Sample records for transport layer security

  1. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  2. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  3. Authentication Binding between SSL/TLS and HTTP

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  4. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network

    PubMed Central

    Yang, Bin; Zhang, Jianfeng

    2017-01-01

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588

  5. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    PubMed

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  6. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  7. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    NASA Astrophysics Data System (ADS)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  8. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  9. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    PubMed

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  10. Location Management in a Transport Layer Mobility Architecture

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Ishac, Joseph

    2005-01-01

    Mobility architectures that place complexity in end nodes rather than in the network interior have many advantageous properties and are becoming popular research topics. Such architectures typically push mobility support into higher layers of the protocol stack than network layer approaches like Mobile IP. The literature is ripe with proposals to provide mobility services in the transport, session, and application layers. In this paper, we focus on a mobility architecture that makes the most significant changes to the transport layer. A common problem amongst all mobility protocols at various layers is location management, which entails translating some form of static identifier into a mobile node's dynamic location. Location management is required for mobile nodes to be able to provide globally-reachable services on-demand to other hosts. In this paper, we describe the challenges of location management in a transport layer mobility architecture, and discuss the advantages and disadvantages of various solutions proposed in the literature. Our conclusion is that, in principle, secure dynamic DNS is most desirable, although it may have current operational limitations. We note that this topic has room for further exploration, and we present this paper largely as a starting point for comparing possible solutions.

  11. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  12. Nature, theory and modelling of geophysical convective planetary boundary layers

    NASA Astrophysics Data System (ADS)

    Zilitinkevich, Sergej

    2015-04-01

    Geophysical convective planetary boundary layers (CPBLs) are still poorly reproduced in oceanographic, hydrological and meteorological models. Besides the mean flow and usual shear-generated turbulence, CPBLs involve two types of motion disregarded in conventional theories: 'anarchy turbulence' comprised of the buoyancy-driven plumes, merging to form larger plumes instead of breaking down, as postulated in conventional theory (Zilitinkevich, 1973), large-scale organised structures fed by the potential energy of unstable stratification through inverse energy transfer in convective turbulence (and performing non-local transports irrespective of mean gradients of transporting properties). C-PBLs are strongly mixed and go on growing as long as the boundary layer remains unstable. Penetration of the mixed layer into the weakly turbulent, stably stratified free flow causes turbulent transports through the CPBL outer boundary. The proposed theory, taking into account the above listed features of CPBL, is based on the following recent developments: prognostic CPBL-depth equation in combination with diagnostic algorithm for turbulence fluxes at the CPBL inner and outer boundaries (Zilitinkevich, 1991, 2012, 2013; Zilitinkevich et al., 2006, 2012), deterministic model of self-organised convective structures combined with statistical turbulence-closure model of turbulence in the CPBL core (Zilitinkevich, 2013). It is demonstrated that the overall vertical transports are performed mostly by turbulence in the surface layer and entrainment layer (at the CPBL inner and outer boundaries) and mostly by organised structures in the CPBL core (Hellsten and Zilitinkevich, 2013). Principal difference between structural and turbulent mixing plays an important role in a number of practical problems: transport and dispersion of admixtures, microphysics of fogs and clouds, etc. The surface-layer turbulence in atmospheric and marine CPBLs is strongly enhanced by the velocity shears in horizontal branches of organised structures. This mechanism (Zilitinkevich et al., 2006), was overlooked in conventional local theories, such as the Monin-Obukhov similarity theory, and convective heat/mass transfer law: Nu~Ra1/3, where Nu and Ra are the Nusselt number and Raleigh numbers. References Hellsten A., Zilitinkevich S., 2013: Role of convective structures and background turbulence in the dry convective boundary layer. Boundary-Layer Meteorol. 149, 323-353. Zilitinkevich, S.S., 1973: Shear convection. Boundary-Layer Meteorol. 3, 416-423. Zilitinkevich, S.S., 1991: Turbulent Penetrative Convection, Avebury Technical, Aldershot, 180 pp. Zilitinkevich S.S., 2012: The Height of the Atmospheric Planetary Boundary layer: State of the Art and New Development - Chapter 13 in 'National Security and Human Health Implications of Climate Change', edited by H.J.S. Fernando, Z. Klaić, J.L. McKulley, NATO Science for Peace and Security Series - C: Environmental Security (ISBN 978-94-007-2429-7), Springer, 147-161. Zilitinkevich S.S., 2013: Atmospheric Turbulence and Planetary Boundary Layers. Fizmatlit, Moscow, 248 pp. Zilitinkevich, S.S., Hunt, J.C.R., Grachev, A.A., Esau, I.N., Lalas, D.P., Akylas, E., Tombrou, M., Fairall, C.W., Fernando, H.J.S., Baklanov, and A., Joffre, S.M., 2006: The influence of large convective eddies on the surface layer turbulence. Quart. J. Roy. Met. Soc. 132, 1423-1456. Zilitinkevich S.S., Tyuryakov S.A., Troitskaya Yu. I., Mareev E., 2012: Theoretical models of the height of the atmospheric planetary boundary layer and turbulent entrainment at its upper boundary. Izvestija RAN, FAO, 48, No.1, 150-160 Zilitinkevich, S.S., Elperin, T., Kleeorin, N., Rogachevskii, I., Esau, I.N., 2013: A hierarchy of energy- and flux-budget (EFB) turbulence closure models for stably stratified geophysical flows. Boundary-Layer Meteorol. 146, 341-373.

  13. Security, privacy, and confidentiality issues on the Internet

    PubMed Central

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  14. Security, privacy, and confidentiality issues on the Internet.

    PubMed

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  15. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  16. Federation for a Secure Enterprise

    DTIC Science & Technology

    2016-09-10

    12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier

  17. Physical-layer encryption on the public internet: A stochastic approach to the Kish-Sethuraman cipher

    NASA Astrophysics Data System (ADS)

    Gunn, Lachlan J.; Chappell, James M.; Allison, Andrew; Abbott, Derek

    2014-09-01

    While information-theoretic security is often associated with the one-time pad and quantum key distribution, noisy transport media leave room for classical techniques and even covert operation. Transit times across the public internet exhibit a degree of randomness, and cannot be determined noiselessly by an eavesdropper. We demonstrate the use of these measurements for information-theoretically secure communication over the public internet.

  18. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  19. An Analysis of the Computer Security Ramifications of Weakened Asymmetric Cryptographic Algorithms

    DTIC Science & Technology

    2012-06-01

    OpenVPN (Yonan). TLS (and by extension SSL) obviously rely on encryption to provide the confidentiality, integrity and authentication services it...Secure Shell (SSH) Transport Layer Protocol.” IETF, Jan. 2006. <tools.ietf.org/html/rfc4253> Yonan, James, and Mattock. " OpenVPN ." SourceForge...11 May 2012. <http://sourceforge.net/projects/ openvpn /> 92 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 The public reporting

  20. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  1. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  2. 75 FR 76428 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ..., country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other... to populate and maintain personal data elements in DoD Component networks and systems, such as.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...

  3. SSL/TLS Vulnerability Detection Using Black Box Approach

    NASA Astrophysics Data System (ADS)

    Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.

    2018-03-01

    Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.

  4. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  5. 75 FR 69644 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ..., organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other mobile, other.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion detection and prevention systems and log monitoring. Complete access to all records is restricted to and...

  6. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Leeuwen, Brian P.; Eldridge, John M.

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less

  7. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    DTIC Science & Technology

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  8. Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis

    DTIC Science & Technology

    2011-09-15

    Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle ( MitM ) attacks is imperative to...keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting...mechanism a user has against a MitM . The goal for this research is to determine if a time threshold exists that can indicate the presence of a MitM in this

  9. Environmental Technology Verification Report for Private Pallet Security Systems, LLC. MultiTrack™ Layered Tracking Systems

    EPA Science Inventory

    This test simulated shipments of hazardous waste contained in polyethylene (poly) drums, metal drums, and corrugated boxes through routine land transportation routes and across international ports of entry in the El Paso/Ciudad Juarez trade area. RFID tags were attached to four ...

  10. 75 FR 69645 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ..., pager, Defense Switched Network (DSN) phone, other fax, other mobile, other pager, city, zip code, post... system may used to populate and maintain persona data elements in DoD component networks and systems.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...

  11. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  12. An explosives detection system for airline security using coherent x-ray scattering technology

    NASA Astrophysics Data System (ADS)

    Madden, Robert W.; Mahdavieh, Jacob; Smith, Richard C.; Subramanian, Ravi

    2008-08-01

    L-3 Communications Security and Detection Systems (SDS) has developed a new system for automated alarm resolution in airline baggage Explosive Detection Systems (EDS) based on coherent x-ray scattering spectroscopy. The capabilities of the system were demonstrated in tests with concealed explosives at the Transportation Security Laboratory and airline passenger baggage at Orlando International Airport. The system uses x-ray image information to identify suspicious objects and performs targeted diffraction measurements to classify them. This extra layer of detection capability affords a significant reduction in the rate of false alarm objects that must presently be resolved by opening passenger bags for hand inspection.

  13. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  14. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOEpatents

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  15. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less

  16. 49 CFR 1580.201 - Rail security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Rail security coordinator. 1580.201 Section 1580.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION...

  17. 49 CFR 1580.201 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Rail security coordinator. 1580.201 Section 1580.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION...

  18. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  19. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  20. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  1. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  2. 49 CFR 1548.13 - Security coordinators.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...

  3. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES...

  4. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  5. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  6. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  7. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  8. 49 CFR 1544.215 - Security coordinators.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...

  9. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Sensitive security information. 1520.5 Section 1520.5 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF...

  10. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Fees for security threat assessment. 1540.209 Section 1540.209 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY...

  11. About the Transportation Secure Data Center | Transportation Secure Data

    Science.gov Websites

    Center | NREL About the Transportation Secure Data Center About the Transportation Secure Data Center The Transportation Secure Data Center (TSDC) makes vital transportation data broadly available large, colorful map of the United States. NREL data experts and engineers analyze large sets of complex

  12. Bio-Fluid Transport Models Through Nano and Micro-Fluidic Components

    DTIC Science & Technology

    2005-08-01

    nm of the wall in steady electroosmotic flow with good accuracy. The nPIV data were in excellent agreement with the model predictions for monovalent...first experimental probe inside the electric double layer in electroosmotic flow of an aqueous electrolyte solution. 15. NUMBER OF PAGES 225 14...SUBJECT TERMS Micro And Nanofluidics, Electroosmotic Flow, Nano Particle Image Velocimetry 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT

  13. 49 CFR 1540.207 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false [Reserved] 1540.207 Section 1540.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security...

  14. 49 CFR 1522.5 - TSA inspection authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threats to transportation; (ii) Enforce security-related regulations, directives, and requirements: (iii... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS...

  15. 49 CFR 1572.203 - Transportation of explosives from Canada to the United States via railroad carrier.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...

  16. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Procedures for security threat assessment. 1540.205 Section 1540.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...

  17. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  18. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  19. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  20. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  1. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  2. A wireless electronic monitoring system for securing milk from farm to processor

    NASA Astrophysics Data System (ADS)

    Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin

    2008-04-01

    The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.

  3. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  4. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  5. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  6. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  7. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  8. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    ERIC Educational Resources Information Center

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, P. W.

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. 49 CFR 1520.1 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY... of records and information that TSA has determined to be Sensitive Security Information, as defined...

  11. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  12. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  13. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  14. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  15. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  16. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Public advisories. 1542.305 Section 1542.305 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305...

  17. Comprehensive security framework for the communication and storage of medical images

    NASA Astrophysics Data System (ADS)

    Slik, David; Montour, Mike; Altman, Tym

    2003-05-01

    Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.

  18. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  19. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  20. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  1. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  2. 49 CFR 1572.500 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC... Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part...

  3. 49 CFR 1520.13 - Marking SSI.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.13 Marking SSI. (a) Marking of paper records. In the case of paper records...

  4. 49 CFR 1520.19 - Destruction of SSI.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.19 Destruction of SSI. (a) DHS. Subject to the requirements of the Federal...

  5. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  6. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  7. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  8. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  9. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  10. 49 CFR 1540.3 - Delegation of authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Delegation of authority. 1540.3 Section 1540.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES General § 1540...

  11. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  12. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...

  13. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  14. 49 CFR 1548.3 - TSA inspection authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., foreign air carrier, indirect air carrier, or airport tenant with— (1) This subchapter, and any security... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.3 TSA inspection...

  15. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  16. 49 CFR 1548.3 - TSA inspection authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., foreign air carrier, indirect air carrier, or airport tenant with— (1) This subchapter, and any security... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.3 TSA inspection...

  17. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  18. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  19. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  20. 49 CFR 1548.3 - TSA inspection authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., foreign air carrier, indirect air carrier, or airport tenant with— (1) This subchapter, and any security... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.3 TSA inspection...

  1. 49 CFR 1548.3 - TSA inspection authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., foreign air carrier, indirect air carrier, or airport tenant with— (1) This subchapter, and any security... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.3 TSA inspection...

  2. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  3. 49 CFR 1548.3 - TSA inspection authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., foreign air carrier, indirect air carrier, or airport tenant with— (1) This subchapter, and any security... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.3 TSA inspection...

  4. 49 CFR 1542.101 - General requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...

  5. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  6. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  7. 49 CFR 1544.409 - Integrity of screener tests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Integrity of screener tests. 1544.409 Section 1544.409 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Screener...

  8. A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security

    NASA Astrophysics Data System (ADS)

    Okamoto, Eiji

    Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.

  9. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    DOT National Transportation Integrated Search

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  10. 49 CFR 1546.409 - Integrity of screener tests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Integrity of screener tests. 1546.409 Section 1546.409 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Screener Qualifications When the Foreign Air...

  11. 49 CFR 1510.11 - Handling of security service fees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  12. 49 CFR 1520.11 - Persons with a need to know.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.11 Persons with a need to know. (a) In general. A person has a need to...

  13. 49 CFR 1510.7 - Air transportation advertisements and solicitations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Air transportation advertisements and solicitations. 1510.7 Section 1510.7 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE...

  14. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  15. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  16. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  17. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...

  18. Performance Evaluation Model for Application Layer Firewalls.

    PubMed

    Xuan, Shichang; Yang, Wu; Dong, Hui; Zhang, Jiangchuan

    2016-01-01

    Application layer firewalls protect the trusted area network against information security risks. However, firewall performance may affect user experience. Therefore, performance analysis plays a significant role in the evaluation of application layer firewalls. This paper presents an analytic model of the application layer firewall, based on a system analysis to evaluate the capability of the firewall. In order to enable users to improve the performance of the application layer firewall with limited resources, resource allocation was evaluated to obtain the optimal resource allocation scheme in terms of throughput, delay, and packet loss rate. The proposed model employs the Erlangian queuing model to analyze the performance parameters of the system with regard to the three layers (network, transport, and application layers). Then, the analysis results of all the layers are combined to obtain the overall system performance indicators. A discrete event simulation method was used to evaluate the proposed model. Finally, limited service desk resources were allocated to obtain the values of the performance indicators under different resource allocation scenarios in order to determine the optimal allocation scheme. Under limited resource allocation, this scheme enables users to maximize the performance of the application layer firewall.

  19. A New Theory of Mix in Omega Capsule Implosions

    NASA Astrophysics Data System (ADS)

    Knoll, Dana; Chacon, Luis; Rauenzahn, Rick; Simakov, Andrei; Taitano, William; Welser-Sherrill, Leslie

    2014-10-01

    We put forth a new mix model that relies on the development of a charge-separation electrostatic double-layer at the fuel-pusher interface early in the implosion of an Omega plastic ablator capsule. The model predicts a sizable pusher mix (several atom %) into the fuel. The expected magnitude of the double-layer field is consistent with recent radial electric field measurements in Omega plastic ablator implosions. Our theory relies on two distinct physics mechanisms. First, and prior to shock breakout, the formation of a double layer at the fuel-pusher interface due to fast preheat-driven ionization. The double-layer electric field structure accelerates pusher ions fairly deep into the fuel. Second, after the double-layer mix has occurred, the inward-directed fuel velocity and temperature gradients behind the converging shock transports these pusher ions inward. We first discuss the foundations of this new mix theory. Next, we discuss our interpretation of the radial electric field measurements on Omega implosions. Then we discuss the second mechanism that is responsible for transporting the pusher material, already mixed via the double-layer deep into the fuel, on the shock convergence time scale. Finally we make a connection to recent mix motivated experimental data on. This work conducted under the auspices of the National Nuclear Security Administration of the U.S. Department of Energy at Los Alamos National Laboratory, managed by LANS, LLC under Contract DE-AC52-06NA25396.

  20. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  1. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  2. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  3. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    NASA Astrophysics Data System (ADS)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  4. MAC layer security issues in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  5. The Interface of Safety and Security in Transport: A Regional Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Welch, Tim; Duhamel, David A; Nandakumar, A. N.

    Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less

  6. 78 FR 4856 - Intent To Request Renewal From OMB of One Current Public Collection of Information: TSA Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Renewal...: Transportation Security Administration, DHS. ACTION: 60-Day notice. SUMMARY: The Transportation Security... provide feedback to TSA about their experiences with TSA's airport security process and procedures while...

  7. 49 CFR 1542.217 - Law enforcement personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...

  8. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  9. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  10. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  11. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  12. 49 CFR 1542.217 - Law enforcement personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...

  13. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  14. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  15. 49 CFR 1542.217 - Law enforcement personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...

  16. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain...

  17. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  18. 49 CFR 1542.217 - Law enforcement personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...

  19. 49 CFR 1542.305 - Public advisories.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.305 Public advisories. When advised by TSA, each airport operator must prominently display and maintain in...

  20. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    NASA Astrophysics Data System (ADS)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  1. Insider Threat Security Reference Architecture

    DTIC Science & Technology

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  2. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  3. 49 CFR 1546.3 - TSA inspection authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY General § 1546.3 TSA... inspections or tests, including copying records, to determine compliance of an airport operator, aircraft...

  4. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  5. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  6. 49 CFR 1544.227 - Exclusive area agreement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...

  7. 49 CFR 1544.227 - Exclusive area agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...

  8. 49 CFR 1546.3 - TSA inspection authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY General § 1546.3 TSA... inspections or tests, including copying records, to determine compliance of an airport operator, aircraft...

  9. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  10. 49 CFR 1544.227 - Exclusive area agreement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...

  11. 49 CFR 1546.3 - TSA inspection authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY General § 1546.3 TSA... inspections or tests, including copying records, to determine compliance of an airport operator, aircraft...

  12. 49 CFR 1544.227 - Exclusive area agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...

  13. 49 CFR 1546.3 - TSA inspection authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY General § 1546.3 TSA... inspections or tests, including copying records, to determine compliance of an airport operator, aircraft...

  14. 49 CFR 1546.3 - TSA inspection authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY General § 1546.3 TSA... inspections or tests, including copying records, to determine compliance of an airport operator, aircraft...

  15. 49 CFR 1544.227 - Exclusive area agreement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...

  16. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  17. 49 CFR 1580.107 - Chain of custody and control requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... businesses, housing, schools, and hospitals. (4) Any information regarding threats to the facility. (5) Other...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION SECURITY Freight Rail Including Freight Railroad Carriers, Rail Hazardous Materials...

  18. 49 CFR 1546.211 - Law enforcement personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...

  19. 49 CFR 1546.211 - Law enforcement personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...

  20. 49 CFR 1546.211 - Law enforcement personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...

  1. 49 CFR 1546.211 - Law enforcement personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ....211 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Operations § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...

  2. Development of a telediagnosis endoscopy system over secure internet.

    PubMed

    Ohashi, K; Sakamoto, N; Watanabe, M; Mizushima, H; Tanaka, H

    2008-01-01

    We developed a new telediagnosis system to securely transmit high-quality endoscopic moving images over the Internet in real time. This system would enable collaboration between physicians seeking advice from endoscopists separated by long distances, to facilitate diagnosis. We adapted a new type of digital video streaming system (DVTS) to our teleendoscopic diagnosis system. To investigate its feasibility, we conducted a two-step experiment. A basic experiment was first conducted to transmit endoscopic video images between hospitals using a plain DVTS. After investigating the practical usability, we incorporated a secure and reliable communication function into the system, by equipping DVTS with "TCP2", a new security technology that establishes secure communication in the transport layer. The second experiment involved international transmission of teleendoscopic image between Hawaii and Japan using the improved system. In both the experiments, no serious transmission delay was observed to disturb physicians' communications and, after subjective evaluation by endoscopists, the diagnostic qualities of the images were found to be adequate. Moreover, the second experiment showed that "TCP2-equipped DVTS" successfully executed high-quality secure image transmission over a long distance network. We conclude that DVTS technology would be promising for teleendoscopic diagnosis. It was also shown that a high quality, secure teleendoscopic diagnosis system can be developed by equipping DVTS with TCP2.

  3. 49 CFR 1510.1 - Applicability and purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States. [79 FR 35472, June 20, 2014] ...

  4. 49 CFR 1510.1 - Applicability and purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...

  5. 49 CFR 1510.1 - Applicability and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...

  6. 49 CFR 1510.1 - Applicability and purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...

  7. 49 CFR 1510.1 - Applicability and purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE... intrastate air transportation originating at airports in the United States to pay for the costs of providing...

  8. 33 CFR 103.500 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.500 General. (a) The Area Maritime... with the National Maritime Transportation Security Plan and the National Transportation Security Plan...

  9. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...

  10. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...

  11. Seven layers of security to help protect biomedical research facilities.

    PubMed

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  12. 77 FR 42752 - New Agency Information Collection Activity Under OMB Review: Generic Clearance for the Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information... Service Delivery AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the Transportation Security Administration (TSA) has forwarded the new Information...

  13. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... threat assessment. 1572.9 Section 1572.9 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information...

  14. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    DOT National Transportation Integrated Search

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  15. Subscribe to the Transportation Secure Data Center Newsletter |

    Science.gov Websites

    Newsletter Subscribe to the Transportation Secure Data Center Newsletter Subscribe to receive via email the Transportation Secure Data Center (TSDC) newsletter. Email Address Subscribe Newsletter

  16. 77 FR 37062 - Intent To Request Approval From OMB of One New Public Collection of Information: Office of Law...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval... Service LEO Reimbursement Request AGENCY: Transportation Security Administration, DHS. ACTION: 60-day Notice. SUMMARY: The Transportation Security Administration (TSA) invites public comment on a new...

  17. 49 CFR 1540.201 - Applicability and terms used in this subpart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Applicability and terms used in this subpart. 1540.201 Section 1540.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...

  18. 49 CFR 15.11 - Persons with a need to know.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...

  19. 49 CFR 15.11 - Persons with a need to know.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...

  20. 49 CFR 1503.203 - Investigations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... Chief Counsel, the Assistant Administrator for Security Operations, the Assistant Administrator for...

  1. Overview Webinar | Transportation Secure Data Center | NREL

    Science.gov Websites

    Overview Webinar Overview Webinar This webinar focuses on the Transportation Secure Data Center (TSDC), which serves as a secure area for archiving and accessing detailed transportation data from a

  2. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  3. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  4. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  5. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  6. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  7. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  8. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security...

  9. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the air operations area (AOA). 1542...

  10. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the air operations area (AOA). 1542...

  11. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the air operations area (AOA). 1542...

  12. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the air operations area (AOA). 1542...

  13. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the air operations area (AOA). 1542...

  14. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  15. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  16. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  17. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  18. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  19. 49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of...

  20. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  1. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  2. 49 CFR 176.162 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 2 2012-10-01 2012-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  3. 49 CFR 176.162 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 2 2013-10-01 2013-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  4. 49 CFR 176.162 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  5. 49 CFR 176.162 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 2 2014-10-01 2014-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  6. 49 CFR 176.162 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  7. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  8. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  9. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  10. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  11. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  12. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  13. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  14. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  15. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  16. 49 CFR 1562.27 - Costs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...

  17. Physical-enhanced secure strategy in an OFDM-PON.

    PubMed

    Zhang, Lijia; Xin, Xiangjun; Liu, Bo; Yu, Jianjun

    2012-01-30

    The physical layer of optical access network is vulnerable to various attacks. As the dramatic increase of users and network capacity, the issue of physical-layer security becomes more and more important. This paper proposes a physical-enhanced secure strategy for orthogonal frequency division multiplexing passive optical network (OFDM-PON) by employing frequency domain chaos scrambling. The Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can dynamically allocate the scrambling matrices for different OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. A mathematical model of this secure system is derived firstly, which achieves a secure transmission at physical layer in OFDM-PON. The results from experimental implementation using Logistic mapped chaos scrambling are also given to further demonstrate the efficiency of this secure strategy. An 10.125 Gb/s 64QAM-OFDM data with Logistic mapped chaos scrambling are successfully transmitted over 25-km single mode fiber (SMF), and the experimental results show that proposed security scheme can protect the system from eavesdropper and attacker, while keep a good performance for the legal ONU.

  18. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    DOT National Transportation Integrated Search

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  19. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  20. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.

    PubMed

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations.

  1. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations

    PubMed Central

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is “frankencerts,” synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired—a low-risk, often ignored error—but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations. PMID:25404868

  2. Method of making organic light emitting devices

    DOEpatents

    Shiang, Joseph John [Niskayuna, NY; Janora, Kevin Henry [Schenectady, NY; Parthasarathy, Gautam [Saratoga Springs, NY; Cella, James Anthony [Clifton Park, NY; Chichak, Kelly Scott [Clifton Park, NY

    2011-03-22

    The present invention provides a method for the preparation of organic light-emitting devices comprising a bilayer structure made by forming a first film layer comprising an electroactive material and an INP precursor material, and exposing the first film layer to a radiation source under an inert atmosphere to generate an interpenetrating network polymer composition comprising the electroactive material. At least one additional layer is disposed on the reacted first film layer to complete the bilayer structure. The bilayer structure is comprised within an organic light-emitting device comprising standard features such as electrodes and optionally one or more additional layers serving as a bipolar emission layer, a hole injection layer, an electron injection layer, an electron transport layer, a hole transport layer, exciton-hole transporting layer, exciton-electron transporting layer, a hole transporting emission layer, or an electron transporting emission layer.

  3. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...

  4. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...

  5. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...

  6. 49 CFR 1544.217 - Law enforcement personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  7. 49 CFR 1544.217 - Law enforcement personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  8. 49 CFR 1544.217 - Law enforcement personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  9. 49 CFR 1544.217 - Law enforcement personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  10. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    DOT National Transportation Integrated Search

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  11. 76 FR 35229 - Intent to Request Renewal and Amendment From OMB of One Current Public Collection of Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... from TSA's Corporate Security Review (CSR) in that a CSR looks at corporate or company-wide security... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent to Request Renewal... of the Top 100 Most Critical Pipelines AGENCY: Transportation Security Administration, DHS. ACTION...

  12. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ...; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343-1717), Acting... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  13. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  14. PennDOT transportation security strategy : volume 2 : effective practices of state departments of transportation security planning

    DOT National Transportation Integrated Search

    2004-08-01

    Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...

  15. 49 CFR 1522.3 - Fraud and intentional falsification of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS General § 1522.3 Fraud and intentional falsification...

  16. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  17. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  18. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  19. Transportation security papers : 2002

    DOT National Transportation Integrated Search

    2002-01-01

    Passenger transportation usually receives more attention for safety and security than freight transportation, and since the tragic events that occurred on September 11th, 2001, passenger air transportation has been receiving a great deal of attention...

  20. Physical layer security in fiber-optic MIMO-SDM systems: An overview

    NASA Astrophysics Data System (ADS)

    Guan, Kyle; Cho, Junho; Winzer, Peter J.

    2018-02-01

    Fiber-optic transmission systems provide large capacities over enormous distances but are vulnerable to simple eavesdropping attacks at the physical layer. We classify key-based and keyless encryption and physical layer security techniques and discuss them in the context of optical multiple-input-multiple-output space-division multiplexed (MIMO-SDM) fiber-optic communication systems. We show that MIMO-SDM not only increases system capacity, but also ensures the confidentiality of information transmission. Based on recent numerical and experimental results, we review how the unique channel characteristics of MIMO-SDM can be exploited to provide various levels of physical layer security.

  1. 49 CFR 1570.5 - Fraud and intentional falsification of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.5 Fraud and intentional falsification of records. No person may make, cause to be...

  2. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    DOT National Transportation Integrated Search

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  3. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-14

    ... Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire... collection of information on December 30, 2011, 76 FR 82313. The collection involves using a questionnaire to... Title: Transportation Security Officer (TSO) Medical Questionnaire. Type of Request: Extension of a...

  4. 77 FR 18716 - Transportation Security Administration Postal Zip Code Change; Technical Amendment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-28

    ... organizational changes and it has no substantive effect on the public. DATES: Effective March 28, 2012. FOR... No. 1572-9] Transportation Security Administration Postal Zip Code Change; Technical Amendment AGENCY: Transportation Security Administration, DHS. ACTION: Final rule. SUMMARY: This rule is a technical change to...

  5. 75 FR 1070 - Cargo Securing Methods for Packages in Transport Vehicles or Freight Containers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-08

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2009-1079] Cargo Securing Methods for... for comments. SUMMARY: The Coast Guard seeks comments from the public on methods for securing cargo in... proper condition for transportation. Currently, the specific method for securing cargo is left to the...

  6. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  7. 49 CFR 8.9 - Information Security Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  8. 49 CFR 8.9 - Information Security Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  9. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  10. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  11. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  12. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  13. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  14. Flexible session management in a distributed environment

    NASA Astrophysics Data System (ADS)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  15. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  16. 49 CFR 1542.213 - Training.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Training. 1542.213 Section 1542.213 Transportation..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.213 Training. (a... training in accordance with TSA-approved curriculum specified in the security program. This curriculum must...

  17. 49 CFR 1540.103 - Fraud and intentional falsification of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Responsibilities of Passengers and Other Individuals and Persons § 1540.103 Fraud... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...

  18. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... 49 Transportation 9 2013-10-01 2013-10-01 false Airport-approved and exclusive area personnel...

  19. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii...

  20. 77 FR 31866 - Intent To Request Approval From OMB of One New Public Collection of Information: Baseline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-30

    ... (BASE) Program for Public Transportation Systems AGENCY: Transportation Security Administration, DHS. ACTION: 60-day Notice. SUMMARY: The Transportation Security Administration (TSA) invites public comment... under contract with a public transportation agency. \\1\\ TSA, ``Transportation Sector-Specific Plan Mass...

  1. A Hierarchical Security Architecture for Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  2. Towards All-Inorganic Transport Layers for Wide-Band-Gap Formamidinium Lead Bromide-Based Planar Photovoltaics

    DOE PAGES

    Subbiah, Anand S.; Mahuli, Neha; Agarwal, Sumanshu; ...

    2017-07-21

    Hybrid perovskite photovoltaic devices heavily rely on the use of organic (rather than inorganic) charge-transport layers on top of a perovskite absorber layer because of difficulties in depositing inorganic materials on top of these fragile absorber layers. However, in comparison to the unstable and expensive organic transport materials, inorganic charge-transport layers provide improved charge transport and stability to the device architecture. Here, we report photovoltaic devices using all-inorganic transport layers in a planar p-i-n junction device configuration using formamidinium lead tribromide (FAPbBr 3) as an absorber. Efficient planar devices are obtained through atomic layer deposition of nickel oxide and sputteredmore » zinc oxide as hole- and electron-transport materials, respectively. Using only inorganic charge-transport layers resulted in planar FAPbBr 3 devices with a power conversion efficiency of 6.75% at an open-circuit voltage of 1.23 V. In conclusion, the transition of planar FAPbBr 3 devices making from all-organic towards all-inorganic charge-transport layers is studied in detail.« less

  3. Towards All-Inorganic Transport Layers for Wide-Band-Gap Formamidinium Lead Bromide-Based Planar Photovoltaics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Subbiah, Anand S.; Mahuli, Neha; Agarwal, Sumanshu

    Hybrid perovskite photovoltaic devices heavily rely on the use of organic (rather than inorganic) charge-transport layers on top of a perovskite absorber layer because of difficulties in depositing inorganic materials on top of these fragile absorber layers. However, in comparison to the unstable and expensive organic transport materials, inorganic charge-transport layers provide improved charge transport and stability to the device architecture. Here, we report photovoltaic devices using all-inorganic transport layers in a planar p-i-n junction device configuration using formamidinium lead tribromide (FAPbBr 3) as an absorber. Efficient planar devices are obtained through atomic layer deposition of nickel oxide and sputteredmore » zinc oxide as hole- and electron-transport materials, respectively. Using only inorganic charge-transport layers resulted in planar FAPbBr 3 devices with a power conversion efficiency of 6.75% at an open-circuit voltage of 1.23 V. In conclusion, the transition of planar FAPbBr 3 devices making from all-organic towards all-inorganic charge-transport layers is studied in detail.« less

  4. State of Maryland Intelligent Transportation Systems: Security and Implementation Recommendations.

    DOT National Transportation Integrated Search

    1997-11-01

    At the direction of the Volpe National Transportation Systems Center of the US Department of Transportation (US DOT), a two-phase study of the security vulnerability of Maryland Intelligent Transportation Systems (ITS) was conducted from July until N...

  5. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less

  6. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...

  7. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is... security screening and identity verification of individuals, including identification media and identifying... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  8. 49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...

  9. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  10. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA... conducting vulnerability assessments became available and usage of the TMSARM has dropped off considerably...

  11. 49 CFR 1572.401 - Fee collection options.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fee collection options. 1572.401 Section 1572.401 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... ASSESSMENTS Fees for Security Threat Assessments for Hazmat Drivers § 1572.401 Fee collection options. (a...

  12. 49 CFR 1503.205 - Records, documents, and reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Records, documents, and reports. 1503.205 Section 1503.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Investigative...

  13. 49 CFR 1503.201 - Reports of violations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Reports of violations. 1503.201 Section 1503.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Investigative Procedures §...

  14. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  15. A study of IEEE 802.15.4 security framework for wireless body area networks.

    PubMed

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  16. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    PubMed Central

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358

  17. A proxy of DICOM services

    NASA Astrophysics Data System (ADS)

    Ribeiro, Luís S.; Costa, Carlos; Oliveira, José Luís

    2010-03-01

    Diagnostic tools supported by digital medical images have increasingly become an essential aid to medical decisions. However, despite its growing importance, Picture Archiving and Communication Systems (PACS) are typically oriented to support a single healthcare institution, and the sharing of medical data across institutions is still a difficult process. This paper describes a proposal to publish and control Digital Imaging Communications in Medicine (DICOM) services in a wide domain composed of several healthcare institutions. The system creates virtual bridges between intranets enabling the exchange, search and store of the medical data within the wide domain. The service provider publishes the DICOM services following a token-based strategy. The token advertisements are public and known by all system users. However, access to the DICOM service is controlled through a role association between an access key and the service. Furthermore, in medical diagnoses, time is a crucial factor. Therefore, our system is a turnkey solution, capable of exchanging medical data across firewalls and Network Address Translation (NAT), avoiding bureaucratic issues with local network security. Security is also an important concern - in any transmission across different domains, data is encrypted by Transport Layer Security (TLS).

  18. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    PubMed

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  19. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  20. Potential terrorist uses of highway-borne hazardous materials.

    DOT National Transportation Integrated Search

    2010-01-01

    The Department of Homeland Security (DHS) has requested that the Mineta Transportation Institutes National Transportation Security Center of Excellence (MTI NTSCOE) provide any research it has or insights it can provide on the security risks creat...

  1. Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    DTIC Science & Technology

    2014-09-18

    radios in a cognitive radio network using a radio frequency fingerprinting based method. In IEEE International Conference on Communications (ICC...IMPROVEDWIRELESS SECURITY THROUGH PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Benjamin W. Ramsey, Captain...PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Presented to the Faculty Graduate School of Engineering and

  2. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  3. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  4. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  5. 49 CFR 1562.25 - Fixed base operator requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...

  6. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... from its inventory of record systems. TSA will rely upon DHS/ALL-017 General Legal Records (November 23, 2011, 76 FR 72428) to cover its legal activities. Eliminating the system of records notice DHS/TSA-009... Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  7. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Training and knowledge for individuals with... SECURITY INDIRECT AIR CARRIER SECURITY § 1548.11 Training and knowledge for individuals with security... accept, handle, transport, or deliver cargo have knowledge of the— (1) Applicable provisions of this part...

  8. Near-Term Options for Improving Security at Los Angeles International Airport

    DTIC Science & Technology

    2004-09-26

    the Transportation Security Administration (TSA), the Los Angeles Police Department ( LAPD ), and LAX to make sure the list was reasonable...World Airports; the Transportation Security Agency; the Los Angeles International Airport Police Department ; the Los Angeles Police Department ; the Los ...Airports. iii PREFACE This document assesses near-term security

  9. Multiple Path Static Routing Protocols for Packet Switched Networks.

    DTIC Science & Technology

    1983-09-01

    model are: (1) Physical Layer (2) Data Link Layer (3) Network Layer (4) Transport Layer (5) Session Layer (6) Presentation Layer (7) pplication Layer The...The transport layer, also known as the host-host layer, accepts data from the session layer, splits it into smaller units if needed, passes these to...the network layer, and ensures that all the pieces arrive correctly at the other end. It creates a distinct network connection for each transport

  10. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  11. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  12. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  13. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  14. 49 CFR 1503.637 - Standard of proof.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... must prove the party's case or defense by a preponderance of the evidence. ...

  15. 77 FR 58208 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... Department of Transportation (DOT), the Federal Aviation Administration and the Transportation Security... International Airport final application; the Transportation Security Administration will also participate... employees, airlines, aviation businesses and airport tenants, elected officials and community residents...

  16. Practices and technologies in hazardous material transportation and security.

    DOT National Transportation Integrated Search

    2011-11-23

    "The University of Arkansas (UA) team is responsible for investigating practices of : hazardous material transportation in the private sector. The UA team is a subcontractor : to the project Petrochemical Transportation Security, Development of...

  17. Aviation security : status of transportation security inspector workforce.

    DOT National Transportation Integrated Search

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  18. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2014-01-01

    This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.

  19. Development of an Independent Locking Securement System for Mobility Aids on Public Transportation Vehicles

    DOT National Transportation Integrated Search

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  20. To amend title 49, United States Code, to direct the Assistant Secretary of Homeland Security (Transportation Security Administration) to transfer unclaimed money recovered at airport security checkpoints to United Service Organizations, Incorporated, and for other purposes.

    THOMAS, 111th Congress

    Rep. Miller, Jeff [R-FL-1

    2009-04-30

    House - 05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  2. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    DOT National Transportation Integrated Search

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  3. Transportation Security Institute : recruiting next generation professionals.

    DOT National Transportation Integrated Search

    2013-08-01

    The Center for Transportation Training and Research (CTTR), as part of Texas Southern University : (TSU), served as host for the 2013 Transportation Security Institute (TSI) in Houston and : surrounding area. The 2013 Houston TSI focuses on the missi...

  4. Transportation Security Institute: recruiting next generation professionals.

    DOT National Transportation Integrated Search

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  5. 49 CFR 1503.415 - Request for portions of the enforcement investigative report (EIR).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Request for portions of the enforcement investigative report (EIR). 1503.415 Section 1503.415 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND...

  6. A secure communication using cascade chaotic computing systems on clinical decision support.

    PubMed

    Koksal, Ahmet Sertol; Er, Orhan; Evirgen, Hayrettin; Yumusak, Nejat

    2016-06-01

    Clinical decision support systems (C-DSS) provide supportive tools to the expert for the determination of the disease. Today, many of the support systems, which have been developed for a better and more accurate diagnosis, have reached a dynamic structure due to artificial intelligence techniques. However, in cases when important diagnosis studies should be performed in secret, a secure communication system is required. In this study, secure communication of a DSS is examined through a developed double layer chaotic communication system. The developed communication system consists of four main parts: random number generator, cascade chaotic calculation layer, PCM, and logical mixer layers. Thanks to this system, important patient data created by DSS will be conveyed to the center through a secure communication line.

  7. Hazardous material transportation safety and security field operational test final detailed test plans : executive summary

    DOT National Transportation Integrated Search

    2003-09-16

    The objective of this Hazardous Material (HazMat) Transportation Safety and Security Field Operational Test (FOT) Final Detailed Test Plans evaluation is to measure the impact of technology solutions on the safety, security, and operational efficienc...

  8. The role of hazardous material placards in transportation safety and security

    DOT National Transportation Integrated Search

    2004-01-15

    Following the events of September 11, 2001, the U.S. Department of Transportation (DOT) has taken steps to reduce vulnerabilities of hazardous materials in transportation through security enhancing initiatives directed at reducing their potential use...

  9. Transportation security research : coordination needed in selecting and implementing infrastructure vulnerability assessments

    DOT National Transportation Integrated Search

    2003-05-01

    The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...

  10. Transportation Energy Security and Climate Change Mitigation Act of 2007

    DOT National Transportation Integrated Search

    2008-09-29

    The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...

  11. 49 CFR 1546.203 - Acceptance and screening of checked baggage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... foreign air carrier must refuse to transport any individual's checked baggage or property if the...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR... deterring the carriage of any explosive or incendiary. Each foreign air carrier must use the procedures...

  12. 49 CFR 393.130 - What are the rules for securing heavy vehicles, equipment and machinery?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 5 2014-10-01 2014-10-01 false What are the rules for securing heavy vehicles, equipment and machinery? 393.130 Section 393.130 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL MOTOR CARRIER SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR CARRIER SAFETY REGULATIONS PARTS AND...

  13. 49 CFR 659.11 - Confidentiality of investigation reports and security plans.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Confidentiality of investigation reports and security plans. 659.11 Section 659.11 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State § 659.11...

  14. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  15. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  16. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  17. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  18. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  19. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  20. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  1. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  2. 49 CFR 1503.407 - Military personnel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... the Department of Defense who is subject to the Uniform Code of Military Justice (10 U.S.C. chapter 47...

  3. 49 CFR 1503.639 - Burden of proof.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... affirmative defense, the burden of proof is on the agency. (b) Except as otherwise provided by statute or rule...

  4. 49 CFR 1548.9 - Acceptance of cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... program. (b) Refusal to transport. Each indirect air carrier must refuse to offer for transport on an..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.9 Acceptance of cargo. (a) Preventing or deterring the carriage of any explosive or incendiary. Each indirect air...

  5. 76 FR 34240 - Chemical Transportation Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0225] Chemical Transportation... Establishment. SUMMARY: The Secretary of Homeland Security has determined that the establishment of the Chemical... performance of duties of the U. S. Coast Guard. Name of Committee: Chemical Transportation Advisory Committee...

  6. Transportation's oil dependence and energy security in the 21st century

    DOT National Transportation Integrated Search

    1997-10-01

    The persistent and in many parts of the world rapid motorization of transport is intensifying global dependence on petroleum. Transportation's global oil dependence poses real energy security risks for the first few decades of the 21st century, at le...

  7. Transportation security : federal action needed to help address security challenges

    DOT National Transportation Integrated Search

    2003-06-30

    The economic well being of the U.S. is dependent on the expeditious flow of people and goods through the transportation system. The attacks on September 11, 2001, illustrate the threats and vulnerabilities of the transportation system. Prior to Septe...

  8. Molecular transport network security using multi-wavelength optical spins.

    PubMed

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  9. Electroluminescent devices formed using semiconductor nanocrystals as an electron transport media and method of making such electroluminescent devices

    DOEpatents

    Alivisatos, A. Paul; Colvin, Vickie

    1996-01-01

    An electroluminescent device is described, as well as a method of making same, wherein the device is characterized by a semiconductor nanocrystal electron transport layer capable of emitting visible light in response to a voltage applied to the device. The wavelength of the light emitted by the device may be changed by changing either the size or the type of semiconductor nanocrystals used in forming the electron transport layer. In a preferred embodiment the device is further characterized by the capability of emitting visible light of varying wavelengths in response to changes in the voltage applied to the device. The device comprises a hole processing structure capable of injecting and transporting holes, and usually comprising a hole injecting layer and a hole transporting layer; an electron transport layer in contact with the hole processing structure and comprising one or more layers of semiconductor nanocrystals; and an electron injecting layer in contact with the electron transport layer for injecting electrons into the electron transport layer. The capability of emitting visible light of various wavelengths is principally based on the variations in voltage applied thereto, but the type of semiconductor nanocrystals used and the size of the semiconductor nanocrystals in the layers of semiconductor nanometer crystals may also play a role in color change, in combination with the change in voltage.

  10. 76 FR 23326 - Intent To Request Renewal From OMB of One Current Public Collection of Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-26

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-24191... Notice. SUMMARY: The Transportation Security Administration (TSA) invites public comment on one currently... approved the collection of information for six months and TSA now seeks the maximum three-year approval...

  11. Maritime Transportation Security Act of 2002 : section 109 implementation : a report to Congress

    DOT National Transportation Integrated Search

    2003-05-01

    The U.S. Congress enacted the Maritime Transportation Security Act (MTSA) of 2002 (Public Law 107- 295) on November 25, 2002. On April 3, 2003, the Secretary of Transportation (Secretary) delegated to the Maritime Administrator the authority to imple...

  12. Application of the API/NPRA SVA methodology to transportation security issues.

    PubMed

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  13. Transportation Secure Data Center Newsletter | Transportation Secure Data

    Science.gov Websites

    Travel Study: A pilot study conducted February-March 2015, the In the Moment Travel Study used an Transportation Study: In February and March 2014, Resource Systems Group, Inc., conducted the Heartland in Motion Transportation Study for the Madison County Council of Governments. The study included a household travel survey

  14. Granular Security in a Graph Database

    DTIC Science & Technology

    2016-03-01

    have a presence in more than one layer. For example, a single social media user may have an account in Twitter, Facebook, and Instagram with... Instagram layers. This restriction re- flects the reality that user A’s Facebook account cannot connect directly to user B’s Twitter account. A security

  15. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... nation's transportation systems to ensure freedom of movement for people and commerce. To achieve this.... Another routine use permits the release of information to the media when there exists a legitimate public... limited to, Social security number; pilot certificate information, including number and country of...

  16. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ...; Department of Homeland Security Transportation Security Administration-023 Workplace Violence Prevention... Administration-023 Workplace Violence Prevention Program System of Records and this proposed rulemaking. In this... Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace Violence Prevention Program System of Records...

  17. Methods for producing thin film charge selective transport layers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hammond, Scott Ryan; Olson, Dana C.; van Hest, Marinus Franciscus Antonius Maria

    Methods for producing thin film charge selective transport layers are provided. In one embodiment, a method for forming a thin film charge selective transport layer comprises: providing a precursor solution comprising a metal containing reactive precursor material dissolved into a complexing solvent; depositing the precursor solution onto a surface of a substrate to form a film; and forming a charge selective transport layer on the substrate by annealing the film.

  18. A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools

    DTIC Science & Technology

    2015-07-14

    computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network

  19. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ... provided by owner/operators of freight railroads, passenger railroads, public transportation systems... in the public transportation, railroad carrier, and over-the-road bus (OTRB) modes.\\2\\ In summary.... 266 (August 3, 2007). 9/11 Act's Public Transportation Security Training Requirements. Paragraph 1408...

  20. 49 CFR 15.19 - Destruction of SSI.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...

  1. 78 FR 69745 - Safety and Security Plans for Class 3 Hazardous Materials Transported by Rail

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... Security Plans for Class 3 Hazardous Materials Transported by Rail AGENCY: Pipeline and Hazardous Materials... characterization, classification, and selection of a packing group for Class 3 materials, and the corresponding...

  2. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    EPA Science Inventory

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  3. 49 CFR 15.19 - Destruction of SSI.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...

  4. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following... dictate the use of air transportation; (3) The nature of the item to be shipped necessitates the use of air transportation in order to avoid possible damage which may be expected from other available...

  5. 77 FR 20872 - Enabling a Secure Environment for Vehicle-to-Infrastructure Research Workshop; Notice of Public...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ... DEPARTMENT OF TRANSPORTATION Enabling a Secure Environment for Vehicle-to-Infrastructure Research Workshop; Notice of Public Meeting AGENCY: ITS Joint Program Office, Research and Innovative Technology Administration, U.S. Department of Transportation. ACTION: Notice. The U.S. Department of Transportation (USDOT...

  6. Surface transportation security : TSA has taken actions to manage risk, improve coordination, and measure performance, but additional actions would enhance its efforts, April 21, 2010.

    DOT National Transportation Integrated Search

    2010-04-21

    Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...

  7. A layered trust information security architecture.

    PubMed

    de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon

    2014-12-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.

  8. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  9. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  10. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  11. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  12. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  13. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  14. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  15. Identifying the Key Weaknesses in Network Security at Colleges.

    ERIC Educational Resources Information Center

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  16. Migration of optical core network to next generation networks - Carrier Grade Ethernet Optical Transport Network

    NASA Astrophysics Data System (ADS)

    Glamočanin, D.

    2017-05-01

    In order to maintain the continuity of the telecom operators’ network construction, while monitoring development needs, increasing customers’ demands and application of technological improvements, it is necessary to migrate optical transport core network to the next generation networks - Carrier Grade Ethernet Optical Transport Network (OTN CE). The primary objective of OTN CE is to realize an environment that is based solely on the switching in the optical domain, i.e. the realization of transparent optical networks and optical switching to the second layer of ISO / OSI model. The realization of such a network provides opportunities for further development of existing, but also technologically more demanding, new services. It is also a prerequisite to provide higher scalability, reliability, security and quality of QoS service, as well as prerequisites for the establishment of SLA (Service Level Agreement) for existing services, especially traffic in real time. This study aims to clarify the proposed model, which has the potential to be eventually adjusted in accordance with new scientific knowledge in this field as well as market requirements.

  17. Surveillance systems for intermodal transportation

    NASA Astrophysics Data System (ADS)

    Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas

    2015-05-01

    Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.

  18. To amend title 49, United States Code, to direct the Secretary of Homeland Security to carry out a program to ensure fair treatment in the security screening of individuals with metal implants traveling in air transportation.

    THOMAS, 111th Congress

    Rep. Oberstar, James L. [D-MN-8

    2009-05-07

    House - 05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. To amend title 49, United States Code, to establish a 10-year term of office for any individual appointed as the Assistant Secretary of Homeland Security (Transportation Security Administration), and for other purposes.

    THOMAS, 111th Congress

    Rep. Wolf, Frank R. [R-VA-10

    2010-01-13

    House - 01/28/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. A two layer chaotic encryption scheme of secure image transmission for DCT precoded OFDM-VLC transmission

    NASA Astrophysics Data System (ADS)

    Wang, Zhongpeng; Chen, Fangni; Qiu, Weiwei; Chen, Shoufa; Ren, Dongxiao

    2018-03-01

    In this paper, a two-layer image encryption scheme for a discrete cosine transform (DCT) precoded orthogonal frequency division multiplexing (OFDM) visible light communication (VLC) system is proposed. Firstly, in the proposed scheme the transmitted image is first encrypted by a chaos scrambling sequence,which is generated from the hybrid 4-D hyper- and Arnold map in the upper-layer. After that, the encrypted image is converted into digital QAM modulation signal, which is re-encrypted by chaos scrambling sequence based on Arnold map in physical layer to further enhance the security of the transmitted image. Moreover, DCT precoding is employed to improve BER performance of the proposed system and reduce the PAPR of OFDM signal. The BER and PAPR performances of the proposed system are evaluated by simulation experiments. The experiment results show that the proposed two-layer chaos scrambling schemes achieve image secure transmission for image-based OFDM VLC. Furthermore, DCT precoding can reduce the PAPR and improve the BER performance of OFDM-based VLC.

  1. Organimetallic Fluorescent Complex Polymers For Light Emitting Applications

    DOEpatents

    Shi, Song Q.; So, Franky

    1997-10-28

    A fluorescent complex polymer with fluorescent organometallic complexes connected by organic chain spacers is utilized in the fabrication of light emitting devices on a substantially transparent planar substrate by depositing a first conductive layer having p-type conductivity on the planar surface of the substrate, depositing a layer of a hole transporting and electron blocking material on the first conductive layer, depositing a layer of the fluorescent complex polymer on the layer of hole transporting and electron blocking material as an electron transporting emissive layer and depositing a second conductive layer having n-type conductivity on the layer of fluorescent complex polymer.

  2. 49 CFR 1503.635 - Evidence.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES... present the party's case or defense by oral, documentary, or demonstrative evidence, to submit rebuttal...

  3. Hazardous material transportation and the security externality : what should be done?

    DOT National Transportation Integrated Search

    2013-04-01

    This project examined the safety and security externalities which exists in the : transportation of hazardous materials (particularly Toxic Inhalant Hazards) and : identified alterative mitigation strategies. The combination of terrorist attack...

  4. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  5. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  6. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  7. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  8. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  9. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  10. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  11. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  12. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  13. Time domain reflectometry measurements of solute transport across a soil layer boundary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nissen, H.H.; Moldrup, P.; Kachanoski, R.G.

    2000-02-01

    The mechanisms governing solute transport through layered soil are not fully understood. Solute transport at, above, and beyond the interface between two soil layers during quasi-steady-state soil water movement was investigated using time domain reflectometry (TDR). A 0.26-m sandy loam layer was packed on top of a 1.35-m fine sand layer in a soil column. Soil water content ({theta}) and bulk soil electrical conductivity (EC{sub b}) were measured by 50 horizontal and 2 vertical TDR probes. A new TDR calibration method that gives a detailed relationship between apparent relative dielectric permittivity (K{sub s}) and {theta} was applied. Two replicate solutemore » transport experiments were conducted adding a conservative tracer (CCl) to the surface as a short pulse. The convective lognormal transfer function model (CLT) was fitted to the TDR-measured time integral-normalized resident concentration breakthrough curves (BTCs). The BTCs and the average solute-transport velocities showed preferential flow occurred across the layer boundary. A nonlinear decrease in TDR-measured {theta} in the upper soil toward the soil layer boundary suggests the existence of a 0.10-m zone where water is confined towards fingered flow, creating lateral variations in the area-averaged water flux above the layer boundary. A comparison of the time integral-normalized flux concentration measured by vertical and horizontal TDR probes at the layer boundary also indicates a nonuniform solute transport. The solute dispersivity remained constant in the upper soil layer, but increased nonlinearly (and further down, linearly) with depth in the lower layer, implying convective-dispersive solute transport in the upper soil, a transition zone just below the boundary, and stochastic-convective solute transport in the remaining part of the lower soil.« less

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection.

  15. Optoelectronic device with nanoparticle embedded hole injection/transport layer

    DOEpatents

    Wang, Qingwu [Chelmsford, MA; Li, Wenguang [Andover, MA; Jiang, Hua [Methuen, MA

    2012-01-03

    An optoelectronic device is disclosed that can function as an emitter of optical radiation, such as a light-emitting diode (LED), or as a photovoltaic (PV) device that can be used to convert optical radiation into electrical current, such as a photovoltaic solar cell. The optoelectronic device comprises an anode, a hole injection/transport layer, an active layer, and a cathode, where the hole injection/transport layer includes transparent conductive nanoparticles in a hole transport material.

  16. Effect of phase inversion on microporous structure development of Al 2O 3/poly(vinylidene fluoride-hexafluoropropylene)-based ceramic composite separators for lithium-ion batteries

    NASA Astrophysics Data System (ADS)

    Jeong, Hyun-Seok; Kim, Dong-Won; Jeong, Yeon Uk; Lee, Sang-Young

    To improve the thermal shrinkage of the separators that are essential to securing the electrical isolation between electrodes in lithium-ion batteries, we develop a new separator based on a ceramic composite membrane. Introduction of microporous, ceramic coating layers onto both sides of a polyethylene (PE) separator allows such a progress. The ceramic coating layers consist of nano-sized alumina (Al 2O 3) powders and polymeric binders (PVdF-HFP). The microporous structure of the ceramic coating layers is observed to be crucial to governing the thermal shrinkage as well as the ionic transport of the ceramic composite separators. This microporous structure is determined by controlling the phase inversion, more specifically, nonsolvent (water) contents in the coating solutions. To provide a theoretical basis for this approach, a pre-investigation on the phase diagram for a ternary mixture comprising PVdF-HFP, acetone, and water is conducted. On the basis of this observation, the effect of phase inversion on the morphology and air permeability (i.e. Gurley value) of ceramic coating layers is systematically discussed. In addition, to explore the application of ceramic composite separators to lithium-ion batteries, the influence of the structural change in the coating layers on the thermal shrinkage and electrochemical performance of the separators is quantitatively identified.

  17. ANGULAR MOMENTUM TRANSPORT BY ACOUSTIC MODES GENERATED IN THE BOUNDARY LAYER. I. HYDRODYNAMICAL THEORY AND SIMULATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Belyaev, Mikhail A.; Rafikov, Roman R.; Stone, James M., E-mail: rrr@astro.princeton.edu

    The nature of angular momentum transport in the boundary layers of accretion disks has been one of the central and long-standing issues of accretion disk theory. In this work we demonstrate that acoustic waves excited by supersonic shear in the boundary layer serve as an efficient mechanism of mass, momentum, and energy transport at the interface between the disk and the accreting object. We develop the theory of angular momentum transport by acoustic modes in the boundary layer, and support our findings with three-dimensional hydrodynamical simulations, using an isothermal equation of state. Our first major result is the identification ofmore » three types of global modes in the boundary layer. We derive dispersion relations for each of these modes that accurately capture the pattern speeds observed in simulations to within a few percent. Second, we show that angular momentum transport in the boundary layer is intrinsically nonlocal, and is driven by radiation of angular momentum away from the boundary layer into both the star and the disk. The picture of angular momentum transport in the boundary layer by waves that can travel large distances before dissipating and redistributing angular momentum and energy to the disk and star is incompatible with the conventional notion of local transport by turbulent stresses. Our results have important implications for semianalytical models that describe the spectral emission from boundary layers.« less

  18. Romanian Experience for Enhancing Safety and Security in Transport of Radioactive Material - 12223

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vieru, Gheorghe

    2012-07-01

    The transport of Dangerous Goods-Class no.7 Radioactive Material (RAM), is an important part of the Romanian Radioactive Material Management. The overall aim of this activity is for enhancing operational safety and security measures during the transport of the radioactive materials, in order to ensure the protection of the people and the environment. The paper will present an overall of the safety and security measures recommended and implemented during transportation of RAM in Romania. Some aspects on the potential threat environment will be also approached with special referring to the low level radioactive material (waste) and NORM transportation either by roadmore » or by rail. A special attention is given to the assessment and evaluation of the possible radiological consequences due to RAM transportation. The paper is a part of the IAEA's Vienna Scientific Research Contract on the State Management of Nuclear Security Regime (Framework) concluded with the Institute for Nuclear Research, Romania, where the author is the CSI (Chief Scientific Investigator). The transport of RAM in Romania is a very sensible and complex problem taking into consideration the importance and the need of the security and safety for such activities. The Romanian Nuclear Regulatory Body set up strictly regulation and procedures according to the Recommendation of the IAEA Vienna and other international organizations. There were implemented the adequate regulation and procedures in order to keep the environmental impacts and the radiological consequences at the lower possible level and to assure the effectiveness of state nuclear security regime due to possible malicious acts in carrying out these activities including transport and the disposal site at the acceptable international levels. The levels of the estimated doses and risk expectation values for transport and disposal are within the acceptable limits provided by national and international regulations and recommendations but can increase, significantly during potential malicious acts. (authors)« less

  19. Surface transportation vulnerability assessment : general distribution version

    DOT National Transportation Integrated Search

    2001-10-25

    The United States possesses an effective and efficient surface transportation infrastructure that : promotes both the well-being of its citizens as well as important economic and national security : goals. The level of security afforded this infrastr...

  20. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  1. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  2. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2013-10-01 2013-10-01 false Armed security officer requirements. 1562.29...

  3. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2014-10-01 2014-10-01 false Armed security officer requirements. 1562.29...

  4. 49 CFR 1562.29 - Armed security officer requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2012-10-01 2012-10-01 false Armed security officer requirements. 1562.29...

  5. Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals

    DTIC Science & Technology

    2013-09-01

    security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S. oil dollars may be...sustainable energy security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S...39  A.  POLICY CHOICES............................................................................. 39  B.  WHY IS THIS PROBLEM IMPORTANT

  6. 49 CFR 393.134 - What are the rules for securing roll-on/roll-off or hook lift containers?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... or hook lift containers? 393.134 Section 393.134 Transportation Other Regulations Relating to... for securing roll-on/roll-off or hook lift containers? (a) Applicability. The rules in this section apply to the transportation of roll-on/roll-off or hook lift containers. (b) Securement of a roll-on...

  7. 49 CFR 393.134 - What are the rules for securing roll-on/roll-off or hook lift containers?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or hook lift containers? 393.134 Section 393.134 Transportation Other Regulations Relating to... for securing roll-on/roll-off or hook lift containers? (a) Applicability. The rules in this section apply to the transportation of roll-on/roll-off or hook lift containers. (b) Securement of a roll-on...

  8. 49 CFR 40.223 - What steps must be taken to protect the security of alcohol testing sites?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false What steps must be taken to protect the security of alcohol testing sites? 40.223 Section 40.223 Transportation Office of the Secretary of..., Equipment and Supplies Used in Alcohol Testing § 40.223 What steps must be taken to protect the security of...

  9. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  10. Multifunctional Inverse Opal-Like TiO2 Electron Transport Layer for Efficient Hybrid Perovskite Solar Cells.

    PubMed

    Chen, Xiao; Yang, Shuang; Zheng, Yi Chu; Chen, Ying; Hou, Yu; Yang, Xiao Hua; Yang, Hua Gui

    2015-09-01

    A novel multifunctional inverse opal-like TiO 2 electron transport layer (IOT-ETL) is designed to replace the traditional compact layer and mesoporous scaffold layer in perovskite solar cells (PSCs). Improved light harvesting efficiency and charge transporting performance in IOT-ETL based PSCs yield high power conversion efficiency of 13.11%.

  11. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-04-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  12. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-01-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  13. Nonlocal thermal transport across embedded few-layer graphene sheets

    DOE PAGES

    Liu, Ying; Huxtable, Scott T.; Yang, Bao; ...

    2014-11-13

    Thermal transport across the interfaces between few-layer graphene sheets and soft materials exhibits intriguing anomalies when interpreted using the classical Kapitza model, e.g., the conductance of the same interface differs greatly for different modes of interfacial thermal transport. Using atomistic simulations, we show that such thermal transport follows a nonlocal flux-temperature drop constitutive law and is characterized jointly by a quasi-local conductance and a nonlocal conductance instead of the classical Kapitza conductance. Lastly, the nonlocal model enables rationalization of many anomalies of the thermal transport across embedded few-layer graphene sheets and should be used in studies of interfacial thermal transportmore » involving few-layer graphene sheets or other ultra-thin layered materials.« less

  14. Transportation Secure Data Center | NREL

    Science.gov Websites

    Data Center The Transportation Secure Data Center (TSDC) provides free access to detailed transportation data from a variety of travel surveys and studies. Data include global positioning system (GPS demographics. Learn more about the TSDC. Cleansed Data by State and Region Use the map to access cleansed data

  15. Investigating fuel-cell transport limitations using hydrogen limiting current

    DOE PAGES

    Spingler, Franz B.; Phillips, Adam; Schuler, Tobias; ...

    2017-03-09

    Reducing mass-transport losses in polymer-electrolyte fuel cells (PEFCs) is essential to increase their power density and reduce overall stack cost. At the same time, cost also motivates the reduction in expensive precious-metal catalysts, which results in higher local transport losses in the catalyst layers. Here, we use a hydrogen-pump limiting-current setup to explore the gas-phase transport losses through PEFC catalyst layers and various gas-diffusion and microporous layers. It is shown that the effective diffusivity in the gas-diffusion layers is a strong function of liquid saturation. Additionally, it is shown how the catalyst layer unexpectedly contributes significantly to the overall measuredmore » transport resistance. This is especially true for low catalyst loadings. It is also shown how the various losses can be separated into different mechanisms including diffusional processes and mass-dependent and independent ones, where the data suggests that a large part of the transport resistance in catalyst layers cannot be attributed to a gas-phase diffusional process. The technique is promising for deconvoluting transport losses in PEFCs.« less

  16. Leveraging brightness from transportation lighting systems through light source color.

    DOT National Transportation Integrated Search

    2013-11-01

    Roadway transportation lighting is installed for multiple reasons including traffic safety and pedestrian : security. Judgments of pedestrian safety and security along roadways are not strictly correlated to : specified light levels, but the color of...

  17. The public transportation system security and emergency preparedness planning guide

    DOT National Transportation Integrated Search

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  18. Photonic sensor applications in transportation security

    NASA Astrophysics Data System (ADS)

    Krohn, David A.

    2007-09-01

    There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.

  19. 78 FR 20685 - Aviation Security Advisory Committee (ASAC) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Aviation Security Advisory...; Notice of Closed Federal Advisory Committee Meeting. SUMMARY: The Aviation Security Advisory Committee... Committee Act, 5 U.S.C. App. (Pub. L. 92-463). The Aviation Security Advisory Committee (ASAC) provides...

  20. Aviation security : TSA has completed key activities associated with implementing secure flight, but additional actions are needed to mitigate risks.

    DOT National Transportation Integrated Search

    2009-05-01

    To enhance aviation security, the Department of Homeland Securitys (DHS) Transportation Security Administration (TSA) developed a programknown as Secure Flightto assume from air carriers the function of matching passenger information against...

  1. Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.

    PubMed

    Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis

    2016-08-01

    Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.

  2. The Experimental Measurement of Local and Bulk Oxygen Transport Resistances in the Catalyst Layer of Proton Exchange Membrane Fuel Cells.

    PubMed

    Wang, Chao; Cheng, Xiaojing; Lu, Jiabin; Shen, Shuiyun; Yan, Xiaohui; Yin, Jiewei; Wei, Guanghua; Zhang, Junliang

    2017-12-07

    Remarkable progress has been made in reducing the cathodic Pt loading of PEMFCs; however, a huge performance loss appears at high current densities, indicating the existence of a large oxygen transport resistance associated with the ultralow Pt loading catalyst layer. To reduce the Pt loading without sacrificing cell performance, it is essential to illuminate the oxygen transport mechanism in the catalyst layer. Toward this goal, an experimental approach to measure the oxygen transport resistance in catalyst layers is proposed and realized for the first time in this study. The measuring approach involves a dual-layer catalyst layer design, which consists of a dummy catalyst layer and a practical catalyst layer, followed by changing the thickness of dummy layer to respectively quantify the local and bulk resistances via limiting current measurements combined with linear extrapolation. The experimental results clearly reveal that the local resistance dominates the total resistance in the catalyst layer.

  3. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat assessment...

  4. Maritime security report number 1. August 1995

    DOT National Transportation Integrated Search

    1995-08-01

    Maritime Security Reports are unclassified periodic publications prepared to inform the commercial maritime industry, senior Maritime Administration officials, the Secretary of Transportation's Office of Intelligence and Security, and the Security Su...

  5. 33 CFR 160.310 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND... credential; (5) Transportation Worker Identification Credential (TWIC) issued by the Transportation Security... authority of the government of a country that has ratified the International Labour Organization Seafarers...

  6. A Layered Trust Information Security Architecture

    PubMed Central

    de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon

    2014-01-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490

  7. Influence of geologic layering on heat transport and storage in an aquifer thermal energy storage system

    NASA Astrophysics Data System (ADS)

    Bridger, D. W.; Allen, D. M.

    2014-01-01

    A modeling study was carried out to evaluate the influence of aquifer heterogeneity, as represented by geologic layering, on heat transport and storage in an aquifer thermal energy storage (ATES) system in Agassiz, British Columbia, Canada. Two 3D heat transport models were developed and calibrated using the flow and heat transport code FEFLOW including: a "non-layered" model domain with homogeneous hydraulic and thermal properties; and, a "layered" model domain with variable hydraulic and thermal properties assigned to discrete geological units to represent aquifer heterogeneity. The base model (non-layered) shows limited sensitivity for the ranges of all thermal and hydraulic properties expected at the site; the model is most sensitive to vertical anisotropy and hydraulic gradient. Simulated and observed temperatures within the wells reflect a combination of screen placement and layering, with inconsistencies largely explained by the lateral continuity of high permeability layers represented in the model. Simulation of heat injection, storage and recovery show preferential transport along high permeability layers, resulting in longitudinal plume distortion, and overall higher short-term storage efficiencies.

  8. Wireless physical layer security

    NASA Astrophysics Data System (ADS)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  9. Wireless physical layer security.

    PubMed

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  10. Wireless physical layer security

    PubMed Central

    Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211

  11. Towards real-time photon Monte Carlo dose calculation in the cloud

    NASA Astrophysics Data System (ADS)

    Ziegenhein, Peter; Kozin, Igor N.; Kamerling, Cornelis Ph; Oelfke, Uwe

    2017-06-01

    Near real-time application of Monte Carlo (MC) dose calculation in clinic and research is hindered by the long computational runtimes of established software. Currently, fast MC software solutions are available utilising accelerators such as graphical processing units (GPUs) or clusters based on central processing units (CPUs). Both platforms are expensive in terms of purchase costs and maintenance and, in case of the GPU, provide only limited scalability. In this work we propose a cloud-based MC solution, which offers high scalability of accurate photon dose calculations. The MC simulations run on a private virtual supercomputer that is formed in the cloud. Computational resources can be provisioned dynamically at low cost without upfront investment in expensive hardware. A client-server software solution has been developed which controls the simulations and transports data to and from the cloud efficiently and securely. The client application integrates seamlessly into a treatment planning system. It runs the MC simulation workflow automatically and securely exchanges simulation data with the server side application that controls the virtual supercomputer. Advanced encryption standards were used to add an additional security layer, which encrypts and decrypts patient data on-the-fly at the processor register level. We could show that our cloud-based MC framework enables near real-time dose computation. It delivers excellent linear scaling for high-resolution datasets with absolute runtimes of 1.1 seconds to 10.9 seconds for simulating a clinical prostate and liver case up to 1% statistical uncertainty. The computation runtimes include the transportation of data to and from the cloud as well as process scheduling and synchronisation overhead. Cloud-based MC simulations offer a fast, affordable and easily accessible alternative for near real-time accurate dose calculations to currently used GPU or cluster solutions.

  12. Towards real-time photon Monte Carlo dose calculation in the cloud.

    PubMed

    Ziegenhein, Peter; Kozin, Igor N; Kamerling, Cornelis Ph; Oelfke, Uwe

    2017-06-07

    Near real-time application of Monte Carlo (MC) dose calculation in clinic and research is hindered by the long computational runtimes of established software. Currently, fast MC software solutions are available utilising accelerators such as graphical processing units (GPUs) or clusters based on central processing units (CPUs). Both platforms are expensive in terms of purchase costs and maintenance and, in case of the GPU, provide only limited scalability. In this work we propose a cloud-based MC solution, which offers high scalability of accurate photon dose calculations. The MC simulations run on a private virtual supercomputer that is formed in the cloud. Computational resources can be provisioned dynamically at low cost without upfront investment in expensive hardware. A client-server software solution has been developed which controls the simulations and transports data to and from the cloud efficiently and securely. The client application integrates seamlessly into a treatment planning system. It runs the MC simulation workflow automatically and securely exchanges simulation data with the server side application that controls the virtual supercomputer. Advanced encryption standards were used to add an additional security layer, which encrypts and decrypts patient data on-the-fly at the processor register level. We could show that our cloud-based MC framework enables near real-time dose computation. It delivers excellent linear scaling for high-resolution datasets with absolute runtimes of 1.1 seconds to 10.9 seconds for simulating a clinical prostate and liver case up to 1% statistical uncertainty. The computation runtimes include the transportation of data to and from the cloud as well as process scheduling and synchronisation overhead. Cloud-based MC simulations offer a fast, affordable and easily accessible alternative for near real-time accurate dose calculations to currently used GPU or cluster solutions.

  13. Near-Infrared to Visible Organic Upconversion Devices Based on Organic Light-Emitting Field Effect Transistors.

    PubMed

    Li, Dongwei; Hu, Yongsheng; Zhang, Nan; Lv, Ying; Lin, Jie; Guo, Xiaoyang; Fan, Yi; Luo, Jinsong; Liu, Xingyuan

    2017-10-18

    The near-infrared (NIR) to visible upconversion devices have attracted great attention because of their potential applications in the fields of night vision, medical imaging, and military security. Herein, a novel all-organic upconversion device architecture has been first proposed and developed by incorporating a NIR absorption layer between the carrier transport layer and the emission layer in heterostructured organic light-emitting field effect transistors (OLEFETs). The as-prepared devices show a typical photon-to-photon upconversion efficiency as high as 7% (maximum of 28.7% under low incident NIR power intensity) and millisecond-scale response time, which are the highest upconversion efficiency and one of the fastest response time among organic upconversion devices as referred to the previous reports up to now. The high upconversion performance mainly originates from the gain mechanism of field-effect transistor structures and the unique advantage of OLEFETs to balance between the photodetection and light emission. Meanwhile, the strategy of OLEFETs also offers the advantage of high integration so that no extra OLED is needed in the organic upconversion devices. The results would pave way for low-cost, flexible and portable organic upconversion devices with high efficiency and simplified processing.

  14. The effect of the hole injection layer on the performance of single layer organic light-emitting diodes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wenjin, Zeng; Ran, Bi; Hongmei, Zhang, E-mail: iamhmzhang@njupt.edu.cn, E-mail: iamwhuang@njupt.edu.cn

    2014-12-14

    Efficient single-layer organic light-emitting diodes (OLEDs) were reported based on a green fluorescent dye 10-(2-benzothiazolyl)-2,3,6,7-tetrahydro-1,1,7,7–tetramethyl-1H,5H,11H-(1) benzopyropyrano (6,7-8-I,j)quinolizin-11-one (C545T). Herein, poly(3,4-ethylenedioxy thiophene) poly(styrene sulfonate) were, respectively, applied as the injection layer for comparison. The hole transport properties of the emission layer with different hole injection materials are well investigated via current-voltage measurement. It was clearly found that the hole injection layers (HILs) play an important role in the adjustment of the electron/hole injection to attain transport balance of charge carriers in the single emission layer of OLEDs with electron-transporting host. The layer of tris-(8-hydroxyquinoline) aluminum played a dual role of hostmore » and electron-transporting materials within the emission layer. Therefore, appropriate selection of hole injection layer is a key factor to achieve high efficiency OLEDs with single emission layer.« less

  15. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shull, Doug

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  16. Color stable white phosphorescent organic light emitting diodes with red emissive electron transport layer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wook Kim, Jin; Yoo, Seung Il; Sung Kang, Jin

    2015-06-28

    We analyzed the performance of multi-emissive white phosphorescent organic light-emitting diodes (PHOLEDs) in relation to various red emitting sites of hole and electron transport layers (HTL and ETL). The shift of the recombination zone producing stable white emission in PHOLEDs was utilized as luminance was increased with red emission in its electron transport layer. Multi-emissive white PHOLEDs including the red light emitting electron transport layer yielded maximum external quantum efficiency of 17.4% with CIE color coordinates (−0.030, +0.001) shifting only from 1000 to 10 000 cd/m{sup 2}. Additionally, we observed a reduction of energy loss in the white PHOLED via Ir(piq){submore » 3} as phosphorescent red dopant in electron transport layer.« less

  17. Improved efficiency of NiOx-based p-i-n perovskite solar cells by using PTEG-1 as electron transport layer

    NASA Astrophysics Data System (ADS)

    Groeneveld, Bart G. H. M.; Najafi, Mehrdad; Steensma, Bauke; Adjokatse, Sampson; Fang, Hong-Hua; Jahani, Fatemeh; Qiu, Li; ten Brink, Gert H.; Hummelen, Jan C.; Loi, Maria Antonietta

    2017-07-01

    We present efficient p-i-n type perovskite solar cells using NiOx as the hole transport layer and a fulleropyrrolidine with a triethylene glycol monoethyl ether side chain (PTEG-1) as electron transport layer. This electron transport layer leads to higher power conversion efficiencies compared to perovskite solar cells with PCBM (phenyl-C61-butyric acid methyl ester). The improved performance of PTEG-1 devices is attributed to the reduced trap-assisted recombination and improved charge extraction in these solar cells, as determined by light intensity dependence and photoluminescence measurements. Through optimization of the hole and electron transport layers, the power conversion efficiency of the NiOx/perovskite/PTEG-1 solar cells was increased up to 16.1%.

  18. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  20. 49 CFR 1510.5 - Imposition of security service fees.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Imposition of security service fees. 1510.5... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE FEES § 1510.5 Imposition of security service fees. (a) Each direct air...

  1. The dynamics of layered and non-layered oscillatory double-diffusive convection

    NASA Astrophysics Data System (ADS)

    Moll, Ryan D.

    Oscillatory double diffusive convection (ODDC) is a double diffusive instability that occurs in fluids that are unstably stratified in temperature and stably stratified in chemical composition. Regions unstable to ODDC are common in the interiors of stars and giant planets, and knowing thermal and compositional transport through these regions is important for stellar and planetary evolution models. Using 3D direct numerical simulations, Rosenblum et al. 2011 first showed that ODDC can either lead to the spontaneous formation of convective layers, or remain in a state dominated by large scale gravity waves. Subsequent studies focused on identifying the conditions for layer formation (Mirouh et al. 2012), and quantifying transport through layered systems (Wood et al. 2013). This document includes 3 works that build on the results of these earlier studies. The subject of the first is transport through non-layered ODDC and shows that in the absence of layered convection, ODDC is dominated by large scale gravity waves that grow to the size of the domain. We find that while these gravity waves induce small amounts of turbulent mixing, turbulent transport through non-layered systems is not significant for the purposes of astrophysical modeling (unlike in layered convection). The second study pertains to ODDC in the presence of Coriolis forces, and shows that rotating systems can be categorized depending on the strength of the rotation. We find that in the slowly rotating regime, the presence of rotation does not significantly affect qualitative behavior, but leads to modest reductions in thermal and compositional transport, while in the fast rotation regime qualitative behaviors are radically different, and systems are dominated by vortices that affect thermal and compositional transport in complex ways. In the final work we study simulations of ODDC at non-layered parameters that are forced into a layered configuration by initial conditions. Our results show that measurements of thermal and compositional transport deviate from values predicted by oft-cited geophysical transport laws.

  2. Preparing for the Next Kamikaze Attack on the American Homeland

    DTIC Science & Technology

    2007-11-27

    This paper presents a case for not diverting additional Transportation Security Administration (TSA) resources from Civil Aviation security to...divert additional resources from Civil Aviation security to General Aviation security .

  3. Characterization of transport phenomena in porous transport layers using X-ray microtomography

    NASA Astrophysics Data System (ADS)

    Hasanpour, S.; Hoorfar, M.; Phillion, A. B.

    2017-06-01

    Among different methods available for estimating the transport properties of porous transport layers (PTLs) of polymer electrolyte membrane fuel cells, X-ray micro computed tomography (X-μCT) imaging in combination with image-based numerical simulation has been recognized as a viable tool. In this study, four commercially-available single-layer and dual-layer PTLs are analyzed using this method in order to compare and contrast transport properties between different PTLs, as well as the variability within a single sheet. Complete transport property datasets are created for each PTL. The simulation predictions indicate that PTLs with high porosity show considerable variability in permeability and effective diffusivity, while PTLs with low porosity do not. Furthermore, it is seen that the Tomadakis-Sotirchos (TS) analytical expressions for porous media match the image-based simulations when porosity is relatively low but predict higher permeability and effective diffusivity for porosity values greater than 80%. Finally, the simulations show that cracks within MPL of dual-layer PTLs have a significant effect on the overall permeability and effective diffusivity of the PTLs. This must be considered when estimating the transport properties of dual-layer PTLs. These findings can be used to improve macro-scale models of product and reactant transport within fuel cells, and ultimately, fuel cell efficiency.

  4. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...

  5. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...

  6. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...

  7. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  8. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  9. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  10. SEADE: Countering the Futility of Network Security

    DTIC Science & Technology

    2015-10-01

    guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The

  11. Safety and security of radioactive sources in industrial radiography in Bangladesh

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less

  12. Polymer and small molecule based hybrid light source

    DOEpatents

    Choong, Vi-En; Choulis, Stelios; Krummacher, Benjamin Claus; Mathai, Mathew; So, Franky

    2010-03-16

    An organic electroluminescent device, includes: a substrate; a hole-injecting electrode (anode) coated over the substrate; a hole injection layer coated over the anode; a hole transporting layer coated over the hole injection layer; a polymer based light emitting layer, coated over the hole transporting layer; a small molecule based light emitting layer, thermally evaporated over the polymer based light emitting layer; and an electron-injecting electrode (cathode) deposited over the electroluminescent polymer layer.

  13. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement officials...

  14. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement officials...

  15. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement officials...

  16. 33 CFR 101.100 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.100 Purpose. (a) The purpose of this subchapter is: (1) To implement portions of the maritime security regime required by the Maritime Transportation Security Act of 2002, as...

  17. Towards lightweight and flexible high performance nanocrystalline silicon solar cells through light trapping and transport layers

    NASA Astrophysics Data System (ADS)

    Gray, Zachary R.

    This thesis investigates ways to enhance the efficiency of thin film solar cells through the application of both novel nano-element array light trapping architectures and nickel oxide hole transport/electron blocking layers. Experimental results independently demonstrate a 22% enhancement in short circuit current density (JSC) resulting from a nano-element array light trapping architecture and a ˜23% enhancement in fill factor (FF) and ˜16% enhancement in open circuit voltage (VOC) resulting from a nickel oxide transport layer. In each case, the overall efficiency of the device employing the light trapping or transport layer was superior to that of the corresponding control device. Since the efficiency of a solar cell scales with the product of JSC, FF, and VOC, it follows that the results of this thesis suggest high performance thin film solar cells can be realized in the event light trapping architectures and transport layers can be simultaneously optimized. The realizations of these performance enhancements stem from extensive process optimization for numerous light trapping and transport layer fabrication approaches. These approaches were guided by numerical modeling techniques which will also be discussed. Key developments in this thesis include (1) the fabrication of nano-element topographies conducive to light trapping using various fabrication approaches, (2) the deposition of defect free nc-Si:H onto structured topographies by switching from SiH4 to SiF 4 PECVD gas chemistry, and (3) the development of the atomic layer deposition (ALD) growth conditions for NiO. Keywords: light trapping, nano-element array, hole transport layer, electron blocking layer, nickel oxide, nanocrystalline silicon, aluminum doped zinc oxide, atomic layer deposition, plasma enhanced chemical vapor deposition, electron beam lithography, ANSYS HFSS.

  18. Hazardous materials safety and security technology field operational test. Volume II, evaluation final report synthesis

    DOT National Transportation Integrated Search

    2004-11-11

    The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...

  19. 15 CFR 700.18 - Limitations on placing rated orders.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... transportation (Department of Transportation); (v) Water resources (Department of Defense/U.S. Army Corps of... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.18 Limitations on placing...

  20. 15 CFR 700.18 - Limitations on placing rated orders.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... transportation (Department of Transportation); (v) Water resources (Department of Defense/U.S. Army Corps of... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.18 Limitations on placing...

  1. 15 CFR 700.18 - Limitations on placing rated orders.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... transportation (Department of Transportation); (v) Water resources (Department of Defense/U.S. Army Corps of... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities § 700.18 Limitations on placing...

  2. Hazardous material transportation safety and security field operational test final evaluation plan : executive summary

    DOT National Transportation Integrated Search

    2003-03-17

    The purpose of this effort is to independently evaluate the Battelle Operational Test Team to test methods for leveraging technology and operations to improve HAZMAT transport security, safety, and operational efficiency. As such, the preceding techn...

  3. Border and Transportation Security: Overview of Congressional Issues

    DTIC Science & Technology

    2004-12-17

    railways, airways, and waterways. While in the immediate aftermath of 9/11 efforts primarily concentrated on an expanded federal role in aviation ... security (in particular on the heightened screening of passengers and baggage), increasingly attention is being turned towards other modes of transportation.

  4. Sustainable Transportation: Strategy for Security, Prosperity, and Peace

    DTIC Science & Technology

    2014-11-01

    number. 1 . REPORT DATE NOV 2014 2. REPORT TYPE 3 . DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Sustainable Transportation...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...licensed Professional Engineer in the state of Virginia. viii 1 SUSTAINABLE TRANSPORTATION: STRATEGY FOR SECURITY, PROSPERITY, AND PEACE Introduction

  5. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...

  6. 49 CFR 8.31 - Industrial security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...

  7. 49 CFR 8.31 - Industrial security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...

  8. 78 FR 26057 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline Corporate Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-03

    ... Information Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request... current industry security practices through its Pipeline Corporate Security Review (PCSR) program. The...

  9. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  10. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  11. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  12. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  13. Heterojunction PbS nanocrystal solar cells with oxide charge-transport layers.

    PubMed

    Hyun, Byung-Ryool; Choi, Joshua J; Seyler, Kyle L; Hanrath, Tobias; Wise, Frank W

    2013-12-23

    Oxides are commonly employed as electron-transport layers in optoelectronic devices based on semiconductor nanocrystals, but are relatively rare as hole-transport layers. We report studies of NiO hole-transport layers in PbS nanocrystal photovoltaic structures. Transient fluorescence experiments are used to verify the relevant energy levels for hole transfer. On the basis of these results, planar heterojunction devices with ZnO as the photoanode and NiO as the photocathode were fabricated and characterized. Solution-processed devices were used to systematically study the dependence on nanocrystal size and achieve conversion efficiency as high as 2.5%. Optical modeling indicates that optimum performance should be obtained with thinner oxide layers than can be produced reliably by solution casting. Room-temperature sputtering allows deposition of oxide layers as thin as 10 nm, which enables optimization of device performance with respect to the thickness of the charge-transport layers. The best devices achieve an open-circuit voltage of 0.72 V and efficiency of 5.3% while eliminating most organic material from the structure and being compatible with tandem structures.

  14. Charge transport in quantum dot organic solar cells with Si quantum dots sandwiched between poly(3-hexylthiophene) (P3HT) absorber and bathocuproine (BCP) transport layers

    NASA Astrophysics Data System (ADS)

    Verma, Upendra Kumar; Kumar, Brijesh

    2017-10-01

    We have modeled a multilayer quantum dot organic solar cell that explores the current-voltage characteristic of the solar cell whose characteristics can be tuned by varying the fabrication parameters of the quantum dots (QDs). The modeled device consists of a hole transport layer (HTL) which doubles up as photon absorbing layer, several quantum dot layers, and an electron transport layer (ETL). The conduction of charge carriers in HTL and ETL has been modeled by the drift-diffusion transport mechanism. The conduction and recombination in the quantum dot layers are described by a system of coupled rate equations incorporating tunneling and bimolecular recombination. Analysis of QD-solar cells shows improved device performance compared to the similar bilayer and trilayer device structures without QDs. Keeping other design parameters constant, solar cell characteristics can be controlled by the quantum dot layers. Bimolecular recombination coefficient of quantum dots is a prime factor which controls the open circuit voltage (VOC) without any significant reduction in short circuit current (JSC).

  15. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    DOT National Transportation Integrated Search

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  16. 78 FR 13395 - Meeting: RTCA Special Committee 223, Airport Surface Wireless Communications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-27

    ... Review: Convergence Sub-layer. Security. MAC Layer. Physical Layer. PICS. CRSL. Review/Approval of MOPS... Washington, DC, on February 21, 2013. Paige Williams, Management Analyst, NextGen, Business Operations Group...

  17. A Decomposition Method for Security Constrained Economic Dispatch of a Three-Layer Power System

    NASA Astrophysics Data System (ADS)

    Yang, Junfeng; Luo, Zhiqiang; Dong, Cheng; Lai, Xiaowen; Wang, Yang

    2018-01-01

    This paper proposes a new decomposition method for the security-constrained economic dispatch in a three-layer large-scale power system. The decomposition is realized using two main techniques. The first is to use Ward equivalencing-based network reduction to reduce the number of variables and constraints in the high-layer model without sacrificing accuracy. The second is to develop a price response function to exchange signal information between neighboring layers, which significantly improves the information exchange efficiency of each iteration and results in less iterations and less computational time. The case studies based on the duplicated RTS-79 system demonstrate the effectiveness and robustness of the proposed method.

  18. Transportation Self-Efficacy and Social Problem-Solving of Persons Who Are Blind or Visually Impaired.

    PubMed

    Crudden, Adele; O'Mally, Jamie; Antonelli, Karla

    2016-01-01

    Social problem-solving skills and transportation self-efficacy were assessed for 48 vocational rehabilitation consumers with visual disabilities who required assistance securing work transportation. Social problem solving was at the upper end of the normed average; transportation self-efficacy averaged 101.5 out of 140. Level of vision loss was not associated with score differences; urban residence related to slightly higher self-efficacy than suburban or rural residency. Participants appeared to have the skills necessary to secure employment transportation, but were less confident about transportation-seeking activities that required more initiative of social interaction. Training and information might help consumers gain confidence in these tasks and increase viable transportation options.

  19. A numerical study on the charge transport in TPD/Alq3-based organic light emitting diodes.

    PubMed

    Kim, K S; Hwang, Y W; Lee, H G; Won, T Y

    2014-08-01

    We report our simulation study on the charge transport characteristic of the multi-layer structure for organic light emitting diodes (OLEDs). We performed a numerical simulation on a multilayer structure comprising a hole transport layer (HTL), an emission layer (EML), and an electron transport layer (ETL) between both electrodes. The material of the HTL is TPD (N,N'-Bis (3-methylphenyl)-N,N'-bis(phenyl) benzidine), and the ETL includes Alq3 (Tris (8-hyroxyquinolinato) aluminium). Here, we investigated the parameters such as recombination rates which influence the efficiency of the charge transport between layers in bilayer OLEDs. We also analyzed a transient response during the turn on/off period and the carrier transport in accordance with the variation of the injection barrier and applied voltage. In addition, our numerical simulation revealed that the insertion of the EML affects the photonic characteristics in bilayer structure and also the efficiency due to the difference in the internal barrier height.

  20. 49 CFR 1511.7 - Remittance of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Remittance of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.7 Remittance of Aviation Security Infrastructure Fees. (a) No..., or an amount as otherwise determined by the Administrator, which will represent the Aviation Security...

  1. 49 CFR 1511.7 - Remittance of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Remittance of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.7 Remittance of Aviation Security Infrastructure Fees. (a) No..., or an amount as otherwise determined by the Administrator, which will represent the Aviation Security...

  2. 49 CFR 1511.7 - Remittance of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Remittance of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.7 Remittance of Aviation Security Infrastructure Fees. (a) No..., or an amount as otherwise determined by the Administrator, which will represent the Aviation Security...

  3. 49 CFR 1511.5 - Imposition of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Imposition of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.5 Imposition of Aviation Security Infrastructure Fees. (a) Effective February 18, 2002, an Aviation Security Infrastructure Fee will be imposed on air carriers and...

  4. 49 CFR 1511.7 - Remittance of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Remittance of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.7 Remittance of Aviation Security Infrastructure Fees. (a) No..., or an amount as otherwise determined by the Administrator, which will represent the Aviation Security...

  5. 49 CFR 1511.5 - Imposition of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Imposition of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.5 Imposition of Aviation Security Infrastructure Fees. (a) Effective February 18, 2002, an Aviation Security Infrastructure Fee will be imposed on air carriers and...

  6. 49 CFR 1511.7 - Remittance of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Remittance of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.7 Remittance of Aviation Security Infrastructure Fees. (a) No..., or an amount as otherwise determined by the Administrator, which will represent the Aviation Security...

  7. 49 CFR 1511.5 - Imposition of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Imposition of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.5 Imposition of Aviation Security Infrastructure Fees. (a) Effective February 18, 2002, an Aviation Security Infrastructure Fee will be imposed on air carriers and...

  8. 49 CFR 1511.5 - Imposition of Aviation Security Infrastructure Fees.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Imposition of Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.5 Imposition of Aviation Security Infrastructure Fees. (a) Effective February 18, 2002, an Aviation Security Infrastructure Fee will be imposed on air carriers and...

  9. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  10. 14 CFR 129.28 - Flightdeck security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  11. 49 CFR 193.2913 - Security monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  12. 49 CFR 193.2903 - Security procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...

  13. 14 CFR 129.28 - Flightdeck security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  14. 49 CFR 193.2903 - Security procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...

  15. 14 CFR 129.28 - Flightdeck security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  16. 49 CFR 193.2913 - Security monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  17. 49 CFR 193.2903 - Security procedures.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security procedures. 193.2903 Section 193.2903...: FEDERAL SAFETY STANDARDS Security § 193.2903 Security procedures. Each operator shall prepare and follow one or more manuals of written procedures to provide security for each LNG plant. The procedures must...

  18. 49 CFR 193.2913 - Security monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  19. 75 FR 73117 - New Agency Information Collection Activity Under OMB Review: Pipeline Corporate Security Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ... Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation Security.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Pipeline Corporate Security Review (PCSR) Protocol...

  20. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...

  1. Micromotor-based lab-on-chip immunoassays

    NASA Astrophysics Data System (ADS)

    García, Miguel; Orozco, Jahir; Guix, Maria; Gao, Wei; Sattayasamitsathit, Sirilak; Escarpa, Alberto; Merkoçi, Arben; Wang, Joseph

    2013-01-01

    Here we describe the first example of using self-propelled antibody-functionalized synthetic catalytic microengines for capturing and transporting target proteins between the different reservoirs of a lab-on-a-chip (LOC) device. A new catalytic polymer/Ni/Pt microtube engine, containing carboxy moieties on its mixed poly(3,4-ethylenedioxythiophene) (PEDOT)/COOH-PEDOT polymeric outermost layer, is further functionalized with the antibody receptor to selectively recognize and capture the target protein. The new motor-based microchip immunoassay operations are carried out without any bulk fluid flow, replacing the common washing steps in antibody-based protein bioassays with the active transport of the captured protein throughout the different reservoirs, where each step of the immunoassay takes place. A first microchip format involving an `on-the-fly' double-antibody sandwich assay (DASA) is used for demonstrating the selective capture of the target protein, in the presence of excess of non-target proteins. A secondary antibody tagged with a polymeric-sphere tracer allows the direct visualization of the binding events. In a second approach the immuno-nanomotor captures and transports the microsphere-tagged antigen through a microchannel network. An anti-protein-A modified microengine is finally used to demonstrate the selective capture, transport and convenient label-free optical detection of a Staphylococcus aureus target bacteria (containing proteinA in its cell wall) in the presence of a large excess of non-target (Saccharomyces cerevisiae) cells. The resulting nanomotor-based microchip immunoassay offers considerable potential for diverse applications in clinical diagnostics, environmental and security monitoring fields.Here we describe the first example of using self-propelled antibody-functionalized synthetic catalytic microengines for capturing and transporting target proteins between the different reservoirs of a lab-on-a-chip (LOC) device. A new catalytic polymer/Ni/Pt microtube engine, containing carboxy moieties on its mixed poly(3,4-ethylenedioxythiophene) (PEDOT)/COOH-PEDOT polymeric outermost layer, is further functionalized with the antibody receptor to selectively recognize and capture the target protein. The new motor-based microchip immunoassay operations are carried out without any bulk fluid flow, replacing the common washing steps in antibody-based protein bioassays with the active transport of the captured protein throughout the different reservoirs, where each step of the immunoassay takes place. A first microchip format involving an `on-the-fly' double-antibody sandwich assay (DASA) is used for demonstrating the selective capture of the target protein, in the presence of excess of non-target proteins. A secondary antibody tagged with a polymeric-sphere tracer allows the direct visualization of the binding events. In a second approach the immuno-nanomotor captures and transports the microsphere-tagged antigen through a microchannel network. An anti-protein-A modified microengine is finally used to demonstrate the selective capture, transport and convenient label-free optical detection of a Staphylococcus aureus target bacteria (containing proteinA in its cell wall) in the presence of a large excess of non-target (Saccharomyces cerevisiae) cells. The resulting nanomotor-based microchip immunoassay offers considerable potential for diverse applications in clinical diagnostics, environmental and security monitoring fields. Electronic supplementary information (ESI) available. See DOI: 10.1039/c2nr32400h

  2. Efficient and ultraviolet durable planar perovskite solar cells via a ferrocenecarboxylic acid modified nickel oxide hole transport layer.

    PubMed

    Zhang, Jiankai; Luo, Hui; Xie, Weijia; Lin, Xuanhuai; Hou, Xian; Zhou, Jianping; Huang, Sumei; Ou-Yang, Wei; Sun, Zhuo; Chen, Xiaohong

    2018-03-28

    Planar perovskite solar cells (PSCs) that use nickel oxide (NiO x ) as a hole transport layer have recently attracted tremendous attention because of their excellent photovoltaic efficiencies and simple fabrication. However, the electrical conductivity of NiO x and the interface contact properties of the NiO x /perovskite layer are always limited for the NiO x layer fabricated at a relatively low annealing temperature. Ferrocenedicarboxylic acid (FDA) was firstly introduced to modify a p-type NiO x hole transport layer in PSCs, which obviously improves the crystallization of the perovskite layer and hole transport and collection abilities and reduces carrier recombination. PSCs with a FDA modified NiO x layer reached a PCE of 18.20%, which is much higher than the PCE (15.13%) of reference PSCs. Furthermore, PSCs with a FDA interfacial modification layer show better UV durability and a hysteresis-free effect and still maintain the original PCE value of 49.8%after being exposed to UV for 24 h. The enhanced performance of the PSCs is attributed to better crystallization of the perovskite layer, the passivation effect of FDA, superior interface contact at the NiO x /perovskite layers and enhancement of the electrical conductivity of the FDA modified NiO x layer. In addition, PSCs with FDA inserted at the interface of the perovskite/PCBM layers can also improve the PCE to 16.62%, indicating that FDA have dual functions to modify p-type and n-type carrier transporting layers.

  3. 33 CFR 101.300 - Preparedness communications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transportation security incident, the COTP will, when appropriate, communicate to the port stakeholders, vessels....300 Section 101.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Communication (Port-Facility-Vessel) § 101.300 Preparedness...

  4. Transportation Secure Data Center Publications | Transportation Secure Data

    Science.gov Websites

    : Emerging Technologies, June 2015 Pavement Performance Evaluation Using Connected Vehicles Author: R Research Procedia, 2015 Quantification of Temperature Implications and Investigation of Battery Design Design, and Consumer Usage Authors: E. Wood, J. Neubauer, A. Brooker, J. Gonder, and K. Smith Conference

  5. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-15

    ... Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire... Evaluation, Cardiac Further Evaluation, Diabetes Further Evaluation, Drug or Alcohol Use Further Evaluation... evaluate a candidate's physical and medical qualifications to be a TSO, including visual and aural acuity...

  6. Memorandum of understanding between the Department of Homeland Security and the Department of Transportation on roles and responsibilities.

    DOT National Transportation Integrated Search

    2004-01-01

    The purpose of this MOU is to facilitate the development and deployment of transportation securty measures that consider efficiency in the movement of goods and people at the same time that they engender greater safety and security.

  7. DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers.

    PubMed

    Sujansky, Walter; Wilson, Tom

    2015-04-01

    This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institutemore » (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.« less

  9. A game-theoretic method for cross-layer stochastic resilient control design in CPS

    NASA Astrophysics Data System (ADS)

    Shen, Jiajun; Feng, Dongqin

    2018-03-01

    In this paper, the cross-layer security problem of cyber-physical system (CPS) is investigated from the game-theoretic perspective. Physical dynamics of plant is captured by stochastic differential game with cyber-physical influence being considered. The sufficient and necessary condition for the existence of state-feedback equilibrium strategies is given. The attack-defence cyber interactions are formulated by a Stackelberg game intertwined with stochastic differential game in physical layer. The condition such that the Stackelberg equilibrium being unique and the corresponding analytical solutions are both provided. An algorithm is proposed for obtaining hierarchical security strategy by solving coupled games, which ensures the operational normalcy and cyber security of CPS subject to uncertain disturbance and unexpected cyberattacks. Simulation results are given to show the effectiveness and performance of the proposed algorithm.

  10. Composite oxygen ion transport element

    DOEpatents

    Chen, Jack C [Getzville, NY; Besecker, Charles J [Batavia, IL; Chen, Hancun [Williamsville, NY; Robinson, Earil T [Mentor, OH

    2007-06-12

    A composite oxygen ion transport element that has a layered structure formed by a dense layer to transport oxygen ions and electrons and a porous support layer to provide mechanical support. The dense layer can be formed of a mixture of a mixed conductor, an ionic conductor, and a metal. The porous support layer can be fabricated from an oxide dispersion strengthened metal, a metal-reinforced intermetallic alloy, a boron-doped Mo.sub.5Si.sub.3-based intermetallic alloy or combinations thereof. The support layer can be provided with a network of non-interconnected pores and each of said pores communicates between opposite surfaces of said support layer. Such a support layer can be advantageously employed to reduce diffusion resistance in any type of element, including those using a different material makeup than that outlined above.

  11. Sediment transport under wave groups: Relative importance between nonlinear waveshape and nonlinear boundary layer streaming

    USGS Publications Warehouse

    Yu, X.; Hsu, T.-J.; Hanes, D.M.

    2010-01-01

    Sediment transport under nonlinear waves in a predominately sheet flow condition is investigated using a two-phase model. Specifically, we study the relative importance between the nonlinear waveshape and nonlinear boundary layer streaming on cross-shore sand transport. Terms in the governing equations because of the nonlinear boundary layer process are included in this one-dimensional vertical (1DV) model by simplifying the two-dimensional vertical (2DV) ensemble-averaged two-phase equations with the assumption that waves propagate without changing their form. The model is first driven by measured time series of near-bed flow velocity because of a wave group during the SISTEX99 large wave flume experiment and validated with the measured sand concentration in the sheet flow layer. Additional studies are then carried out by including and excluding the nonlinear boundary layer terms. It is found that for the grain diameter (0.24 mm) and high-velocity skewness wave condition considered here, nonlinear waveshape (e.g., skewness) is the dominant mechanism causing net onshore transport and nonlinear boundary layer streaming effect only causes an additional 36% onshore transport. However, for conditions of relatively low-wave skewness and a stronger offshore directed current, nonlinear boundary layer streaming plays a more critical role in determining the net transport. Numerical experiments further suggest that the nonlinear boundary layer streaming effect becomes increasingly important for finer grain. When the numerical model is driven by measured near-bed flow velocity in a more realistic surf zone setting, model results suggest nonlinear boundary layer processes may nearly double the onshore transport purely because of nonlinear waveshape. Copyright 2010 by the American Geophysical Union.

  12. Biometrics encryption combining palmprint with two-layer error correction codes

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang

    2017-07-01

    To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.

  13. High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits

    DTIC Science & Technology

    2014-01-28

    polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating

  14. Unusual Enhancement in Intrinsic Thermal Conductivity of Multilayer Graphene by Tensile Strains

    DOE PAGES

    Kuang, Youdi; Lindsay, Lucas R.; Huang, Baoling

    2015-01-01

    High basal plane thermal conductivity k of multi-layer graphene makes it promising for thermal management applications. Here we examine the effects of tensile strain on thermal transport in this system. Using a first principles Boltzmann-Peierls equation for phonon transport approach, we calculate the room-temperature in-plane lattice k of multi-layer graphene (up to four layers) and graphite under different isotropic tensile strains. The calculated in-plane k of graphite, finite mono-layer graphene and 3-layer graphene agree well with previous experiments. The dimensional transitions of the intrinsic k and the extent of the diffusive transport regime from mono-layer graphene to graphite are presented.more » We find a peak enhancement of intrinsic k for multi-layer graphene and graphite with increasing strain and the largest enhancement amplitude is about 40%. In contrast the calculated intrinsic k with tensile strain decreases for diamond and diverges for graphene, we show that the competition between the decreased mode heat capacities and the increased lifetimes of flexural phonons with increasing strain contribute to this k behavior. Similar k behavior is observed for 2-layer hexagonal boron nitride systems, suggesting that it is an inherent thermal transport property in multi-layer systems assembled of purely two dimensional atomic layers. This study provides insights into engineering k of multi-layer graphene and boron nitride by strain and into the nature of thermal transport in quasi-two-dimensional and highly anisotropic systems.« less

  15. 49 CFR 1511.15 - Cessation of the Aviation Security Infrastructure Fee.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Cessation of the Aviation Security Infrastructure... AVIATION SECURITY INFRASTRUCTURE FEE § 1511.15 Cessation of the Aviation Security Infrastructure Fee... this part. Any unremitted Aviation Security Infrastructure Fees incurred by an air carrier or foreign...

  16. 75 FR 10300 - South Texas Area Maritime Security (STAMS) Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0074] South Texas Area Maritime Security... notice requests individuals interested in serving on the South Texas Area Maritime Security (STAMS... Section 102 of the Maritime Transportation Security Act (MTSA) of 2002 (Pub. L. 107-295) added section...

  17. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...

  18. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  19. 76 FR 9041 - Intent To Request Approval From OMB of One New Public Collection of Information: Security Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...

  20. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.9 Restrictions on the disclosure of SSI. (a) Duty to... infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

Top