CDS requires a tremendous investment for initial C&A and many solutions are limited with respect to the integration of an organization's applications. As a result, most of today's highly secured systems have been designed to restrict access to entire user populations rather than implement data sharing on the basis of mandatory access controls and an individual's need-to-know. Most CDSs today are based on one-way replication through data transfer guards that copy data from one network to another. This model inherently builds in additional and extensive Operations and Maintenance (O&M) costs. Oracle's National Security Group challenged its top engineers and security architects to engineer the first Cross-Domain database providing a practical and robust solution to the Cross-Domain security problem. The result is the MLSpOC, which is deployed, fielded, and accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.
Airport Remote Tower Sensor Systems
NASA Technical Reports Server (NTRS)
Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin
2006-01-01
Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.
Computer Center: Setting Up a Microcomputer Center--1 Person's Perspective.
ERIC Educational Resources Information Center
Duhrkopf, Richard, Ed.; Collins, Michael, A. J., Ed.
1988-01-01
Considers eight components to be considered in setting up a microcomputer center for use with college classes. Discussions include hardware, software, physical facility, furniture, technical support, personnel, continuing financial expenditures, and security. (CW)
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
Addressing software security risk mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2003-01-01
The NASA Office of Safety and Mission Assurance (OSMA) has funded the Jet Propulsion Laboratory (JPL) with a Center Initiative, 'Reducing Software Security Risk through an Integrated Approach' (RSSR), to address this need. The Initiative is a formal approach to addressing software security in the life cycle through the instantiation of a Software Security Assessment Instrument (SSAI) for the development and maintenance life cycles.
Sem, Richard D
2016-10-01
When a hospital suffers a serious loss or act of violence, the blame frequently centers on the facility's Security Department, but, as the author, a longtime security consultant, points out, there's plenty of blame to go around--including Administration at all levels, and employees, both clinical and non clinical. In this article, he presents the many reasons why security can fail and what should be done to prevent such failure.
NASA Technical Reports Server (NTRS)
Koelbl, Terry G.; Ponchak, Denise; Lamarche, Teresa
2002-01-01
The field of digital avionics experienced another year of important advances in civil aviation, military systems, and space applications. As a result of the events of 9/11/2001, NASA has pursued activities to apply its aerospace technologies toward improved aviation security. Both NASA Glenn Research Center and Langley Research Center have performed flight research demonstrations using advanced datalink concepts to transmit live pictures from inside a jetliner, and to downlink the contents of the plane's 'black box' recorder in real time. The U.S. Navy and General Electric demonstrated survivable engine control (SEC) algorithms during engine ground tests at the Weapons Survivability Laboratory at China Lake. The scientists at Boeing Satellite Systems advanced the field of stellar inertial technology with the development of a new method for positioning optical star trackers on satellites.
77 FR 26024 - National Maritime Security Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... Maritime Intelligence Center and in open session at the American Bureau of Shipping, 1400 Key Blvd., Suite... Guard to continue deliberations and make forward progress regarding multiple maritime security...
Knowledge management: Role of the the Radiation Safety Information Computational Center (RSICC)
NASA Astrophysics Data System (ADS)
Valentine, Timothy
2017-09-01
The Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL) is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 software packages that have been provided by code developers from various federal and international agencies. RSICC's customers (scientists, engineers, and students from around the world) obtain access to such computing codes (source and/or executable versions) and processed nuclear data files to promote on-going research, to ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programs both domestically and internationally, as the majority of RSICC's customers are students attending U.S. universities. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S) tools that support both domestic and international activities. This presentation will provide a general review of RSICC's activities, services, and systems that support knowledge management and education and training in the nuclear field.
NASA Technical Reports Server (NTRS)
Senter, H. F.
1984-01-01
Tool alines center of new hold with existing hole. Tool marks center of new hole drilled while workpiece is in place. Secured with bolts while hole center marked with punch. Used for field installations where reference points unavailable or work area cramped and not easily accessible with conventional tools.
Food Insecurity in Homeless Families in the Paris Region (France): Results from the ENFAMS Survey
Martin-Fernandez, Judith; Lioret, Sandrine; Vuillermoz, Cécile; Vandentorren, Stéphanie
2018-01-01
The number of families living in shelters in the Paris region (France) has increased by a factor of three in 10 years. In 2013, a survey was performed on homeless families in order to characterize their living conditions, their health needs, and the developmental problems in children. This probability survey was conducted in 17 languages among 801 homeless families sheltered in emergency centers for asylum-seekers, emergency housing centers, social rehabilitation centers, and social hotels in the Paris region. Among the 772 families that provided data on food security only 14.0% were with food security, whereas 43.3% were with low food security and 9.8% with very low food security (a situation where children are also affected). Stratified multivariate robust Poisson models showed that some characteristics are associated with a higher risk of food insecurity and/or of falling into very low food security, such as residential instability, single parenthood, having more than three children, depressive symptoms, housing in social hostels, and difficult access to cheap or free food locally. Given the wealth of the Paris region, resources and programs should be concentrated on improving the living situation of this vulnerable population. It needs better detection of these families, a closer social follow-up, and an increase in food aid. PMID:29495563
2009-06-10
CAPE CANAVERAL, Fla. – Workers at NASA's Kennedy Space Center in Florida secure a new window on the Firing Room in the Launch Control Center. New, hurricane-rated window systems for the four Firing Rooms and the vestibule areas between Firing Rooms 1 & 2 and Firing Rooms 3 & 4 are being installed. In order to avoid operational impacts the new windows are being installed on the outside of the existing windows, enclosing the space formerly occupied by the louvers. The old windows will remain in place until the new windows are completely installed and leak tested. This approach will continue to keep the firing rooms from being exposed to the elements. Photo credit: NASA/Jack Pfaller
NASA Technical Reports Server (NTRS)
Davis, V. Leon; Nordeen, Ross
1988-01-01
A laboratory for developing robotics technology for hazardous and repetitive Shuttle and payload processing activities is discussed. An overview of the computer hardware and software responsible for integrating the laboratory systems is given. The center's anthropomorphic robot is placed on a track allowing it to be moved to different stations. Various aspects of the laboratory equipment are described, including industrial robot arm control, smart systems integration, the supervisory computer, programmable process controller, real-time tracking controller, image processing hardware, and control display graphics. Topics of research include: automated loading and unloading of hypergolics for space vehicles and payloads; the use of mobile robotics for security, fire fighting, and hazardous spill operations; nondestructive testing for SRB joint and seal verification; Shuttle Orbiter radiator damage inspection; and Orbiter contour measurements. The possibility of expanding the laboratory in the future is examined.
Securing the User's Work Environment
NASA Technical Reports Server (NTRS)
Cardo, Nicholas P.
2004-01-01
High performance computing at the Numerical Aerospace Simulation Facility at NASA Ames Research Center includes C90's, J90's and Origin 2000's. Not only is it necessary to protect these systems from outside attacks, but also to provide a safe working environment on the systems. With the right tools, security anomalies in the user s work environment can be deleted and corrected. Validating proper ownership of files against user s permissions, will reduce the risk of inadvertent data compromise. The detection of extraneous directories and files hidden amongst user home directories is important for identifying potential compromises. The first runs of these utilities detected over 350,000 files with problems. With periodic scans, automated correction of problems takes only minutes. Tools for detecting these types of problems as well as their development techniques will be discussed with emphasis on consistency, portability and efficiency for both UNICOS and IRIX.
IMIRSEL: a secure music retrieval testing environment
NASA Astrophysics Data System (ADS)
Downie, John S.
2004-10-01
The Music Information Retrieval (MIR) and Music Digital Library (MDL) research communities have long noted the need for formal evaluation mechanisms. Issues concerning the unavailability of freely-available music materials have greatly hindered the creation of standardized test collections with which these communities could scientifically assess the strengths and weaknesses of their various music retrieval techniques. The International Music Information Retrieval Systems Evaluation Laboratory (IMIRSEL) is being developed at the University of Illinois at Urbana-Champaign (UIUC) specifically to overcome this hindrance to the scientific evaluation of MIR/MDL systems. Together with its subsidiary Human Use of Music Information Retrieval Systems (HUMIRS) project, IMIRSEL will allow MIR/MDL researchers access to the standardized large-scale collection of copyright-sensitive music materials and standardized test queries being housed at UIUC's National Center for Supercomputing Applications (NCSA). Virtual Research Labs (VRL), based upon NCSA's Data-to-Knowledge (D2K) tool set, are being developed through which MIR/MDL researchers will interact with the music materials under a "trusted code" security model.
Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook
2016-05-01
In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.
Hyperspectral Systems Increase Imaging Capabilities
NASA Technical Reports Server (NTRS)
2010-01-01
In 1983, NASA started developing hyperspectral systems to image in the ultraviolet and infrared wavelengths. In 2001, the first on-orbit hyperspectral imager, Hyperion, was launched aboard the Earth Observing-1 spacecraft. Based on the hyperspectral imaging sensors used in Earth observation satellites, Stennis Space Center engineers and Institute for Technology Development researchers collaborated on a new design that was smaller and used an improved scanner. Featured in Spinoff 2007, the technology is now exclusively licensed by Themis Vision Systems LLC, of Richmond, Virginia, and is widely used in medical and life sciences, defense and security, forensics, and microscopy.
FLTSATCOM interoperability applications
NASA Astrophysics Data System (ADS)
Woolford, Lynn
A mobile Fleet Satellite Communications (FLTSATCOM) system called the Mobile Operational Control Center (MOCC) was developed which has demonstrated the ability to be interoperable with many of the current FLTSATCOM command and control channels. This low-cost system is secure in all its communications, is lightweight, and provides a gateway for other communications formats. The major elements of this system are made up of a personal computer, a protocol microprocessor, and off-the-shelf mobile communication components. It is concluded that with both FLTSATCOM channel protocol and data format interoperability, the MOCC has the ability provide vital information in or near real time, which significantly improves mission effectiveness.
International Space Station (ISS)
2001-04-24
This is a Space Shuttle STS-100 mission onboard photograph. Astronaut Scott Parazynski totes a Direct Current Switching Unit while anchored on the end of the Canadian-built Remote Manipulator System (RMS) robotic arm. The RMS is in the process of moving Parazynski to the exterior of the Destiny laboratory (right foreground), where he will secure the spare unit, a critical part of the station's electrical system, to the stowage platform in case future crews will need it. Also in the photograph are the Italian-built Raffaello multipurpose Logistics Module (center) and the new Canadarm2 (lower right) or Space Station Remote Manipulator System.
Securing Ground Data System Applications for Space Operations
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.; Tso, Kam S.; Johnson, Bryan
2014-01-01
The increasing prevalence and sophistication of cyber attacks has prompted the Multimission Ground Systems and Services (MGSS) Program Office at Jet Propulsion Laboratory (JPL) to initiate the Common Access Manager (CAM) effort to protect software applications used in Ground Data Systems (GDSs) at JPL and other NASA Centers. The CAM software provides centralized services and software components used by GDS subsystems to meet access control requirements and ensure data integrity, confidentiality, and availability. In this paper we describe the CAM software; examples of its integration with spacecraft commanding software applications and an information management service; and measurements of its performance and reliability.
2006-06-30
KENNEDY SPACE CENTER, FLA. - In the Space Station Processing Facility at NASA's Kennedy Space Center, John Hoog reaches for a container filled with prepared meals for the crew of mission STS-121 to secure it for flight. Hoog is a USA-FCE/EVA representative from Johnson Space Center. Astronauts select their own menus from a large array of food items. Astronauts are supplied with three balanced meals, plus snacks. Foods flown on space missions are researched and developed at the Space Food Systems Laboratory at the Johnson Space Center (JSC) in Houston, which is staffed by food scientists, dietitians and engineers. Foods are analyzed through nutritional analysis, sensory evaluation, storage studies, packaging evaluations and many other methods. Each astronaut’s food is stored aboard the space shuttle and is identified by a colored dot affixed to each package. Launch of Space Shuttle Discovery on mission STS-121 is scheduled for July 1. Photo credit: NASA/Jack Pfaller
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
The Orion Exploration Mission-1 (EM-1) structural test article, inside its transport container, is secured in NASA's Super Guppy aircraft at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
The Orion Exploration Mission-1 (EM-1) structural test article, secured inside its transport container, is loaded into NASA's Super Guppy aircraft at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
MDA DS COI Spiral 3 - NOA, SILO and ABAC
2009-06-01
agencies. The National Plan to Achieve MDA, a by-product of the Maritime Security Policy, established the national maritime common operating picture...information about vessels determined to be of interest by intelligence and operational organizations and is normally classified or highly sensitive. Exposing...makes it available to its users. For Spiral 3, the Coast Guard team, consisting of CG-26, the Operations Systems Center (OSC), and the Coast Guard