Sample records for wide-area secure collaborative

  1. Technical Report for the Demonstration of Wide Area ...

    EPA Pesticide Factsheets

    Report The U.S. Environmental Protection Agency in collaboration with the Department of Homeland Security conducted the “Wide-Area Urban Radiological Contaminant, Mitigation, and Cleanup Technology Demonstration” in Columbus, Ohio on June 22-25, 2015. Five wide-area radiological decontamination technologies (including strippable coatings, gels, and chemical foam technologies) were demonstrated on an urban building.

  2. TeleMed: Wide-area, secure, collaborative object computing with Java and CORBA for healthcare

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forslund, D.W.; George, J.E.; Gavrilov, E.M.

    1998-12-31

    Distributed computing is becoming commonplace in a variety of industries with healthcare being a particularly important one for society. The authors describe the development and deployment of TeleMed in a few healthcare domains. TeleMed is a 100% Java distributed application build on CORBA and OMG standards enabling the collaboration on the treatment of chronically ill patients in a secure manner over the Internet. These standards enable other systems to work interoperably with TeleMed and provide transparent access to high performance distributed computing to the healthcare domain. The goal of wide scale integration of electronic medical records is a grand-challenge scalemore » problem of global proportions with far-reaching social benefits.« less

  3. Security and Policy for Group Collaboration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ian Foster; Carl Kesselman

    2006-07-31

    “Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration ofmore » new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.« less

  4. Wide area restoration following biological contamination

    NASA Astrophysics Data System (ADS)

    Yang, Lynn; Hibbard, Wilthea; Edwards, Donna; Franco, David; Fruetel, Julie; Tucker, Mark; Einfeld, Wayne; Knowlton, Robert; Brown, Gary; Brockmann, John; Greenwalt, Robert; Miles, Robin; Raber, Ellen; Carlsen, Tina; Krauter, Paula; Dillon, Michael; MacQueen, Don; Intrepido, Tony; Hoppes, Bill; Wilson, Wendy; Mancieri, Sav

    2008-04-01

    Current understanding of how to restore a wide area that has been contaminated following a large biological attack is limited. The Department of Homeland Security and Department of Defense are executing a four-year collaborative program named the Interagency Biological Restoration Demonstration (IBRD) program. This program is aimed at developing technologies, methods, plans and policies necessary to restore a wide area, including military installations and critical infrastructures, in the event of a large outdoor aerosol release of anthrax. The IBRD program partner pilot city is the Seattle Urban Area to include Fort Lewis, WA and McChord Air Force Base. A front-end systems analysis was conducted as part of IBRD, to: 1) assess existing technologies and processes for wide area restoration; from this, 2) develop an "as-is" decision framework for wide area restoration; and 3) identify and prioritize capability gaps. Qualitative assessments and quantitative analyses, including sensitivity, timeline and case study analyses, were conducted to evaluate existing processes and rank capability gaps. This paper describes the approach and results from this front-end systems analysis.

  5. The Military Dimension of the Niger Delta Crisis: Increasing the Effectiveness of Security Forces Through Information Operations

    DTIC Science & Technology

    2010-06-11

    Torulagha makes strong accusations against the oil companies who he says barely conduct any environmental assessment before engaging in exploratory...residents widely regard the GoN as ―having collaborated with the multinational oil firms to alter the social and environmental stability of the area ...residents demanded resource control in the face of environmental degradation by multinational oil companies; and complaints of government marginalization

  6. Regional collaboration among Urban Area Security Initiative regions: results of the Johns Hopkins urban area survey.

    PubMed

    Errett, Nicole A; Bowman, Calvin; Barnett, Daniel J; Resnick, Beth A; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration-related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments.

  7. Framework for Deploying a Virtualized Computing Environment for Collaborative and Secure Data Analytics

    PubMed Central

    Meyer, Adrian; Green, Laura; Faulk, Ciearro; Galla, Stephen; Meyer, Anne-Marie

    2016-01-01

    Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information. Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training. Conclusion: A platform like SeDAP is not simply successful through technical excellence and performance. It’s adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects. PMID:27683665

  8. Regional Collaboration Among Urban Area Security Initiative Regions: Results of the Johns Hopkins Urban Area Survey

    PubMed Central

    Bowman, Calvin; Barnett, Daniel J.; Resnick, Beth A.; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration–related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments. PMID:25398073

  9. Developing a Regional Recovery Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.

    2011-09-01

    Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other criticalmore » infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.« less

  10. Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing

    ERIC Educational Resources Information Center

    Konak, Abdullah; Kulturel-Konak, Sadan; Nasereddin, Mahdi; Bartolacci, Michael R.

    2017-01-01

    Aim/Purpose: This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students' technological backgrounds and the role of collaborative work. Background: RVCLs are widely used in information technology and cyber security education to provide…

  11. SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.

    PubMed

    Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra

    2013-01-01

    The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.

  12. The Benefits of Collaborative Processes for Establishing All Hazard Incident Management Teams in Urban Area Security Initiative Regions

    DTIC Science & Technology

    2013-09-01

    incidents beyond wild land fires.15 This journal article also noted that national IMTs provided command functions at the World Trade Center on September...11, 2001, Hurricane Katrina in 2005 and search and recovery efforts following the Space Shuttle Columbia disaster.16 Because of the utility and...Management Team SWA Southwest Area SWCC Southwest Coordination Center UASI Urban Area Security Initiative UAWG Urban Area Working Group

  13. A new security model for collaborative environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah; Lorch, Markus; Thompson, Mary

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less

  14. The International Collaboration for Autism Registry Epidemiology (iCARE): multinational registry-based investigations of autism risk factors and trends.

    PubMed

    Schendel, Diana E; Bresnahan, Michaeline; Carter, Kim W; Francis, Richard W; Gissler, Mika; Grønborg, Therese K; Gross, Raz; Gunnes, Nina; Hornig, Mady; Hultman, Christina M; Langridge, Amanda; Lauritsen, Marlene B; Leonard, Helen; Parner, Erik T; Reichenberg, Abraham; Sandin, Sven; Sourander, Andre; Stoltenberg, Camilla; Suominen, Auli; Surén, Pål; Susser, Ezra

    2013-11-01

    The International Collaboration for Autism Registry Epidemiology (iCARE) is the first multinational research consortium (Australia, Denmark, Finland, Israel, Norway, Sweden, USA) to promote research in autism geographical and temporal heterogeneity, phenotype, family and life course patterns, and etiology. iCARE devised solutions to challenges in multinational collaboration concerning data access security, confidentiality and management. Data are obtained by integrating existing national or state-wide, population-based, individual-level data systems and undergo rigorous harmonization and quality control processes. Analyses are performed using database federation via a computational infrastructure with a secure, web-based, interface. iCARE provides a unique, unprecedented resource in autism research that will significantly enhance the ability to detect environmental and genetic contributions to the causes and life course of autism.

  15. An Overview of SBIR Phase 2 Communications Technology and Development

    NASA Technical Reports Server (NTRS)

    Nguyen, Hung D.; Steele, Gynelle C.

    2015-01-01

    Technological innovation is the overall focus of NASA's Small Business Innovation Research (SBIR) program. The program invests in the development of innovative concepts and technologies to help NASA's mission directorates address critical research and development needs for agency projects. This report highlights innovative SBIR Phase II projects from 2007-2012 specifically addressing areas in Communications Technology and Development which is one of six core competencies at NASA Glenn Research Center. There are eighteen technologies featured with emphasis on a wide spectrum of applications such as with a security-enhanced autonomous network management, secure communications using on-demand single photons, cognitive software-defined radio, spacesuit audio systems, multiband photonic phased-array antenna, and much more. Each article in this booklet describes an innovation, technical objective, and highlights NASA commercial and industrial applications. This report serves as an opportunity for NASA personnel including engineers, researchers, and program managers to learn of NASA SBIR's capabilities that might be crosscutting into this technology area. As the result, it would cause collaborations and partnerships between the small companies and NASA Programs and Projects resulting in benefit to both SBIR companies and NASA.

  16. The Document Management Alliance.

    ERIC Educational Resources Information Center

    Fay, Chuck

    1998-01-01

    Describes the Document Management Alliance, a standards effort for document management systems that manages and tracks changes to electronic documents created and used by collaborative teams, provides secure access, and facilitates online information retrieval via the Internet and World Wide Web. Future directions are also discussed. (LRW)

  17. Structuring Cooperative Nuclear RIsk Reduction Initiatives with China.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brandt, Larry; Reinhardt, Jason Christian; Hecker, Siegfried

    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagementsmore » between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.« less

  18. Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kovacic, Donald N

    2015-01-01

    This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture

  19. The Potential for University Collaboration and Online Learning to Internationalise Geography Education

    ERIC Educational Resources Information Center

    Clark, Charlotte H.; Wilson, Benjamin P.

    2017-01-01

    International partnerships between universities, facilitated by online pedagogies, have great potential to bring together students and teachers from widely differing backgrounds, cultures and locations to combine global perspectives and local relevance in the widely interdisciplinary subject area of geography. However, collaboration between…

  20. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less

  1. Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm.

    PubMed

    Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar

    2018-01-31

    Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point's received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner.

  2. Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm

    PubMed Central

    Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar

    2018-01-01

    Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point’s received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner. PMID:29385042

  3. Increasing security through public health: a practical model.

    PubMed

    Parker, R David

    2011-01-01

    As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations. 2011.

  4. Discovering and Mitigating Software Vulnerabilities through Large-Scale Collaboration

    ERIC Educational Resources Information Center

    Zhao, Mingyi

    2016-01-01

    In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…

  5. Consolidation and development roadmap of the EMI middleware

    NASA Astrophysics Data System (ADS)

    Kónya, B.; Aiftimiei, C.; Cecchi, M.; Field, L.; Fuhrmann, P.; Nilsen, J. K.; White, J.

    2012-12-01

    Scientific research communities have benefited recently from the increasing availability of computing and data infrastructures with unprecedented capabilities for large scale distributed initiatives. These infrastructures are largely defined and enabled by the middleware they deploy. One of the major issues in the current usage of research infrastructures is the need to use similar but often incompatible middleware solutions. The European Middleware Initiative (EMI) is a collaboration of the major European middleware providers ARC, dCache, gLite and UNICORE. EMI aims to: deliver a consolidated set of middleware components for deployment in EGI, PRACE and other Distributed Computing Infrastructures; extend the interoperability between grids and other computing infrastructures; strengthen the reliability of the services; establish a sustainable model to maintain and evolve the middleware; fulfil the requirements of the user communities. This paper presents the consolidation and development objectives of the EMI software stack covering the last two years. The EMI development roadmap is introduced along the four technical areas of compute, data, security and infrastructure. The compute area plan focuses on consolidation of standards and agreements through a unified interface for job submission and management, a common format for accounting, the wide adoption of GLUE schema version 2.0 and the provision of a common framework for the execution of parallel jobs. The security area is working towards a unified security model and lowering the barriers to Grid usage by allowing users to gain access with their own credentials. The data area is focusing on implementing standards to ensure interoperability with other grids and industry components and to reuse already existing clients in operating systems and open source distributions. One of the highlights of the infrastructure area is the consolidation of the information system services via the creation of a common information backbone.

  6. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  7. Across the Atlantic cooperation to address international challenges in eHealth and health IT: managing toward a common goal.

    PubMed

    Friedman, Charles P; Iakovidis, Ilias; Debenedetti, Laurent; Lorenzi, Nancy M

    2009-11-01

    Countries on both sides of the Atlantic Ocean have invested in health information and communication technologies. Since eHealth challenges cross borders a European Union-United States of America conference on public policies relating to health IT and eHealth was held October 20-21, 2008 in Paris, France. The conference was organized around the four themes: (1) privacy and security, (2) health IT interoperability, (3) deployment and adoption of health IT, and (4) Public Private Collaborative Governance. The four key themes framed the discussion over the two days of plenary sessions and workshops. Key findings of the conference were organized along the four themes. (1) Privacy and security: Patients' access to their own data and key elements of a patient identification management framework were discussed. (2) Health IT interoperability: Three significant and common interoperability challenges emerged: (a) the need to establish common or compatible standards and clear guidelines for their implementation, (b) the desirability for shared certification criteria and (c) the need for greater awareness of the importance of interoperability. (3) Deployment and adoption of health IT: Three major areas of need emerged: (a) a shared knowledge base and assessment framework, (b) public-private collaboration and (c) and effective organizational change strategies. (4) Public Private Collaborative Governance: Sharing and communication are central to success in this area. Nations can learn from one another about ways to develop harmonious, effective partnerships. Three areas that were identified as highest priority for collaboration included: (1) health data security, (2) developing effective strategies to ensure healthcare professionals' acceptance of health IT tools, and (3) interoperability.

  8. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  9. Speaker Verification Using SVM

    DTIC Science & Technology

    2010-11-01

    application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic

  10. Pilot study completed: Paving the way for stereoscopic DEMs, orthophotos and vector maps over the ice-free parts of Greenland

    NASA Astrophysics Data System (ADS)

    Levinsen, Joanna F.; Borgstrøm, Rasmus E.

    2017-04-01

    We present the work towards developing new Digital Elevation Models (DEMs), orthophotos, and vector maps over the ice-free parts of Greenland. The products will be based on high-resolution stereoscopic images co-registered to Ground Control Points (GCPs) to reduce horizontal and vertical errors. Here, we provide a status overview of our achievements wrt. DEMs and orthophotos. We have conducted a pilot study in which four areas have been mapped using SPOT-6 and -7 images: The Disko Bay, Narsaq, Tasiilaq, and Zackenberg. The images have been acquired in 2016, with a few additions from 2014, and the areas cover approximately 82.000 km2, i.e. ˜20% of the total ice-free area. The technical requirements for the products have been defined in close collaboration with end-users from governmental institutions, emergency management offices, the tourist industry, etc., to ensure a direct applicability following product completion. This has resulted in 8 m DEMs and 1.5 m orthophotos. Validation against GCPs shows horizontal and vertical offsets of approximately 0.5 ± 2 m, i.e. values that meet our expectations and satisfy end-user needs. The GCPs make out an extensive network of huts, helipads, ports, large boulders, etc., measured using GPS by collaborators during field campaigns. The experiences gained in the product development as well as the broad range of collaborations provides confidence that the set-up for a production of the total ice-free area has been established, which can deliver products with a high accuracy in time and space. That will make them useful for a wide range of purposes. The next step therefore is to secure the given upgrade. More on that to come!

  11. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raber, Ellen; Kirvel, Robert; MacQueen, Don

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urbanmore » area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and decision points.« less

  12. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    PubMed

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  13. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  14. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    PubMed

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  15. Use of a secure Internet Web site for collaborative medical research.

    PubMed

    Marshall, W W; Haley, R W

    2000-10-11

    Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.

  16. Federal-Tribal Government Collaboration in Homeland Security

    DTIC Science & Technology

    2007-09-01

    the direct cooperation and collaboration that had long characterized their unique status. Many tribes, such as the Navajo Nation , cover areas in...values. The Navajo Rangers interoperable communications system was also cited as a model. The Navajo Rangers are part of the Navajo Nation Parks...through the tribal lands of the Tohono O’odham Nation , and more than twenty-five other tribes have land on or near the international borders or

  17. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C. M. Pancerella; L. A. Rahn; C. Yang

    2000-02-01

    The Diesel Combustion Collaborator (DCC) is a pilot project to develop and deploy collaborative technologies to combustion researchers distributed throughout the DOE national laboratories, academia, and industry. The result is a problem-solving environment for combustion research. Researchers collaborate over the Internet using DCC tools, which include: a distributed execution management system for running combustion models on widely distributed computers, including supercomputers; web-accessible data archiving capabilities for sharing graphical experimental or modeling data; electronic notebooks and shared workspaces for facilitating collaboration; visualization of combustion data; and video-conferencing and data-conferencing among researchers at remote sites. Security is a key aspect of themore » collaborative tools. In many cases, the authors have integrated these tools to allow data, including large combustion data sets, to flow seamlessly, for example, from modeling tools to data archives. In this paper the authors describe the work of a larger collaborative effort to design, implement and deploy the DCC.« less

  18. 76 FR 6761 - Federal Advisory Committee Meeting To Be Held Authorized Under the Secure Rural Schools Act and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... varied interests and areas of expertise. They will work collaboratively to improve working relationships... National Forests lands and can maintain infrastructure, improve the health of watersheds and ecosystems...

  19. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  20. Common Capabilities for Trust and Security in Service Oriented Infrastructures

    NASA Astrophysics Data System (ADS)

    Brossard, David; Colombo, Maurizio

    In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.

  1. Security Aspects of an Enterprise-Wide Network Architecture.

    ERIC Educational Resources Information Center

    Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan

    1999-01-01

    Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…

  2. Idaho National Laboratory Mission Accomplishments, Fiscal Year 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allen, Todd Randall; Wright, Virginia Latta

    A summary of mission accomplishments for the research organizations at the Idaho National Laboratory for FY 2015. Areas include Nuclear Energy, National and Homeland Security, Science and Technology Addressing Broad DOE Missions; Collaborations; and Stewardship and Operation of Research Facilities.

  3. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    NASA Astrophysics Data System (ADS)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  4. Interagency Biological Restoration Demonstration (IBRD): a collaborative approach to biological incident recovery.

    PubMed

    Crockett, Katie

    2011-09-01

    Following the terrorist attacks in 2001, much time and effort has been put toward improving catastrophic incident response. But recovery--the period following initial response that focuses on the long-term viability of the affected area--has received less attention. Recognizing the importance of being able to recover an area following a catastrophic incident, the Department of Defense, through its Defense Threat Reduction Agency (DTRA), and the Department of Homeland Security, through its Science and Technology Directorate (DHS S&T), created the Interagency Biological Restoration Demonstration (IBRD) program. IBRD was a 4-year program jointly managed and funded by DTRA and DHS S&T, the goal of which was to reduce the time and resources necessary to recover a wide urban area from an intentional release of Bacillus anthracis. Specific program objectives included understanding the social, economic, and operational interdependencies that affect recovery; establishing long-term coordination between the Departments of Defense and Homeland Security; developing strategic recovery/restoration plans; identifying and demonstrating technologies that support recovery; and exercising recovery activities and technology solutions. IBRD has made important first steps toward improving national preparedness in the area biological incident recovery. Specifically, IBRD has helped enhance the efficacy and efficiency of recovering large urban areas by developing consequence management guidance; identifying key S&T capabilities and integrating them with planning and guidance documents; and establishing key relationships across the federal interagency, federal-to-regional, civilian-to-military, and public-to-private stakeholders. Upon completion of IBRD in fall 2010, both DTRA and DHS S&T planned follow-on programs.

  5. Department of Defense Chemical and Biological Defense Program. Annual Report to Congress

    DTIC Science & Technology

    2008-05-01

    defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military

  6. Human image tracking technique applied to remote collaborative environments

    NASA Astrophysics Data System (ADS)

    Nagashima, Yoshio; Suzuki, Gen

    1993-10-01

    To support various kinds of collaborations over long distances by using visual telecommunication, it is necessary to transmit visual information related to the participants and topical materials. When people collaborate in the same workspace, they use visual cues such as facial expressions and eye movement. The realization of coexistence in a collaborative workspace requires the support of these visual cues. Therefore, it is important that the facial images be large enough to be useful. During collaborations, especially dynamic collaborative activities such as equipment operation or lectures, the participants often move within the workspace. When the people move frequently or over a wide area, the necessity for automatic human tracking increases. Using the movement area of the human being or the resolution of the extracted area, we have developed a memory tracking method and a camera tracking method for automatic human tracking. Experimental results using a real-time tracking system show that the extracted area fairly moves according to the movement of the human head.

  7. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    NASA Astrophysics Data System (ADS)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  8. Right Technology, Right Now: An Evaluation Methodology for Rapidly Deployable Information and Communications Technologies in Humanitarian Assistance/Disaster Relief

    DTIC Science & Technology

    2012-03-01

    30  c.  IEEE 802.16/WiMAX .............................................................31  4.  Broadband Global Area Network...Space Agency, 2006) ...........................34  Figure 19.  Global BGAN Coverage (From Inmarsat, 2009...BGAN Broadband Global Area Network C2 Command and Control CHSC California Homeland Security Consortium CIE Collaborative Information Environment CJCS

  9. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  10. Honeynet Learning: Discovering IT Security

    ERIC Educational Resources Information Center

    del Moral Talabis, Mark Ryan

    2007-01-01

    Learning IT Security in a classroom setting has often been a frustrating endeavor for both instructors and students alike. From our experience, traditional instructional methods like direct instruction and lectures though widely used and effective in most other areas have significant shortcomings when applied in IT security learning. In this…

  11. Wide-area situation awareness in electric power grid

    NASA Astrophysics Data System (ADS)

    Greitzer, Frank L.

    2010-04-01

    Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.

  12. Efficacy of Floor Control Protocols in Distributed Multimedia Collaboration

    DTIC Science & Technology

    1999-01-01

    advanced consider- ably, support for such controlled group interaction, particularly for applications geared towards synchronous and wide-area groupwork ...transaction-oriented collaboration, and synchronous groupwork is limited mostly to text and chatting. The JETS system [32] is a recent example for a Java-based

  13. Faculty Collaboration on Multidisciplinary Web-Based Education.

    ERIC Educational Resources Information Center

    Saad, Ashraf; Uskov, Vladimir L.; Cedercreutz, Kettil; Geonetta, Sam; Spille, Jack; Abel, Dick

    In 1998, faculty members at the University of Cincinnati started a project as an interdepartmental collaboration to investigate the use of World Wide Web-based instructional (WBI) tools. The project team included representatives from various areas such as information engineering technology, mechanical engineering technology, chemical technology,…

  14. A study on an information security system of a regional collaborative medical platform.

    PubMed

    Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong

    2010-01-01

    The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.

  15. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    PubMed

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  16. Sharing Ideas: Tough Times Encourage Colleges to Collaborate

    ERIC Educational Resources Information Center

    Fain, Paul; Blumenstyk, Goldie; Sander, Libby

    2009-01-01

    Tough times are encouraging colleges to share resources in a variety of areas, including campus security, research, and degree programs. Despite its veneer of cooperation, higher education is a competitive industry, where resource sharing is eyed warily. But the recession is chipping away at that reluctance, and institutions are pursuing…

  17. 5 CFR 9701.105 - Continuing collaboration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...

  18. 5 CFR 9701.105 - Continuing collaboration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...

  19. IsoWAN: A NASA Science and Engineering Information and Services Framework

    NASA Technical Reports Server (NTRS)

    Korsmeyer, David J.; Chow, Edward T.; Conroy, Michael P.; Swanson, Keith (Technical Monitor)

    2000-01-01

    We believe that the next evolutionary step in supporting wide-area application and services delivery to customers is a network framework that provides for collocation of applications and services at distinct sites in the network, an interconnection between these sites that is performance optimized for these applications, and value-added services for applications. We use the term IsoWAN to describe an advanced, isolated network interconnect services framework that will enable applications to be more secure, and able to access and be in use in both local and remote environments. The main functions of an IsoWAN are virtual localization of application services, an application service interface, coordinated delivery of applications and associated data to the customer, and supporting collaborative application development for customers. An initial pilot network between three NASA Centers: Ames Research Center, the Jet Propulsion Laboratory, and Marshall Space Flight Center, has been built and its properties will be discussed.

  20. National Fusion Collaboratory: Grid Computing for Simulations and Experiments

    NASA Astrophysics Data System (ADS)

    Greenwald, Martin

    2004-05-01

    The National Fusion Collaboratory Project is creating a computational grid designed to advance scientific understanding and innovation in magnetic fusion research by facilitating collaborations, enabling more effective integration of experiments, theory and modeling and allowing more efficient use of experimental facilities. The philosophy of FusionGrid is that data, codes, analysis routines, visualization tools, and communication tools should be thought of as network available services, easily used by the fusion scientist. In such an environment, access to services is stressed rather than portability. By building on a foundation of established computer science toolkits, deployment time can be minimized. These services all share the same basic infrastructure that allows for secure authentication and resource authorization which allows stakeholders to control their own resources such as computers, data and experiments. Code developers can control intellectual property, and fair use of shared resources can be demonstrated and controlled. A key goal is to shield scientific users from the implementation details such that transparency and ease-of-use are maximized. The first FusionGrid service deployed was the TRANSP code, a widely used tool for transport analysis. Tools for run preparation, submission, monitoring and management have been developed and shared among a wide user base. This approach saves user sites from the laborious effort of maintaining such a large and complex code while at the same time reducing the burden on the development team by avoiding the need to support a large number of heterogeneous installations. Shared visualization and A/V tools are being developed and deployed to enhance long-distance collaborations. These include desktop versions of the Access Grid, a highly capable multi-point remote conferencing tool and capabilities for sharing displays and analysis tools over local and wide-area networks.

  1. Using the base-of-the-pyramid perspective to catalyze interdependence-based collaborations

    PubMed Central

    London, Ted; Anupindi, Ravi

    2012-01-01

    Improving food security and nutrition in the developing world remains among society's most intractable challenges and continues despite a wide variety of investments. Both donor- and enterprise-led initiatives, for example, have explored including smallholder farmers in their value chains. However, these efforts have had only modest success, partly because the private and development sectors prefer to maintain their independence. Research from the base-of-the-pyramid domain offers new insights into how collaborative interdependence between sectors can enhance the connection between profits and the alleviation of poverty. In this article, we identify the strengths and weaknesses of donor-led and enterprise-led value chain initiatives. We then explore how insights from the base-of-the-pyramid domain yield a set of interdependence-based collaboration strategies that can achieve more sustainable and scalable outcomes. PMID:21482752

  2. Using the base-of-the-pyramid perspective to catalyze interdependence-based collaborations.

    PubMed

    London, Ted; Anupindi, Ravi

    2012-07-31

    Improving food security and nutrition in the developing world remains among society's most intractable challenges and continues despite a wide variety of investments. Both donor- and enterprise-led initiatives, for example, have explored including smallholder farmers in their value chains. However, these efforts have had only modest success, partly because the private and development sectors prefer to maintain their independence. Research from the base-of-the-pyramid domain offers new insights into how collaborative interdependence between sectors can enhance the connection between profits and the alleviation of poverty. In this article, we identify the strengths and weaknesses of donor-led and enterprise-led value chain initiatives. We then explore how insights from the base-of-the-pyramid domain yield a set of interdependence-based collaboration strategies that can achieve more sustainable and scalable outcomes.

  3. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    PubMed Central

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  4. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    PubMed

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  5. Education and Strategic Research Collaborations

    Science.gov Websites

    Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student

  6. Play Well With Others: Improvisational Theater and Collaboration in the Homeland Security Environment

    DTIC Science & Technology

    2013-09-01

    AND COLLABORATION IN THE HOMELAND SECURITY ENVIRONMENT 5. FUNDING NUMBERS 6. AUTHOR(S) Andrew J. Phelps 7. PERFORMING ORGANIZATION NAME(S) AND...ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S...collaboration is important, but we are not told how to collaborate. Improvisational theater, on the other hand, is built on collaboration among performers to

  7. A new data collaboration service based on cloud computing security

    NASA Astrophysics Data System (ADS)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  8. Exploring Public Health's roles and limitations in advancing food security in British Columbia.

    PubMed

    Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S

    2014-07-22

    This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.

  9. Collaborative Learning and Knowledge-Construction through a Knowledge-Based WWW Authoring Tool.

    ERIC Educational Resources Information Center

    Haugsjaa, Erik

    This paper outlines hurdles to using the World Wide Web for learning, specifically in a collaborative knowledge-construction environment. Theoretical solutions based directly on existing Web environments, as well as on research and system prototypes in the areas of Intelligent Tutoring Systems (ITS) and ITS authoring systems, are suggested. Topics…

  10. Hydrogen Infrastructure Testing and Research Facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2017-04-10

    Learn about the Hydrogen Infrastructure Testing and Research Facility (HITRF), where NREL researchers are working on vehicle and hydrogen infrastructure projects that aim to enable more rapid inclusion of fuel cell and hydrogen technologies in the market to meet consumer and national goals for emissions reduction, performance, and energy security. As part of NREL’s Energy Systems Integration Facility (ESIF), the HITRF is designed for collaboration with a wide range of hydrogen, fuel cell, and transportation stakeholders.

  11. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    PubMed

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  12. Additional Security Considerations for Grid Management

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  13. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.

  14. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    ERIC Educational Resources Information Center

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  15. A methodology for secure recovery of spacecrafts based on a trusted hardware platform

    NASA Astrophysics Data System (ADS)

    Juliato, Marcio; Gebotys, Catherine

    2017-02-01

    This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.

  16. Vehicle Tracking and Security

    NASA Astrophysics Data System (ADS)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  17. Wireless security in mobile health.

    PubMed

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  18. The insurance industry and public-private collaborations as a vector to develop and spread EO technologies and techniques in the domain of Food Security: The Swiss Re case.

    NASA Astrophysics Data System (ADS)

    Coutu, S.; Ragaz, M.; Mäder, D.; Hammer, P.; Andriesse, M.; Güttinger, U.; Feyen, H.

    2017-12-01

    The insurance industry has been contributing to the resilient development of agriculture in multiple regions of the globe since the beginning of the 19th Century. It also has from the very beginning of the development of EO Sciences, kept a very close eye on the development of technologies and techniques in this domain. Recent advances in this area such as increased satellite imagery resolution, faster computation time and Big Data management combined with the ground-based knowledge from the insurance industry have offered farmers not only tools permitting better crop management, but also reliable and live yield coverage. This study presents several of these applications at different scales (industrial farming and micro-farming) and in different climate regions, with an emphasis on the limit of current products. Some of these limits such as lack of access of to ground data, R&D efforts or understanding of ground needs could be quickly overcome through closer public-private or private-private collaborations. However, despite a clear benefit for the Food Security nexus and potential win-win situations, those collaborations are not always simple to develop. We present here successful but also disappointing collaboration cases based on the Swiss Re experience, as a global insurance leader. As a conclusion, we highlight how academia, NGOs, governmental organization, start-ups and the insurance industry can get together to foster the development of EO in the domain of Food Security, and bring cutting-edge science to game changing industrial applications.

  19. Distributed computing testbed for a remote experimental environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butner, D.N.; Casper, T.A.; Howard, B.C.

    1995-09-18

    Collaboration is increasing as physics research becomes concentrated on a few large, expensive facilities, particularly in magnetic fusion energy research, with national and international participation. These facilities are designed for steady state operation and interactive, real-time experimentation. We are developing tools to provide for the establishment of geographically distant centers for interactive operations; such centers would allow scientists to participate in experiments from their home institutions. A testbed is being developed for a Remote Experimental Environment (REE), a ``Collaboratory.`` The testbed will be used to evaluate the ability of a remotely located group of scientists to conduct research on themore » DIII-D Tokamak at General Atomics. The REE will serve as a testing environment for advanced control and collaboration concepts applicable to future experiments. Process-to-process communications over high speed wide area networks provide real-time synchronization and exchange of data among multiple computer networks, while the ability to conduct research is enhanced by adding audio/video communication capabilities. The Open Software Foundation`s Distributed Computing Environment is being used to test concepts in distributed control, security, naming, remote procedure calls and distributed file access using the Distributed File Services. We are exploring the technology and sociology of remotely participating in the operation of a large scale experimental facility.« less

  20. DoD-Supported Overseas Training Rotations in Tropical Medicine and Global Health, 2000-2015.

    PubMed

    Mancuso, James D; Hickey, Patrick W; Coldren, Rodney L; Korman, Amy K; Keep, Lisa W; DeFraites, Robert F; Smith, Maria; Mancuso, Luke J; Sanchez, Jose L

    2017-03-01

    In 1999, the Department of Defense developed a tropical medicine training program (TMTP) to train military physicians, medical students, and scientists in performing surveillance activities in an overseas environment. This review describes the competencies, educational approach, program participants, institutional collaborations, and process outcomes of the TMTP from 2000 to 2015. TMTP-sponsored rotations addressed a wide variety of interdisciplinary competencies, many of which have military-unique applications. Rotations consisted of both didactic and experiential (overseas) components. The program provided 282 rotations for 260 trainees between 2006 and 2015, the years for which data were available. The Department of Defense accrues benefits from this training program in three main ways: (1) building a cadre of health care professionals who will go on to work at the overseas research laboratories, (2) supporting force health protection and readiness through experiential tropical medicine training, and (3) engaging in global health collaborations and partnerships. The primary challenges include funding, health and security, trainee and site heterogeneity, supervision, trainee engagement, and burden on the host institution. The program will continue to focus on improvement in these areas, with special attention to trainee preparation, communication with both trainees and host sites, and increasing reciprocity with host sites and their faculty. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  1. Breaking Free with Wireless Networks.

    ERIC Educational Resources Information Center

    Fleischman, John

    2002-01-01

    Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…

  2. Complex watersheds, collaborative teams: Assessing pollutant presence and effects in the San Francisco Delta

    EPA Science Inventory

    There is a great diversity of sources of chemical contaminants and stressors over large geographic areas. Chemical contaminant inputs and magnitude can potentially exhibit wide seasonal variation over large geographic areas. Together, these factors make linking exposure to monito...

  3. High Fidelity Simulations of Large-Scale Wireless Networks (Plus-Up)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onunkwo, Uzoma

    Sandia has built a strong reputation in scalable network simulation and emulation for cyber security studies to protect our nation’s critical information infrastructures. Georgia Tech has preeminent reputation in academia for excellence in scalable discrete event simulations, with strong emphasis on simulating cyber networks. Many of the experts in this field, such as Dr. Richard Fujimoto, Dr. George Riley, and Dr. Chris Carothers, have strong affiliations with Georgia Tech. The collaborative relationship that we intend to immediately pursue is in high fidelity simulations of practical large-scale wireless networks using ns-3 simulator via Dr. George Riley. This project will have mutualmore » benefits in bolstering both institutions’ expertise and reputation in the field of scalable simulation for cyber-security studies. This project promises to address high fidelity simulations of large-scale wireless networks. This proposed collaboration is directly in line with Georgia Tech’s goals for developing and expanding the Communications Systems Center, the Georgia Tech Broadband Institute, and Georgia Tech Information Security Center along with its yearly Emerging Cyber Threats Report. At Sandia, this work benefits the defense systems and assessment area with promise for large-scale assessment of cyber security needs and vulnerabilities of our nation’s critical cyber infrastructures exposed to wireless communications.« less

  4. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    DTIC Science & Technology

    2009-09-01

    collaborative effort? C. RESEARCH METHODOLOGY This research project utilized a modified case study methodology. The traditional case study method ...discussing the research method , offering smart practices and culminate with findings and recommendations. Chapter II Homeland Security Collaboration...41 Centers for Regional Excellence, “Building Models.” 16 Chapter III Research Methodology:  Modified Case Study Method is

  5. Management of Guidance, Navigation and Control Technologies for Spacecraft Formations under the NASA Cross-Enterprise Technology Development Program (CETDP)

    NASA Technical Reports Server (NTRS)

    Hartman, Kathy; Weidow, David; Hadaegh, Fred

    1999-01-01

    Breakthrough technology development is critical to securing the future of our space industry. The National Aeronautics and Space Administration (NASA) Cross-Enterprise Technology Development Program (CETDP) is developing critical space technologies that enable innovative and less costly missions, and spawn new mission opportunities through revolutionary, long-term, high-risk, high-payoff technology advances. The CETDP is a NASA-wide activity managed by the Advanced Technology and Mission Studies Division (AT&MS) at Headquarters Office of Space Science. Program management for CETDP is distributed across the multiple NASA Centers and draws on expertise throughout the Agency. The technology research activities are organized along Project-level divisions called thrust areas that are directly linked to the Agency's goals and objectives of the Enterprises: Earth Science, Space Science, Human Exploration and Development of Space; and the Office of the Chief Technologist's (OCT) strategic technology areas. Cross-Enterprise technology is defined as long-range strategic technologies that have broad potential to span the needs of more than one Enterprise. Technology needs are identified and prioritized by each of the primary customers. The thrust area manager (TAM) for each division is responsible for the ultimate success of technologies within their area, and can draw from industry, academia, other government agencies, other CETDP thrust areas, and other NASA Centers to accomplish the goals of the thrust area. An overview of the CETDP and description of the future directions of the thrust area called Distributed Spacecraft are presented in this paper. Revolutionary technologies developed within this thrust area will enable the implementation of a spatially distributed network of individual vehicles, or assets, collaborating as a single collective unit, and exhibiting a common system-wide capability to accomplish a shared objective. With such a capability, new Earth and space science measurement concepts become a reality.

  6. Management of Guidance, Navigation, and Control Technologies for Spacecraft Formations Under the NASA Cross Enterprise Technology Development Program (CETDP)

    NASA Technical Reports Server (NTRS)

    Hartman, Kathy; Weidow, David; Hadaegh, Fred

    1999-01-01

    Breakthrough technology development is critical to securing the future of our space industry. The National Aeronautics and Space Administration (NASA) Cross-Enterprise Technology Development Program (CETDP) is developing critical space technologies that enable innovative and less costly missions, and spawn new mission opportunities through revolutionary, long-term, high-risk, high-payoff technology advances. The CETDP is a NASA-wide activity managed by the Advanced Technology and Mission Studies Division (AT&MS) at Headquarters Office of Space Science. Program management for CETDP is distributed across the multiple NASA Centers and draws on expertise throughout the Agency. The technology research activities are organized along Project-level divisions called thrust areas that are directly linked to the Agency's goals and objectives of the Enterprises: Earth Science, Space Science, Human Exploration and Development of Space; and the Office of the Chief Technologist's (OCT) strategic technology areas. Cross-Enterprise technology is defined as long-range strategic technologies that have broad potential to span the needs of more than one Enterprise. Technology needs are identified and prioritized by each of the primary customers. The thrust area manager (TAM) for each division is responsible for the ultimate success of technologies within their area, and can draw from industry, academia, other government agencies, other CETDP thrust areas, and other NASA Centers to accomplish the goals of the thrust area. An overview of the CETDP and description of the future directions of the thrust area called Distributed Spacecraft are presented in this paper. Revolutionary technologies developed within this thrust area will enable the implementation of a spatially distributed network of individual vehicles, or assets, collaborating as a single collective unit, and exhibiting a common system-wide capability to accomplish a shared objective. With such a capability, new Earth and space science measurement concepts become a reality.

  7. Regulatory underpinnings of Global Health security: FDA's roles in preventing, detecting, and responding to global health threats.

    PubMed

    Courtney, Brooke; Bond, Katherine C; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas-antimicrobial resistance, food safety, and supply chain integrity-in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats.

  8. Collaboration using roles. [in computer network security

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1990-01-01

    Segregation of roles into alternative accounts is a model which provides not only the ability to collaborate but also enables accurate accounting of resources consumed by collaborative projects, protects the resources and objects of such a project, and does not introduce new security vulnerabilities. The implementation presented here does not require users to remember additional passwords and provides a very simple consistent interface.

  9. Supporting Regularized Logistic Regression Privately and Efficiently.

    PubMed

    Li, Wenfa; Liu, Hongzhe; Yang, Peng; Xie, Wei

    2016-01-01

    As one of the most popular statistical and machine learning models, logistic regression with regularization has found wide adoption in biomedicine, social sciences, information technology, and so on. These domains often involve data of human subjects that are contingent upon strict privacy regulations. Concerns over data privacy make it increasingly difficult to coordinate and conduct large-scale collaborative studies, which typically rely on cross-institution data sharing and joint analysis. Our work here focuses on safeguarding regularized logistic regression, a widely-used statistical model while at the same time has not been investigated from a data security and privacy perspective. We consider a common use scenario of multi-institution collaborative studies, such as in the form of research consortia or networks as widely seen in genetics, epidemiology, social sciences, etc. To make our privacy-enhancing solution practical, we demonstrate a non-conventional and computationally efficient method leveraging distributing computing and strong cryptography to provide comprehensive protection over individual-level and summary data. Extensive empirical evaluations on several studies validate the privacy guarantee, efficiency and scalability of our proposal. We also discuss the practical implications of our solution for large-scale studies and applications from various disciplines, including genetic and biomedical studies, smart grid, network analysis, etc.

  10. Supporting Regularized Logistic Regression Privately and Efficiently

    PubMed Central

    Li, Wenfa; Liu, Hongzhe; Yang, Peng; Xie, Wei

    2016-01-01

    As one of the most popular statistical and machine learning models, logistic regression with regularization has found wide adoption in biomedicine, social sciences, information technology, and so on. These domains often involve data of human subjects that are contingent upon strict privacy regulations. Concerns over data privacy make it increasingly difficult to coordinate and conduct large-scale collaborative studies, which typically rely on cross-institution data sharing and joint analysis. Our work here focuses on safeguarding regularized logistic regression, a widely-used statistical model while at the same time has not been investigated from a data security and privacy perspective. We consider a common use scenario of multi-institution collaborative studies, such as in the form of research consortia or networks as widely seen in genetics, epidemiology, social sciences, etc. To make our privacy-enhancing solution practical, we demonstrate a non-conventional and computationally efficient method leveraging distributing computing and strong cryptography to provide comprehensive protection over individual-level and summary data. Extensive empirical evaluations on several studies validate the privacy guarantee, efficiency and scalability of our proposal. We also discuss the practical implications of our solution for large-scale studies and applications from various disciplines, including genetic and biomedical studies, smart grid, network analysis, etc. PMID:27271738

  11. Networked but No System: Educational Innovation among Bay Area Jewish Organizations

    ERIC Educational Resources Information Center

    Rubin Ross, Renee

    2017-01-01

    A widely read article from this journal explores innovative Jewish educational programs, initiatives, and organizations, arguing that these share a comdmitment to being "learner-centered" and recommending that a system be created to foster collaboration among them (Woocher, 2012). Using five San Francisco Bay Area-based…

  12. Addressing security issues related to virtual institute distributed activities

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.

  13. Image-based electronic patient records for secured collaborative medical applications.

    PubMed

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  14. Enhancing international collaboration among early career researchers.

    PubMed

    Carroll, Jennifer K; Albada, Akke; Farahani, Mansoureh; Lithner, Maria; Neumann, Melanie; Sandhu, Harbinder; Shepherd, Heather L

    2010-09-01

    The European Association of Communication in Healthcare (EACH) Early Career Researchers Network (ECRN) aims are to (1) promote international collaboration among young investigators and (2) provide a support network for future innovative communication research projects. In October 2009, Miami, USA at a workshop facilitated by the ECRN at the International Conference on Communication in Healthcare (ICCH) hosted by the American Academy of Communication in Healthcare we explored common facilitators and challenges faced by early career researchers in health communication research. Attendees introduced themselves, their research area(s) of interest, and listed one facilitator and one barrier for their career development. EACH ECRN members then led a discussion of facilitators and challenges encountered in communication research projects and career development. We discussed potential collaboration opportunities, future goals, and activities. Having supportive collegial relationships, institutional support, job security, and funding are critical facilitators for early career investigators. Key challenges include difficulty with time management and prioritizing, limited resources, and contacts. International collaboration among early career researchers is a feasible and effective means to address important challenges, by increasing opportunities for professional support and networking, problem-solving, discussion of data, and ultimately publishing. Future AACH-EACH Early Career Researcher Networks should continue to build collaborations by developing shared research projects, papers, and other scholarly products. Copyright (c) 2010. Published by Elsevier Ireland Ltd.

  15. Enhancing international collaboration among early-career researchers

    PubMed Central

    Carroll, Jennifer K; Albada, Akke; Farahani, Mansoureh; Lithner, Maria; Neumann, Melanie; Sandhu, Harbinder; Shepherd, Heather L

    2010-01-01

    Objective The European Association of Communication in Healthcare (EACH) Early Career Researchers Network (ECRN) aims are to (1) promote international collaboration among young investigators and (2) provide a support network for future innovative communication research projects. In October 2009, Miami, USA at a workshop facilitated by the ECRN at the International Conference on Communication in Healthcare (ICCH) hosted by the American Academy of Communication in Healthcare we explored common facilitators and challenges faced by early career researchers in health communication research. Methods Attendees introduced themselves, their research area(s) of interest, and listed one facilitator and one barrier for their career development. EACH ECRN members then led a discussion of facilitators and challenges encountered in communication research projects and career development. We discussed potential collaboration opportunities, future goals, and activities. Results Having supportive collegial relationships, institutional support, job security, and funding are critical facilitators for early career investigators. Key challenges include difficulty with time management and prioritizing, limited resources, and contacts. Conclusion International collaboration among early career researchers is a feasible and effective means to address important challenges, by increasing opportunities for professional support and networking, problem-solving, discussion of data, and ultimately publishing. Practice Implications Future AACH-EACH Early Career Researcher Networks should continue to build collaborations by developing shared research projects, papers, and other scholarly products. PMID:20663630

  16. The federal role in the health information infrastructure: a debate of the pros and cons of government intervention.

    PubMed Central

    Shortliffe, E H; Bleich, H L; Caine, C G; Masys, D R; Simborg, D W

    1996-01-01

    Some observers feel that the federal government should play a more active leadership role in educating the medical community and in coordinating and encouraging a more rapid and effective implementation of clinically relevant applications of wide-area networking. Other people argue that the private sector is recognizing the importance of these issues and will, when the market demands it, adopt and enhance the telecommunications systems that are needed to produce effective uses of the National Information Infrastructure (NII) by the healthcare community. This debate identifies five areas for possible government involvement: convening groups for the development of standards; providing funding for research and development; ensuring the equitable distribution of resources, particularly to places and people considered by private enterprise to provide low opportunities for profit; protecting rights of privacy, intellectual property, and security; and overcoming the jurisdictional barriers to cooperation, particularly when states offer conflicting regulations. Arguments against government involvement include the likely emergence of an adequate infrastructure under free market forces, the often stifling effect of regulation, and the need to avoid a common-and-control mentality in an infrastructure that is best promoted collaboratively. PMID:8816347

  17. Managing Documents in the Wider Area: Intelligent Document Management.

    ERIC Educational Resources Information Center

    Bittleston, Richard

    1995-01-01

    Discusses techniques for managing documents in wide area networks, reviews technique limitations, and offers recommendations to database designers. Presented techniques include: increasing bandwidth, reducing data traffic, synchronizing documentation, partial synchronization, audit trials, navigation, and distribution control and security. Two…

  18. ARTEMIS: a collaborative framework for health care.

    PubMed

    Reddy, R; Jagannathan, V; Srinivas, K; Karinthi, R; Reddy, S M; Gollapudy, C; Friedman, S

    1993-01-01

    Patient centered healthcare delivery is an inherently collaborative process. This involves a wide range of individuals and organizations with diverse perspectives: primary care physicians, hospital administrators, labs, clinics, and insurance. The key to cost reduction and quality improvement in health care is effective management of this collaborative process. The use of multi-media collaboration technology can facilitate timely delivery of patient care and reduce cost at the same time. During the last five years, the Concurrent Engineering Research Center (CERC), under the sponsorship of DARPA (Defense Advanced Research Projects Agency, recently renamed ARPA) developed a number of generic key subsystems of a comprehensive collaboration environment. These subsystems are intended to overcome the barriers that inhibit the collaborative process. Three subsystems developed under this program include: MONET (Meeting On the Net)--to provide consultation over a computer network, ISS (Information Sharing Server)--to provide access to multi-media information, and PCB (Project Coordination Board)--to better coordinate focussed activities. These systems have been integrated into an open environment to enable collaborative processes. This environment is being used to create a wide-area (geographically distributed) research testbed under DARPA sponsorship, ARTEMIS (Advance Research Testbed for Medical Informatics) to explore the collaborative health care processes. We believe this technology will play a key role in the current national thrust to reengineer the present health-care delivery system.

  19. Risk of Zika virus transmission in the Euro-Mediterranean area and the added value of building preparedness to arboviral threats from a One Health perspective.

    PubMed

    Escadafal, Camille; Gaayeb, Lobna; Riccardo, Flavia; Pérez-Ramírez, Elisa; Picard, Marie; Dente, Maria Grazia; Fernández-Pinero, Jovita; Manuguerra, Jean-Claude; Jiménez-Clavero, Miguel-Ángel; Declich, Silvia; Victoir, Kathleen; Robert, Vincent

    2016-12-03

    In the alarming context of risk of Zika virus (ZIKV) transmission in the Euro-Mediterranean area, there is a need to examine whether capacities to detect, diagnose and notify ZIKV infections in the region are in place and whether ongoing capacity-building initiatives are filling existing gaps.The MediLabSecure network, created in 2014, comprises 55 laboratories of virology and medical entomology and 19 public health institutions in 19 countries in the Balkans, North-Africa, the Middle-East and the Black Sea regions. It aims to set up awareness, risk assessment, monitoring and control of emerging and re-emerging vector-borne viruses. We here examine the actions and strategies that MediLabSecure has been implementing and how they will contribute to the prevention and control of the ZIKV threat in the Euro-Mediterranean area.Capacity-building for arbovirus diagnostics is a major objective of the project and follows a methodological rather than disease-driven approach. This enables the implementation of laboratory trainings on techniques that are common to several arboviruses, including ZIKV, and putting into action appropriate diagnostic tools in the target region.Moreover, by its One Health approach and the interaction of its four sub-networks in human virology, animal virology, medical entomology and public health, MediLabSecure is fostering intersectoral collaboration, expertise and sharing of information. The resulting exchanges (methodological, communication and operational) across disciplines and across countries, dedicated research on intersectoral collaboration and increasing diagnostic capacities are providing new paths and tools to public health professionals to face emerging viral threats such as a ZIKV epidemic in the Euro-Mediterranean region.

  20. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruce, Joseph R.; Fink, Glenn A.

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset andmore » test the output of the system.« less

  1. The Distributed Space Exploration Simulation (DSES)

    NASA Technical Reports Server (NTRS)

    Crues, Edwin Z.; Chung, Victoria I.; Blum, Mike G.; Bowman, James D.

    2007-01-01

    The paper describes the Distributed Space Exploration Simulation (DSES) Project, a research and development collaboration between NASA centers which focuses on the investigation and development of technologies, processes and integrated simulations related to the collaborative distributed simulation of complex space systems in support of NASA's Exploration Initiative. This paper describes the three major components of DSES: network infrastructure, software infrastructure and simulation development. In the network work area, DSES is developing a Distributed Simulation Network that will provide agency wide support for distributed simulation between all NASA centers. In the software work area, DSES is developing a collection of software models, tool and procedures that ease the burden of developing distributed simulations and provides a consistent interoperability infrastructure for agency wide participation in integrated simulation. Finally, for simulation development, DSES is developing an integrated end-to-end simulation capability to support NASA development of new exploration spacecraft and missions. This paper will present current status and plans for each of these work areas with specific examples of simulations that support NASA's exploration initiatives.

  2. Collaborating To Serve Arizona Students & Families More Effectively: Phase 1 Report. Evaluation of Murphy School District-Department of Economic Security Collaborative Project.

    ERIC Educational Resources Information Center

    Izu, Jo Ann; Carreon, Tori

    This report presents the results of Phase I of an evaluation of the Murphy School District (MSD)-Department of Economic Security (DES) collaborative effort, one of the first interagency partnerships in the state of Arizona that attempts to address the needs of students and their families more effectively. The primary purposes of the evaluation are…

  3. Underwater magnetic gradiometer for magnetic anomaly detection, localization, and tracking

    NASA Astrophysics Data System (ADS)

    Kumar, S.; Sulzberger, G.; Bono, J.; Skvoretz, D.; Allen, G. I.; Clem, T. R.; Ebbert, M.; Bennett, S. L.; Ostrom, R. K.; Tzouris, A.

    2007-04-01

    GE Security and the Naval Surface Warfare Center, Panama City (NSWC-PC) have collaborated to develop a magnetic gradiometer, called the Real-time Tracking Gradiometer or RTG that is mounted inside an unmanned underwater vehicle (UUV). The RTG is part of a buried mine hunting platform being developed by the United States Navy. The RTG has been successfully used to make test runs on mine-like targets buried off the coast of Florida. We will present a general description of the system and latest results describing system performance. This system can be also potentially used for other applications including those in the area of Homeland Security.

  4. Advanced Value Chain Collaboration in Ghana's Cocoa Sector: An Entry Point for Integrated Landscape Approaches?

    PubMed

    Deans, Howard; Ros-Tonen, Mirjam A F; Derkyi, Mercy

    2017-04-15

    Value chain analyses have focused mainly on collaboration between chain actors, often neglecting collaboration "beyond the chain" with non-chain actors to tackle food security, poverty and sustainability issues in the landscapes in which these value chains are embedded. Comparing conventional and advanced value chain collaborations involving small-scale cocoa farmers in Ghana, this paper analyzes the merits of a more integrated approach toward value chain collaboration. It particularly asks whether advanced value chain collaboration targeting cocoa-producing areas potentially offers an entry point for implementing a landscape approach. The findings detail current chain actors and institutions and show how advanced value chain collaboration has a greater positive impact than conventional value chain collaboration on farmers' social, human and natural capital. The paper concludes that the integrated approach, focus on learning, and stable relationships with small-scale farmers inherent in advanced value chain collaboration makes it both more sustainable and effective at the local level than conventional approaches. However, its scope and the actors' jurisdictional powers and self-organization are too limited to be the sole tool in negotiating land use and trade-offs at the landscape level. To evolve as such would require certification beyond the farm level, partnering with other landscape stakeholders, and brokering by bridging organizations.

  5. Towards a real-time wide area motion imagery system

    NASA Astrophysics Data System (ADS)

    Young, R. I.; Foulkes, S. B.

    2015-10-01

    It is becoming increasingly important in both the defence and security domains to conduct persistent wide area surveillance (PWAS) of large populations of targets. Wide Area Motion Imagery (WAMI) is a key technique for achieving this wide area surveillance. The recent development of multi-million pixel sensors has provided sensors with wide field of view replete with sufficient resolution for detection and tracking of objects of interest to be achieved across these extended areas of interest. WAMI sensors simultaneously provide high spatial and temporal resolutions, giving extreme pixel counts over large geographical areas. The high temporal resolution is required to enable effective tracking of targets. The provision of wide area coverage with high frame rates generates data deluge issues; these are especially profound if the sensor is mounted on an airborne platform, with finite data-link bandwidth and processing power that is constrained by size, weight and power (SWAP) limitations. These issues manifest themselves either as bottlenecks in the transmission of the imagery off-board or as latency in the time taken to analyse the data due to limited computational processing power.

  6. JPARSS: A Java Parallel Network Package for Grid Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Jie; Akers, Walter; Chen, Ying

    2002-03-01

    The emergence of high speed wide area networks makes grid computinga reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve bandwidth and to reduce latency on a high speed wide area network. This paper presents a Java package called JPARSS (Java Parallel Secure Stream (Socket)) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a grid environment without the necessity of tuning TCP window size.more » This package enables single sign-on, certificate delegation and secure or plain-text data transfer using several security components based on X.509 certificate and SSL. Several experiments will be presented to show that using Java parallelstreams is more effective than tuning TCP window size. In addition a simple architecture using Web services« less

  7. Collaboration between civilian and military healthcare professionals: a better way for planning, preparing, and responding to all hazard domestic events.

    PubMed

    Marklund, LeRoy A; Graham, Adrienne M; Morton, Patricia G; Hurst, Charles G; Motola, Ivette; Robinson, Donald W; Kelley, Vivian A; Elenberg, Kimberly J; Russler, Michael F; Boehm, Daniel E; Higgins, Dawn M; McAndrew, Patrick E; Williamson, Hope M; Atwood, Rodney D; Huebner, Kermit D; Brotons, Angel A; Miller, Geoffrey T; Rimpel, Laukton Y; Harris, Larry L; Santiago, Manuel; Cantrell, LeRoy

    2010-01-01

    Collaboration is used by the US National Security Council as a means to integrate inter-federal government agencies during planning and execution of common goals towards unified, national security. The concept of collaboration has benefits in the healthcare system by building trust, sharing resources, and reducing costs. The current terrorist threats have made collaborative medical training between military and civilian agencies crucial. This review summarizes the long and rich history of collaboration between civilians and the military in various countries and provides support for the continuation and improvement of collaborative efforts. Through collaboration, advances in the treatment of injuries have been realized, deaths have been reduced, and significant strides in the betterment of the Emergency Medical System have been achieved. This review promotes collaborative medical training between military and civilian medical professionals and provides recommendations for the future based on medical collaboration.

  8. Wide Area Security Region Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less

  9. Collaboration with the Local Community.

    ERIC Educational Resources Information Center

    Jackson, Michael L.; Cherrey, Cynthia

    2002-01-01

    Colleges and universities continually search for ways to enhance the safety and security of their educational programs and physical plant. This article examines how the University of Southern California and other institutions are using collaborative efforts with the local community to enhance their mutual safety and security through dynamic…

  10. ARTEMIS: a collaborative framework for health care.

    PubMed Central

    Reddy, R.; Jagannathan, V.; Srinivas, K.; Karinthi, R.; Reddy, S. M.; Gollapudy, C.; Friedman, S.

    1993-01-01

    Patient centered healthcare delivery is an inherently collaborative process. This involves a wide range of individuals and organizations with diverse perspectives: primary care physicians, hospital administrators, labs, clinics, and insurance. The key to cost reduction and quality improvement in health care is effective management of this collaborative process. The use of multi-media collaboration technology can facilitate timely delivery of patient care and reduce cost at the same time. During the last five years, the Concurrent Engineering Research Center (CERC), under the sponsorship of DARPA (Defense Advanced Research Projects Agency, recently renamed ARPA) developed a number of generic key subsystems of a comprehensive collaboration environment. These subsystems are intended to overcome the barriers that inhibit the collaborative process. Three subsystems developed under this program include: MONET (Meeting On the Net)--to provide consultation over a computer network, ISS (Information Sharing Server)--to provide access to multi-media information, and PCB (Project Coordination Board)--to better coordinate focussed activities. These systems have been integrated into an open environment to enable collaborative processes. This environment is being used to create a wide-area (geographically distributed) research testbed under DARPA sponsorship, ARTEMIS (Advance Research Testbed for Medical Informatics) to explore the collaborative health care processes. We believe this technology will play a key role in the current national thrust to reengineer the present health-care delivery system. PMID:8130536

  11. Building international genomics collaboration for global health security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Helen H.; Erkkila, Tracy; Chain, Patrick S. G.

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installationmore » of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.« less

  12. Building international genomics collaboration for global health security

    DOE PAGES

    Cui, Helen H.; Erkkila, Tracy; Chain, Patrick S. G.; ...

    2015-12-07

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installationmore » of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.« less

  13. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    PubMed

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  14. The Process for the Formulation of the International Telehealth Position Statement for Occupational Therapy

    PubMed Central

    JACOBS, KAREN; CASON, JANA; MCCULLOUGH, ANN

    2015-01-01

    The World Federation of Occupational Therapists (WFOT) consists of 84 member organizations representing over 420,000 occupational therapists internationally (WFOT, 2014). In 2014, WFOT published the WFOT Telehealth Position Statement on the use of telehealth in occupational therapy. The process for the formulation of the official document involved reviewing WFOT member organizations’ telehealth position statements and data collected from a survey sent to member organizations’ delegates in April 2014. Qualitative data from 39 countries yielded factors to consider in five key areas: licensure/registration requirements, the cost of technology, privacy and security, reimbursement/payment models, and other issues (e.g., need for collaboration/transfer of knowledge, client selection, provider competencies, standard of care). The WFOT Telehealth Position Statement addressed each of these areas. The collaborative effort resulting in the development of the WFOT Telehealth Position Statement serves as a model for other international organizations. PMID:27563380

  15. Traffic flow visualization and control (TFVC) : final report

    DOT National Transportation Integrated Search

    1998-11-01

    The TFVC system was developed in collaboration with the New York State Department of Transportation, the Federal Highway Administration, and the US Air Force Research Laboratory. It is a video-camera-based, wide-area, traffic surveillance and detecti...

  16. Collaborating toward improving food security in Nunavut.

    PubMed

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  17. Collaborating toward improving food security in Nunavut

    PubMed Central

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Background Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. Objective The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. Design The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. Results In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. Conclusions The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut. PMID:23984307

  18. Multistage Security Mechanism For Hybrid, Large-Scale Wireless Sensor Networks

    DTIC Science & Technology

    2007-06-01

    sensor network . Building on research in the areas of the wireless sensor networks (WSN) and the mobile ad hoc networks (MANET), this thesis proposes an...A wide area network consisting of ballistic missile defense satellites and terrestrial nodes can be viewed as a hybrid, large-scale mobile wireless

  19. Valued Sustainable Services: Building Partnership Capacity Through Collaborating Approaches

    DTIC Science & Technology

    2013-07-01

    and national Security Policy, institute for national Strategic Studies , at the national defense university. he is also a distinguished research...for choosing a site for ValSServ initiation is the enthusiasm of the population—that is, the priority generally is to work with those who are...applied to domains to improve daily life in a ValSServ project area. Agriculture/Food. Power for cool or cold storage and on-site processing of

  20. The Study on the Communication Network of Wide Area Measurement System in Electricity Grid

    NASA Astrophysics Data System (ADS)

    Xiaorong, Cheng; Ying, Wang; Yangdan, Ni

    Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.

  1. Sensor Authentication in Collaborating Sensor Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bielefeldt, Jake Uriah

    2014-11-01

    In this thesis, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O i of Sensor Network S imore » to correctly determine the number of active sensors in Network Si. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first to addresses a practical security problem in collaborating sensor networks.« less

  2. An analysis of land use planning and equity issues surrounding hazardous liquid and natural gas transmission pipelines in North Carolina

    NASA Astrophysics Data System (ADS)

    Osland, Anna Christine

    Hazardous liquid and natural gas transmission pipelines have received limited attention by planning scholars even though local development decisions can have broad consequences if a rupture occurs. In this dissertation, I evaluated the implications of land-use planning for reducing risk to transmission pipeline hazards in North Carolina via three investigations. First, using a survey of planning directors in jurisdictions with transmission pipeline hazards, I investigated the land use planning tools used to mitigate pipeline hazards and the factors associated with tool adoption. Planning scholars have documented the difficulty of inducing planning in hazardous areas, yet there remain gaps in knowledge about the factors associated with tool adoption. Despite the risks associated with pipeline ruptures, I found most localities use few mitigation tools, and the adoption of regulatory and informational tools appear to be influenced by divergent factors. Whereas risk perception, commitment, capacity, and community context were associated with total tool and information tool use, only risk perception and capacity factors were associated with regulatory tool use. Second, using interviews of emergency managers and planning directors, I examined the role of agency collaboration for building mitigation capacity. Scholars have highlighted the potential of technical collaboration, yet less research has investigated how inter-agency collaboration shapes mitigation capacity. I identify three categories of technical collaboration, discuss how collaborative spillovers can occur from one planning area to another, and challenge the notion that all technical collaborations result in equal mitigation outcomes. Third, I evaluated characteristics of the population near pipelines to address equity concerns. Surprisingly, I did not find broad support for differences in exposure of vulnerable populations. Nonetheless, my analyses uncovered statistically significant clusters of vulnerable groups within the hazard area. Interestingly, development closer to pipelines was newer than areas farther away, illustrating the failure of land-use planning to reduce development encroachment. Collectively, these results highlight the potential of land-use planning to keep people and development from encroaching on pipeline hazards. While this study indicates that planners in many areas address pipeline hazards, it also illustrates how changes to local practices can further reduce risks to human health, homeland security, and the environment.

  3. Efficient Authorization of Rich Presence Using Secure and Composed Web Services

    NASA Astrophysics Data System (ADS)

    Li, Li; Chou, Wu

    This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

  4. A security mediator for health care information.

    PubMed Central

    Wiederhold, G.; Bilello, M.; Sarathy, V.; Qian, X.

    1996-01-01

    The TIHI (Trusted Interoperation of Healthcare Information) project addresses a security issue that arises when some information is being shared among collaborating enterprises, although not all enterprise information is sharable. It assumes that protection exists to prevent intrusion by adversaries through secure transmission and firewalls. The TIHI system design provides a gateway, owned by the enterprise security officer, to mediate queries and responses. The latter are typically transmitted via the Internet. The enterprise policy is determined by rules provided to the mediator. We show examples of typical rules. The problem and our solution, although developed in a healthcare context, is equally valid among collaborating enterprises. PMID:8947640

  5. Flexible session management in a distributed environment

    NASA Astrophysics Data System (ADS)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  6. Implementing healthcare information security: standards can help.

    PubMed

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  7. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    PubMed Central

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  8. Hyperspectral Systems Increase Imaging Capabilities

    NASA Technical Reports Server (NTRS)

    2010-01-01

    In 1983, NASA started developing hyperspectral systems to image in the ultraviolet and infrared wavelengths. In 2001, the first on-orbit hyperspectral imager, Hyperion, was launched aboard the Earth Observing-1 spacecraft. Based on the hyperspectral imaging sensors used in Earth observation satellites, Stennis Space Center engineers and Institute for Technology Development researchers collaborated on a new design that was smaller and used an improved scanner. Featured in Spinoff 2007, the technology is now exclusively licensed by Themis Vision Systems LLC, of Richmond, Virginia, and is widely used in medical and life sciences, defense and security, forensics, and microscopy.

  9. Method and apparatus for managing transactions with connected computers

    DOEpatents

    Goldsmith, Steven Y.; Phillips, Laurence R.; Spires, Shannon V.

    2003-01-01

    The present invention provides a method and apparatus that make use of existing computer and communication resources and that reduce the errors and delays common to complex transactions such as international shipping. The present invention comprises an agent-based collaborative work environment that assists geographically distributed commercial and government users in the management of complex transactions such as the transshipment of goods across the U.S.-Mexico border. Software agents can mediate the creation, validation and secure sharing of shipment information and regulatory documentation over the Internet, using the World-Wide Web to interface with human users.

  10. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  11. Security and Resilience | Grid Modernization | NREL

    Science.gov Websites

    Security and Resilience Security and Resilience NREL develops tools and solutions to enable a more Consortium, NREL collaborates with industry, academia, and other research organizations to find solutions to

  12. DXBC: a long distance wireless broadband communication system for coastal maritime surveillance applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Argyreas, Nick D.; Xilouris, Chris K.; Thomopoulos, Stelios C. A.

    2015-05-01

    The field of Homeland Security focuses on the air, land, and sea borders surveillance in order to prevent illegal activities while facilitating lawful travel and trade. The achievement of this goal requires collaboration of complex decentralized systems and services, and transfer of huge amount of information between the remote surveillance areas and the command & control centers. It becomes obvious that the effectiveness of the provided security depends highly on the available communication capabilities between the interconnected areas. Although nowadays the broadband communication between remote places is presumed easy because of the extensive infrastructure inside residential areas, it becomes a real challenge when the required information should be acquired from locations where no infrastructure is available such as mountain or sea areas. The Integrated Systems Lab of NCSR Demokritos within the PERSEUS FP7- SEC-2011-261748 project has developed a wireless broadband telecommunication system that combines different communication channels from subGHz to microwave frequencies and provides secure IP connectivity between sea surveillance vessels and the Command and Control Centers (C3). The system was deployed in Fast Patrol Boats of the Hellenic Coast Guard that are used for maritime surveillance in sea boarders and tested successfully in two demonstration exercises for irregular migration and smuggling scenarios in the Aegean Archipelagos. This paper describes in detail the system architecture in terms of hardware and software and the evaluation measurements of the system communication capabilities.

  13. Interoperability and security in wireless body area network infrastructures.

    PubMed

    Warren, Steve; Lebak, Jeffrey; Yao, Jianchu; Creekmore, Jonathan; Milenkovic, Aleksandar; Jovanov, Emil

    2005-01-01

    Wireless body area networks (WBANs) and their supporting information infrastructures offer unprecedented opportunities to monitor state of health without constraining the activities of a wearer. These mobile point-of-care systems are now realizable due to the convergence of technologies such as low-power wireless communication standards, plug-and-play device buses, off-the-shelf development kits for low-power microcontrollers, handheld computers, electronic medical records, and the Internet. To increase acceptance of personal monitoring technology while lowering equipment cost, advances must be made in interoperability (at both the system and device levels) and security. This paper presents an overview of WBAN infrastructure work in these areas currently underway in the Medical Component Design Laboratory at Kansas State University (KSU) and at the University of Alabama in Huntsville (UAH). KSU efforts include the development of wearable health status monitoring systems that utilize ISO/IEEE 11073, Bluetooth, Health Level 7, and OpenEMed. WBAN efforts at UAH include the development of wearable activity and health monitors that incorporate ZigBee-compliant wireless sensor platforms with hardware-level encryption and the TinyOS development environment. WBAN infrastructures are complex, requiring many functional support elements. To realize these infrastructures through collaborative efforts, organizations such as KSU and UAH must define and utilize standard interfaces, nomenclature, and security approaches.

  14. Effects of the 2008 flood on economic performance and food security in Yemen: a simulation analysis.

    PubMed

    Breisinger, Clemens; Ecker, Olivier; Thiele, Rainer; Wiebelt, Manfred

    2016-04-01

    Extreme weather events such as floods and droughts can have devastating consequences for individual well being and economic development, in particular in poor societies with limited availability of coping mechanisms. Combining a dynamic computable general equilibrium model of the Yemeni economy with a household-level calorie consumption simulation model, this paper assesses the economy-wide, agricultural and food security effects of the 2008 tropical storm and flash flood that hit the Hadramout and Al-Mahrah governorates. The estimation results suggest that agricultural value added, farm household incomes and rural food security deteriorated long term in the flood-affected areas. Due to economic spillover effects, significant income losses and increases in food insecurity also occurred in areas that were unaffected by flooding. This finding suggests that while most relief efforts are typically concentrated in directly affected areas, future efforts should also consider surrounding areas and indirectly affected people. © 2016 The Author(s). Disasters © Overseas Development Institute, 2016.

  15. "Development of Model-Based Air Pollution Exposure Metrics for use in Epidemiologic Studies"

    EPA Science Inventory

    Population-based epidemiological studies of air pollution have traditionally relied upon imperfect surrogates of personal exposures, such as area-wide ambient air pollution levels based on readily available concentrations from central monitoring sites. U.S. EPA in collaboration w...

  16. DEVELOPMENT OF MODEL-BASED AIR POLLUTION EXPOSURE METRICS FOR USE IN EPIDEMIOLOGIC STUDIES

    EPA Science Inventory

    Population-based epidemiological studies of air pollution have traditionally relied upon imperfect surrogates of personal exposures, such as area-wide ambient air pollution levels based on readily available concentrations from central monitoring sites. U.S. EPA in collaboration w...

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; Mittelstadt, William; Martin, Kenneth E.

    During 2005 and 2006 the Western Electricity Coordinating Council (WECC) performed three major tests of western system dynamics. These tests used a Wide Area Measurement System (WAMS) based primarily on Phasor Measurement Units (PMUs) to determine response to events including the insertion of the 1400-MW Chief Joseph braking resistor, probing signals, and ambient events. Test security was reinforced through real-time analysis of wide area effects, and high-quality data provided dynamic profiles for interarea modes across the entire western interconnection. The tests established that low-level optimized pseudo-random ±20-MW probing with the Pacific DC Intertie (PDCI) roughly doubles the apparent noise thatmore » is natural to the power system, providing sharp dynamic information with negligible interference to system operations. Such probing is an effective alternative to use of the 1400-MW Chief Joseph dynamic brake, and it is under consideration as a standard means for assessing dynamic security.« less

  18. Handling of the demilitarized zone using service providers in SAP

    NASA Astrophysics Data System (ADS)

    Iovan, A.; Robu, R.

    2016-02-01

    External collaboration needs to allow data access from the Internet. In a trusted Internet collaboration scenario where the external user works on the same data like the internal user direct access to the data in the Intranet is required. The paper presents a solution to get access to certain data in the Enterprise Resource Planning system, having the User Interface on a system in the Demilitarized Zone and the database on a system which is located in the trusted area. Using the Service Provider Interface framework, connections between separate systems can be created in different areas of the network. The paper demonstrates how to connect the two systems, one in the Demilitarized Zone and one in the trusted area, using SAP ERP 6.0 with Enhancement Package 7. In order to use the Service Provider Interface SAP Business Suite Foundation component must be installed in both systems. The advantage of using the Service Provider Interface framework is that the external user works on the same data like the internal user (and not on copies). This assures data consistency and less overhead for backup and security systems.

  19. Photonic sensor opportunities for distributed and wireless systems in security applications

    NASA Astrophysics Data System (ADS)

    Krohn, David

    2006-10-01

    There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

  20. The Undergraduate ALFALFA Team: Collaborative Research Projects

    NASA Astrophysics Data System (ADS)

    Cannon, John M.; Koopmann, Rebecca A.; Haynes, Martha P.; Undergraduate ALFALFA Team, ALFALFA Team

    2016-01-01

    The NSF-sponsored Undergraduate ALFALFA (Arecibo Legacy Fast ALFA) Team (UAT) has allowed faculty and students from a wide range of public and private colleges and especially those with small astronomy programs to learn how science is accomplished in a large collaboration while contributing to the scientific goals of a legacy radio astronomy survey. The UAT has achieved this through close collaboration with ALFALFA PIs to identify research areas accessible to undergraduates. In this talk we will summarize the main research efforts of the UAT, including multiwavelength followup observations of ALFALFA sources, the UAT Collaborative Groups Project, the Survey of HI in Extremely Low-mass Dwarfs (SHIELD), and the Arecibo Pisces-Perseus Supercluster Survey. This work has been supported by NSF grants AST-0724918/0902211, AST-075267/0903394, AST-0725380, and AST-1211005.

  1. Social Software and National Security: An Initial Net Assessment

    DTIC Science & Technology

    2009-04-01

    networks. Government ignores this fact at its peril. Use of social software as ICT is creative and collaborative. Large corporations conduct...from the collaborative, distributed approaches promoted by responsible use of social software. Our recommendations are not exhaustive, but this... responsibilities are there for cyber security when using social software on government computers in a Web 2.0 environment?   67 This section might be

  2. Benchmarking Public Education in Worcester.

    ERIC Educational Resources Information Center

    Beaman, Richard H.; Schaefer, Roberta R.

    This report examines the performance of the Worcester Public Schools, Massachusetts, highlighting the areas in which Worcester is succeeding and where it needs improvement. Indicators presented in the report were developed in collaboration with representatives of a wide variety of organizations, as well as public officials. The report provides…

  3. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  4. Homeland Security Strategic Research Action Plan 2016-2019

    EPA Pesticide Factsheets

    This is a four-year research strategy designed to meet the following objectives:Improve water utilities’ abilities to prepare for and respond to incidents that threaten public health; andAdvance EPA’s capabilities to respond to wide-area contamination

  5. A community effort to protect genomic data sharing, collaboration and outsourcing.

    PubMed

    Wang, Shuang; Jiang, Xiaoqian; Tang, Haixu; Wang, Xiaofeng; Bu, Diyue; Carey, Knox; Dyke, Stephanie Om; Fox, Dov; Jiang, Chao; Lauter, Kristin; Malin, Bradley; Sofia, Heidi; Telenti, Amalio; Wang, Lei; Wang, Wenhao; Ohno-Machado, Lucila

    2017-01-01

    The human genome can reveal sensitive information and is potentially re-identifiable, which raises privacy and security concerns about sharing such data on wide scales. In 2016, we organized the third Critical Assessment of Data Privacy and Protection competition as a community effort to bring together biomedical informaticists, computer privacy and security researchers, and scholars in ethical, legal, and social implications (ELSI) to assess the latest advances on privacy-preserving techniques for protecting human genomic data. Teams were asked to develop novel protection methods for emerging genome privacy challenges in three scenarios: Track (1) data sharing through the Beacon service of the Global Alliance for Genomics and Health. Track (2) collaborative discovery of similar genomes between two institutions; and Track (3) data outsourcing to public cloud services. The latter two tracks represent continuing themes from our 2015 competition, while the former was new and a response to a recently established vulnerability. The winning strategy for Track 1 mitigated the privacy risk by hiding approximately 11% of the variation in the database while permitting around 160,000 queries, a significant improvement over the baseline. The winning strategies in Tracks 2 and 3 showed significant progress over the previous competition by achieving multiple orders of magnitude performance improvement in terms of computational runtime and memory requirements. The outcomes suggest that applying highly optimized privacy-preserving and secure computation techniques to safeguard genomic data sharing and analysis is useful. However, the results also indicate that further efforts are needed to refine these techniques into practical solutions.

  6. Organizing Diverse, Distributed Project Information

    NASA Technical Reports Server (NTRS)

    Keller, Richard M.

    2003-01-01

    SemanticOrganizer is a software application designed to organize and integrate information generated within a distributed organization or as part of a project that involves multiple, geographically dispersed collaborators. SemanticOrganizer incorporates the capabilities of database storage, document sharing, hypermedia navigation, and semantic-interlinking into a system that can be customized to satisfy the specific information-management needs of different user communities. The program provides a centralized repository of information that is both secure and accessible to project collaborators via the World Wide Web. SemanticOrganizer's repository can be used to collect diverse information (including forms, documents, notes, data, spreadsheets, images, and sounds) from computers at collaborators work sites. The program organizes the information using a unique network-structured conceptual framework, wherein each node represents a data record that contains not only the original information but also metadata (in effect, standardized data that characterize the information). Links among nodes express semantic relationships among the data records. The program features a Web interface through which users enter, interlink, and/or search for information in the repository. By use of this repository, the collaborators have immediate access to the most recent project information, as well as to archived information. A key advantage to SemanticOrganizer is its ability to interlink information together in a natural fashion using customized terminology and concepts that are familiar to a user community.

  7. Healthcare teams over the Internet: programming a certificate-based approach.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2003-07-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  8. Healthcare teams over the Internet: towards a certificate-based approach.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2002-01-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  9. Information Sharing for IT Security Professionals

    ERIC Educational Resources Information Center

    Petersen, Rodney J.

    2008-01-01

    Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…

  10. Learning Analytics for Natural User Interfaces

    ERIC Educational Resources Information Center

    Martinez-Maldonado, Roberto; Shum, Simon Buckingham; Schneider, Bertrand; Charleer, Sven; Klerkx, Joris; Duval, Erik

    2017-01-01

    The continuous advancement of natural user interfaces (NUIs) allows for the development\tof novel and creative ways to support collocated collaborative work in a wide range of areas, including teaching and learning. The use of NUIs, such as those based on interactive multi-touch surfaces and tangible user interfaces (TUIs), can offer unique…

  11. Developing and implementing mating disruption for area-wide control of citrus leafminer and citrus canker disease

    USDA-ARS?s Scientific Manuscript database

    Successful development and commercial launch of the first semiochemical-based control method for a major exotic insect pest and associated disease of citrus in Florida have resulted from vigorous collaboration between university and government researchers with support from private industry and innov...

  12. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    PubMed

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  13. Radioactive source security: the cultural challenges.

    PubMed

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Midwives' and health visitors' collaborative relationships: A systematic review of qualitative and quantitative studies.

    PubMed

    Aquino, Maria Raisa Jessica Ryc V; Olander, Ellinor K; Needle, Justin J; Bryar, Rosamund M

    2016-10-01

    Interprofessional collaboration between midwives and health visitors working in maternal and child health services is widely encouraged. This systematic review aimed to identify existing and potential areas for collaboration between midwives and health visitors; explore the methods through which collaboration is and can be achieved; assess the effectiveness of this relationship between these groups, and ascertain whether the identified examples of collaboration are in line with clinical guidelines and policy. A narrative synthesis of qualitative and quantitative studies. Fourteen electronic databases, research mailing lists, recommendations from key authors and reference lists and citations of included papers. Papers were included if they explored one or a combination of: the areas of practice in which midwives and health visitors worked collaboratively; the methods that midwives and health visitors employed when communicating and collaborating with each other; the effectiveness of collaboration between midwives and health visitors; and whether collaborative practice between midwives and health visitors meet clinical guidelines. Papers were assessed for study quality. Eighteen papers (sixteen studies) met the inclusion criteria. The studies found that midwives and health visitors reported valuing interprofessional collaboration, however this was rare in practice. Findings show that collaboration could be useful across the service continuum, from antenatal care, transition of care/handover, to postnatal care. Evidence for the effectiveness of collaboration between these two groups was equivocal and based on self-reported data. In relation, multiple enablers and barriers to collaboration were identified. Communication was reportedly key to interprofessional collaboration. Interprofessional collaboration was valuable according to both midwives and health visitors, however, this was made challenging by several barriers such as poor communication, limited resources, and poor understanding of each other's role. Structural barriers such as physical distance also featured as a challenge to interprofessional collaboration. Although the findings are limited by variable methodological quality, these were consistent across time, geographical locations, and health settings, indicating transferability and reliability. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  15. CROSS-DISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY: Diffusion-Based Recommendation in Collaborative Tagging Systems

    NASA Astrophysics Data System (ADS)

    Shang, Ming-Sheng; Zhang, Zi-Ke

    2009-11-01

    Recently, collaborative tagging systems have attracted more and more attention and have been widely applied in web systems. Tags provide highly abstracted information about personal preferences and item content, and therefore have the potential to help in improving better personalized recommendations. We propose a diffusion-based recommendation algorithm considering the personal vocabulary and evaluate it in a real-world dataset: Del.icio.us. Experimental results demonstrate that the usage of tag information can significantly improve the accuracy of personalized recommendations.

  16. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  17. A game theory based framework for assessing incentives for local area collaboration with an application to Scottish salmon farming.

    PubMed

    Murray, Alexander G

    2014-08-01

    Movements of water that transport pathogens mean that in net-pen aquaculture diseases are often most effectively managed collaboratively among neighbours. Such area management is widely and explicitly applied for pathogen management in marine salmon farms. Effective area management requires the active support of farm managers and a simple game-theory based framework was developed to identify the conditions required under which collaboration is perceived to be in their own best interest. The model applied is based on area management as practiced for Scottish salmon farms, but its simplicity allows it to be generalised to other area-managed net-pen aquaculture systems. In this model managers choose between purchasing tested pathogen-free fish or cheaper, untested fish that might carry pathogens. Perceived pay-off depends on degree of confidence that neighbours will not buy untested fish, risking input of pathogens that spread between farms. For a given level of risk, confidence in neighbours is most important in control of moderate-impact moderate-probability diseases. Common low-impact diseases require high confidence since there is a high probability a neighbour will import, while testing for rare high-impact diseases may be cost-effective regardless of neighbours actions. In some cases testing may be beneficial at an area level, even if all individual farms are better off not testing. Higher confidence is required for areas with many farms and so focusing management on smaller, epidemiologically imperfect, areas may be more effective. The confidence required for collaboration can be enhanced by the development of formal agreements and the involvement of outside disinterested parties such as trade bodies or government. Copyright © 2014. Published by Elsevier B.V.

  18. Water Treatment Using Advanced Ultraviolet Light Sources Final Report CRADA No. TC02089.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoppes, W.; Oster, S.

    This was a collaborative effort between Lawrence Livermore National Security, LLC as manager and operator of Lawrence Livermore National Laboratory (LLNL) and Teknichal Services, LLC (TkS), to develop water treatment systems using advanced ultraviolet light sources. The Russian institutes involved with this project were The High Current Electronics Institute (HCEI) and Russian Institute of Technical Physics-Institute of Experimental Physics (VNIIEF). HCEI and VNIIEF developed and demonstrated the potential commercial viability of short-wavelength ultraviolet excimer lamps under a Thrust 1 Initiatives for Proliferation Prevention (IPP) Program. The goals of this collaboration were to demonstrate both the commercial viability of excilampbased watermore » disinfection and achieve further substantial operational improvement in the lamps themselves; particularly in the area of energy efficiency.« less

  19. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  20. Quantum communication for satellite-to-ground networks with partially entangled states

    NASA Astrophysics Data System (ADS)

    Chen, Na; Quan, Dong-Xiao; Pei, Chang-Xing; Yang-Hong

    2015-02-01

    To realize practical wide-area quantum communication, a satellite-to-ground network with partially entangled states is developed in this paper. For efficiency and security reasons, the existing method of quantum communication in distributed wireless quantum networks with partially entangled states cannot be applied directly to the proposed quantum network. Based on this point, an efficient and secure quantum communication scheme with partially entangled states is presented. In our scheme, the source node performs teleportation only after an end-to-end entangled state has been established by entanglement swapping with partially entangled states. Thus, the security of quantum communication is guaranteed. The destination node recovers the transmitted quantum bit with the help of an auxiliary quantum bit and specially defined unitary matrices. Detailed calculations and simulation analyses show that the probability of successfully transferring a quantum bit in the presented scheme is high. In addition, the auxiliary quantum bit provides a heralded mechanism for successful communication. Based on the critical components that are presented in this article an efficient, secure, and practical wide-area quantum communication can be achieved. Project supported by the National Natural Science Foundation of China (Grant Nos. 61072067 and 61372076), the 111 Project (Grant No. B08038), the Fund from the State Key Laboratory of Integrated Services Networks (Grant No. ISN 1001004), and the Fundamental Research Funds for the Central Universities (Grant Nos. K5051301059 and K5051201021).

  1. Real time wide area radiation surveillance system (REWARD) based on 3d silicon and (CD,ZN)Te for neutron and gamma-ray detection

    NASA Astrophysics Data System (ADS)

    Disch, C.

    2014-09-01

    Mobile surveillance systems are used to find lost radioactive sources and possible nuclear threats in urban areas. The REWARD collaboration [1] aims to develop such a complete radiation monitoring system that can be installed in mobile or stationary setups across a wide area. The scenarios include nuclear terrorism threats, lost radioactive sources, radioactive contamination and nuclear accidents. This paper will show the performance capabilities of the REWARD system in different scnarios. The results include both Monte Carlo simulations as well as neutron and gamma-ray detection performances in terms of efficiency and nuclide identification. The outcomes of several radiation mapping survey with the entire REWARD system will also be presented.

  2. CCSDS - Advancing Spaceflight Technology for International Collaboration

    NASA Technical Reports Server (NTRS)

    Kearney, Mike; Kiely, Aaron; Yeh, Penshu; Gerner, Jean-Luc; Calzolari, Gian-Paolo; Gifford, Kevin; Merri, Mario; Weiss, Howard

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has been developing data and communications standards since 1982, with the objective of providing interoperability for enabling international collaboration for spaceflight missions. As data and communications technology has advanced, CCSDS has progressed to capitalize on existing products when available and suitable for spaceflight, and to develop innovative new approaches when available products fail. The current scope of the CCSDS architecture spans the end-to-end data architecture of a spaceflight mission, with ongoing efforts to develop and standardize cutting-edge technology. This manuscript describes the overall architecture, the position of CCSDS in the standards and international mission community, and some CCSDS processes. It then highlights in detail several of the most interesting and critical technical areas in work right now, and how they support collaborative missions. Special topics include: Delay/Disruption Tolerant Networking (DTN), Asynchronous Message Service (AMS), Multispectral/Hyperspectral Data Compression (MHDC), Coding and Synchronization, Onboard Wireless, Spacecraft Monitor and Control, Navigation, Security, and Time Synchronization/Correlation. Broad international participation in development of CCSDS standards is encouraged.

  3. The EGS Data Collaboration Platform: Enabling Scientific Discovery

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weers, Jonathan D; Johnston, Henry; Huggins, Jay V

    Collaboration in the digital age has been stifled in recent years. Reasonable responses to legitimate security concerns have created a virtual landscape of silos and fortified castles incapable of sharing information efficiently. This trend is unfortunately opposed to the geothermal scientific community's migration toward larger, more collaborative projects. To facilitate efficient sharing of information between team members from multiple national labs, universities, and private organizations, the 'EGS Collab' team has developed a universally accessible, secure data collaboration platform and has fully integrated it with the U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) and the National Geothermal Data Systemmore » (NGDS). This paper will explore some of the challenges of collaboration in the modern digital age, highlight strategies for active data management, and discuss the integration of the EGS Collab data management platform with the GDR to enable scientific discovery through the timely dissemination of information.« less

  4. Scientific Misconduct

    NASA Astrophysics Data System (ADS)

    Moore, John W.

    2002-12-01

    These cases provide a good basis for discussions of scientific ethics, particularly with respect to the responsibilities of colleagues in collaborative projects. With increasing numbers of students working in cooperative or collaborative groups, there may be opportunities for more than just discussion—similar issues of responsibility apply to the members of such groups. Further, this is an area where, “no clear, widely accepted standards of behavior exist” (1). Thus there is an opportunity to point out to students that scientific ethics, like science itself, is incomplete and needs constant attention to issues that result from new paradigms such as collaborative research. Finally, each of us can resolve to pay more attention to the contributions we and our colleagues make to collaborative projects, applying to our own work no less critical an eye than we would cast on the work of those we don’t know at all.

  5. Purdue University graduate certificate program in Veterinary Homeland Security.

    PubMed

    Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E

    2008-01-01

    Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.

  6. Public-Private Collaboration in the Department of Defense

    DTIC Science & Technology

    2012-07-01

    In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.

  7. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  8. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  9. CMS Annual Report 2004

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    de la Rubia, T D; Shang, S P; Rennie, G

    2005-07-29

    Glance at the articles in this report, and you will sense the transformation that is reshaping the landscape of materials science and chemistry. This transformation is bridging the gaps among chemistry, materials science, and biology--ushering in a wealth of innovative technologies with broad scientific impact. The emergence of this intersection is reinvigorating our strategic investment into areas that build on our strength of interdisciplinary science. It is at the intersection that we position our strategic vision into a future where we will provide radical materials innovations and solutions to our national-security programs and other sponsors. Our 2004 Annual Report describesmore » how our successes and breakthroughs follow a path set forward by our strategic plan and four organizing research themes, each with key scientific accomplishments by our staff and collaborators. We have organized this report into two major sections: research themes and our dynamic teams. The research-theme sections focus on achievements arising from earlier investments while addressing future challenges. The dynamic teams section illustrates the directorate's organizational structure of divisions, centers, and institutes that support a team environment across disciplinary and institutional boundaries. The research presented in this annual report gives substantive examples of how we are proceeding in each of these four theme areas and how they are aligned with our national-security mission. By maintaining an organizational structure that offers an environment of collaborative problem-solving opportunities, we are able to nurture the discoveries and breakthroughs required for future successes.« less

  10. CERN automatic audio-conference service

    NASA Astrophysics Data System (ADS)

    Sierra Moral, Rodrigo

    2010-04-01

    Scientists from all over the world need to collaborate with CERN on a daily basis. They must be able to communicate effectively on their joint projects at any time; as a result telephone conferences have become indispensable and widely used. Managed by 6 operators, CERN already has more than 20000 hours and 5700 audio-conferences per year. However, the traditional telephone based audio-conference system needed to be modernized in three ways. Firstly, to provide the participants with more autonomy in the organization of their conferences; secondly, to eliminate the constraints of manual intervention by operators; and thirdly, to integrate the audio-conferences into a collaborative working framework. The large number, and hence cost, of the conferences prohibited externalization and so the CERN telecommunications team drew up a specification to implement a new system. It was decided to use a new commercial collaborative audio-conference solution based on the SIP protocol. The system was tested as the first European pilot and several improvements (such as billing, security, redundancy...) were implemented based on CERN's recommendations. The new automatic conference system has been operational since the second half of 2006. It is very popular for the users and has doubled the number of conferences in the past two years.

  11. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  12. Open NASA Earth Exchange (OpenNEX): Strategies for enabling cross organization collaboration in the earth sciences

    NASA Astrophysics Data System (ADS)

    Michaelis, A.; Ganguly, S.; Nemani, R. R.; Votava, P.; Wang, W.; Lee, T. J.; Dungan, J. L.

    2014-12-01

    Sharing community-valued codes, intermediary datasets and results from individual efforts with others that are not in a direct funded collaboration can be a challenge. Cross organization collaboration is often impeded due to infrastructure security constraints, rigid financial controls, bureaucracy, and workforce nationalities, etc., which can force groups to work in a segmented fashion and/or through awkward and suboptimal web services. We show how a focused community may come together, share modeling and analysis codes, computing configurations, scientific results, knowledge and expertise on a public cloud platform; diverse groups of researchers working together at "arms length". Through the OpenNEX experimental workshop, users can view short technical "how-to" videos and explore encapsulated working environment. Workshop participants can easily instantiate Amazon Machine Images (AMI) or launch full cluster and data processing configurations within minutes. Enabling users to instantiate computing environments from configuration templates on large public cloud infrastructures, such as Amazon Web Services, may provide a mechanism for groups to easily use each others work and collaborate indirectly. Moreover, using the public cloud for this workshop allowed a single group to host a large read only data archive, making datasets of interest to the community widely available on the public cloud, enabling other groups to directly connect to the data and reduce the costs of the collaborative work by freeing other individual groups from redundantly retrieving, integrating or financing the storage of the datasets of interest.

  13. Description and implementation of a surveillance network for bluetongue in the Balkans and in adjoining areas of south-eastern Europe.

    PubMed

    Dall'Acqua, F; Paladini, C; Meiswinkel, R; Savini, L; Calistri, P

    2006-01-01

    During the recent severe outbreaks of bluetongue (BT) in the Mediterranean Basin, the BT virus (BTV) spread beyond its historical limits into the Balkan region. One of the primary impacts of BT is the cessation in livestock trade which can have severe economic and social consequences. The authors briefly describe the development of the collaborative East-BTnet programme which aims to assist all affected and at-risk Balkan states and adjoining countries in the management of BT, and in the development of individual national surveillance systems. The beneficiary countries involved, and led by the World organisation for animal health (Office International des Epizooties) Collaborating Centre for veterinary training, epidemiology, food safety and animal welfare of the Istituto Zooprofilattico dell'Abruzzo e del Molise 'G. Caporale' in collaboration with the Institute for the Protection and the Security of the Citizen, the European Commission Joint Research Centre (IPSC-JRC), were Albania, Bosnia-Herzegovina, Bulgaria, Croatia, Cyprus, the Former Yugoslavia Republic of Macedonia, Kosovo, Malta, Romania, Serbia and Montenegro, Slovenia and Turkey. A regional web-based surveillance network is a valuable tool for controlling and managing transboundary animal diseases such as BT. Its implementation in the Balkan region and in adjoining areas of south-eastern Europe is described and discussed.

  14. Supplemental Instruction and Video-Based Supplemental Instruction: Annotated Bibliography 2014

    ERIC Educational Resources Information Center

    Arendale, David R., Comp.

    2014-01-01

    Peer collaborative learning has been popular in education for decades. As both pedagogy and learning strategy, it has been frequently adopted and adapted for a wide range of academic content areas at the elementary, secondary, and postsecondary levels due to its benefits. The professional literature is filled with reports of individual professors…

  15. Contributions of team climate in the study of interprofessional collaboration: A conceptual analysis.

    PubMed

    Agreli, Heloise F; Peduzzi, Marina; Bailey, Christopher

    2017-11-01

    The concept of team climate is widely used to understand and evaluate working environments. It shares some important features with Interprofessional Collaboration (IPC). The four-factor theory of climate for work group innovation, which underpins team climate, could provide a better basis for understanding both teamwork and IPC. This article examines in detail the common ground between team climate and IPC, and assesses the relevance of team climate as a theoretical approach to understanding IPC. There are important potential areas of overlap between team climate and IPC that we have grouped under four headings: (1) interaction and communication between team members; (2) common objectives around which collective work is organised; (3) responsibility for performing work to a high standard; and (4) promoting innovation in working practices. These overlapping areas suggest common characteristics that could provide elements of a framework for considering the contribution of team climate to collaborative working, both from a conceptual perspective and, potentially, in operational terms as, for example, a diagnostic tool.

  16. Descriptive Model of Generic WAMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; DeSteese, John G.

    The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.

  17. A Collection of Technical Studies Completed for the Computer-Aided Acquisition and Logistic Support (CALS) Program Fiscal Year 1988. Volume 1. Text, Security and Data Management

    DTIC Science & Technology

    1991-03-01

    management methodologies claim to be "expert systems" with security intelligence built into them to I derive a body of both facts and speculative data ... Data Administration considerations . III -21 IV. ARTIFICIAL INTELLIGENCE . .. .. .. . .. IV - 1 A. Description of Technologies . . . . . .. IV - 1 1...as intelligent gateways, wide area networks, and distributed databases for the distribution of logistics products. The integrity of CALS data and the

  18. Global Implementation of Genomic Medicine: We Are Not Alone

    PubMed Central

    Manolio, Teri A.; Abramowicz, Marc; Al-Mulla, Fahd; Anderson, Warwick; Balling, Rudi; Berger, Adam C.; Bleyl, Steven; Chakravarti, Aravinda; Chantratita, Wasun; Chisholm, Rex L.; Dissanayake, Vajira H. W.; Dunn, Michael; Dzau, Victor J.; Han, Bok-Ghee; Hubbard, Tim; Kolbe, Anne; Korf, Bruce; Kubo, Michiaki; Lasko, Paul; Leego, Erkki; Mahasirimongkol, Surakameth; Majumdar, Partha P.; Matthijs, Gert; McLeod, Howard L.; Metspalu, Andres; Meulien, Pierre; Miyano, Satoru; Naparstek, Yaakov; O’Rourke, P. Pearl; Patrinos, George P.; Rehm, Heidi L.; Relling, Mary V.; Rennert, Gad; Rodriguez, Laura Lyman; Roden, Dan M.; Shuldiner, Alan R.; Sinha, Sukdev; Tan, Patrick; Ulfendahl, Mats; Ward, Robyn; Williams, Marc S.; Wong, John E.L.; Green, Eric D.; Ginsburg, Geoffrey S.

    2016-01-01

    Advances in high-throughput genomic technologies coupled with a growing number of genomic results potentially useful in clinical care have led to ground-breaking genomic medicine implementation programs in various nations. Many of these innovative programs capitalize on unique local capabilities arising from the structure of their health care systems or their cultural or political milieu, as well as from unusual burdens of disease or risk alleles. Many such programs are being conducted in relative isolation and might benefit from sharing of approaches and lessons learned in other nations. The National Human Genome Research Institute recently brought together 25 of these groups from around the world to describe and compare projects, examine the current state of implementation and desired near-term capabilities, and identify opportunities for collaboration to promote the responsible implementation of genomic medicine. The wide variety of nascent programs in diverse settings demonstrates that implementation of genomic medicine is expanding globally in varied and highly innovative ways. Opportunities for collaboration abound in the areas of evidence generation, health information technology, education, workforce development, pharmacogenomics, and policy and regulatory issues. Several international organizations that are already facilitating effective research collaborations should engage to ensure implementation proceeds collaboratively without potentially wasteful duplication. Efforts to coalesce these groups around concrete but compelling signature projects, such as global eradication of genetically-mediated drug reactions or developing a truly global genomic variant data resource across a wide number of ethnicities, would accelerate appropriate implementation of genomics to improve clinical care world-wide. PMID:26041702

  19. Wide-Area Cooperative Biometric Tagging, Tracking and Locating in a Multimodal Sensor Network

    DTIC Science & Technology

    2014-12-04

    12] 89.3% 2.7% 7 5 50s Our Model 90.7% 2.7% 6 5 4.6s TABLE III: Comparison of tracking results on CAVIAR dataset. The number of trajectories in...other. We evaluate our approach on two widely used public single-camera pedestrian tracking datasets: the CAVIAR dataset [1] and the TownCentre dataset...collaborators at Progeny. It is also being provided to ONR along with datasets on which it has been tested. REFERENCES [1] Caviar dataset. http

  20. Enabling Innovation and Collaboration Across Geography and Culture: A Case Study of NASA's Systems Engineering Community of Practice

    NASA Technical Reports Server (NTRS)

    Topousis, Daria E.; Murphy, Keri; Robinson, Greg

    2008-01-01

    In 2004, NASA faced major knowledge sharing challenges due to geographically isolated field centers that inhibited personnel from sharing experiences and ideas. Mission failures and new directions for the agency demanded better collaborative tools. In addition, with the push to send astronauts back to the moon and to Mars, NASA recognized that systems engineering would have to improve across the agency. Of the ten field centers, seven had not built a spacecraft in over 30 years, and had lost systems engineering expertise. The Systems Engineering Community of Practice came together to capture the knowledge of its members using the suite of collaborative tools provided by the NASA Engineering Network (NEN.) The NEN provided a secure collaboration space for over 60 practitioners across the agency to assemble and review a NASA systems engineering handbook. Once the handbook was complete, they used the open community area to disseminate it. This case study explores both the technology and the social networking that made the community possible, describes technological approaches that facilitated rapid setup and low maintenance, provides best practices that other organizations could adopt, and discusses the vision for how this community will continue to collaborate across the field centers to benefit the agency as it continues exploring the solar system.

  1. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    PubMed Central

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.

    2016-01-01

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300

  2. Organizational Legitimacy of International Research Collaborations: Crossing Boundaries in the Middle East

    ERIC Educational Resources Information Center

    Oleksiyenko, Anatoly

    2013-01-01

    Cross-border academic collaborations in conflict zones are vulnerable to escalated turbulence, liability concerns and flagging support. Multi-level stakeholder engagement at home and abroad is essential for securing the political and financial sustainability of such collaborations. This study examines the multilayered stakeholder arrangements…

  3. Collaboration between Supported Employment and Human Resource Services: Strategies for Success

    ERIC Educational Resources Information Center

    Post, Michal; Campbell, Camille; Heinz, Tom; Kotsonas, Lori; Montgomery, Joyce; Storey, Keith

    2010-01-01

    The article presents the benefits of successful collaboration between supported employment agencies and human resource managers when working together to secure employment for individuals with disabilities. Two case studies are presented: one involving a successful collaboration with county human resource managers in negotiating a change in the…

  4. The core legion object model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lewis, M.; Grimshaw, A.

    1996-12-31

    The Legion project at the University of Virginia is an architecture for designing and building system services that provide the illusion of a single virtual machine to users, a virtual machine that provides secure shared object and shared name spaces, application adjustable fault-tolerance, improved response time, and greater throughput. Legion targets wide area assemblies of workstations, supercomputers, and parallel supercomputers, Legion tackles problems not solved by existing workstation based parallel processing tools; the system will enable fault-tolerance, wide area parallel processing, inter-operability, heterogeneity, a single global name space, protection, security, efficient scheduling, and comprehensive resource management. This paper describes themore » core Legion object model, which specifies the composition and functionality of Legion`s core objects-those objects that cooperate to create, locate, manage, and remove objects in the Legion system. The object model facilitates a flexible extensible implementation, provides a single global name space, grants site autonomy to participating organizations, and scales to millions of sites and trillions of objects.« less

  5. Improving ward environments and developing skills for discharge with the implementation of self-catering on a low secure forensic unit.

    PubMed Central

    O'Reilly, Alison

    2016-01-01

    The opportunities for service users to develop skills for more independent living and take control of their environments are limited in secure mental health units. This paper will outline a quality improvement project that changed how the catering services were delivered in a low secure unit in East London NHS Foundation Trust (ELFT). A Quality Improvement methodology was adopted incorporating the Plan, Do, Study, Act (PDSA) cycle which included the trial of service users preparing their own meals on a daily basis. The participation rates were measured and functional daily living skills were recorded. Following success of the trial, long-term implementation of self-catering was agreed, with service users being supported to prepare a shared evening meal every day on the ward with an average of 60% participation. Functional living skills indicated an improvement in the area of process skills. The project aligned with ELFT's aims of service users working in collaboration with staff to implement changes in service delivery. PMID:28090324

  6. Improving ward environments and developing skills for discharge with the implementation of self-catering on a low secure forensic unit.

    PubMed

    O'Reilly, Alison

    2016-01-01

    The opportunities for service users to develop skills for more independent living and take control of their environments are limited in secure mental health units. This paper will outline a quality improvement project that changed how the catering services were delivered in a low secure unit in East London NHS Foundation Trust (ELFT). A Quality Improvement methodology was adopted incorporating the Plan, Do, Study, Act (PDSA) cycle which included the trial of service users preparing their own meals on a daily basis. The participation rates were measured and functional daily living skills were recorded. Following success of the trial, long-term implementation of self-catering was agreed, with service users being supported to prepare a shared evening meal every day on the ward with an average of 60% participation. Functional living skills indicated an improvement in the area of process skills. The project aligned with ELFT's aims of service users working in collaboration with staff to implement changes in service delivery.

  7. Trust and Privacy Solutions Based on Holistic Service Requirements.

    PubMed

    Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio

    2015-12-24

    The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens' information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing.

  8. Trust and Privacy Solutions Based on Holistic Service Requirements

    PubMed Central

    Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio

    2015-01-01

    The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens’ information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing. PMID:26712752

  9. Brain-CODE: A Secure Neuroinformatics Platform for Management, Federation, Sharing and Analysis of Multi-Dimensional Neuroscience Data.

    PubMed

    Vaccarino, Anthony L; Dharsee, Moyez; Strother, Stephen; Aldridge, Don; Arnott, Stephen R; Behan, Brendan; Dafnas, Costas; Dong, Fan; Edgecombe, Kenneth; El-Badrawi, Rachad; El-Emam, Khaled; Gee, Tom; Evans, Susan G; Javadi, Mojib; Jeanson, Francis; Lefaivre, Shannon; Lutz, Kristen; MacPhee, F Chris; Mikkelsen, Jordan; Mikkelsen, Tom; Mirotchnick, Nicholas; Schmah, Tanya; Studzinski, Christa M; Stuss, Donald T; Theriault, Elizabeth; Evans, Kenneth R

    2018-01-01

    Historically, research databases have existed in isolation with no practical avenue for sharing or pooling medical data into high dimensional datasets that can be efficiently compared across databases. To address this challenge, the Ontario Brain Institute's "Brain-CODE" is a large-scale neuroinformatics platform designed to support the collection, storage, federation, sharing and analysis of different data types across several brain disorders, as a means to understand common underlying causes of brain dysfunction and develop novel approaches to treatment. By providing researchers access to aggregated datasets that they otherwise could not obtain independently, Brain-CODE incentivizes data sharing and collaboration and facilitates analyses both within and across disorders and across a wide array of data types, including clinical, neuroimaging and molecular. The Brain-CODE system architecture provides the technical capabilities to support (1) consolidated data management to securely capture, monitor and curate data, (2) privacy and security best-practices, and (3) interoperable and extensible systems that support harmonization, integration, and query across diverse data modalities and linkages to external data sources. Brain-CODE currently supports collaborative research networks focused on various brain conditions, including neurodevelopmental disorders, cerebral palsy, neurodegenerative diseases, epilepsy and mood disorders. These programs are generating large volumes of data that are integrated within Brain-CODE to support scientific inquiry and analytics across multiple brain disorders and modalities. By providing access to very large datasets on patients with different brain disorders and enabling linkages to provincial, national and international databases, Brain-CODE will help to generate new hypotheses about the biological bases of brain disorders, and ultimately promote new discoveries to improve patient care.

  10. Brain-CODE: A Secure Neuroinformatics Platform for Management, Federation, Sharing and Analysis of Multi-Dimensional Neuroscience Data

    PubMed Central

    Vaccarino, Anthony L.; Dharsee, Moyez; Strother, Stephen; Aldridge, Don; Arnott, Stephen R.; Behan, Brendan; Dafnas, Costas; Dong, Fan; Edgecombe, Kenneth; El-Badrawi, Rachad; El-Emam, Khaled; Gee, Tom; Evans, Susan G.; Javadi, Mojib; Jeanson, Francis; Lefaivre, Shannon; Lutz, Kristen; MacPhee, F. Chris; Mikkelsen, Jordan; Mikkelsen, Tom; Mirotchnick, Nicholas; Schmah, Tanya; Studzinski, Christa M.; Stuss, Donald T.; Theriault, Elizabeth; Evans, Kenneth R.

    2018-01-01

    Historically, research databases have existed in isolation with no practical avenue for sharing or pooling medical data into high dimensional datasets that can be efficiently compared across databases. To address this challenge, the Ontario Brain Institute’s “Brain-CODE” is a large-scale neuroinformatics platform designed to support the collection, storage, federation, sharing and analysis of different data types across several brain disorders, as a means to understand common underlying causes of brain dysfunction and develop novel approaches to treatment. By providing researchers access to aggregated datasets that they otherwise could not obtain independently, Brain-CODE incentivizes data sharing and collaboration and facilitates analyses both within and across disorders and across a wide array of data types, including clinical, neuroimaging and molecular. The Brain-CODE system architecture provides the technical capabilities to support (1) consolidated data management to securely capture, monitor and curate data, (2) privacy and security best-practices, and (3) interoperable and extensible systems that support harmonization, integration, and query across diverse data modalities and linkages to external data sources. Brain-CODE currently supports collaborative research networks focused on various brain conditions, including neurodevelopmental disorders, cerebral palsy, neurodegenerative diseases, epilepsy and mood disorders. These programs are generating large volumes of data that are integrated within Brain-CODE to support scientific inquiry and analytics across multiple brain disorders and modalities. By providing access to very large datasets on patients with different brain disorders and enabling linkages to provincial, national and international databases, Brain-CODE will help to generate new hypotheses about the biological bases of brain disorders, and ultimately promote new discoveries to improve patient care. PMID:29875648

  11. Managing security risks for inter-organisational information systems: a multiagent collaborative model

    NASA Astrophysics Data System (ADS)

    Feng, Nan; Wu, Harris; Li, Minqiang; Wu, Desheng; Chen, Fuzan; Tian, Jin

    2016-09-01

    Information sharing across organisations is critical to effectively managing the security risks of inter-organisational information systems. Nevertheless, few previous studies on information systems security have focused on inter-organisational information sharing, and none have studied the sharing of inferred beliefs versus factual observations. In this article, a multiagent collaborative model (MACM) is proposed as a practical solution to assess the risk level of each allied organisation's information system and support proactive security treatment by sharing beliefs on event probabilities as well as factual observations. In MACM, for each allied organisation's information system, we design four types of agents: inspection agent, analysis agent, control agent, and communication agent. By sharing soft findings (beliefs) in addition to hard findings (factual observations) among the organisations, each organisation's analysis agent is capable of dynamically predicting its security risk level using a Bayesian network. A real-world implementation illustrates how our model can be used to manage security risks in distributed information systems and that sharing soft findings leads to lower expected loss from security risks.

  12. The global lambda visualization facility: An international ultra-high-definition wide-area visualization collaboratory

    USGS Publications Warehouse

    Leigh, J.; Renambot, L.; Johnson, Aaron H.; Jeong, B.; Jagodic, R.; Schwarz, N.; Svistula, D.; Singh, R.; Aguilera, J.; Wang, X.; Vishwanath, V.; Lopez, B.; Sandin, D.; Peterka, T.; Girado, J.; Kooima, R.; Ge, J.; Long, L.; Verlo, A.; DeFanti, T.A.; Brown, M.; Cox, D.; Patterson, R.; Dorn, P.; Wefel, P.; Levy, S.; Talandis, J.; Reitzer, J.; Prudhomme, T.; Coffin, T.; Davis, B.; Wielinga, P.; Stolk, B.; Bum, Koo G.; Kim, J.; Han, S.; Corrie, B.; Zimmerman, T.; Boulanger, P.; Garcia, M.

    2006-01-01

    The research outlined in this paper marks an initial global cooperative effort between visualization and collaboration researchers to build a persistent virtual visualization facility linked by ultra-high-speed optical networks. The goal is to enable the comprehensive and synergistic research and development of the necessary hardware, software and interaction techniques to realize the next generation of end-user tools for scientists to collaborate on the global Lambda Grid. This paper outlines some of the visualization research projects that were demonstrated at the iGrid 2005 workshop in San Diego, California.

  13. Analysis of therapeutic growth hormone preparations: report of an interlaboratory collaborative study on growth hormone assay methodologies.

    PubMed

    Bristow, A F; Jeffcoate, S L

    1992-09-01

    Recombinant DNA-derived human growth hormone (somatotropin) is widely used to treat growth hormone-deficient children. The potency of this product is determined by in-vivo bioassay in hypophysectomized rats, which is imprecise, costly and invasive, and there have been suggestions that it could safely be replaced with in-vitro or physico-chemical alternatives. In this report we present the results of a collaborative study designed to test this proposal. Somatotropin was modified by mild or severe proteolysis, mild or severe oxidation or treatment at high pH, and compared in a multi-centre collaborative study with unmodified somatotropin or with dimerized somatotropin. Participating laboratories included manufacturers and national control laboratories, and pharmacopoeial bioassays were compared with in-house in-vitro and physico-chemical bioassays. Although performing adequately with untreated somatotropin, for degraded samples the in-vivo bioassays were relatively unresponsive to changes in the growth hormone molecule. In contrast, the physico-chemical assays, in particular the reverse-phase HPLC, performed with a high degree of selectivity. We conclude that in the case of somatotropin, the in-vivo bioassay can be removed from the routine product specification with an acceptable degree of security. This however does not obviate the requirement rigorously to demonstrate biological activity in-vivo during product development, nor may the conclusions of this study be applied to other therapeutic recombinant proteins without similar collaborative investigations.

  14. Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool

    DTIC Science & Technology

    2010-11-01

    designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and authorisation in terms...level authentication and authorisation in terms of security. It uses operating system level security but does not provide application level security for...and collaboration tool, designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and

  15. The ethics weathervane.

    PubMed

    Knoppers, Bartha Maria; Chadwick, Ruth

    2015-09-04

    Global collaboration in genomic research is increasingly both a scientific reality and an ethical imperative. This past decade has witnessed the emergence of six new, interconnected areas of ethical consensus and emphasis for policy in genomics: governance, security, empowerment, transparency, the right not to know, and globalization. The globalization of genomic research warrants an approach to governance policies grounded in human rights. A human rights approach activates the ethical principles underpinning genomic research. It lends force to the right of all citizens to benefit from scientific progress, and to the right of all scientists to be recognized for their contributions.

  16. Privacy-preserving GWAS analysis on federated genomic datasets.

    PubMed

    Constable, Scott D; Tang, Yuzhe; Wang, Shuang; Jiang, Xiaoqian; Chapin, Steve

    2015-01-01

    The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount of samples, which can grow beyond the capability of a single institution. Federated genomic data analysis holds the promise of enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as data are being exchanged across institutional boundaries), which becomes an inhibiting factor for the practical use. We present a privacy-preserving GWAS framework on federated genomic datasets. Our method is to layer the GWAS computations on top of secure multi-party computation (MPC) systems. This approach allows two parties in a distributed system to mutually perform secure GWAS computations, but without exposing their private data outside. We demonstrate our technique by implementing a framework for minor allele frequency counting and χ2 statistics calculation, one of typical computations used in GWAS. For efficient prototyping, we use a state-of-the-art MPC framework, i.e., Portable Circuit Format (PCF) 1. Our experimental results show promise in realizing both efficient and secure cross-institution GWAS computations.

  17. The technological obsolescence of the Brazilian eletronic ballot box.

    PubMed

    Camargo, Carlos Rogério; Faust, Richard; Merino, Eugênio; Stefani, Clarissa

    2012-01-01

    The electronic ballot box has played a significant role in the consolidation of Brazilian political process. It has enabled paper ballots extinction as a support for the elector's vote as well as for voting counting processes. It is also widely known that election automation has decisively collaborated to the legitimization of Brazilian democracy, getting rid of doubts about the winning candidates. In 1995, when the project was conceived, it represented a compromise solution, balancing technical efficiency and costs trade-offs. However, this architecture currently limits the ergonomic enhancements to the device operation, transportation, maintenance and storage. Nowadays are available in the market devices of reduced dimensions, based on novel computational architecture, namely tablet computers, which emphasizes usability, autonomy, portability, security and low power consumption. Therefore, the proposal under discussion is the replacement of the current electronic ballot boxes for tablet-based devices to improve the ergonomics aspects of the Brazilian voting process. These devices offer a plethora of integrated features (e.g., capacitive touchscreen, speakers, microphone) that enable highly usable and simple user interfaces, in addition to enhancing the voting process security mechanisms. Finally, their operational systems features allow for the development of highly secure applications, suitable to the requirements of a voting process.

  18. Modification of soils by plants: sustainability by design

    NASA Astrophysics Data System (ADS)

    Hallett, Paul; White, Philip; Garcia Moreno, Rosario; Vetterlein, Doris

    2014-05-01

    In recent years, food and environmental security threats have increased the prominence and funding of soil science. A growing area is the study of root-soil interactions in soil, driven by the need to increase crop productivity, whilst also decreasing inputs. The untapped potential in manipulating soil properties with plants to increase food security is increasingly recognised. We argue that this area of soil science has been successful for a number of reasons: (1) it offers something positive, in terms of more food for a growing population; (2) the research is collaborative, with plant and soil scientists working together and bringing the research from the lab to the field by working across a broad range of disciplines; (3) there have been technical advances in both plant genetics and soil science that allow for very novel and exciting research questions to be answered; and (4) there are commercial demands from both plant breeding companies and farmers for more sustainable crop varieties, which provides lobbying power to funders. However, soil science is still viewed by many as 'bucket science' where the answers are known but just poorly applied in farming practice. We know this is nonsense, but how do we convince others? Using examples from our EGU 2014 session, we will demonstrate how recent scientific advances in soil science have greatly increased the understanding of the root-soil interface. The research includes new technologies such as high resolution non-invasive imaging of roots in soil, the use of model plants that have controlled traits that modify soils, molecular biology approaches to investigate nutrient cycling and other microbial functions affected by plants, and the development of new models of root growth, nutrient capture and plant-soil water relations. Despite a surge of soil researchers studying roots, the research still fails to attract the attention or funding of other disciplines, including our collaborators in plant science. This is typical of many areas of soil science. We will discuss opportunities to increase demand for our science and its impact in addressing food security challenges.

  19. Why information security belongs on the CFO's agenda.

    PubMed

    Quinnild, James; Fusile, Jeff; Smith, Cindy

    2006-02-01

    Healthcare financial executives need to understand the complex and growing role of information security in supporting the business of health care. The biggest security gaps in healthcare organizations occur in strategy and centralization, business executive preparation, and protected health information. CFOs should collaborate with the CIO in engaging a comprehensive framework to develop, implement, communicate, and maintain an enterprisewide information security strategy.

  20. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    DTIC Science & Technology

    2007-03-01

    commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them

  1. Visualizing Collaboration Characteristics and Topic Burst on International Mobile Health Research: Bibliometric Analysis.

    PubMed

    Shen, Lining; Xiong, Bing; Li, Wei; Lan, Fuqiang; Evans, Richard; Zhang, Wei

    2018-06-05

    In the last few decades, mobile technologies have been widely adopted in the field of health care services to improve the accessibility to and the quality of health services received. Mobile health (mHealth) has emerged as a field of research with increasing attention being paid to it by scientific researchers and a rapid increase in related literature being reported. The purpose of this study was to analyze the current state of research, including publication outputs, in the field of mHealth to uncover in-depth collaboration characteristics and topic burst of international mHealth research. The authors collected literature that has been published in the last 20 years and indexed by Thomson Reuters Web of Science Core Collection (WoSCC). Various statistical techniques and bibliometric measures were employed, including publication growth analysis; journal distribution; and collaboration network analysis at the author, institution, and country collaboration level. The temporal visualization map of burst terms was drawn, and the co-occurrence matrix of these burst terms was analyzed by hierarchical cluster analysis and social network analysis. A total of 2704 bibliographic records on mHealth were collected. The earliest paper centered on mHealth was published in 1997, with the number of papers rising continuously since then. A total of 21.28% (2318/10,895) of authors publishing mHealth research were first author, whereas only 1.29% (141/10,895) of authors had published one paper. The total degree of author collaboration was 4.42 (11,958/2704) and there are 266 core authors who have collectively published 53.07% (1435/2704) of the total number of publications, which means that the core group of authors has fundamentally been formed based on the Law of Price. The University of Michigan published the highest number of mHealth-related publications, but less collaboration among institutions exits. The United States is the most productive country in the field and plays a leading role in collaborative research on mHealth. There are 5543 different identified keywords in the cleaned records. The temporal bar graph clearly presents overall topic evolutionary process over time. There are 12 important research directions identified, which are in the imbalanced development. Moreover, the density of the network was 0.007, a relatively low level. These 12 topics can be categorized into 4 areas: (1) patient engagement and patient intervention, (2) health monitoring and self-care, (3) mobile device and mobile computing, and (4) security and privacy. The collaboration of core authors on mHealth research is not tight and stable. Furthermore, collaboration between institutions mainly occurs in the United States, although country collaboration is seen as relatively scarce. The focus of research topics on mHealth is decentralized. Our study might provide a potential guide for future research in mHealth. ©Lining Shen, Bing Xiong, Wei Li, Fuqiang Lan, Richard Evans, Wei Zhang. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 05.06.2018.

  2. SQC: secure quality control for meta-analysis of genome-wide association studies.

    PubMed

    Huang, Zhicong; Lin, Huang; Fellay, Jacques; Kutalik, Zoltán; Hubaux, Jean-Pierre

    2017-08-01

    Due to the limited power of small-scale genome-wide association studies (GWAS), researchers tend to collaborate and establish a larger consortium in order to perform large-scale GWAS. Genome-wide association meta-analysis (GWAMA) is a statistical tool that aims to synthesize results from multiple independent studies to increase the statistical power and reduce false-positive findings of GWAS. However, it has been demonstrated that the aggregate data of individual studies are subject to inference attacks, hence privacy concerns arise when researchers share study data in GWAMA. In this article, we propose a secure quality control (SQC) protocol, which enables checking the quality of data in a privacy-preserving way without revealing sensitive information to a potential adversary. SQC employs state-of-the-art cryptographic and statistical techniques for privacy protection. We implement the solution in a meta-analysis pipeline with real data to demonstrate the efficiency and scalability on commodity machines. The distributed execution of SQC on a cluster of 128 cores for one million genetic variants takes less than one hour, which is a modest cost considering the 10-month time span usually observed for the completion of the QC procedure that includes timing of logistics. SQC is implemented in Java and is publicly available at https://github.com/acs6610987/secureqc. jean-pierre.hubaux@epfl.ch. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  3. A security scheme of SMS system

    NASA Astrophysics Data System (ADS)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  4. Collaboration Platforms in China for Translational and Clinical Research: The Partnership Between Peking University Health Science Center and the University of Michigan Medical School.

    PubMed

    Kolars, Joseph C; Fang, Weigang; Zheng, Kai; Huang, Amy Y; Sun, Qiudan; Wang, Yanfang; Woolliscroft, James O; Ke, Yang

    2017-03-01

    Clinical and translational research is increasing in China, attracting faculty-to-faculty collaborations between U.S. and Chinese researchers. However, examples of successful institution-to-institution collaborations to facilitate this research are limited. The authors describe a partnership between Peking University Health Science Center (PUHSC) and the University of Michigan Medical School (UMMS) designed to enable faculty-initiated joint translational and clinical research projects. In 2009, UMMS leadership identified PUHSC as the most appropriate institutional partner, and the Joint Institute for Translational and Clinical Research was established in 2010. Each contributed $7 million for joint research projects in areas of mutual interest. A shared governance structure, four thematic programs (pulmonary, cardiovascular, liver, and renal diseases), three joint research-enabling cores, and processes for awarding funding have been established along with methods for collaborating and mechanisms to share data and biomaterials. As of November 2015, 52 joint faculty proposals have been submitted, and 25 have been funded. These projects have involved more than 100,000 patients in the United States and China and have generated 13 peer-reviewed publications. Pilot data have been leveraged to secure $3.3 million of U.S. extramural funding. Faculty and trainee exchanges take place regularly (including an annual symposium), and mechanisms exist to link faculty seeking collaborations. Critical determinants of success include having co-ownership at all levels with coinvestment of resources. Each institution is committed to continuing its support with a repeat $7 million investment. Next steps include initiating studies in new clinical areas and pursuing large clinical intervention trials.

  5. Advanced Optical Burst Switched Network Concepts

    NASA Astrophysics Data System (ADS)

    Nejabati, Reza; Aracil, Javier; Castoldi, Piero; de Leenheer, Marc; Simeonidou, Dimitra; Valcarenghi, Luca; Zervas, Georgios; Wu, Jian

    In recent years, as the bandwidth and the speed of networks have increased significantly, a new generation of network-based applications using the concept of distributed computing and collaborative services is emerging (e.g., Grid computing applications). The use of the available fiber and DWDM infrastructure for these applications is a logical choice offering huge amounts of cheap bandwidth and ensuring global reach of computing resources [230]. Currently, there is a great deal of interest in deploying optical circuit (wavelength) switched network infrastructure for distributed computing applications that require long-lived wavelength paths and address the specific needs of a small number of well-known users. Typical users are particle physicists who, due to their international collaborations and experiments, generate enormous amounts of data (Petabytes per year). These users require a network infrastructures that can support processing and analysis of large datasets through globally distributed computing resources [230]. However, providing wavelength granularity bandwidth services is not an efficient and scalable solution for applications and services that address a wider base of user communities with different traffic profiles and connectivity requirements. Examples of such applications may be: scientific collaboration in smaller scale (e.g., bioinformatics, environmental research), distributed virtual laboratories (e.g., remote instrumentation), e-health, national security and defense, personalized learning environments and digital libraries, evolving broadband user services (i.e., high resolution home video editing, real-time rendering, high definition interactive TV). As a specific example, in e-health services and in particular mammography applications due to the size and quantity of images produced by remote mammography, stringent network requirements are necessary. Initial calculations have shown that for 100 patients to be screened remotely, the network would have to securely transport 1.2 GB of data every 30 s [230]. According to the above explanation it is clear that these types of applications need a new network infrastructure and transport technology that makes large amounts of bandwidth at subwavelength granularity, storage, computation, and visualization resources potentially available to a wide user base for specified time durations. As these types of collaborative and network-based applications evolve addressing a wide range and large number of users, it is infeasible to build dedicated networks for each application type or category. Consequently, there should be an adaptive network infrastructure able to support all application types, each with their own access, network, and resource usage patterns. This infrastructure should offer flexible and intelligent network elements and control mechanism able to deploy new applications quickly and efficiently.

  6. Treatment with Youth Who Have Committed Sexual Offences: Extending the Reach of Systemic Interventions through Collaborative Partnerships

    ERIC Educational Resources Information Center

    Smallbone, Stephen; Rayment-McHugh, Susan; Crissman, Belinda; Shumack, Danielle

    2008-01-01

    Delivery of high-quality mental health services to clients in regional and remote areas in Australia presents significant challenges. Griffith Youth Forensic Service (GYFS) provides specialised, state-wide assessment and systemic treatment services for young people in Queensland who have committed sexual offences. In an effort to provide…

  7. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  8. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  9. UAVs Being Used for Environmental Surveying

    ScienceCinema

    Chung, Sandra

    2017-12-09

    UAVs, are much more sophisticated than your typical remote-controlled plane. INL robotics and remote sensing experts have added state-of-the-art imaging and wireless technology to the UAVs to create intelligent remote surveillance craft that can rapidly survey a wide area for damage and track down security threats.

  10. Using a Learning Collaborative Strategy With Office-based Practices to Increase Access and Improve Quality of Care for Patients With Opioid Use Disorders.

    PubMed

    Nordstrom, Benjamin R; Saunders, Elizabeth C; McLeman, Bethany; Meier, Andrea; Xie, Haiyi; Lambert-Harris, Chantal; Tanzman, Beth; Brooklyn, John; King, Gregory; Kloster, Nels; Lord, Clifton Frederick; Roberts, William; McGovern, Mark P

    2016-01-01

    Rapidly escalating rates of heroin and prescription opioid use have been widely observed in rural areas across the United States. Although US Food and Drug Administration-approved medications for opioid use disorders exist, they are not routinely accessible to patients. One medication, buprenorphine, can be prescribed by waivered physicians in office-based practice settings, but practice patterns vary widely. This study explored the use of a learning collaborative method to improve the provision of buprenorphine in the state of Vermont. We initiated a learning collaborative with 4 cohorts of physician practices (28 total practices). The learning collaborative consisted of a series of 4 face-to-face and 5 teleconference sessions over 9 months. Practices collected and reported on 8 quality-improvement data measures, which included the number of patients prescribed buprenorphine, and the percent of unstable patients seen weekly. Changes from baseline to 8 months were examined using a p-chart and logistic regression methodology. Physician engagement in the learning collaborative was favorable across all 4 cohorts (85.7%). On 6 of the 7 quality-improvement measures, there were improvements from baseline to 8 months. On 4 measures, these improvements were statistically significant (P < 0.001). Importantly, practice variation decreased over time on all measures. The number of patients receiving medication increased only slightly (3.4%). Results support the effectiveness of a learning collaborative approach to engage physicians, modestly improve patient access, and significantly reduce practice variation. The strategy is potentially generalizable to other systems and regions struggling with this important public health problem.

  11. Innovations in nutrition education and global health: the Bangalore Boston nutrition collaborative

    PubMed Central

    2014-01-01

    Background India has a wide range of nutrition and health problems which require professionals with appropriate skills, knowledge and trans-disciplinary collaborative abilities to influence policy making at the national and global level. Methods The Bangalore Boston Nutrition Collaborative (BBNC) was established as collaboration between St. John’s Research Institute (SJRI), Harvard School of Public Health and Tufts University, with a focus on nutrition research and training. The goals of the BBNC were to conduct an interdisciplinary course, develop web-based courses and identify promising Indian students and junior faculty for graduate training in Boston. Results From 2010, an annual two-week short course in nutrition research methods was conducted on the SJRI campus taught by international faculty from Indian and US universities. More than 100 students applied yearly for approximately 30 positions. The course had didactic lectures in the morning and practical hands-on sessions in the afternoon. Student rating of the course was excellent and consistent across the years. The ratings on the design and conduct of the course significantly improved (p <0.001) from 2010 to 2012. Through open-ended questions, students reported the main strengths of the course to be the excellent faculty and practical “hands-on” sessions. A web based learning system TYRO, was developed, which can be used for distance learning. Four faculty members/graduate students from SJRI have visited Boston for collaborative research efforts. Conclusion The BBNC has become a well-established capacity building and research training program for young professionals in nutrition and global health. Efforts are ongoing to secure long term funding to sustain and expand this collaboration to deliver high quality nutrition and global health education enabled by information and communication technologies. PMID:24400811

  12. Innovations in nutrition education and global health: the Bangalore Boston nutrition collaborative.

    PubMed

    Kuriyan, Rebecca; Griffiths, Jeffrey K; Finkelstein, Julia L; Thomas, Tinku; Raj, Tony; Bosch, Ronald J; Kurpad, Anura V; Duggan, Christopher

    2014-01-08

    India has a wide range of nutrition and health problems which require professionals with appropriate skills, knowledge and trans-disciplinary collaborative abilities to influence policy making at the national and global level. The Bangalore Boston Nutrition Collaborative (BBNC) was established as collaboration between St. John's Research Institute (SJRI), Harvard School of Public Health and Tufts University, with a focus on nutrition research and training. The goals of the BBNC were to conduct an interdisciplinary course, develop web-based courses and identify promising Indian students and junior faculty for graduate training in Boston. From 2010, an annual two-week short course in nutrition research methods was conducted on the SJRI campus taught by international faculty from Indian and US universities. More than 100 students applied yearly for approximately 30 positions. The course had didactic lectures in the morning and practical hands-on sessions in the afternoon. Student rating of the course was excellent and consistent across the years. The ratings on the design and conduct of the course significantly improved (p <0.001) from 2010 to 2012. Through open-ended questions, students reported the main strengths of the course to be the excellent faculty and practical "hands-on" sessions. A web based learning system TYRO, was developed, which can be used for distance learning. Four faculty members/graduate students from SJRI have visited Boston for collaborative research efforts. The BBNC has become a well-established capacity building and research training program for young professionals in nutrition and global health. Efforts are ongoing to secure long term funding to sustain and expand this collaboration to deliver high quality nutrition and global health education enabled by information and communication technologies.

  13. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    PubMed

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the merging of the public management and sociobiology fields of knowledge and validated by means of a case study must be accomplished. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  14. Demonstration of a Novel Synchrophasor-based Situational Awareness System: Wide Area Power System Visualization, On-line Event Replay and Early Warning of Grid Problems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosso, A.

    Since the large North Eastern power system blackout on August 14, 2003, U.S. electric utilities have spent lot of effort on preventing power system cascading outages. Two of the main causes of the August 14, 2003 blackout were inadequate situational awareness and inadequate operator training In addition to the enhancements of the infrastructure of the interconnected power systems, more research and development of advanced power system applications are required for improving the wide-area security monitoring, operation and planning in order to prevent large- scale cascading outages of interconnected power systems. It is critically important for improving the wide-area situation awarenessmore » of the operators or operational engineers and regional reliability coordinators of large interconnected systems. With the installation of large number of phasor measurement units (PMU) and the related communication infrastructure, it will be possible to improve the operators’ situation awareness and to quickly identify the sequence of events during a large system disturbance for the post-event analysis using the real-time or historical synchrophasor data. The purpose of this project was to develop and demonstrate a novel synchrophasor-based comprehensive situational awareness system for control centers of power transmission systems. The developed system named WASA (Wide Area Situation Awareness) is intended to improve situational awareness at control centers of the power system operators and regional reliability coordinators. It consists of following main software modules: • Wide-area visualizations of real-time frequency, voltage, and phase angle measurements and their contour displays for security monitoring. • Online detection and location of a major event (location, time, size, and type, such as generator or line outage). • Near-real-time event replay (in seconds) after a major event occurs. • Early warning of potential wide-area stability problems. The system has been deployed and demonstrated at the Tennessee Valley Authority (TVA) and ISO New England system using real-time synchrophasor data from openPDC. Apart from the software product, the outcome of this project consists of a set of technical reports and papers describing the mathematical foundations and computational approaches of different tools and modules, implementation issues and considerations, lessons learned, and the results of lidation processes.« less

  15. Draft secure medical database standard.

    PubMed

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  16. Protecting computer-based medical devices: defending against viruses and other threats.

    PubMed

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  17. New developments in laser-heated diamond anvil cell with in situ synchrotron x-ray diffraction at High Pressure Collaborative Access Team

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meng, Yue; Hrubiak, Rostislav; Rod, Eric

    An overview of the in situ laser heating system at the High Pressure Collaborative Access Team, with emphasis on newly developed capabilities, is presented. Since its establishment at the beamline 16-ID-B a decade ago, laser-heated diamond anvil cell coupled with in situ synchrotron x-ray diffraction has been widely used for studying the structural properties of materials under simultaneous high pressure and high temperature conditions. Recent developments in both continuous-wave and modulated heating techniques have been focusing on resolving technical issues of the most challenging research areas. Furthermore, the new capabilities have demonstrated clear benefits and provide new opportunities in researchmore » areas including high-pressure melting, pressure-temperature-volume equations of state, chemical reaction, and time resolved studies.« less

  18. New developments in laser-heated diamond anvil cell with in situ synchrotron x-ray diffraction at High Pressure Collaborative Access Team

    DOE PAGES

    Meng, Yue; Hrubiak, Rostislav; Rod, Eric; ...

    2015-07-17

    An overview of the in situ laser heating system at the High Pressure Collaborative Access Team, with emphasis on newly developed capabilities, is presented. Since its establishment at the beamline 16-ID-B a decade ago, laser-heated diamond anvil cell coupled with in situ synchrotron x-ray diffraction has been widely used for studying the structural properties of materials under simultaneous high pressure and high temperature conditions. Recent developments in both continuous-wave and modulated heating techniques have been focusing on resolving technical issues of the most challenging research areas. Furthermore, the new capabilities have demonstrated clear benefits and provide new opportunities in researchmore » areas including high-pressure melting, pressure-temperature-volume equations of state, chemical reaction, and time resolved studies.« less

  19. A governor's guide to emergency management. Volume two : homeland security

    DOT National Transportation Integrated Search

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  20. NREL Workshop Convenes Industry Experts on Cybersecurity and an Evolving

    Science.gov Websites

    silos in a field that demands greater collaboration, and the benefits of systemic security architecture groups to identify possible solutions to the challenges in securing DERs-from a technology, business, and

  1. Atypical dimensions of caregiver–adolescent interaction in an economically disadvantaged sample

    PubMed Central

    Kobak, Roger; Zajac, Kristyn; Abbott, Caroline; Zisk, Abby; Bounoua, Nadia

    2018-01-01

    The Goal-corrected Partnership Adolescent Coding System (GPACS) has shown promise in assessing a secure as well as three atypical patterns of parent-adolescent interaction during a conflict discussion. The current study of 186 economically disadvantaged families examines the degree to which four GPACS patterns: Secure/Collaborative, Punitive, Role Confused and Disoriented—account for residual change in adolescents’ social competence and maladaptive behavior (internalizing, externalizing, and risk behaviors) between ages 13 to 15. Adolescents from Secure/Collaborative dyads at age 13 were more likely to have a secure state of mind in the AAI at age 15 and showed increases in teachers’ ratings of empathy and decreases in teachers’ ratings of externalizing behaviors between ages 13 and 15. Adolescents in Disoriented dyads showed a dramatic increase in teacher-rated internalizing problems, while male adolescents in Role Confused dyads reported increased involvement in risk behaviors including unprotected sexual activity and substance use problems. PMID:28401833

  2. The Russian-American high magnetic field collaboration

    NASA Astrophysics Data System (ADS)

    Fowler, C. M.; Christian, J. M.; Freeman, B. L.

    We report here on a joint experimental shot series with teams from Russia and the United States. The program was based largely upon the MC-1 generator, a high magnetic field explosive flux compressor, developed by the Pavlovskii group at Arzamas-16. The series was of historical interest in that it was carried out in a Los Alamos security area, the first time for such a collaboration. We discuss a number of technical issues involved in matching Russian hardware with Los Alamos explosives, initiation systems and the seed field energy source, as well as comparison of field measuring diagnostics finished by the two teams. We conclude with a discussion of an investigation of the high temperature superconductor YBa2Cu3O7 (YBCO), employing these generators. The low temperature critical magnetic field of this material was found to be 340 +/- 40 T, as determined from a 94 GHz microwave interferometer developed for this purpose.

  3. Radar research at University of Oklahoma (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Zhang, Yan R.; Weber, Mark E.

    2017-05-01

    This abstract is for the academic institution profiles session This presentation will focus on radar research programs at the University of Oklahoma, the radar research in OU has more than 50 years history of collaboration with NOAA, and has been through tremendous growth since early 2000. Before 2010, the focus was weather radar and weather surveillance, and since the Defense, Security and Intelligence (DSI) initiative in 2011, there have many new efforts on the defense and military radar applications. This presentation will focus on the following information: (1) The history, facilities and instrumentations of Advanced Radar Research Center, (2) Focus area of polarimetric phased array systems, (3) Focus area of airborne and spaceborne radars, (4) Intelligent radar information processing, (5) Innovative antenna and components.

  4. Biological and chemical terrorism scenarios and implications for detection systems needs

    NASA Astrophysics Data System (ADS)

    Gordon, Susanna P.; Chumfong, Isabelle; Edwards, Donna M.; Gleason, Nathaniel J.; West, Todd; Yang, Lynn

    2007-04-01

    Terrorists intent on causing many deaths and severe disruption to our society could, in theory, cause hundreds to tens of thousands of deaths and significant contamination of key urban facilities by using chemical or biological (CB) agents. The attacks that have occurred to date, such as the 1995 Aum Shinrikyo CB attacks and the 2001 anthrax letters, have been very small on the scale of what is possible. In order to defend against and mitigate the impacts of large-scale terrorist attacks, defensive systems for protection of urban areas and high-value facilities from biological and chemical threats have been deployed. This paper reviews analyses of such scenarios and of the efficacy of potential response options, discusses defensive systems that have been deployed and detectors that are being developed, and finally outlines the detection systems that will be needed for improved CB defense in the future. Sandia's collaboration with San Francisco International Airport on CB defense will also be briefly reviewed, including an overview of airport facility defense guidelines produced in collaboration with Lawrence Berkeley National Laboratory. The analyses that will be discussed were conducted by Sandia National Laboratories' Systems Studies Department in support of the U.S. Department of Homeland Security (DHS) Science and Technology Directorate, and include quantitative analyses utilizing simulation models developed through close collaboration with subject matter experts, such as public health officials in urban areas and biological defense experts.

  5. Alaska telemedicine: growth through collaboration.

    PubMed

    Patricoski, Chris

    2004-12-01

    The last thirty years have brought the introduction and expansion of telecommunications to rural and remote Alaska. The intellectual and financial investment of earlier projects, the more recent AFHCAN Project and the Universal Service Administrative Company Rural Health Care Division (RHCD) has sparked a new era in telemedicine and telecommunication across Alaska. This spark has been flamed by the dedication and collaboration of leaders at he highest levels of organizations such as: AFHCAN member organizations, AFHCAN Office, Alaska Clinical Engineering Services, Alaska Federal Health Care Partnership, Alaska Federal Health Care Partnership Office, Alaska Native health Board, Alaska Native Tribal health Consortium, Alaska Telehealth Advisory Council, AT&T Alascom, GCI Inc., Health care providers throughout the state of Alaska, Indian Health Service, U.S. Department of Health and Human Services, Office of U.S. Senator Ted Steens, State of Alaska, U.S. Department of Homeland Security--United States Coast Guard, United States Department of Agriculture, United States Department of Defense--Air Force and Army, United States Department of Veterans Affairs, University of Alaska, and University of Alaska Anchorage. Alaska now has one of the largest telemedicine programs in the world. As Alaska moves system now in place become self-sustaining, and 2) collaborating with all stakeholders in promoting the growth of an integrated, state-wide telemedicine network.

  6. Consultation and Collaboration to Develop and Implement Restorative Practices in a Culturally and Linguistically Diverse Elementary School

    ERIC Educational Resources Information Center

    Ingraham, Colette L.; Hokoda, Audrey; Moehlenbruck, Derek; Karafin, Monica; Manzo, Caroline; Ramirez, Daniel

    2016-01-01

    Through an embedded single-case study design and qualitative methods, this article describes the school-wide implementation and preliminary results of a restorative practices (RP) program within a culturally and linguistically diverse (CLD) elementary school. Located in an urban area with high rates of crime, violence, and poverty, the three-year…

  7. Traffic Driven Analysis of Cellular and WiFi Networks

    ERIC Educational Resources Information Center

    Paul, Utpal Kumar

    2012-01-01

    Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…

  8. Practice brief. Securing wireless technology for healthcare.

    PubMed

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  9. Goals, Strategies

    Science.gov Websites

    stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure

  10. The Coming Nuclear Renaissance for Next Generation Safeguards Specialists--Maximizing Potential and Minimizing the Risks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eipeldauer, Mary D

    2009-01-01

    This document is intended to provide an overview of the workshop entitled 'The Coming Nuclear Renaissance for the Next Generation Safeguards Experts-Maximizing Benefits While Minimizing Proliferation Risks', conducted at Oak Ridge National Laboratory (ORNL) in partnership with the Y-12 National Security Complex (Y-12) and the Savannah River National Laboratory (SRNL). This document presents workshop objectives; lists the numerous participant universities and individuals, the nuclear nonproliferation lecture topics covered, and the facilities tours taken as part of the workshop; and discusses the university partnership sessions and proposed areas for collaboration between the universities and ORNL for 2009. Appendix A contains themore » agenda for the workshop; Appendix B lists the workshop attendees and presenters with contact information; Appendix C contains graphics of the evaluation form results and survey areas; and Appendix D summarizes the responses to the workshop evaluation form. The workshop was an opportunity for ORNL, Y-12, and SRNL staff with more than 30 years combined experience in nuclear nonproliferation to provide a comprehensive overview of their expertise for the university professors and their students. The overall goal of the workshop was to emphasize nonproliferation aspects of the nuclear fuel cycle and to identify specific areas where the universities and experts from operations and national laboratories could collaborate.« less

  11. Interprofessional mental health training in rural primary care: findings from a mixed methods study.

    PubMed

    Heath, Olga; Church, Elizabeth; Curran, Vernon; Hollett, Ann; Cornish, Peter; Callanan, Terrence; Bethune, Cheri; Younghusband, Lynda

    2015-05-01

    The benefits of interprofessional care in providing mental health services have been widely recognized, particularly in rural communities where access to health services is limited. There continues to be a need for more continuing interprofessional education in mental health intervention in rural areas. There have been few reports of rural programs in which mental health content has been combined with training in collaborative practice. The current study used a sequential mixed-method and quasi-experimental design to evaluate the impact of an interprofessional, intersectoral education program designed to enhance collaborative mental health capacity in six rural sites. Quantitative results reveal a significant increase in positive attitudes toward interprofessional mental health care teams and self-reported increases in knowledge and understanding about collaborative mental health care delivery. The analysis of qualitative data collected following completion of the program, reinforced the value of teaching mental health content within the context of collaborative practice and revealed practice changes, including more interprofessional and intersectoral collaboration. This study suggests that imbedding explicit training in collaborative care in content focused continuing professional education for more complex and chronic health issues may increase the likelihood that professionals will work together to effectively meet client needs.

  12. Using a Learning Collaborative Strategy With Office-based Practices to Increase Access and Improve Quality of Care for Patients With Opioid Use Disorders

    PubMed Central

    Nordstrom, Benjamin R.; Saunders, Elizabeth C.; McLeman, Bethany; Meier, Andrea; Xie, Haiyi; Lambert-Harris, Chantal; Tanzman, Beth; Brooklyn, John; King, Gregory; Kloster, Nels; Lord, Clifton Frederick; Roberts, William; McGovern, Mark P.

    2016-01-01

    Objectives Rapidly escalating rates of heroin and prescription opioid use have been widely observed in rural areas across the United States. Although US Food and Drug Administration-approved medications for opioid use disorders exist, they are not routinely accessible to patients. One medication, buprenorphine, can be prescribed by waivered physicians in office-based practice settings, but practice patterns vary widely. This study explored the use of a learning collaborative method to improve the provision of buprenorphine in the state of Vermont. Methods We initiated a learning collaborative with 4 cohorts of physician practices (28 total practices). The learning collaborative consisted of a series of 4 face-to-face and 5 teleconference sessions over 9 months. Practices collected and reported on 8 quality-improvement data measures, which included the number of patients prescribed buprenorphine, and the percent of unstable patients seen weekly. Changes from baseline to 8 months were examined using a p-chart and logistic regression methodology. Results Physician engagement in the learning collaborative was favorable across all 4 cohorts (85.7%). On 6 of the 7 quality-improvement measures, there were improvements from baseline to 8 months. On 4 measures, these improvements were statistically significant (P < 0.001). Importantly, practice variation decreased over time on all measures. The number of patients receiving medication increased only slightly (3.4%). Conclusions Results support the effectiveness of a learning collaborative approach to engage physicians, modestly improve patient access, and significantly reduce practice variation. The strategy is potentially generalizable to other systems and regions struggling with this important public health problem. PMID:26900669

  13. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  14. The collaborative edge: patient empowerment for vulnerable populations.

    PubMed

    Safran, Charles

    2003-03-01

    The problems with access to care and the special needs for educational outreach for disadvantage or vulnerable populations of patients require innovation. This paper describes Baby CareLink use of information technology to support communication, consultation, and collaboration among colleagues as well as with patients, their families, and community resources. In response to the educational, emotional and communication needs of parents of premature infants and the clinicians who care for the infants and support the families, we developed Baby CareLink, a secure collaborative environment. Baby CareLink provides a nurturing environment where parents, even though remote from the Neonatal Intensive Care Unit, can actively participate in decisions surrounding their baby's care. In a southeastern hospital serving a mostly Medicaid population in a rural setting, more than 300 parents have used Baby CareLink more than 11000 times during the past year. Despite the common wisdom that Medicaid families do not have access to the Internet, approximately 85% of the parents access Baby CareLink from home, at work, from the library or other public access point. The median use of Baby CareLinks from outside the hospital by parents is 17 separate sessions. In a city hospital in the midwestern US which exclusively serves a Medicaid population, experience has been equally encouraging. More than 70 parents have initiated more than 600 secure sessions with Baby CareLink. In contrast to the rural hospital, only 35% of sessions have been initiated outside the hospital. Experience with Baby CareLink suggests that families from all walks of life will use and benefit from collaborative tools that keep them informed and involved in the care of their children. The most significant barrier to wider deployment is bandwidth limitations into the homes of most families. The care of premature infants is a great example of an area where medical knowledge and ability has grown dramatically, and where information and communication technology holds enormous potential.

  15. Department of Defense International Space Cooperation Strategy

    DTIC Science & Technology

    2017-01-01

    Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission

  16. The Power of Partnership

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hazi, A

    2005-09-20

    Institutions Lawrence Livermore National Laboratory conduct similar or complementary research often excel through collaboration. Indeed, much of Lawrence Livermore's research involves collaboration with other institutions, including universities, other national laboratories, government agencies, and private industry. In particular, Livermore's strategic collaborations with other University of California (UC) campuses have proven exceptionally successful in combining basic science and applied multidisciplinary research. In joint projects, the collaborating institutions benefit from sharing expertise and resources as they work toward their distinctive missions in education, research, and public service. As Laboratory scientists and engineers identify resources needed to conduct their work, they often turn tomore » university researchers with complementary expertise. Successful projects can expand in scope to include additional scientists and engineers both from the Laboratory and from UC, and these projects may become an important element of the research portfolios of the cognizant Livermore directorate and the university department. Additional funding may be provided to broaden or deepen a research project or perhaps develop it for transfer to the private sector for commercial release. Occasionally, joint projects evolve into a strategic collaboration at the institutional level, attracting the attention of the Laboratory director and the UC chancellor. Government agencies or private industries may contribute funding in recognition of the potential payoff of the joint research, and a center may be established at one of the UC campuses. Livermore scientists and engineers and UC faculty are recruited to these centers to focus on a particular area and achieve goals through interdisciplinary research. Some of these researchers hold multilocation appointments, allowing them to work at Livermore and another UC campus. Such centers also attract postdoctoral researchers and graduate students pursuing careers in the centers specialized areas of science. foster university collaboration is through the Laboratory's institutes, which have been established to focus university outreach efforts in fields of scientific importance to Livermore's programs and missions. Some of these joint projects may grow to the level of a strategic collaboration. Others may assist in Livermore's national security mission; provide a recruiting pipeline from universities to the Laboratory; or enhance university interactions and the vitality of Livermore's science and technology environment through seminars, workshops, and visitor programs.« less

  17. Teaching retirement financial literacy in an undergraduate gerontology classroom: broadening the concept of the tripod or three-legged stool of retirement income utilizing active learning.

    PubMed

    Baker, Hallie E; Brown, Pamela Pitman

    2015-01-01

    The three-legged stool concept is widely used in gerontological and geriatric education as an explanation on how one should fiscally approach his or her retirement. Financial managers, planners, retirees, business owners, even the Social Security Administration uses this metaphor of fiscal soundness in retirement planning. Gerontologists are moving away from the "tripod of retirement income" and "three-legged stool" term, as more often market work is needed for financial security. This activity focuses on the tripod or three-legged stool concepts of retirement planning using active learning, allowing the students to work collaboratively in a group, reflect upon the activity, and most importantly have fun. The game also allows for an expansion of the tripod concepts into the four pillars of economic security, broaching the use of personal assets and the possible need for longer employment. Game scenarios also emphasize macro- and microlevel forces, such as race, gender, health status, education, or marital status, which can influence timing of retirement or the level of retirement income available. The authors include instructions on how to set up the learning experience including worksheets, as well as reflection questions posed throughout the process.

  18. Hydrologic Resources Management Program and Underground Tests Area Project FY 2003 Progress Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    J., B C; F., E G; K., E B

    This report describes FY 2003 technical studies conducted by the Chemical Biology and Nuclear Science Division (CBND) at Lawrence Livermore National Laboratory (LLNL) in support of the Hydrologic Resources Management Program (HRMP) and the Underground Test Area (UGTA) Project. These programs are administered by the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) through the Defense Programs and Environmental Restoration Divisions, respectively. HRMP-sponsored work is directed toward the responsible management of the natural resources at the Nevada Test Site (NTS), enabling its continued use as a staging area for strategic operations in support of national security.more » UGTA-funded work emphasizes the development of an integrated set of groundwater flow and contaminant transport models to predict the extent of radionuclide migration from underground nuclear testing areas at the NTS. The present report is organized on a topical basis and contains five chapters that reflect the range of technical work performed by LLNL-CBND during FY 2003. Although we have emphasized investigations that were led by CBND, we also participated in a variety of collaborative studies with other UGTA and HRMP contract organizations including the Energy and Environment Directorate at LLNL (LLNL-E&E), Los Alamos National Laboratory (LANL), the Desert Research Institute (DRI), the U.S. Geological Survey (USGS), Stoller-Navarro Joint Venture (SNJV), and Bechtel Nevada (BN).« less

  19. A Novel Group Coordination Protocol for Collaborative Multimedia Systems

    DTIC Science & Technology

    1998-01-01

    technology have advanced considerably, ef- ficient group coordination support for applications characterized by synchronous and wide-area groupwork is...As a component within a general coordination architecture for many-to-many groupwork , floor control coexists with proto- cols for reliable ordered...multicast and media synchronization at a sub-application level. Orchestration of multiparty groupwork with fine-grained and fair floor control is an

  20. Program Level Feedback from Former Occupational Education Students: Report 1 of 2, Summary Findings of Respondents District-Wide. Research Brief.

    ERIC Educational Resources Information Center

    Glyer-Culver, Betty

    In fall 2000, the staff of Los Rios Community College District Office of Institutional Research collaborated with occupational education deans, academic area deans, and faculty to develop a series of program-specific followup surveys to be administered in spring 2001. These surveys were designed to determine how well courses met the employment and…

  1. A Survey of Former Business Students (General Business, Management, Marketing, Real Estate). Summary Findings of Respondents District-Wide.

    ERIC Educational Resources Information Center

    Glyer-Culver, Betty

    In fall 2002 staff of the Los Rios Community College District (LRCCD) Office of Institutional Research collaborated with occupational deans, academic deans, and faculty to develop and administer a survey of former business students. The survey was designed to determine how well courses had met the needs of former business students in the areas of…

  2. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zarkesh-Ha, Payman

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  3. Applications Using High Flux LCS gamma-ray Beams: Nuclear Security and Contributions to Fukushima

    NASA Astrophysics Data System (ADS)

    Fujiwara, Mamoru

    2014-09-01

    Nuclear nonproliferation and security are an important issue for the peaceful use of nuclear energy. Many countries now collaborate together for preventing serious accidents from nuclear terrorism. Detection of hidden long-lived radioisotopes and fissionable nuclides in a non-destructive manner is useful for nuclear safeguards and management of nuclear wastes as well as nuclear security. After introducing the present situation concerning the nuclear nonproliferation and security in Japan, we plan to show the present activities of JAEA to detect the hidden nuclear materials by means of the nuclear resonance fluorescence with energy-tunable, monochromatic gamma-rays generated by Laser Compton Scattering (LCS) with an electron beam. The energy recovery linac (ERL) machine is now under development with the KEK-JAEA collaboration for realizing the new generation of gamma-ray sources. The detection technologies of nuclear materials are currently developed using the existing electron beam facilities at Duke University and at NewSubaru. These developments in Japan will contribute to the nuclear security program in Japan and to the assay of melted nuclear fuels in the Fukushima Daiichi nuclear power plants.

  4. Security Aspects of Computer Supported Collaborative Work

    DTIC Science & Technology

    1993-09-01

    unstructured tasks at one end 11 and prescriptive tasks at the other. Unstructured tasks are those requiring creative input from a number of users and...collaborative technology begun to mature, it has begun to outstrip prevailing management attitudes. One barrier to telecommuting is the perception that

  5. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  6. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  7. Can trainees design and deliver a national audit of epistaxis management? A pilot of a secure web-based audit tool and research trainee collaboratives.

    PubMed

    Mehta, N; Williams, R J; Smith, M E; Hall, A; Hardman, J C; Cheung, L; Ellis, M P; Fussey, J M; Lakhani, R; McLaren, O; Nankivell, P C; Sharma, N; Yeung, W; Carrie, S; Hopkins, C

    2017-06-01

    To investigate the feasibility of a national audit of epistaxis management led and delivered by a multi-region trainee collaborative using a web-based interface to capture patient data. Six trainee collaboratives across England nominated one site each and worked together to carry out this pilot. An encrypted data capture tool was adapted and installed within the infrastructure of a university secure server. Site-lead feedback was assessed through questionnaires. Sixty-three patients with epistaxis were admitted over a two-week period. Site leads reported an average of 5 minutes to complete questionnaires and described the tool as easy to use. Data quality was high, with little missing data. Site-lead feedback showed high satisfaction ratings for the project (mean, 4.83 out of 5). This pilot showed that trainee collaboratives can work together to deliver an audit using an encrypted data capture tool cost-effectively, whilst maintaining the highest levels of data quality.

  8. Agricultural Development, Land Change, and Livelihoods in Tanzania's Kilombero Valley

    NASA Astrophysics Data System (ADS)

    Connors, John Patrick

    The Kilombero Valley lies at the intersection of a network of protected areas that cross Tanzania. The wetlands and woodlands of the Valley, as well as the forest of surrounding mountains are abundant in biodiversity and are considered to be critical areas for conservation. This area, however, is also the home to more than a half million people, primarily poor smallholder farmers. In an effort to support the livelihoods and food security of these farmers and the larger Tanzanian population, the country has recently targeted a series of programs to increase agricultural production in the Kilombero Valley and elsewhere in the country. Bridging concepts and methods from land change science, political ecology, and sustainable livelihoods, I present an integrated assessment of the linkages between development and conservation efforts in the Kilombero Valley and the implications for food security. This dissertation uses three empirical studies to understand the process of development in the Kilombero Valley and to link the priorities and perceptions of conservation and development efforts to the material outcomes in food security and land change. The first paper of this dissertation examines the changes in land use in the Kilombero Valley between 1997 and 2014 following the privatization of agriculture and the expansion of Tanzania's Kilimo Kwanza program. Remote sensing analysis reveals a two-fold increase in agricultural area during this short time, largely at the expense of forest. Protected areas in some parts of the Valley appear to be deterring deforestation, but rapid agricultural growth, particularly surrounding a commercial rice plantation, has led to loss of extant forest and sustained habitat fragmentation. The second paper focuses examines livelihood strategies in the Valley and claims regarding the role of agrobiodiversity in food security. The results of household survey reveal no difference or lower food security among households that diversify their agricultural activities. Some evidence, however, emerges regarding the importance of home gardens and crop diversification for dietary diversity. The third paper considers the competing discourses surrounding conservation and development in the Kilombero Valley. Employing q-method, this paper discerns four key viewpoints among various stakeholders in the Valley. While there are some apparently intractable distinctions between among these discourses, consensus regarding the importance of wildlife corridors and the presence of boundary-crossing individuals provide the promise of collaboration and compromise.

  9. Vegetation map of the greater Denver area, Front Range urban corridor, Colorado

    USGS Publications Warehouse

    Marr, J.W.; Boyd, W.S.

    1979-01-01

    Vegetation is one of our most valuable renewable resources; it is the primary producer of organic matter on which all nongreen organisms are dependent for energy, construction materials, aesthetic enjoyment, and other necessities of life. In order to secure the greatest possible returns from the utilization of the different types of vegetation, people need to know what species are present, the ecological processes in which they are involved, and the ways in which they are arranged in the landscape. This vegetation map is designed to help persons in a wide variety of activities to secure that information.

  10. Necessity for Industry-Academic Economic Geology Collaborations for Energy Critical Minerals Research and Development

    NASA Astrophysics Data System (ADS)

    Hitzman, M.

    2012-12-01

    Economic geology is a highly interdisciplinary field utilizing a diverse set of petrologic, geochemical, geophysical, and tectonic data for improved scientific understanding of element migration and concentration in the crust (ore formation). A number of elements that were once laboratory curiosities now figure prominently in new energy technologies (e.g. wind turbines, solar energy collectors). If widely deployed, such technologies have the capacity to transform the way we produce, transmit, store, and conserve energy. To meet domestic and worldwide renewable energy needs these systems must be scaled from laboratory, to demonstration, to widespread deployment. Such technologies are materials intensive. If widely deployed, the elements required by these technologies will be needed in significant quantities and shortage of these "energy critical elements" could significantly inhibit the adoption of otherwise game changing energy technologies. It is imperative to better understand the geology, metallurgy, and mining engineering of critical mineral deposits if we are to sustainably develop these new technologies. There is currently no consensus among federal and state agencies, the national and international mining industry, the public, and the U.S. academic community regarding the importance of economic geology to secure sufficient energy critical elements to undertake large-scale renewable energy development. Available federal funding for critical elements focuses on downstream areas such as metallurgy, substitutions, and recycling rather than primary deposits. Undertaking the required research to discover and mine critical element deposits in an environmentally friendly manner will require significant partnering with industry due to the current lack of federal research support.

  11. 33 CFR 103.300 - Area Maritime Security (AMS) Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Area Maritime Security (AMS... SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Committee § 103.300 Area Maritime Security (AMS) Committee. (a) The AMS Committee is established under the...

  12. Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedman, Dr. Peter S.; Ball, Robert; Chapman, J. Wehrley

    2010-01-01

    A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

  13. Evolution of Embedded Processing for Wide Area Surveillance

    DTIC Science & Technology

    2014-01-01

    future vision . 15. SUBJECT TERMS Embedded processing; high performance computing; general-purpose graphical processing units (GPGPUs) 16. SECURITY...recon- naissance (ISR) mission capabilities. The capabilities these advancements are achieving include the ability to provide persistent all...fighters to support and positively affect their mission . Significant improvements in high-performance computing (HPC) technology make it possible to

  14. Water Security - National and Global Issues

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Campbell, A. A.; Moran, E. H.

    2010-12-01

    Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.

  15. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-02

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.

  16. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    PubMed Central

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130

  17. International contributions to IAEA-NEA heat transfer databases for supercritical fluids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leung, L. K. H.; Yamada, K.

    2012-07-01

    An IAEA Coordinated Research Project on 'Heat Transfer Behaviour and Thermohydraulics Code Testing for SCWRs' is being conducted to facilitate collaboration and interaction among participants from 15 organizations. While the project covers several key technology areas relevant to the development of SCWR concepts, it focuses mainly on the heat transfer aspect, which has been identified as the most challenging. Through the collaborating effort, large heat-transfer databases have been compiled for supercritical water and surrogate fluids in tubes, annuli, and bundle subassemblies of various orientations over a wide range of flow conditions. Assessments of several supercritical heat-transfer correlations were performed usingmore » the complied databases. The assessment results are presented. (authors)« less

  18. GIFT-Cloud: A data sharing and collaboration platform for medical imaging research.

    PubMed

    Doel, Tom; Shakir, Dzhoshkun I; Pratt, Rosalind; Aertsen, Michael; Moggridge, James; Bellon, Erwin; David, Anna L; Deprest, Jan; Vercauteren, Tom; Ourselin, Sébastien

    2017-02-01

    Clinical imaging data are essential for developing research software for computer-aided diagnosis, treatment planning and image-guided surgery, yet existing systems are poorly suited for data sharing between healthcare and academia: research systems rarely provide an integrated approach for data exchange with clinicians; hospital systems are focused towards clinical patient care with limited access for external researchers; and safe haven environments are not well suited to algorithm development. We have established GIFT-Cloud, a data and medical image sharing platform, to meet the needs of GIFT-Surg, an international research collaboration that is developing novel imaging methods for fetal surgery. GIFT-Cloud also has general applicability to other areas of imaging research. GIFT-Cloud builds upon well-established cross-platform technologies. The Server provides secure anonymised data storage, direct web-based data access and a REST API for integrating external software. The Uploader provides automated on-site anonymisation, encryption and data upload. Gateways provide a seamless process for uploading medical data from clinical systems to the research server. GIFT-Cloud has been implemented in a multi-centre study for fetal medicine research. We present a case study of placental segmentation for pre-operative surgical planning, showing how GIFT-Cloud underpins the research and integrates with the clinical workflow. GIFT-Cloud simplifies the transfer of imaging data from clinical to research institutions, facilitating the development and validation of medical research software and the sharing of results back to the clinical partners. GIFT-Cloud supports collaboration between multiple healthcare and research institutions while satisfying the demands of patient confidentiality, data security and data ownership. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  19. Accelerating Cancer Systems Biology Research through Semantic Web Technology

    PubMed Central

    Wang, Zhihui; Sagotsky, Jonathan; Taylor, Thomas; Shironoshita, Patrick; Deisboeck, Thomas S.

    2012-01-01

    Cancer systems biology is an interdisciplinary, rapidly expanding research field in which collaborations are a critical means to advance the field. Yet the prevalent database technologies often isolate data rather than making it easily accessible. The Semantic Web has the potential to help facilitate web-based collaborative cancer research by presenting data in a manner that is self-descriptive, human and machine readable, and easily sharable. We have created a semantically linked online Digital Model Repository (DMR) for storing, managing, executing, annotating, and sharing computational cancer models. Within the DMR, distributed, multidisciplinary, and inter-organizational teams can collaborate on projects, without forfeiting intellectual property. This is achieved by the introduction of a new stakeholder to the collaboration workflow, the institutional licensing officer, part of the Technology Transfer Office. Furthermore, the DMR has achieved silver level compatibility with the National Cancer Institute’s caBIG®, so users can not only interact with the DMR through a web browser but also through a semantically annotated and secure web service. We also discuss the technology behind the DMR leveraging the Semantic Web, ontologies, and grid computing to provide secure inter-institutional collaboration on cancer modeling projects, online grid-based execution of shared models, and the collaboration workflow protecting researchers’ intellectual property. PMID:23188758

  20. Accelerating cancer systems biology research through Semantic Web technology.

    PubMed

    Wang, Zhihui; Sagotsky, Jonathan; Taylor, Thomas; Shironoshita, Patrick; Deisboeck, Thomas S

    2013-01-01

    Cancer systems biology is an interdisciplinary, rapidly expanding research field in which collaborations are a critical means to advance the field. Yet the prevalent database technologies often isolate data rather than making it easily accessible. The Semantic Web has the potential to help facilitate web-based collaborative cancer research by presenting data in a manner that is self-descriptive, human and machine readable, and easily sharable. We have created a semantically linked online Digital Model Repository (DMR) for storing, managing, executing, annotating, and sharing computational cancer models. Within the DMR, distributed, multidisciplinary, and inter-organizational teams can collaborate on projects, without forfeiting intellectual property. This is achieved by the introduction of a new stakeholder to the collaboration workflow, the institutional licensing officer, part of the Technology Transfer Office. Furthermore, the DMR has achieved silver level compatibility with the National Cancer Institute's caBIG, so users can interact with the DMR not only through a web browser but also through a semantically annotated and secure web service. We also discuss the technology behind the DMR leveraging the Semantic Web, ontologies, and grid computing to provide secure inter-institutional collaboration on cancer modeling projects, online grid-based execution of shared models, and the collaboration workflow protecting researchers' intellectual property. Copyright © 2012 Wiley Periodicals, Inc.

  1. 33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Area Maritime Security (AMS) Plan... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be submitted...

  2. 76 FR 34231 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-13

    ... Information Collection. (2) Title of the Form/Collection: Science and Technology, External S&T Collaboration... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0041] Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security...

  3. 76 FR 68486 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0077] Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS), Science and Technology, External S&T Collaboration Site (E-STCS) AGENCY: Science and Technology...

  4. Real-time stress monitoring of highway bridges with a secured wireless sensor network.

    DOT National Transportation Integrated Search

    2011-12-01

    "This collaborative research aims to develop a real-time stress monitoring system for highway bridges with a secured wireless sensor network. The near term goal is to collect wireless sensor data under different traffic patterns from local highway br...

  5. Using Instant Messaging Systems as a Platform for Electronic Voting

    NASA Astrophysics Data System (ADS)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  6. Grid Computing and Collaboration Technology in Support of Fusion Energy Sciences

    NASA Astrophysics Data System (ADS)

    Schissel, D. P.

    2004-11-01

    The SciDAC Initiative is creating a computational grid designed to advance scientific understanding in fusion research by facilitating collaborations, enabling more effective integration of experiments, theory and modeling, and allowing more efficient use of experimental facilities. The philosophy is that data, codes, analysis routines, visualization tools, and communication tools should be thought of as easy to use network available services. Access to services is stressed rather than portability. Services share the same basic security infrastructure so that stakeholders can control their own resources and helps ensure fair use of resources. The collaborative control room is being developed using the open-source Access Grid software that enables secure group-to-group collaboration with capabilities beyond teleconferencing including application sharing and control. The ability to effectively integrate off-site scientists into a dynamic control room will be critical to the success of future international projects like ITER. Grid computing, the secure integration of computer systems over high-speed networks to provide on-demand access to data analysis capabilities and related functions, is being deployed as an alternative to traditional resource sharing among institutions. The first grid computational service deployed was the transport code TRANSP and included tools for run preparation, submission, monitoring and management. This approach saves user sites from the laborious effort of maintaining a complex code while at the same time reducing the burden on developers by avoiding the support of a large number of heterogeneous installations. This tutorial will present the philosophy behind an advanced collaborative environment, give specific examples, and discuss its usage beyond FES.

  7. Building bridges to operationalise one health - A Sino-Swedish collaboration to tackle antibiotic resistance.

    PubMed

    Cars, Otto; Xiao, Yonghong; Stålsby Lundborg, Cecilia; Nilsson, Lennart E; Shen, Jianzhong; Sun, Qiang; Bi, Zhenqiang; Börjesson, Stefan; Greko, Christina; Wang, Yang; Liu, Yuqing; Ottoson, Jakob; Li, Xuewen; Nilsson, Maud; Yin, Hong; Bi, Zhenwang; Zheng, Beiwen; Xia, Xi; Chen, Baoli; Ding, Lilu; Sun, Pan; Dyar, Oliver James; Hulth, Anette; Tomson, Göran

    2016-12-01

    Antibiotic resistance is a complex global health challenge. The recent Global Action Plan on antimicrobial resistance highlights the importance of adopting One Health approaches that can cross traditional disciplinary boundaries. We report on the early experiences of a multisectoral Sino-Swedish research project that aims to address gaps in our current knowledge and seeks to improve the situation through system-wide interventions. Our research project is investigating antibiotic use and resistance in a rural area of China through a combination of epidemiological, health systems and laboratory investigations. We reflect here on the challenges inherent in conducting long distance cross-disciplinary collaborations, having now completed data and sample collection for a baseline situation analysis. In particular, we recognise the importance of investing in aspects such as effective communication, shared conceptual frameworks and leadership. We suggest that our experiences will be instructive to others planning to develop similar international One Health collaborations.

  8. Science diplomacy: Investigating the perspective of scholars on politics-science collaboration in international affairs.

    PubMed

    Fähnrich, Birte

    2017-08-01

    Science diplomacy is a widely practiced area of international affairs, but academic research is rather sparse. The role of academia within this field of politics-science interaction has hardly been considered. This article analyzes this scholarly perspective: Based on a literature review, a case study of a German science diplomacy program is used to explore objectives, benefits, and constraints of science diplomacy for participating scholars. While political approaches suggest an ideal world where both sides profit from the collaboration, the findings of the case study point to another conclusion which shows that the interaction of scholars and officials in science diplomacy is far more complex. Thus, the contribution is regarded as both a useful starting point for further research and for a critical reflection of academics and politicians in science diplomacy practice to gauge what can be expected from the collaboration and what cannot.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forslund, D.W.; Cook, J.L.

    One of the most powerful tools available for telemedicine is a multimedia medical record accessible over a wide area and simultaneously editable by multiple physicians. The ability to do this through an intuitive interface linking multiple distributed data repositories while maintaining full data integrity is a fundamental enabling technology in healthcare. The authors discuss the role of distributed object technology using Java and CORBA in providing this capability including an example of such a system (TeleMed) which can be accessed through the World Wide Web. Issues of security, scalability, data integrity, and usability are emphasized.

  10. The role of CORBA in enabling telemedicine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forslund, D.W.

    1997-07-01

    One of the most powerful tools available for telemedicine is a multimedia medical record accessible over a wide area and simultaneously editable by multiple physicians. The ability to do this through an intuitive interface linking multiple distributed data repositories while maintaining full data integrity is a fundamental enabling technology in healthcare. The author discusses the role of distributed object technology using CORBA in providing this capability including an example of such a system (TeleMed) which can be accessed through the World Wide Web. Issues of security, scalability, data integrity, and useability are emphasized.

  11. Information infrastructure for emergency medical services.

    PubMed

    Orthner, Helmuth; Mishra, Ninad; Terndrup, Thomas; Acker, Joseph; Grimes, Gary; Gemmill, Jill; Battles, Marcie

    2005-01-01

    The pre-hospital emergency medical and public safety information environment is nearing a threshold of significant change. The change is driven in part by several emerging technologies such as secure, high-speed wireless communication in the local and wide area networks (wLAN, 3G), Geographic Information Systems (GIS), Global Positioning Systems (GPS), and powerful handheld computing and communication services, that are of sufficient utility to be more widely adopted. We propose a conceptual model to enable improved clinical decision making in the pre-hospital environment using these change agents.

  12. AskNow!--Evaluating an Australian Collaborative Chat Reference Service: A Project Manager's Perspective

    ERIC Educational Resources Information Center

    Wilson, Fran; Keys, Jacki

    2004-01-01

    AskNow! online answers Australia-wide, the first nation-wide chat reference service, has been a successful exercise in collaboration and cooperation. This article examines some of the lessons learnt, the challenges of collaboration and possible future directions. AskNow!, an initiative of the Council of Australian State Libraries (CASL), commenced…

  13. Collaboration between social workers and dentists for care of people with special health needs (a commentary).

    PubMed

    Waldman, H Barry; Perlman, Steven P

    2003-01-01

    The difficulties faced by individuals with mental retardation, developmental and other disabilities in securing dental services are reviewed. The need for social workers to stimulate family members and other health care providers to collaborate with and challenge dental practitioners is emphasized.

  14. Linking Schools with Human Service Agencies. ERIC/CUE Digest No. 62.

    ERIC Educational Resources Information Center

    Ascher, Carol

    A number of factors put pressure on schools to work more closely with health, social service, and other youth-serving institutions but poor communications, program redundancies, fear for job security, and concerns about parent and community support for controversial services inhibit close collaboration. Recent successful collaborative school,…

  15. Efforts Toward an Early Warning Crop Monitor for Countries at Risk

    NASA Astrophysics Data System (ADS)

    Budde, M. E.; Verdin, J. P.; Barker, B.; Humber, M. L.; Becker-Reshef, I.; Justice, C. O.; Magadzire, T.; Galu, G.; Rodriguez, M.; Jayanthi, H.

    2015-12-01

    Assessing crop growing conditions is a crucial aspect of monitoring food security in the developing world. One of the core components of the Group on Earth Observations - Global Agricultural Monitoring (GEOGLAM) targets monitoring Countries at Risk (component 3). The Famine Early Warning Systems Network (FEWS NET) has a long history of utilizing remote sensing and crop modeling to address food security threats in the form of drought, floods, pest infestation, and climate change in some of the world's most at risk countries. FEWS NET scientists at the U.S. Geological Survey Earth Resources Observation and Science (EROS) Center and the University of Maryland Department of Geography have undertaken efforts to address component 3, by promoting the development of a collaborative Early Warning Crop Monitor (EWCM) that would specifically address Countries at Risk. A number of organizations utilize combinations of satellite earth observations, field campaigns, network partner inputs, and crop modeling techniques to monitor crop conditions throughout the world. Agencies such as the Food and Agriculture Organization of the United Nations (FAO), United Nations World Food Programme (WFP), and the European Commission's Joint Research Centre (JRC) provide agricultural monitoring information and reporting across a broad number of areas at risk and in many cases, organizations routinely report on the same countries. The latter offers an opportunity for collaboration on crop growing conditions among agencies. The reduction of uncertainty and achievement of consensus will help strengthen confidence in decisions to commit resources for mitigation of acute food insecurity and support for resilience and development programs. In addition, the development of a collaborative global EWCM will provide each of the partner agencies with the ability to quickly gather crop condition information for areas where they may not typically work or have access to local networks. Using a framework developed by GEOGLAM for monitoring crop conditions in support of the Agricultural Market Information System, we developed an EWCM system for countries at risk. We present the current status of that implementation and highlight achievements to date along with future plans to support the needs of the global agricultural monitoring community.

  16. Secure ICCP Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.

    Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities havemore » received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.« less

  17. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    NASA Astrophysics Data System (ADS)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  18. Informatics for neglected diseases collaborations.

    PubMed

    Bost, Frederic; Jacobs, Robert T; Kowalczyk, Paul

    2010-05-01

    Many different public and private organizations from across the globe are collaborating on neglected diseases drug-discovery and development projects with the aim of identifying a cure for tropical infectious diseases. These neglected diseases collaborations require a global, secure, multi-organization data-management solution, combined with a platform that facilitates communication and supports collaborative work. This review discusses the solutions offered by 'Software as a Service' (SaaS) web-based platforms, despite notable challenges, and the evolution of these platforms required to foster efficient virtual research efforts by geographically dispersed scientists.

  19. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...

  20. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...

  1. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...

  2. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...

  3. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...

  4. Groundwater protection: what can we learn from Germany?

    PubMed

    Zhu, Yan; Balke, Klaus-Dieter

    2008-03-01

    For drinking water security the German waterworks proceed on a comprehensive concept, i.e., the protection of all the regions from the recharge area to the client. It includes the protection of the recharge area by a precautionary management, a safe water treatment, a strict maintenance of the water distribution network, continuous control and an intensive training of staff. Groundwater protection zones together with effective regulations and control play a very important role. Three protection zones with different restrictions in land-use are distinguished. Water in reservoirs and lakes is also protected by Surface Water Protection Zones. Within the surrounding area the land-use is controlled, too. Special treatment is necessary if acidification happens caused by acid rain, or eutrophication caused by the inflow of sewage. Very important is the collaboration between waterworks and the farmers cultivating land in the recharge area in order to execute water-protecting ecological farming with the aim to reduce the application of fertilizers and plant protection agents. Probable financial losses have to be compensated by the waterworks.

  5. Satellite Communications for Coast Guard Homeland Defense

    DTIC Science & Technology

    2002-03-01

    WAN Wide Area Network WHEC High Endurance Cutter WIX Training Cutter WLB Seagoing Buoy Tenders WLI Inland Buoy Tenders WLIC...WMEC), Icebreakers (WAGB), and the Training Cutter ( WIX ) 9 MILSATCOM (UHF) Secure Voice, Record Message Traffic, Tactical data (OTIXICS...onboard CG vessels. [Ref. 3, p.19] By supporting different platforms throughout the CG fleet, we increase the complexity of the network, and thus

  6. Creating an Effective Multi-Domain Wide-Area Surveillance Platform to Enhance Border Security

    DTIC Science & Technology

    2008-03-01

    SWOT ANALYSIS ........................................................................................43 I. ANALYSIS OF PROS AND CONS ...weaknesses and opportunities and SWOT analysis was also used to build pros and cons for the platform. All the interviewees liked unmanned platforms...because of the reduced night hour’s operations and SWOT analysis was also used to build pros and cons for the platform. All the interviewees really

  7. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    DTIC Science & Technology

    2015-05-21

    lie outside their span of control. This monograph therefore assumes no significant changes to whole-of- government collaboration, legislated ...with several other military and whole-of-government BPC efforts. Security cooperation and security assistance (SA) are legislated portfolios of...Plan Colombia, the campaign proposed in 1999 by the Colombian President to reduce internal conflict, led to increased US confidence and support for

  8. Developing Ministerial Collaborative Planning Capacity

    DTIC Science & Technology

    2012-03-14

    1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and

  9. A review and a framework of handheld computer adoption in healthcare.

    PubMed

    Lu, Yen-Chiao; Xiao, Yan; Sears, Andrew; Jacko, Julie A

    2005-06-01

    Wide adoption of mobile computing technology can potentially improve information access, enhance workflow, and promote evidence-based practice to make informed and effective decisions at the point of care. Handheld computers or personal digital assistants (PDAs) offer portable and unobtrusive access to clinical data and relevant information at the point of care. This article reviews the literature on issues related to adoption of PDAs in health care and barriers to PDA adoption. Studies showed that PDAs were used widely in health care providers' practice, and the level of use is expected to rise rapidly. Most care providers found PDAs to be functional and useful in areas of documentation, medical reference, and access to patient data. Major barriers to adoption were identified as usability, security concerns, and lack of technical and organizational support. PDAs offer health care practitioners advantages to enhance their clinical practice. However, better designed PDA hardware and software applications, more institutional support, seamless integration of PDA technology with hospital information systems, and satisfactory security measures are necessary to increase acceptance and wide use of PDAs in healthcare.

  10. Recovery Act - LADWP Smart Grid Regional Demonstration Program Final Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chiu, Sungly; Vohra, Surendra; Abdelshehid, Emil

    LADWP collaborated with its project partners to carry out this demonstration in the designated areas to include two university campuses – the University of California, Los Angeles (UCLA) and the University of Southern California (USC) – surrounding neighborhoods, City of Los Angeles facilities, and LADWP power system test labs. The last project partner, Jet Propulsion Laboratory (JPL) was responsible for the cyber security aspects of the project. The program’s use cases provided insightful information to understand triggers for customers, distributors, and generators to adapt their behavior which aid in reducing system demands and costs, increasing energy efficiency, and increasing gridmore » reliability.« less

  11. ERCMExpress. Volume 2, Issue 4

    ERIC Educational Resources Information Center

    US Department of Education, 2006

    2006-01-01

    This issue of ERCMExpress alerts readers of the All-Hazard NOAA weather radio (NWR) network upgrade. In 2004, The National Oceanic and Atmospheric Administration NOAA and the U.S. Department of Homeland Security (DHS) collaborated to enable DHS to disseminate homeland security-related information over the NWR network. DHS's goal was to produce an…

  12. Security in Distributed Collaborative Environments: Limitations and Solutions

    NASA Astrophysics Data System (ADS)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  13. Astronomy as the Leader of Interdisciplinary and Multidisciplinary Sciences (Introductory talk)

    NASA Astrophysics Data System (ADS)

    Martirosyan, R. M.; Mickaelian, A. M.

    2015-07-01

    Interdisciplinary and multidisciplinary sciences over the last few decades have become the major booster of science development. The most important discoveries occur just at the intersection of sciences and in collaboration of several fields. There appeared such intermediate fields as mathematical physics, physical chemistry, biophysics, biochemistry, geophysics, etc. In astronomy, astrophysics has long been the main field, and in present archaeoastronomy, astrochemistry, astrobiology, astroinformatics (which is tightly related to virtual observatories) are developing. On the other hand, in recent years many science areas surfeit of research on Earth, more and more use data coming from the Space and are being developed just due to them. It is possible that in the near future, various science areas create Space departments or simply develop their research in close collaboration with astronomers. Interesting discoveries have been made in studies of astronomical topics in various areas of culture; such topics are widely used in folklore, other genres of literature, painting, and architecture. Astronomy has also a leading role in scientific tourism, scientific journalism and in general, dissemination of popular science or public outreach.

  14. Astronomy as the Leader of Interdisciplinary and Multidisciplinary Sciences

    NASA Astrophysics Data System (ADS)

    Mickaelian, A. M.; Farmanyan, S. V.

    2016-12-01

    Interdisciplinary and multidisciplinary sciences over the last few decades have become the major booster of science development. The most important discoveries occur just at the intersection of sciences and in collaboration of several fields. There appeared such intermediate fields as mathematical physics, physical chemistry, biophysics, biochemistry, geophysics, etc. In astronomy, astrophysics has long been the main field, and in present archaeoastronomy, astrochemistry, astrobiology, astroinformatics (which is tightly related to virtual observatories) are developing. On the other hand, in recent years many science areas surfeit of research on Earth, more and more use data coming from the Space and are being developed just due to them. It is possible that in the near future, various science areas create Space departments or simply develop their research in close collaboration with astronomers. Interesting discoveries have been made in studies of astronomical topics in various areas of culture; such topics are widely used in folklore, other genres of literature, painting, and architecture. Astronomy has also a leading role in scientific tourism, scientific journalism and in general, dissemination of popular science or public outreach.

  15. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

    PubMed Central

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S. Cenk; Shimizu, Chisato; Burns, Jane C.; Wright, Victoria J.; Png, Eileen; Hibberd, Martin L.; Lloyd, David D.; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S.; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-01-01

    Abstract Motivation: We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. Results: To demonstrate PRINCESS’ performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). Availability and Implementation: https://github.com/achenfengb/PRINCESS_opensource Contact: shw070@ucsd.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:28065902

  16. A Strategy toward Collaborative Filter Recommended Location Service for Privacy Protection

    PubMed Central

    Wang, Peng; Yang, Jing; Zhang, Jianpei

    2018-01-01

    A new collaborative filtered recommendation strategy was proposed for existing privacy and security issues in location services. In this strategy, every user establishes his/her own position profiles according to their daily position data, which is preprocessed using a density clustering method. Then, density prioritization was used to choose similar user groups as service request responders and the neighboring users in the chosen groups recommended appropriate location services using a collaborative filter recommendation algorithm. The two filter algorithms based on position profile similarity and position point similarity measures were designed in the recommendation, respectively. At the same time, the homomorphic encryption method was used to transfer location data for effective protection of privacy and security. A real location dataset was applied to test the proposed strategy and the results showed that the strategy provides better location service and protects users’ privacy. PMID:29751670

  17. A Strategy toward Collaborative Filter Recommended Location Service for Privacy Protection.

    PubMed

    Wang, Peng; Yang, Jing; Zhang, Jianpei

    2018-05-11

    A new collaborative filtered recommendation strategy was proposed for existing privacy and security issues in location services. In this strategy, every user establishes his/her own position profiles according to their daily position data, which is preprocessed using a density clustering method. Then, density prioritization was used to choose similar user groups as service request responders and the neighboring users in the chosen groups recommended appropriate location services using a collaborative filter recommendation algorithm. The two filter algorithms based on position profile similarity and position point similarity measures were designed in the recommendation, respectively. At the same time, the homomorphic encryption method was used to transfer location data for effective protection of privacy and security. A real location dataset was applied to test the proposed strategy and the results showed that the strategy provides better location service and protects users' privacy.

  18. Scalability, Interoperability, and Security at the Data Discovery Level: A System Administrator's Perspective

    NASA Technical Reports Server (NTRS)

    2006-01-01

    The Global Change Master Directory (GCMD) has been one of the best known Earth science and global change data discovery online resources throughout its extended operational history. The growing popularity of the system since its introduction on the World Wide Web in 1994 has created an environment where resolving issues of scalability, security, and interoperability have been critical to providing the best available service to the users and partners of the GCMD. Innovative approaches developed at the GCMD in these areas will be presented with a focus on how they relate to current and future GO-ESSP community needs.

  19. Alfalfa (Medicago sativa L.)/maize (Zea mays L.) intercropping provides a feasible way to improve yield and economic incomes in farming and pastoral areas of northeast China.

    PubMed

    Sun, Baoru; Peng, Yi; Yang, Hongyu; Li, Zhijian; Gao, Yingzhi; Wang, Chao; Yan, Yuli; Liu, Yanmei

    2014-01-01

    Given the growing challenges to food and eco-environmental security as well as sustainable development of animal husbandry in the farming and pastoral areas of northeast China, it is crucial to identify advantageous intercropping modes and some constraints limiting its popularization. In order to assess the performance of various intercropping modes of maize and alfalfa, a field experiment was conducted in a completely randomized block design with five treatments: maize monoculture in even rows, maize monoculture in alternating wide and narrow rows, alfalfa monoculture, maize intercropped with one row of alfalfa in wide rows and maize intercropped with two rows of alfalfa in wide rows. Results demonstrate that maize monoculture in alternating wide and narrow rows performed best for light transmission, grain yield and output value, compared to in even rows. When intercropped, maize intercropped with one row of alfalfa in wide rows was identified as the optimal strategy and the largely complementary ecological niches of alfalfa and maize were shown to account for the intercropping advantages, optimizing resource utilization and improving yield and economic incomes. These findings suggest that alfalfa/maize intercropping has obvious advantages over monoculture and is applicable to the farming and pastoral areas of northeast China.

  20. Alfalfa (Medicago sativa L.)/Maize (Zea mays L.) Intercropping Provides a Feasible Way to Improve Yield and Economic Incomes in Farming and Pastoral Areas of Northeast China

    PubMed Central

    Sun, Baoru; Peng, Yi; Yang, Hongyu; Li, Zhijian; Gao, Yingzhi; Wang, Chao; Yan, Yuli; Liu, Yanmei

    2014-01-01

    Given the growing challenges to food and eco-environmental security as well as sustainable development of animal husbandry in the farming and pastoral areas of northeast China, it is crucial to identify advantageous intercropping modes and some constraints limiting its popularization. In order to assess the performance of various intercropping modes of maize and alfalfa, a field experiment was conducted in a completely randomized block design with five treatments: maize monoculture in even rows, maize monoculture in alternating wide and narrow rows, alfalfa monoculture, maize intercropped with one row of alfalfa in wide rows and maize intercropped with two rows of alfalfa in wide rows. Results demonstrate that maize monoculture in alternating wide and narrow rows performed best for light transmission, grain yield and output value, compared to in even rows. When intercropped, maize intercropped with one row of alfalfa in wide rows was identified as the optimal strategy and the largely complementary ecological niches of alfalfa and maize were shown to account for the intercropping advantages, optimizing resource utilization and improving yield and economic incomes. These findings suggest that alfalfa/maize intercropping has obvious advantages over monoculture and is applicable to the farming and pastoral areas of northeast China. PMID:25329376

  1. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  2. Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework.

    PubMed

    Parenreng, Jumadi Mabe; Kitagawa, Akio

    2018-05-17

    Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network's data output to stay at a high or medium level.

  3. Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework

    PubMed Central

    Kitagawa, Akio

    2018-01-01

    Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network’s data output to stay at a high or medium level. PMID:29772773

  4. Leveraging Successful Collaborative Processes to Improve Performance Outcomes in Large-Scale Event Planning: Super Bowl, A Planned Homeland Security Event

    DTIC Science & Technology

    2010-03-01

    are turning out to be counterproductive because they are culturally anathema (Wollman, 2009). A consideration of psychological tenets by Sigmund ... Freud suggests a principle aspect of dysfunction in collaboration. He reasoned that An Ego governed by social convention and a Superego governed by

  5. U.S.-RUSSIA TIES: Spy Conviction Strains Science Collaborations.

    PubMed

    Stone, R

    2000-12-15

    The conviction last week in Russia of U.S. businessman Edward Pope on charges of espionage may add to already growing tensions in scientific collaborations between the two countries, according to officials on both sides. The recent strains appear to be a reaction to a broad range of national security concerns in each nation.

  6. Collaboration and Commitment to Sealed Source Safety, Security, and Disposition - 13627

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jennison, Meaghan; Martin, David W.

    2013-07-01

    EnergySolutions, the Division of Radiation Control at the Utah Department of Environmental Quality (UDEQ), the Conference of Radiation Control Program Directors (CRCPD), and the Department of Energy's Global Threat Reduction Initiative (GTRI) are collaborating on a truly innovative effort to expand opportunities for cost-effective sealed source disposal. These entities have developed a first-of-its-kind initiative to dispose of certain sealed sources at the EnergySolutions disposal facility near Clive, Utah, which normally cannot accept sealed sources of any type. This creative and collaborative effort to improve radiation health, safety, and security exemplifies the spirit and commitment represented by the Richard S. Hodes,more » M.D. Honor Lecture Award, which is presented annually at the Waste Management Symposia by the Southeast Compact Commission to encourage environmental professionals and political leaders to develop innovative approaches to waste management in the United States. The participants in the collaborative initiative are honored to receive special recognition for their efforts thus far. They also recognize that the hard work remains to be done. (authors)« less

  7. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  8. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  9. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  10. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  11. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  12. Maude: A Wide Spectrum Language for Secure Active Networks

    DTIC Science & Technology

    2002-08-01

    AFRL-IF-RS-TR-2002-197 Final Technical Report August 2002 MAUDE: A WIDE SPECTRUM LANGUAGE FOR SECURE ACTIVE NETWORKS SRI...MAUDE: A WIDE SPECTRUM FORMAL LANGUAGE FOR SECURE ACTIVE NETWORKS 6. AUTHOR(S) Jose Meseguer and Carolyn Talcott 5. FUNDING NUMBERS C...specifications to address this challenge. We also show how, using the Maude rewriting logic language and tools, active network systems, languages , and

  13. “Highly processed, highly packaged, very unhealthy. But they are low risk”: exploring intersections between community food security and food safety

    PubMed Central

    Kelsey A., Speed; Samantha B., Meyer; Rhona M., Hanning; Shannon E., Majowicz

    2017-01-01

    Abstract Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat. PMID:29043759

  14. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety.

    PubMed

    Speed, Kelsey A; Meyer, Samantha B; Hanning, Rhona M; Majowicz, Shannon E

    2017-10-01

    Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  15. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    DTIC Science & Technology

    2008-12-01

    disqualifying criminal conviction from an application to become a Lawful Permanent Resident of the U.S.10 10...developing Collaborative Capacity Builders (CCBs) is another method to sustain and continue to build an effective USCIS and ICE network into the 21st...Weber and Anne M. Khademian, “Wicked Problems, Knowledge Challenges, and Collaborative Capacity Builders in Network Settings,” Public Administration

  16. Analysis of Alternatives (AoA) of Open Colllaboration and Research Capabilities Collaboratipon in Research and Engineering in Advanced Technology and Education and High-Performance Computing Innovation Center (HPCIC) on the LVOC.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vrieling, P. Douglas

    2016-01-01

    The Livermore Valley Open Campus (LVOC), a joint initiative of the National Nuclear Security Administration (NNSA), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL), enhances the national security missions of NNSA by promoting greater collaboration between world-class scientists at the national security laboratories, and their partners in industry and academia. Strengthening the science, technology, and engineering (ST&E) base of our nation is one of the NNSA’s top goals. By conducting coordinated and collaborative programs, LVOC enhances both the NNSA and the broader national science and technology base, and helps to ensure the health of core capabilities at LLNLmore » and SNL. These capabilities must remain strong to enable the laboratories to execute their primary mission for NNSA.« less

  17. Collaborative drug discovery for More Medicines for Tuberculosis (MM4TB)

    PubMed Central

    Ekins, Sean; Spektor, Anna Coulon; Clark, Alex M.; Dole, Krishna; Bunin, Barry A.

    2016-01-01

    Neglected disease drug discovery is generally poorly funded compared with major diseases and hence there is an increasing focus on collaboration and precompetitive efforts such as public–private partnerships (PPPs). The More Medicines for Tuberculosis (MM4TB) project is one such collaboration funded by the EU with the goal of discovering new drugs for tuberculosis. Collaborative Drug Discovery has provided a commercial web-based platform called CDD Vault which is a hosted collaborative solution for securely sharing diverse chemistry and biology data. Using CDD Vault alongside other commercial and free cheminformatics tools has enabled support of this and other large collaborative projects, aiding drug discovery efforts and fostering collaboration. We will describe CDD's efforts in assisting with the MM4TB project. PMID:27884746

  18. Collaborative Systems Testing

    ERIC Educational Resources Information Center

    Pocatilu, Paul; Ciurea, Cristian

    2009-01-01

    Collaborative systems are widely used today in various activity fields. Their complexity is high and the development involves numerous resources and costs. Testing collaborative systems has a very important role for the systems' success. In this paper we present taxonomy of collaborative systems. The collaborative systems are classified in many…

  19. E-Center: A Collaborative Platform for Wide Area Network Users

    NASA Astrophysics Data System (ADS)

    Grigoriev, M.; DeMar, P.; Tierney, B.; Lake, A.; Metzger, J.; Frey, M.; Calyam, P.

    2012-12-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  20. Energy Transmission and Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mathison, Jane

    2012-12-31

    The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: • improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; • identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); • analyze the potential within the district to utilize farm wastes to produce biofuels; •more » enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; • identify the policy, regulatory, and financial barriers impeding development of a new energy system; and • improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the College’s yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.« less

  1. Evaluating a European knowledge hub on climate change in agriculture: Are we building a better connected community?

    PubMed

    Saetnan, Eli Rudinow; Kipling, Richard Philip

    In order to maintain food security and sustainability of production under climate change, interdisciplinary and international collaboration in research is essential. In the EU, knowledge hubs are important funding instruments for the development of an interconnected European Research Area. Here, network analysis was used to assess whether the pilot knowledge hub MACSUR has affected interdisciplinary collaboration, using co-authorship of peer reviewed articles as a measure of collaboration. The broad community of all authors identified as active in the field of agriculture and climate change was increasingly well connected over the period studied. Between knowledge hub members, changes in network parameters suggest an increase in collaborative interaction beyond that expected due to network growth, and greater than that found in the broader community. Given that interdisciplinary networks often take several years to have an impact on research outputs, these changes within the relatively new MACSUR community provide evidence that the knowledge hub structure has been effective in stimulating collaboration. However, analysis showed that knowledge hub partners were initially well-connected, suggesting that the initiative may have gathered together researchers with particular resources or inclinations towards collaborative working. Long term, consistent funding and ongoing reflection to improve networking structures may be necessary to sustain the early positive signs from MACSUR, to extend its success to a wider community of researchers, or to repeat it in less connected fields of science. Tackling complex challenges such as climate change will require research structures that can effectively support and utilise the diversity of talents beyond the already well-connected core of scientists at major research institutes. But network research shows that this core, well-connected group are vital brokers in achieving wider integration.

  2. When Collaborative Is Not Collaborative: Supporting Student Learning through Self-Surveillance

    ERIC Educational Resources Information Center

    Kotsopoulos, Donna

    2010-01-01

    Collaborative learning has been widely endorsed in education. This qualitative research examines instances of collaborative learning during mathematics that were seen to be predominantly non-collaborative despite the pedagogical efforts and intentions of the teacher and the task. In an effort to disrupt the non-collaborative learning, small groups…

  3. Low Earth Orbit Satellite Tracking Telescope Network: Collaborative Optical Tracking for Enhanced Space Situational Awareness

    DTIC Science & Technology

    2015-03-27

    i.e., temporarily focusing on one object instead of wide area survey) or SOI collection on high interest objects (e.g., unidentified objects ...The Air Force Institute of Technology has spent the last seven years conducting research on orbit identification and object characterization of space... objects through the use of commercial-off-the-shelf hardware systems controlled via custom software routines, referred to simply as TeleTrak. Year

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Verce, M. F.; Schwartz, L. I.

    This was a collaborative effort between LLNL and STE to investigate the use of vaporized hydrogen peroxide (VHP®) to decontaminate spore-contaminated heating, ventilation, and cooling (HV AC) systems in a trailer sized room. LLNL's effort under this CRADA was funded by DOE's Chemical and Biological National Security Program (CBNP), which later became part of Department of Homeland Security in 2004.

  5. 33 CFR 103.500 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.500 General. (a) The Area Maritime... with the National Maritime Transportation Security Plan and the National Transportation Security Plan...

  6. Identifying Emerging Hybrid Adversaries

    DTIC Science & Technology

    2012-01-01

    average 1 hour per response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON a. REPORT...an extended engage- ment area to get into the close fight.4 In addition, they will employ a wide range of capabilities including cyber, social media

  7. What It Takes. Air Force Command of Joint Operations

    DTIC Science & Technology

    2009-01-01

    Iraq Assistance Group IDE intermediate developmental education IO international organization ISAF International Security and Assistance Force ISR...Operations Table A.1—Continued Joint Task Force Mission/Operation Start End Service Command Rank JTF–Joint Area Support Group (JASG) Iraqi Freedom...be of interest to a wide group of Air Force personnel involved in the development and func- tion of the service’s command organizations, including

  8. Multinational Experiment 7. Regional Analysis: Wider Mediterranean

    DTIC Science & Technology

    2013-07-08

    crossroads for the maritime trade and the global economic flows, the Mediterranean Sea is something like a lab where maritime security initiatives could...and their economic development. One of the most critical areas in the world partially faces the Mediterranean: the Middle East. As stated, 21...Nations have a coastline on the Mediterranean Sea, offering a wide range of economical , political, cultural and religious perspectives that hamper the

  9. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively.« less

  10. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively. (authors)« less

  11. Cost-effective scat-detection dogs: unleashing a powerful new tool for international mammalian conservation biology.

    PubMed

    Orkin, Joseph D; Yang, Yuming; Yang, Chunyan; Yu, Douglas W; Jiang, Xuelong

    2016-10-10

    Recently, detection dogs have been utilized to collect fecal samples from cryptic and rare mammals. Despite the great promise of this technique for conservation biology, its broader application has been limited by the high cost (tens to hundreds of thousands of dollars) and logistical challenges of employing a scat-detection dog team while conducting international, collaborative research. Through an international collaboration of primatologists and the Chinese Ministry of Public Security, we trained and used a detection dog to find scat from three species of unhabituated, free-ranging primates, for less than $3,000. We collected 137 non-human primate fecal samples that we confirmed by sequencing taxonomically informative genetic markers. Our detection dog team had a 92% accuracy rate, significantly outperforming our human-only team. Our results demonstrate that detection dogs can locate fecal samples from unhabituated primates with variable diets, locomotion, and grouping patterns, despite challenging field conditions. We provide a model for in-country training, while also building local capacity for conservation and genetic monitoring. Unlike previous efforts, our approach will allow for the wide adoption of scat-detection dogs in international conservation biology.

  12. Cost-effective scat-detection dogs: unleashing a powerful new tool for international mammalian conservation biology

    PubMed Central

    Orkin, Joseph D.; Yang, Yuming; Yang, Chunyan; Yu, Douglas W.; Jiang, Xuelong

    2016-01-01

    Recently, detection dogs have been utilized to collect fecal samples from cryptic and rare mammals. Despite the great promise of this technique for conservation biology, its broader application has been limited by the high cost (tens to hundreds of thousands of dollars) and logistical challenges of employing a scat-detection dog team while conducting international, collaborative research. Through an international collaboration of primatologists and the Chinese Ministry of Public Security, we trained and used a detection dog to find scat from three species of unhabituated, free-ranging primates, for less than $3,000. We collected 137 non-human primate fecal samples that we confirmed by sequencing taxonomically informative genetic markers. Our detection dog team had a 92% accuracy rate, significantly outperforming our human-only team. Our results demonstrate that detection dogs can locate fecal samples from unhabituated primates with variable diets, locomotion, and grouping patterns, despite challenging field conditions. We provide a model for in-country training, while also building local capacity for conservation and genetic monitoring. Unlike previous efforts, our approach will allow for the wide adoption of scat-detection dogs in international conservation biology. PMID:27721442

  13. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  14. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  15. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  16. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  17. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  18. Balancing entrepreneurship and business practices for e-collaboration: responsible information sharing in academic research.

    PubMed

    Porter, Mark W; Porter, Mark William; Milley, David; Oliveti, Kristyn; Ladd, Allen; O'Hara, Ryan J; Desai, Bimal R; White, Peter S

    2008-11-06

    Flexible, highly accessible collaboration tools can inherently conflict with controls placed on information sharing by offices charged with privacy protection, compliance, and maintenance of the general business environment. Our implementation of a commercial enterprise wiki within the academic research environment addresses concerns of all involved through the development of a robust user training program, a suite of software customizations that enhance security elements, a robust auditing program, allowance for inter-institutional wiki collaboration, and wiki-specific governance.

  19. Forging a New Partnership: The Story of Teacher Union and School District Collaboration in Pittsburgh

    ERIC Educational Resources Information Center

    Hamill, Sean D.

    2011-01-01

    This paper documents Pittsburgh's transformation from a typical, adversarial district-union dynamic to one of deep, substantive collaboration over the course of several years. This work has catapulted Pittsburgh to the vanguard of efforts to improve teacher effectiveness, and helped secure more than $80 million in philanthropic and federal grants.…

  20. Data management and analysis for the Earth System Grid

    NASA Astrophysics Data System (ADS)

    Williams, D. N.; Ananthakrishnan, R.; Bernholdt, D. E.; Bharathi, S.; Brown, D.; Chen, M.; Chervenak, A. L.; Cinquini, L.; Drach, R.; Foster, I. T.; Fox, P.; Hankin, S.; Henson, V. E.; Jones, P.; Middleton, D. E.; Schwidder, J.; Schweitzer, R.; Schuler, R.; Shoshani, A.; Siebenlist, F.; Sim, A.; Strand, W. G.; Wilhelmi, N.; Su, M.

    2008-07-01

    The international climate community is expected to generate hundreds of petabytes of simulation data within the next five to seven years. This data must be accessed and analyzed by thousands of analysts worldwide in order to provide accurate and timely estimates of the likely impact of climate change on physical, biological, and human systems. Climate change is thus not only a scientific challenge of the first order but also a major technological challenge. In order to address this technological challenge, the Earth System Grid Center for Enabling Technologies (ESG-CET) has been established within the U.S. Department of Energy's Scientific Discovery through Advanced Computing (SciDAC)-2 program, with support from the offices of Advanced Scientific Computing Research and Biological and Environmental Research. ESG-CET's mission is to provide climate researchers worldwide with access to the data, information, models, analysis tools, and computational capabilities required to make sense of enormous climate simulation datasets. Its specific goals are to (1) make data more useful to climate researchers by developing Grid technology that enhances data usability; (2) meet specific distributed database, data access, and data movement needs of national and international climate projects; (3) provide a universal and secure web-based data access portal for broad multi-model data collections; and (4) provide a wide-range of Grid-enabled climate data analysis tools and diagnostic methods to international climate centers and U.S. government agencies. Building on the successes of the previous Earth System Grid (ESG) project, which has enabled thousands of researchers to access tens of terabytes of data from a small number of ESG sites, ESG-CET is working to integrate a far larger number of distributed data providers, high-bandwidth wide-area networks, and remote computers in a highly collaborative problem-solving environment.

  1. European security framework for healthcare.

    PubMed

    Ruotsalainen, Pekka; Pohjonen, Hanna

    2003-01-01

    eHealth and telemedicine services are promising business areas in Europe. It is clear that eHealth products and services will be sold and ordered from a distance and over national borderlines in the future. However, there are many barriers to overcome. For both national and pan-European eHealth and telemedicine applications a common security framework is needed. These frameworks set security requirements needed for cross-border eHealth services. The next step is to build a security infrastructure which is independent of technical platforms. Most of the European eHealth platforms are regional or territorial. Some countries are looking for a Public Key Infrastructure, but no large scale solutions do exist in healthcare. There is no clear candidate solution for European-wide interoperable eHealth platform. Gross-platform integration seems to be the most practical integration method at a European level in the short run. The use of Internet as a European integration platform is a promising solution in the long run.

  2. 33 CFR 103.305 - Composition of an Area Maritime Security (AMS) Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... port stakeholders having a special competence in maritime security; and (7) Port stakeholders affected... Security (AMS) Committee. 103.305 Section 103.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  3. Software To Secure Distributed Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  4. Security and Efficiency Concerns With Distributed Collaborative Networking Environments

    DTIC Science & Technology

    2003-09-01

    have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while

  5. Computer Supported Cooperative Work in Information Search and Retrieval.

    ERIC Educational Resources Information Center

    Twidale, Michael B.; Nichols, David M.

    1998-01-01

    Considers how research in collaborative technologies can inform research and development in library and information science. Topics include computer supported collaborative work; shared drawing; collaborative writing; MUDs; MOOs; workflow; World Wide Web; collaborative learning; computer mediated communication; ethnography; evaluation; remote…

  6. SERVIR HIMALYA: Enabling Improved Environmental Management and Livelihoods in the HKH

    NASA Astrophysics Data System (ADS)

    Bajracharya, B.; Murthy, M. S. R.; Shrestha, B.

    2014-11-01

    With an overarching goal to improve environmental management and resilience to climate change, SERVIR-Himalaya is established as a collaborative initiative of USAID, NASA and ICIMOD. The SERVIR-Himalaya has been the key instrument to provide integrated and innovative geospatial solutions for generation and dissemination of information and knowledge resources on mountain environments. The SERVIR applications, products and services are viewed as essential cross-cutting elements to achieve the greater impacts on addressing Himalayan livelihood challenges. The broad thematic areas which are also subset of the societal benefit areas of Global Earth Observation (GEO), namely - agriculture and food security, ecosystems and sustainable landscapes, and disaster risk management are addressed. On the cross-cutting theme, SERVIR Himalaya is also focusing on developing regional level applications providing key information systems and services on multiple themes of regional significance. The regional level science applications include use of MODIS satellite information products and services for environmental and natural resources monitoring in the Himalayan region. Regional and national training and workshops, on-the-job training, internships and exchange programs and technical backstopping are key capacity building components to enhance the capacity of partners from national institutions in the regional member countries. These efforts are also seen as receiving feedback on the science applications, identify additional needs, and increase synergy by exploring opportunities for collaboration.

  7. Collaborative Information Agents on the World Wide Web

    NASA Technical Reports Server (NTRS)

    Chen, James R.; Mathe, Nathalie; Wolfe, Shawn; Koga, Dennis J. (Technical Monitor)

    1998-01-01

    In this paper, we present DIAMS, a system of distributed, collaborative information agents which help users access, collect, organize, and exchange information on the World Wide Web. Personal agents provide their owners dynamic displays of well organized information collections, as well as friendly information management utilities. Personal agents exchange information with one another. They also work with other types of information agents such as matchmakers and knowledge experts to facilitate collaboration and communication.

  8. Human Pacman: A Mobile Augmented Reality Entertainment System Based on Physical, Social, and Ubiquitous Computing

    NASA Astrophysics Data System (ADS)

    Cheok, Adrian David

    This chapter details the Human Pacman system to illuminate entertainment computing which ventures to embed the natural physical world seamlessly with a fantasy virtual playground by capitalizing on infrastructure provided by mobile computing, wireless LAN, and ubiquitous computing. With Human Pacman, we have a physical role-playing computer fantasy together with real human-social and mobile-gaming that emphasizes on collaboration and competition between players in a wide outdoor physical area that allows natural wide-area human-physical movements. Pacmen and Ghosts are now real human players in the real world experiencing mixed computer graphics fantasy-reality provided by using the wearable computers on them. Virtual cookies and actual tangible physical objects are incorporated into the game play to provide novel experiences of seamless transitions between the real and virtual worlds. This is an example of a new form of gaming that anchors on physicality, mobility, social interaction, and ubiquitous computing.

  9. Core components of the rural nurse specialist role in New Zealand.

    PubMed

    Bell, Jennie; Crawford, Ruth; Holloway, Kathy

    2018-06-01

    New Zealand has a rural population with unique healthcare needs. Traditionally, rural health care has been provided by medical general practitioners (GPs); however, as the number of GPs declines, the rural nurse specialist (RNS) role has emerged. The RNS is a registered nurse with advanced nursing skills that enable independent, autonomous practice within rural areas. The health needs of each rural community are specific to that area and the RNS role has been developed according to local healthcare needs. The purpose of this research was to provide a description of the RNS role in New Zealand. A descriptive exploratory approach was used in this qualitative study. The study was conducted in two parts. Phase 1 consisted of document content analysis of RNS position descriptions and phase 2 comprised four semi-structured interviews with RNSs. Data were analysed using thematic analysis. The Modified Strong Model of Advanced Practice was utilised as a framework for thematic analysis during both phases. Rural nurse specialists demonstrated a wide variance in the understanding of the term 'RNS'. The RNS role was found to include provision of care across a wide range of settings according to local needs. Advanced assessment skills were expected by employers and considered a major component of the role by RNSs. Advanced assessments skills were utilised to enhance communication and thus increase collaboration with other health professionals. The ability to effectively communicate and collaborate with other health professionals was found to be a high priority. However, RNSs perceived that collaboration and thus patient care was affected by a lack of role clarity. The nurse practitioner (NP) role in New Zealand was considered more effective, with greater role recognition for the NP. Education was considered essential to maintain advanced assessment skills. RNSs identified providing education in the form of health promotion relevant to local needs as important. There was a lack of information regarding publication and professional leadership, highlighting this as an area for development. Another issue was the importance of stress management in an isolated area. The RNS role requires advanced knowledge to provide independent patient care. Advanced skills utilised include assessment, diagnosis and treatment of patients. RNSs must have postgraduate education to develop the advanced skills required in this role. RNSs perceive the NP role as having better role clarity; therefore, all participants were considering becoming an NP. There are barriers to becoming an NP, thus an expansion of the current RNS role is recommended. Further recommendations from this study include increased professional leadership to improve RNS visibility and further continued interprofessional education to enhance collaboration.

  10. Translational Research 2.0: a framework for accelerating collaborative discovery.

    PubMed

    Asakiewicz, Chris

    2014-05-01

    The world wide web has revolutionized the conduct of global, cross-disciplinary research. In the life sciences, interdisciplinary approaches to problem solving and collaboration are becoming increasingly important in facilitating knowledge discovery and integration. Web 2.0 technologies promise to have a profound impact - enabling reproducibility, aiding in discovery, and accelerating and transforming medical and healthcare research across the healthcare ecosystem. However, knowledge integration and discovery require a consistent foundation upon which to operate. A foundation should be capable of addressing some of the critical issues associated with how research is conducted within the ecosystem today and how it should be conducted for the future. This article will discuss a framework for enhancing collaborative knowledge discovery across the medical and healthcare research ecosystem. A framework that could serve as a foundation upon which ecosystem stakeholders can enhance the way data, information and knowledge is created, shared and used to accelerate the translation of knowledge from one area of the ecosystem to another.

  11. Collaboration with city agencies: a winning approach to community assessment.

    PubMed

    Reifsnider, Elizabeth; Dominguez, Amy; Friesenhahn, Jana; Hodges, Pamela; Chapin, Candace; Sims, W Bryan

    2005-07-01

    Five graduate nursing students made a difference in the health of San Antonio citizens by conducting a community assessment as part of a standard clinical activity in their community health nursing course. The students and their professor were able to effect city-wide change for health protection and promotion through collaboration with the City of San Antonio Planning Department (CSAPD). By compiling information, linking organizations, and speaking before community groups about the importance of a fluoridated water supply, the students generated public interest and momentum, which resulted in a successful vote to add fluoride to the water supply. In addition, they were able to add to the assessment compiled by the Planning Department employees and increase the CSAPD's awareness of health concerns as an important area to assess within a community. The resulting assessment was more comprehensive than it would have been without the students' input. This use of collaboration provides a model other faculty may adopt for community assessment.

  12. From Swords to Plowshares: The US/Russian Collaboration in High Energy Density Physics Using Pulsed Power

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Younger, S.M.; Fowler, C.M.; Lindemuth, I.

    1999-03-15

    Since 1992, the All-Russian Scientific Research Institute of Experimental Physics and the Los Alamos National Laboratory, the institutes that designed the first nuclear weapons of the Soviet Union and the US, respectively, have been working together in fundamental research related to pulsed power and high energy density science. This collaboration has enabled scientists formerly engaged in weapons activities to redirect their attention to peaceful pursuits of wide benefit to the technical community. More than thirty joint experiments have been performed at Sarov and Los Alamos in areas as diverse as solid state physics in high magnetic fields, fusion plasma formation,more » isentropic compression of noble gases, and explosively driven-high current generation technology. Expanding on the introductory comments of the conference plenary presentation, this paper traces the origins of this collaboration and briefly reviews the scientific accomplishments. Detailed reports of the scientific accomplishments can be found in other papers in these proceedings and in other publications.« less

  13. Smart Grid Demonstration Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Craig; Carroll, Paul; Bell, Abigail

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives,more » to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and posted for universal access at www.nreca.coop/smartgrid. This research is available for widespread distribution to both cooperative members and non-members. These reports are listed in Table 1.2. Interoperability: The deliverable in this area was the advancement of the MultiSpeak™ interoperability standard from version 4.0 to version 5.0, and improvement in the MultiSpeak™ documentation to include more than 100 use cases. This deliverable substantially expanded the scope and usability of MultiSpeak, ™ the most widely deployed utility interoperability standard, now in use by more than 900 utilities. MultiSpeak™ documentation can be accessed only at www.multispeak.org. Cyber Security: NRECA’s starting point was to develop cyber security tools that incorporated succinct guidance on best practices. The deliverables were: cyber security extensions to MultiSpeak,™ which allow more security message exchanges; a Guide to Developing a Cyber Security and Risk Mitigation Plan; a Cyber Security Risk Mitigation Checklist; a Cyber Security Plan Template that co-ops can use to create their own cyber security plans; and Security Questions for Smart Grid Vendors.« less

  14. Autonomous collection of dynamically-cued multi-sensor imagery

    NASA Astrophysics Data System (ADS)

    Daniel, Brian; Wilson, Michael L.; Edelberg, Jason; Jensen, Mark; Johnson, Troy; Anderson, Scott

    2011-05-01

    The availability of imagery simultaneously collected from sensors of disparate modalities enhances an image analyst's situational awareness and expands the overall detection capability to a larger array of target classes. Dynamic cooperation between sensors is increasingly important for the collection of coincident data from multiple sensors either on the same or on different platforms suitable for UAV deployment. Of particular interest is autonomous collaboration between wide area survey detection, high-resolution inspection, and RF sensors that span large segments of the electromagnetic spectrum. The Naval Research Laboratory (NRL) in conjunction with the Space Dynamics Laboratory (SDL) is building sensors with such networked communications capability and is conducting field tests to demonstrate the feasibility of collaborative sensor data collection and exploitation. Example survey / detection sensors include: NuSAR (NRL Unmanned SAR), a UAV compatible synthetic aperture radar system; microHSI, an NRL developed lightweight hyper-spectral imager; RASAR (Real-time Autonomous SAR), a lightweight podded synthetic aperture radar; and N-WAPSS-16 (Nighttime Wide-Area Persistent Surveillance Sensor-16Mpix), a MWIR large array gimbaled system. From these sensors, detected target cues are automatically sent to the NRL/SDL developed EyePod, a high-resolution, narrow FOV EO/IR sensor, for target inspection. In addition to this cooperative data collection, EyePod's real-time, autonomous target tracking capabilities will be demonstrated. Preliminary results and target analysis will be presented.

  15. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  16. Comment on "Proactive quantum secret sharing"

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Yue

    2017-03-01

    In the paper, Qin and Dai (Quantum Inf Process 14:4237-4244, 2015) proposed a proactive quantum secret sharing scheme. We study the security of the proposed scheme and find that it is not secure. In the distribution phase of the proposed scheme, two dishonest participants may collaborate to eavesdrop the secret of the dealer without introducing any error.

  17. Aviation Security: Background and Policy Options for Screening and Securing Air Cargo

    DTIC Science & Technology

    2008-02-25

    today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security

  18. 33 CFR 103.520 - Recordkeeping.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 103.520 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.520 Recordkeeping. (a) All records pertaining to the Area Maritime Security (AMS) Assessment and AMS Plan will be retained by...

  19. 33 CFR 103.400 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.400 General. (a) The Area Maritime Security (AMS) Committee will ensure that a risk based AMS Assessment, is completed and meets the...

  20. Cloud computing security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shin, Dongwan; Claycomb, William R.; Urias, Vincent E.

    Cloud computing is a paradigm rapidly being embraced by government and industry as a solution for cost-savings, scalability, and collaboration. While a multitude of applications and services are available commercially for cloud-based solutions, research in this area has yet to fully embrace the full spectrum of potential challenges facing cloud computing. This tutorial aims to provide researchers with a fundamental understanding of cloud computing, with the goals of identifying a broad range of potential research topics, and inspiring a new surge in research to address current issues. We will also discuss real implementations of research-oriented cloud computing systems for bothmore » academia and government, including configuration options, hardware issues, challenges, and solutions.« less

  1. Meta-analysis of individual registry results enhances international registry collaboration.

    PubMed

    Paxton, Elizabeth W; Mohaddes, Maziar; Laaksonen, Inari; Lorimer, Michelle; Graves, Stephen E; Malchau, Henrik; Namba, Robert S; Kärrholm, John; Rolfson, Ola; Cafri, Guy

    2018-03-28

    Background and purpose - Although common in medical research, meta-analysis has not been widely adopted in registry collaborations. A meta-analytic approach in which each registry conducts a standardized analysis on its own data followed by a meta-analysis to calculate a weighted average of the estimates allows collaboration without sharing patient-level data. The value of meta-analysis as an alternative to individual patient data analysis is illustrated in this study by comparing the risk of revision of porous tantalum cups versus other uncemented cups in primary total hip arthroplasties from Sweden, Australia, and a US registry (2003-2015). Patients and methods - For both individual patient data analysis and meta-analysis approaches a Cox proportional hazard model was fit for time to revision, comparing porous tantalum (n = 23,201) with other uncemented cups (n = 128,321). Covariates included age, sex, diagnosis, head size, and stem fixation. In the meta-analysis approach, treatment effect size (i.e., Cox model hazard ratio) was calculated within each registry and a weighted average for the individual registries' estimates was calculated. Results - Patient-level data analysis and meta-analytic approaches yielded the same results with the porous tantalum cups having a higher risk of revision than other uncemented cups (HR (95% CI) 1.6 (1.4-1.7) and HR (95% CI) 1.5 (1.4-1.7), respectively). Adding the US cohort to the meta-analysis led to greater generalizability, increased precision of the treatment effect, and similar findings (HR (95% CI) 1.6 (1.4-1.7)) with increased risk of porous tantalum cups. Interpretation - The meta-analytic technique is a viable option to address privacy, security, and data ownership concerns allowing more expansive registry collaboration, greater generalizability, and increased precision of treatment effects.

  2. Sharing the Wonder of Gravitational Waves

    NASA Astrophysics Data System (ADS)

    Key, Joey Shapiro; LIGO Scientific Collaboration; Virgo Collaboration

    2017-01-01

    To share as widely as possible the excitement of the new discovery of gravitational waves, scientists in the LIGO Scientific Collaboration (LSC) and Virgo Collaboration prepared communication tools for a worldwide and diverse audience. This work included resources for traditional and social media outlets, preparing to engage at a wide range of levels and interests. The response to the LIGO discovery announcement indicated that the public is eager to engage with frontier physics. The LSC and Virgo outreach efforts hold lessons for broad STEM outreach including examples of citizen science initiatives and art +science collaboration as a way to inspire and engage a wide range of audiences.

  3. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the air operations area (AOA). 1542...

  4. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the air operations area (AOA). 1542...

  5. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the air operations area (AOA). 1542...

  6. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the air operations area (AOA). 1542...

  7. 49 CFR 1542.203 - Security of the air operations area (AOA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the air operations area (AOA). 1542...

  8. Preventing infant abductions: an infant security program transitioned into an interdisciplinary model.

    PubMed

    Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann

    2012-01-01

    Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.

  9. Feasibility of Wide-Area Decontamination of Bacillus anthracis Spores Using a Germination-Lysis Approach

    DTIC Science & Technology

    2011-11-16

    Security, LLC 2011 CBD S& T Conference November 16, 2011 LLNL-PRES-508394 Lawrence Livermore National Laboratory LLNL-PRES-  Background...PRES-  Gruinard Island 5% formaldehyde  Sverdlosk Release UNKNOWN: but washing, chloramines , soil disposal believed to have been used...508394 Lawrence Livermore National Laboratory LLNL-PRES- 4 Disinfectant >6 Log Reduction on Materials (EPA, 2010a,b; Wood et al., 2011

  10. Cooperative Autonomous Robots for Reconnaissance

    DTIC Science & Technology

    2009-03-06

    REPORT Cooperative Autonomous Robots for Reconnaissance 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Collaborating mobile robots equipped with WiFi ...Cooperative Autonomous Robots for Reconnaissance Report Title ABSTRACT Collaborating mobile robots equipped with WiFi transceivers are configured as a mobile...equipped with WiFi transceivers are configured as a mobile ad-hoc network. Algorithms are developed to take advantage of the distributed processing

  11. 75 FR 28319 - Thirteenth Meeting: EUROCAE WG-72: RTCA Special Committee 216: Aeronautical Systems Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... for collaboration or joint work. ED204-SG4: Review the SOW of both groups, determine if full or partly... the expectations of the audience well understood? How will the work progress, fully joint, partly... Publication (separate in ED210 or integrated). 11:00 to 11:15: Break. 11:15 to 11:30: Discuss collaboration...

  12. 75 FR 16901 - Thirteenth Meeting: EUROCAE WG-72: RTCA Special Committee 216: Aeronautical Systems Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... basis for collaboration or joint work. ED204-SG4: Review the SOW of both groups, determine if full or... the expectations of the audience well understood? How will the work progress, fully joint, partly... Publication (separate in ED210 or integrated). 11:00 to 11:15: Break. 11:15 to 11:30: Discuss collaboration...

  13. The Role of Police Officers in Elementary and Secondary Schools: Implications for Police-School Social Work Collaboration

    ERIC Educational Resources Information Center

    Patterson, George T.

    2007-01-01

    Collaborations between law enforcement agencies and elementary and secondary schools focus on the provision of education to students, the safety and security of school property, and public relations efforts aimed at changing youths' attitudes toward the police both inside and outside of schools. The use of police officers in school settings…

  14. 18 CFR 33.1 - Applicability, definitions, and blanket authorizations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... transactions between affiliated companies, value means market value if the securities are widely traded, in... securities are being traded at the time the transaction occurs; if the securities are not widely traded... Office of the Comptroller of the Currency, under the Bank Holding Company Act of 1956 as amended by the...

  15. How to Receive More Funding for Your Research? Get Connected to the Right People!

    PubMed

    Ebadi, Ashkan; Schiffauerova, Andrea

    2015-01-01

    Funding has been viewed in the literature as one of the main determinants of scientific activities. Also, at an individual level, securing funding is one of the most important factors for a researcher, enabling him/her to carry out research projects. However, not everyone is successful in obtaining the necessary funds. The main objective of this work is to measure the effect of several important factors such as past productivity, scientific collaboration or career age of researchers, on the amount of funding that is allocated to them. For this purpose, the paper estimates a temporal non-linear multiple regression model. According to the results, although past productivity of researchers positively affects the funding level, our findings highlight the significant role of networking and collaboration. It was observed that being a member of large scientific teams and getting connected to productive researchers who have also a good control over the collaboration network and the flow of information can increase the chances for securing more money. In fact, our results show that in the quest for the research money it is more important how researchers build their collaboration network than what publications they produce and whether they are cited.

  16. How to Receive More Funding for Your Research? Get Connected to the Right People!

    PubMed Central

    Ebadi, Ashkan; Schiffauerova, Andrea

    2015-01-01

    Funding has been viewed in the literature as one of the main determinants of scientific activities. Also, at an individual level, securing funding is one of the most important factors for a researcher, enabling him/her to carry out research projects. However, not everyone is successful in obtaining the necessary funds. The main objective of this work is to measure the effect of several important factors such as past productivity, scientific collaboration or career age of researchers, on the amount of funding that is allocated to them. For this purpose, the paper estimates a temporal non-linear multiple regression model. According to the results, although past productivity of researchers positively affects the funding level, our findings highlight the significant role of networking and collaboration. It was observed that being a member of large scientific teams and getting connected to productive researchers who have also a good control over the collaboration network and the flow of information can increase the chances for securing more money. In fact, our results show that in the quest for the research money it is more important how researchers build their collaboration network than what publications they produce and whether they are cited. PMID:26222598

  17. Care control and collaborative working in a prison hospital.

    PubMed

    Foster, John; Bell, Linda; Jayasinghe, Neil

    2013-03-01

    This paper reports findings from a qualitative research project, using interviews, focus groups and participant observations, which sought to investigate "good practice" in a nurse-led prison hospital wing for male prisoners. The study raised issues about tensions between "caring" and "control" of prisoners from the perspectives of professionals working or visiting the wing. This paper discusses collaborative working between professionals from different backgrounds, including nurses and healthcare (prison) officers who were based on the wing and others who visited such as probation, medical, Inreach team or Counselling Advice, Referral, Assessment and Through Care team staff (CARAT). The key finding was that there is a balance between therapy and security/risk. In order to maintain this, the two main groups based on the hospital wing--nurses and prison officers--moved between at times cooperating, coordinating and collaborating with each other to maintain this balance. Other themes were care and control, team working, individual and professional responsibilities and communication issues. Enhancing the role of nurses should be encouraged so that therapy remains paramount, and we conclude with some recommendations to encourage collaborative working in prison healthcare settings to ensure that therapy continues to be paramount while security and safety are maintained.

  18. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    DTIC Science & Technology

    2014-12-01

    Press, 2010), Kindle edition. 35 Peter H. Diamandis and Steven Kotler , Abundance: The Future Is Better than You Think (New York: Free Press, 2012...Diamandis and Kotler , Abundance: The Future Is Better Than You Think, 6. 116 Maeve Duggan and Aaron Smith, “Social Media Update 2013,” Pew Research Center...Committee on Homeland Security and Governmental Affairs of the U.S. Senate). 298 Philip J. Palin, “Perspectives on Preparedness: Nudging Us Forward a

  19. Using a student-faculty collaborative learning model to teach grant development in graduate nursing education.

    PubMed

    Falk, Nancy L; Phillips, Kathleen M; Hymer, Regina; Acquaviva, Kimberly D; Schumann, Mary Jean

    2014-05-01

    Graduate nurses are employed in clinical, research, educational, and policy roles. As leaders, they are expected to develop and sustain projects that support translating research to practice and policy. Funding to support initiatives is tight and requires innovative solutions to cover salaries, benefits, equipment purchases, and other program expenses. In an effort to teach grant writing while developing skilled leaders who are effective and competitive in securing funds, the George Washington University School of Nursing offers a graduate-level grant writing course. In the summer of 2011, a collaborative learning model was developed within the course. The joint approach was foundational to securing an Agency for Healthcare Research and Quality grant to support development and implementation of a patient engagement project by the Nursing Alliance for Quality Care. This article describes the project and offers hints for those seeking to develop a collaborative educational experience that affords new leadership skills for RNs from all backgrounds. Copyright 2014, SLACK Incorporated.

  20. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

    PubMed

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S Cenk; Shimizu, Chisato; Burns, Jane C; Wright, Victoria J; Png, Eileen; Hibberd, Martin L; Lloyd, David D; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-03-15

    We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. To demonstrate PRINCESS' performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). https://github.com/achenfengb/PRINCESS_opensource. shw070@ucsd.edu. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    B. Gardiner; L.Graton; J.Longo

    Classified removable electronic media (CREM) are tracked in several different ways at the Laboratory. To ensure greater security for CREM, we are creating a single, Laboratory-wide system to track CREM. We are researching technology that can be used to electronically tag and detect CREM, designing a database to track the movement of CREM, and planning to test the system at several locations around the Laboratory. We focus on affixing ''smart tags'' to items we want to track and installing gates at pedestrian portals to detect the entry or exit of tagged items. By means of an enterprise database, the systemmore » will track the entry and exit of tagged items into and from CREM storage vaults, vault-type rooms, access corridors, or boundaries of secure areas, as well as the identity of the person carrying an item. We are considering several options for tracking items that can give greater security, but at greater expense.« less

  2. I-WASTE: EPA's Suite of Homeland Security Decision Support ...

    EPA Pesticide Factsheets

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies. A significant component of responding to and recovering from wide-area or isolated events, whether natural, accidental, or intentional, is the management of waste resulting from the incident itself or from activities cleaning up after the incident. To facilitate the proper management of incident-derived waste, EPA developed the Incident Waste Assessment and Tonnage Estimator (I-WASTE). I-WASTE was developed by the U.S. EPA’s Homeland Security Research Program in partnership with EPA program and regional offices, other U.S. government agencies, industry, and state and local emergency response programs. Presenting the disaster waste tool at the ORD Tools Café held in EPA Region 7th on Dec 9th.

  3. GEOGLAM Crop Assessment Tool: Adapting from global agricultural monitoring to food security monitoring

    NASA Astrophysics Data System (ADS)

    Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.

    2014-12-01

    The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.

  4. 19 CFR 122.181 - Definition of Customs security area.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition of Customs security area. For purposes of this section, the term “Customs security area” means the Federal...

  5. Collaborative Design of World Wide Web Pages: A Case Study.

    ERIC Educational Resources Information Center

    Andrew, Paige G; Musser, Linda R.

    1997-01-01

    This case study of the collaborative design of an earth science World Wide Web page at Pennsylvania State University highlights the role of librarians. Discusses the original Web site and links, planning, the intended audience, and redesign and recommended changes; and considers the potential contributions of librarians. (LRW)

  6. Community-Level Collaboration for Substance Abuse Prevention.

    ERIC Educational Resources Information Center

    Stevenson, John F.; Mitchell, Roger E.

    2003-01-01

    Reviews the literature on the roles of community-wide collaboration in substance abuse prevention. Three broad strategies through which collaboration may have its effects are identified. Alternative theories of effects, means of measurement, and results and conclusions from studies of collaborative interventions for prevention are discussed.…

  7. The Enterprise 2.0 Concept: Challenges on Data and Information Security

    NASA Astrophysics Data System (ADS)

    Silva, Ana; Moreira, Fernando; Varajão, João

    The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.

  8. Trusted Data Sharing and Imagery Workflow for Disaster Response in Partnership with the State of California

    NASA Astrophysics Data System (ADS)

    Glasscoe, M. T.; Aubrey, A. D.; Rosinski, A.; Morentz, J.; Beilin, P.; Jones, D.

    2016-12-01

    Providing actionable data for situational awareness following an earthquake or other disaster is critical to decision makers in order to improve their ability to anticipate requirements and provide appropriate resources for response. Key information on the nature, magnitude and scope of damage, or Essential Elements of Information (EEI), necessary to achieve situational awareness are often generated from a wide array of organizations and disciplines, using any number of geospatial and non-geospatial technologies. We have worked in partnership with the California Earthquake Clearinghouse to develop actionable data products for use in their response efforts, particularly in regularly scheduled, statewide exercises like the recent 2016 Cascadia Rising NLE, the May 2015 Capstone/SoCal NLE/Ardent Sentry Exercises and in the August 2014 South Napa earthquake activation and plan to participate in upcoming exercises with the National Guard (Vigilant Guard 17) and the USGS (Haywired). Our efforts over the past several years have been to aid in enabling coordination between research scientists, applied scientists and decision makers in order to reduce duplication of effort, maximize information sharing, translate scientific results into actionable information for decision-makers, and increase situational awareness. We will present perspectives on developing tools for decision support and data discovery in partnership with the Clearinghouse. Products delivered include map layers as part of the common operational data plan for the Clearinghouse delivered through XchangeCore Web Service Data Orchestration and the SpotOnResponse field analysis application. We are exploring new capabilities for real-time collaboration using GeoCollaborate®. XchangeCore allows real-time, two-way information sharing, enabling users to create merged datasets from multiple providers; SpotOnResponse provides web-enabled secure information exchange, collaboration, and field analysis for responders; and GeoCollaborate® enables users to access, share, manipulate, and interact across disparate platforms, connecting public and private sector agencies and organizations rapidly on the same map at the same time, allowing improved collaborative decision making on the same datasets simultaneously.

  9. Protecting Sensitive Information in Directory Services Using Virtual Directories

    NASA Astrophysics Data System (ADS)

    Claycomb, William; Shin, Dongwan

    Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  12. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  13. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  14. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  15. Collaborating to optimize nursing students' agency information technology use.

    PubMed

    Fetter, Marilyn S

    2009-01-01

    As the learning laboratory for gaining actual patient care experience, clinical agencies play an essential role in nursing education. With an information technology revolution transforming healthcare, nursing programs are eager for their students to learn the latest informatics systems and technologies. However, many healthcare institutions are struggling to meet their own information technology needs and report limited resources and other as barriers to nursing student training. In addition, nursing students' information technology access and use raise security and privacy concerns. With the goal of a fully electronic health record by 2014, it is imperative that agencies and educational programs collaborate. They need to establish educationally sound, cost-effective, and secure policies and procedures for managing students' use of information technology systems. Strategies for evaluating options, selecting training methods, and ensuring data security are shared, along with strategies that may reap clinical, economic, and educational benefits. Students' information technology use raises numerous issues that the nursing profession must address to participate in healthcare's transformation into the digital age.

  16. Establishing a Global Radiation Oncology Collaboration in Education (GRaCE): Objectives and priorities.

    PubMed

    Turner, Sandra; Eriksen, Jesper G; Trotter, Theresa; Verfaillie, Christine; Benstead, Kim; Giuliani, Meredith; Poortmans, Philip; Holt, Tanya; Brennan, Sean; Pötter, Richard

    2015-10-01

    Representatives from countries and regions world-wide who have implemented modern competency-based radiation- or clinical oncology curricula for training medical specialists, met to determine the feasibility and value of an ongoing international collaboration. In this forum, educational leaders from the ESTRO School, encompassing many European countries adopting the ESTRO Core Curriculum, and clinician educators from Canada, Denmark, the United Kingdom, Australia and New Zealand considered the training and educational arrangements within their jurisdictions, identifying similarities and challenges between programs. Common areas of educational interest and need were defined, which included development of new competency statements and assessment tools, and the application of the latter. The group concluded that such an international cooperation, which might expand to include others with similar goals, would provide a valuable vehicle to ensure training program currency, through sharing of resources and expertise, and enhance high quality radiation oncology education. Potential projects for the Global Radiation Oncology Collaboration in Education (GRaCE) were agreed upon, as was a strategy designed to maintain momentum. This paper describes the rationale for establishing this collaboration, presents a comparative view of training in the jurisdictions represented, and reports early goals and priorities. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  17. Evaluation of Roadmap to Achieve Energy Delivery Systems Cybersecurity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.

    The Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) Cybersecurity for Energy Delivery Systems (CEDS) program is currently evaluating the Roadmap to Achieve Energy Delivery Systems Cybersecurity document that sets a vision and outlines a set of milestones. The milestones are divided into five strategic focus areas that include: 1. Build a Culture of Security; 2. Assess and Monitor Risk; 3. Develop and Implement New Protective Measures to Reduce Risk; 4. Manage Incidents; and 5. Sustain Security Improvements. The most current version of the roadmap was last updated in September of 2016. Sandia National Laboratories (SNL) has beenmore » tasked with revisiting the roadmap to update the current state of energy delivery systems cybersecurity protections. SNL is currently working with previous and current partners to provide feedback on which of the roadmap milestones have been met and to identify any preexisting or new gaps that are not addressed by the roadmap. The specific focus areas SNL was asked to evaluate are: 1. Develop and Implement New Protective Measures to Reduce Risk and 2. Sustain Security Improvements. SNL has formed an Industry Advisory Board (IAB) to assist in answering these questions. The IAB consists of previous partners on past CEDS funded efforts as well as new collaborators that have unique insights into the current state of cybersecurity within energy delivery systems. The IAB includes asset owners, utilities and vendors of control systems. SNL will continue to maintain regular communications with the IAB to provide various perspectives on potential future updates to further improve the breadth of cybersecurity coverage of the roadmap.« less

  18. Web Service Execution and Monitoring in Integrated Applications in Support of Business Communities

    NASA Astrophysics Data System (ADS)

    Chiriacescu, Rares M.; SzóKe, Alexandru; Portase, Sorin; Florea, Monica

    Emerging technology is one of the key factors that drive the business world to faster adaptation, reaction and shorter communication path. Building upon such technologies, business communities emerge, geared toward high flexibility in their offerings and collaboration: business-to-customer and business-to-business collaborations. Adapting to the market requirements, companies must address several technical challenges that arise from the main requirements of the system they have to introduce: a high degree of flexibility, heterogeneous system collaboration and security of the transferred data.

  19. Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment

    PubMed Central

    Rabadan, Jose; Perez-Jimenez, Rafael

    2017-01-01

    Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. PMID:29186184

  20. Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment.

    PubMed

    Marin-Garcia, Ignacio; Chavez-Burbano, Patricia; Guerra, Victor; Rabadan, Jose; Perez-Jimenez, Rafael

    2017-01-01

    Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks.

  1. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  2. Enabling Outcomes for Students with Developmental Disabilities through Collaborative Consultation

    ERIC Educational Resources Information Center

    Villeneuve, Michelle; Hutchinson, Nancy L.

    2012-01-01

    Collaborative consultation has been widely adopted in school-based occupational therapy practice; however, limited research has examined how collaboration between educators and occupational therapists contributes to students' outcomes. The purpose of this study was to describe the nature of collaborative working in two cases of school-based…

  3. Eagle Racing: Addressing Corporate Collaboration Challenges through an Online Simulation Game

    ERIC Educational Resources Information Center

    Angehrn, Albert A.; Maxwell, Katrina

    2009-01-01

    Effective collaboration is necessary for corporation-wide learning, knowledge exchange, and innovation. However, it is difficult to create a corporate culture that encourages collaboration; the complexity of such collaboration is increased substantially by the diverse and distributed nature of knowledge sources and decision makers in the global…

  4. University Industry Collaboration and Graduates' Unemployment in Ondo State, Nigeria

    ERIC Educational Resources Information Center

    Adepoju, O. O.; Adedeji, A. O

    2015-01-01

    Research evidence shows that university industry collaboration presents a wide range of benefits to industries, higher institutions, and to the development of a nation. This study investigated the existence of university industry collaboration, the factors militating against the collaboration, and the extent to which university industry…

  5. Developing human functioning and rehabilitation research. Part II: Interdisciplinary university centers and national and regional collaboration networks.

    PubMed

    Stucki, Gerold; Celio, Marco

    2007-05-01

    There is a strong movement towards interdisciplinary research around common and scientifically competitive themes, both at universities and at the national and regional level. Human functioning and rehabilitation is a new, highly innovative and relevant theme. It has the potential to attract researchers from a wide range of disciplines, institutions and organizations. It is thus of interest for universities seeking to embark upon a new and unique research area. Similarly, it is a promising theme for individual researchers, institutions and organizations aiming to develop a national or regional collaboration network for interdisciplinary research. Human functioning and rehabilitation complements established themes from the biomedical perspective. In the context of the life sciences, it can be seen as an extension of the biosciences towards a comprehensive understanding of human life, including human interaction and communication, against the background of the natural and social environment. Based on a better understanding of human functioning and disability, there is a wide range of largely unexplored possibilities to optimize populations' functioning and minimize persons' experience of disability in the presence of a health condition. Rehabilitation research is uniquely positioned to integrate and translate scientific advances into benefits for people and the society. Rehabilitation research from the comprehensive perspective can thus become a catalyst of interdisciplinary research that crosses the boundaries of the natural sciences and engineering research, the human and behavioral sciences, the social sciences and a wide range of related scientific areas. Rehabilitation research is also uniquely positioned to cross the boundaries of medicine and the health sector at large, and to translate knowledge across sectors including education, labor and social affairs.

  6. Project UNITY: Cross Domain Visualization Collaboration

    NASA Astrophysics Data System (ADS)

    Moore, J.; Havig, P.

    UNITY is an International Cooperative Research and Development (ICR&D) project between the United States and Great Britain under the Research and Development Projects (RDP) Memorandum of Agreement (MOA). UNITYs objectives are to develop and evaluate the operational concepts and requirements for undertaking combined operations: a) pursuant to the interests of mission partners, b) develop, experiment, and demonstrate, transitionable emergent technologies, capabilities, or concepts, which facilitate the sharing of information and products between mission partners, and c) identify and define additional emerging technologies that may need to be developed to support current and future military information sharing. Collaboration between coalition partners is essentially for accurate and timely decision making in the ever increasing nature and tempo of global security. The purpose for this project is to develop engineering solutions in order to further investigate the human factors issues that arise while sharing information in a collaborative environment where security is an issue. The biggest difference between existing available solutions are in the presentation and interaction with the interface on both ends of the collaboration in order to preserve the expressed intent of shared situation awareness while also enabling markups and content on one screen that the other collaborator does not see and vice versa. The UNITY project stresses collaboration differently than all known realtime collaboration software in production, aka groupware, on the market today. The tradition of What You See Is What I See (WYSIWIS) as in typical implementations of shared whiteboards simply do not address the need for local and private information to be displayed in context with shareable data. This paper addresses the concerns, problems, and some solutions for shared 3D visualization and 2D tabular visualizations which are explored and presented within the space situation awareness problem set.

  7. Meeting EHR security requirements: SeAAS approach.

    PubMed

    Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian

    2010-01-01

    In the last few years, Electronic Health Record (EHR) systems have received a great attention in the literature, as well as in the industry. They are expected to lead to health care savings, increase health care quality and reduce medical errors. This interest has been accompanied by the development of different standards and frameworks to meet EHR challenges. One of the most important initiatives that was developed to solve problems of EHR is IHE (Integrating the Healthcare Enterprise), which adapts the distributed approach to store and manage healthcare data. IHE aims at standardizing the way healthcare systems exchange information in distributed environments. For this purpose it defines several so called Integration Profiles that specify the interactions and the interfaces (Transactions) between various healthcare systems (Actors) or entities. Security was considered also in few profiles that tackled the main security requirements, mainly authentication and audit trails. The security profiles of IHE currently suffer two drawbacks. First, they apply end point security methodology, which has been proven recently to be insufficient and cumbersome in distributed and heterogeneous environment. Second, the current security profiles for more complex security requirements are oversimplified, vague and do not consider architectural design. This recently changed to some extend e.g., with the introduction of newly published white papers regarding privacy [5] and access control [9]. In order to solve the first problem we utilize results of previous studies conducted in the area of security-aware IHE-based systems and the state-of-the-art Security-as-a-Service approach as a convenient methodology to group domain-wide security needs and overcome the end point security shortcomings.

  8. The Preparedness Web: Utilizing Regional Collaborative Networks for Homeland Security Preparedness

    DTIC Science & Technology

    2007-09-01

    Hughes’ conflict strategies could then be used to develop methodologies for improved conflict management . 45 D. ORGANIZATIONAL CHANGE Emergency...has training in place to develop collaborative skills (e.g., conflict management , team process skills). * 2.3 (0.7) * 4 point scale; 1...included (a) knowledge of other agencies’ capabilities, (b) communication, (c) inter-agency trust and respect, and (d) conflict management . Further

  9. Enabling Security, Stability, Transition, and Reconstruction Operations through Knowledge Management

    DTIC Science & Technology

    2009-03-18

    strategy. Overall, the cultural barriers to knowledge sharing center on knowledge creation and capture. The primary barrier to knowledge sharing is lack ... Lacking a shared identity decreases the likelihood of knowledge sharing, which is essential to effective collaboration.84 Related to collaboration...to adapt, develop, and change based on experience-derived knowledge.90 A second cultural barrier to knowledge acquisition is the lack receptiveness

  10. Preclinical Mouse Models of Neurofibromatosis

    DTIC Science & Technology

    2004-10-01

    collaborated closely and have shared expertise and reagents extensively. This NF Consortium is a member of the Moue Models of Human Cancer Consortium...of the National Cancer Institute and is participating fully in the activities of the group. The current award will support these collaborative...studies through 2005. 14. SUBJECT TERMS 15. NUMBER OF PAGES Neurofibromatosis, cancer , mouse models 48 16. PRICE CODE 17. SECURITY CLASSIFICATION 78

  11. Using the Internet in Middle Schools: A Model for Success. A Collaborative Effort between Los Alamos National Laboratory (LANL) and Los Alamos Middle School (LAMS).

    ERIC Educational Resources Information Center

    Addessio, Barbara K.; And Others

    Los Alamos National Laboratory (LANL) developed a model for school networking using Los Alamos Middle School as a testbed. The project was a collaborative effort between the school and the laboratory. The school secured administrative funding for hardware and software; and LANL provided the network architecture, installation, consulting, and…

  12. Bonding with the Nuclear Industry: A Technical Communication Professor and His Students Partner With Y-12 National Security Complex

    ERIC Educational Resources Information Center

    Hirst, Russel

    2016-01-01

    This article describes how a special kind of academe-industry collaboration--based on a joint appointment agreement between a university and an industry site--was set up, promoted, and experienced by a professor of technical communication and his student interns. To illustrate the nature and value of this kind of collaboration, the article…

  13. 49 CFR 1540.5 - Terms used in this subchapter.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... within a secured area or SIDA. Exclusive area means any portion of a secured area, AOA, or SIDA... Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in... present without an escort in, secured areas and SIDA's of airports. Unescorted access to cargo means the...

  14. GIS INTERNET MAP SERVICE FOR DISPLAYING SELENIUM CONTAMINATION DATA IN THE SOUTHEASTERN IDAHO PHOSPHATE MINING RESOURCE AREA

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roger Mayes; Sera White; Randy Lee

    2005-04-01

    Selenium is present in waste rock/overburden that is removed during phosphate mining in southeastern Idaho. Waste rock piles or rock used during reclamation can be a source of selenium (and other metals) to streams and vegetation. Some instances (in 1996) of selenium toxicity in grazing sheep and horses caused public health and environmental concerns, leading to Idaho Department of Environmental Quality (DEQ) involvement. The Selenium Information System Project is a collaboration among the DEQ, the United States Forest Service (USFS), the Bureau of Land Management (BLM), the Idaho Mining Association (IMA), Idaho State University (ISU), and the Idaho National Laboratorymore » (INL)2. The Selenium Information System is a centralized data repository for southeastern Idaho selenium data. The data repository combines information that was previously in numerous agency, mining company, and consultants’ databases and web sites. These data include selenium concentrations in soil, water, sediment, vegetation and other environmental media, as well as comprehensive mine information. The Idaho DEQ spearheaded a selenium area-wide investigation through voluntary agreements with the mining companies and interagency participants. The Selenium Information System contains the results of that area-wide investigation, and many other background documents. As studies are conducted and remedial action decisions are made the resulting data and documentation will be stored within the information system. Potential users of the information system are agency officials, students, lawmakers, mining company personnel, teachers, researchers, and the general public. The system, available from a central website, consists of a database that contains the area-wide sampling information and an ESRI ArcIMS map server. The user can easily acquire information pertaining to the area-wide study as well as the final area-wide report. Future work on this project includes creating custom tools to increase the simplicity of the website and increasing the amount of information available from site-specific studies at 15 mines.« less

  15. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less

  16. Simulation studies of a wide area health care network.

    PubMed Central

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  17. 2008 Homeland Security S and T Stakeholders Conference West-Volume 3 Tuesday

    DTIC Science & Technology

    2008-01-16

    Architecture ( PNNL SRS) • Online data collection / entry • Data Warehouse • On Demand Analysis and Reporting Tools • Reports, Charts & Graphs • Visual / Data...Sustainability 2007– 2016 Our region wide investment include all PANYNJ business areas Computer Statistical Analysis COMPSTAT •NYPD 1990’s •Personnel Management...Coast Guard, and public health Expertise, Depth, Agility Staff Degrees 6 Our Value Added Capabilities • Risk Analysis • Operations Analysis

  18. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

    PubMed Central

    Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.

    2016-01-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566

  19. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.

    PubMed

    Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M

    2016-07-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).

  20. Water Resource Management Mechanisms for Intrastate Violent Conflict Resolution: the Capacity Gap and What To Do About It.

    NASA Astrophysics Data System (ADS)

    Workman, M.; Veilleux, J. C.

    2014-12-01

    Violent conflict and issues surrounding available water resources are both global problems and are connected. Violent conflict is increasingly intrastate in nature and coupled with increased hydrological variability as a function of climate change, there will be increased pressures on water resource use. The majority of mechanisms designed to secure water resources are often based on the presence of a governance framework or another type of institutional capacity, such as offered through a supra- or sub-national organization like the United Nations or a river basin organization. However, institutional frameworks are not present or loose functionality during violent conflict. Therefore, it will likely be extremely difficult to secure water resources for a significant proportion of populations in Fragile and Conflict Affected States. However, the capacity in Organisation for Economic Co-operation and Development nations for the appropriate interventions to address this problem is reduced by an increasing reluctance to participate in interventionist operations following a decade of expeditionary warfighting mainly in Iraq and Afghanistan, and related defence cuts. Therefore, future interventions in violent conflict and securing water resources may be more indirect in nature. This paper assesses the state of understanding key areas in the present literature and highlights the gap of securing water resources during violent conflict in the absence of institutional capacity. There is a need to close this gap as a matter of urgency by formulating frameworks to assess the lack of institutional oversight / framework for water resources in areas where violent conflict is prevalent; developing inclusive resource management platforms through transparency and reconciliation mechanisms; and developing endogenous confidence-building measures and evaluate how these may be encouraged by exogenous initiatives including those facilitated by the international community. This effort will require the development of collaborations between academic, NGO sectors, and national aid agencies in order to allow the development of the appropriate tools, understanding in a broad range of contexts, and the mechanisms that can be brought to bear to address this increasingly important area.

  1. Managing the Aviation Insider Threat

    DTIC Science & Technology

    2010-12-01

    World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal

  2. Scaling the PuNDIT project for wide area deployments

    NASA Astrophysics Data System (ADS)

    McKee, Shawn; Batista, Jorge; Carcassi, Gabriele; Dovrolis, Constantine; Lee, Danny

    2017-10-01

    In today’s world of distributed scientific collaborations, there are many challenges to providing reliable inter-domain network infrastructure. Network operators use a combination of active monitoring and trouble tickets to detect problems, but these are often ineffective at identifying issues that impact wide-area network users. Additionally, these approaches do not scale to wide area inter-domain networks due to unavailability of data from all the domains along typical network paths. The Pythia Network Diagnostic InfrasTructure (PuNDIT) project aims to create a scalable infrastructure for automating the detection and localization of problems across these networks. The project goal is to gather and analyze metrics from existing perfSONAR monitoring infrastructures to identify the signatures of possible problems, locate affected network links, and report them to the user in an intuitive fashion. Simply put, PuNDIT seeks to convert complex network metrics into easily understood diagnoses in an automated manner. We present our progress in creating the PuNDIT system and our status in developing, testing and deploying PuNDIT. We report on the project progress to-date, describe the current implementation architecture and demonstrate some of the various user interfaces it will support. We close by discussing the remaining challenges and next steps and where we see the project going in the future.

  3. Collaboration in Art Education.

    ERIC Educational Resources Information Center

    McCoubrey, Sharon, Ed.

    2000-01-01

    Educators are familiar with working together to produce curriculum packages, to team teach a unit, to host a parent event, to put on a school-wide concert, or to plan a conference. Collaboration in art education as presented in this publication is a team effort that is slightly different and beyond ordinary collaboration. Collaborative art-making…

  4. The Effects of a Creative Commons Approach on Collaborative Learning

    ERIC Educational Resources Information Center

    Liu, Chen-Chung; Tao, Shu-Yuan; Chen, Wei-Hung; Chen, Sherry Y.; Liu, Baw-Jhiune

    2013-01-01

    Social media on the World Wide Web, such as Wiki, are increasingly applied to support collaborative learning for students to conduct a project together. However, recent studies indicated that students, learning in the collaborative project, may not actively contribute to the collaborative work and are involved only in a limited level of positive…

  5. Professional Learning: A Collaborative Model for Online Teaching and Development

    ERIC Educational Resources Information Center

    Bowser, Audrey; Davis, Kimberley; Singleton, Jacques; Small, Topeka

    2017-01-01

    This article examined a unique collaborative initiative between a team of graduate level faculty to improve the quality of course development and delivery using a collaborative review process. The collaborative review of teaching has become a widely accepted means for assuring quality distance learning coursework and for the purpose of evaluating…

  6. An Overview of Web-Based School Collaboration: A History of Success or Failure?

    ERIC Educational Resources Information Center

    Gouseti, Anastasia

    2013-01-01

    The notion of school collaboration has become widely recognised as an effective means of fostering cultural links and supporting communication between geographically separated schools. As shall be acknowledged in this paper, school collaboration follows on from a long history of collaborative initiatives across the past 50 years. However, the…

  7. Handheld THz security imaging

    NASA Astrophysics Data System (ADS)

    Duling, Irl N.

    2016-05-01

    Terahertz energy, with its ability to penetrate clothing and non-conductive materials, has held much promise in the area of security scanning. Millimeter wave systems (300 GHz and below) have been widely deployed. These systems have used full two-dimensional surface imaging, and have resulted in privacy concerns. Pulsed terahertz imaging, can detect the presence of unwanted objects without the need for two-dimensional photographic imaging. With high-speed waveform acquisition it is possible to create handheld tools that can be used to locate anomalies under clothing or headgear looking exclusively at either single point waveforms or cross-sectional images which do not pose a privacy concern. Identification of the anomaly to classify it as a potential threat or a benign object is also possible.

  8. 75 FR 10300 - South Texas Area Maritime Security (STAMS) Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0074] South Texas Area Maritime Security... notice requests individuals interested in serving on the South Texas Area Maritime Security (STAMS... Section 102 of the Maritime Transportation Security Act (MTSA) of 2002 (Pub. L. 107-295) added section...

  9. Esophageal cancer in high-risk areas of China: research progress and challenges.

    PubMed

    Lin, Yingsong; Totsuka, Yukari; Shan, Baoen; Wang, Chaochen; Wei, Wenqiang; Qiao, Youlin; Kikuchi, Shogo; Inoue, Manami; Tanaka, Hideo; He, Yutong

    2017-03-01

    The extremely high incidence of esophageal cancer in certain rural areas of China has prompted significant intellectual curiosity and research efforts both in China and abroad. We summarize the research progress over the past several decades in high-risk areas (Linxian, Cixian, Shexian, and Yanting) based on literature research and our field trip (2012-2013). Considerable progress in clarifying the environmental risk factors and pathogenesis of esophageal cancer in high-risk areas has been achieved over the past several decades. Epidemiologic evidence suggests that carcinogen exposure and nutritional deficiency, rather than smoking and drinking, may be the major risk factors for esophageal cancer in the Taihang Mountains region, where the incidence of esophageal cancer is among the highest in the world. Two genome-wide association studies have identified variants in PLCE1 at 10q23 that are significantly associated with esophageal cancer risk. Recent whole-exome studies have revealed a comprehensive mutation pattern, in which the C>T transition is the predominant mutation type. Despite extensive research, the main causative factors that contribute to esophageal cancer in high-risk areas have not yet been elucidated. Challenges in this research area include determining the causative role of nitrosamine, identifying other potential carcinogens, and conducting fruitful international collaborative studies based on a multidisciplinary approach. Increased international collaboration will contribute to a better understanding of the etiology of esophageal cancer. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. The Value of Doctrine for a Developing Organization

    DTIC Science & Technology

    2009-12-01

    increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security’s...CBP was created, the majority of the existing organization came from two legacy agencies, U.S. Customs and the Immigration and Naturalization Service...Collaboration, Merger, Trust, Customs And Border Protection, CBP 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY

  11. Shared Awareness in Times of Crisis: A Framework for Collaboration

    DTIC Science & Technology

    2011-06-01

    also affords a “ dashboard ” perspective allowing for centralization of resources. The U.S. Army’s Knowledge Online portal is one example of a single...labor, energy, materials, information, cash and technology into outputs of higher value • Organization’s values (criteria that managers and...follows: Challenges - Disabilities Inter-Organizational Cross-Organizational Privacy and Security high security (portal) blocks information flow Trust

  12. New developments in laser-heated diamond anvil cell with in situ synchrotron x-ray diffraction at High Pressure Collaborative Access Team

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meng, Yue; Hrubiak, Rostislav; Rod, Eric

    An overview of the in situ laser heating system at the High Pressure Collaborative Access Team, with emphasis on newly developed capabilities, is presented. Since its establishment at the beamline 16-ID-B a decade ago, laser-heated diamond anvil cell coupled with in situ synchrotron x-ray diffraction has been widely used for studying the structural properties of materials under simultaneous high pressure and high temperature conditions. Recent developments in both continuous-wave and modulated heating techniques have been focusing on resolving technical issues of the most challenging research areas. The new capabilities have demonstrated clear benefits and provide new opportunities in research areasmore » including high-pressure melting, pressure-temperature-volume equations of state, chemical reaction, and time resolved studies.« less

  13. Enablers and barriers to implementing collaborative care for anxiety and depression: a systematic qualitative review.

    PubMed

    Overbeck, Gritt; Davidsen, Annette Sofie; Kousgaard, Marius Brostrøm

    2016-12-28

    Collaborative care is an increasingly popular approach for improving quality of care for people with mental health problems through an intensified and structured collaboration between primary care providers and health professionals with specialized psychiatric expertise. Trials have shown significant positive effects for patients suffering from depression, but since collaborative care is a complex intervention, it is important to understand the factors which affect its implementation. We present a qualitative systematic review of the enablers and barriers to implementing collaborative care for patients with anxiety and depression. We developed a comprehensive search strategy in cooperation with a research librarian and performed a search in five databases (EMBASE, PubMed, PsycINFO, ProQuest, and CINAHL). All authors independently screened titles and abstracts and reviewed full-text articles. Studies were included if they were published in English and based on the original qualitative data on the implementation of a collaborative care intervention targeted at depression or anxiety in an adult patient population in a high-income country. Our subsequent analysis employed the normalization process theory (NPT). We included 17 studies in our review of which 11 were conducted in the USA, five in the UK, and one in Canada. We identified several barriers and enablers within the four major analytical dimensions of NPT. Securing buy-in among primary care providers was found to be critical but sometimes difficult. Enablers included physician champions, reimbursement for extra work, and feedback on the effectiveness of collaborative care. The social and professional skills of the care managers seemed critical for integrating collaborative care in the primary health care clinic. Day-to-day implementation was also found to be facilitated by the care managers being located in the clinic since this supports regular face-to-face interactions between physicians and care managers. The following areas require special attention when planning collaborative care interventions: effective educational programs, especially for care managers; issues of reimbursement in relation to primary care providers; good systems for communication and monitoring; and promoting face-to-face interaction between care managers and physicians, preferably through co-location. There is a need for well-sampled, in-depth qualitative studies on the implementation of collaborative care in settings outside the USA and the UK.

  14. Collaborations among Diverse Support Areas for Hybrid Success

    ERIC Educational Resources Information Center

    Haggar, Faye; Kelley, Bruce; Chen, Weichao

    2017-01-01

    Successful implementation of hybrid courses typically demands collaboration among diverse support areas on campus. This article examines these collaborations through the lens of Badrul Khan's theory of managing blended learning support. Also discussed is the central role that faculty developers can play in connecting these support areas to ensure…

  15. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering

    NASA Astrophysics Data System (ADS)

    Li, Fengjun; Luo, Bo; Liu, Peng; Squicciarini, Anna C.; Lee, Dongwon; Chu, Chao-Hsien

    Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.

  16. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    DTIC Science & Technology

    2004-06-01

    such as that represented in the know-how of the master craftsman), and cognitive (know why, perceptions, values, beliefs, and mental models).4... cognitive engineering, educational technology, industrial/organizational psychology, sociology, cultural anthropology, and computational...such as human-human interaction, interface design and evaluation methodology, cognitive models and user models, health and ergonomic studies, empirical

  17. Electronic health information system at an opioid treatment programme: roadblocks to implementation

    PubMed Central

    Louie, Ben; Kritz, Steven; Brown, Lawrence S.; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-01-01

    Rationale Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. Methods At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. Results We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. Conclusion This description may provide practical insights to other institutions seeking to pursue this technology. PMID:21414111

  18. Electronic health information system at an opioid treatment programme: roadblocks to implementation.

    PubMed

    Louie, Ben; Kritz, Steven; Brown, Lawrence S; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-08-01

    Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. This description may provide practical insights to other institutions seeking to pursue this technology. © 2011 Blackwell Publishing Ltd.

  19. 33 CFR 165.30 - Security zones.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zones. 165.30 Section... AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Security Zones § 165.30 Security zones. (a) A security zone is an area of land, water, or land and water which is so designated by...

  20. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    PubMed

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  1. Experimental Internet Environment Software Development

    NASA Technical Reports Server (NTRS)

    Maddux, Gary A.

    1998-01-01

    Geographically distributed project teams need an Internet based collaborative work environment or "Intranet." The Virtual Research Center (VRC) is an experimental Intranet server that combines several services such as desktop conferencing, file archives, on-line publishing, and security. Using the World Wide Web (WWW) as a shared space paradigm, the Graphical User Interface (GUI) presents users with images of a lunar colony. Each project has a wing of the colony and each wing has a conference room, library, laboratory, and mail station. In FY95, the VRC development team proved the feasibility of this shared space concept by building a prototype using a Netscape commerce server and several public domain programs. Successful demonstrations of the prototype resulted in approval for a second phase. Phase 2, documented by this report, will produce a seamlessly integrated environment by introducing new technologies such as Java and Adobe Web Links to replace less efficient interface software.

  2. BTFS: The Border Trade Facilitation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, L.R.

    The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. Themore » BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.« less

  3. Détente from the Air: Monitoring Air Pollution during the Cold War.

    PubMed

    Rothschild, Rachel

    During the period of détente in the 1970s, a Norwegian proposal to construct an air pollution monitoring network for the European continent resulted in the first concrete collaboration between the communist and capitalist blocs after the 1975 Helsinki Accords. Known as the "European-wide monitoring programme" or EMEP, the network earned considerable praise from diplomats for facilitating cooperation across the Iron Curtain. Yet as this article argues, EMEP was strongly influenced by the politics of détente and the constraints of the Cold War even as it helped to decrease tensions. Concerns about national security and sharing data with the enemy shaped both the construction of the monitoring network and the modeling of pollution transport. The article also proposes that environmental monitoring systems like EMEP reveal the ways in which observational technologies can affect conceptions of the natural world and the role of science in public policy.

  4. An Adaptive Ship Detection Algorithm for Hrws SAR Images Under Complex Background: Application to SENTINEL1A Data

    NASA Astrophysics Data System (ADS)

    He, G.; Xia, Z.; Chen, H.; Li, K.; Zhao, Z.; Guo, Y.; Feng, P.

    2018-04-01

    Real-time ship detection using synthetic aperture radar (SAR) plays a vital role in disaster emergency and marine security. Especially the high resolution and wide swath (HRWS) SAR images, provides the advantages of high resolution and wide swath synchronously, significantly promotes the wide area ocean surveillance performance. In this study, a novel method is developed for ship target detection by using the HRWS SAR images. Firstly, an adaptive sliding window is developed to propose the suspected ship target areas, based upon the analysis of SAR backscattering intensity images. Then, backscattering intensity and texture features extracted from the training samples of manually selected ship and non-ship slice images, are used to train a support vector machine (SVM) to classify the proposed ship slice images. The approach is verified by using the Sentinl1A data working in interferometric wide swath mode. The results demonstrate the improvement performance of the proposed method over the constant false alarm rate (CFAR) method, where the classification accuracy improved from 88.5 % to 96.4 % and the false alarm rate mitigated from 11.5 % to 3.6 % compared with CFAR respectively.

  5. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    PubMed

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  6. 14 CFR 1203a.104 - Violation of security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Violation of security areas. 1203a.104 Section 1203a.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.104 Violation of security areas. (a) Removal of unauthorized persons. The directors of NASA field...

  7. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees, and...

  8. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees, and...

  9. 14 CFR 1203a.104 - Violation of security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Violation of security areas. 1203a.104 Section 1203a.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.104 Violation of security areas. (a) Removal of unauthorized persons. The directors of NASA field...

  10. Recent Results on SNRs and PWNe from the Fermi Large Area Telescope

    NASA Technical Reports Server (NTRS)

    Hays, Elizabeth A.

    2010-01-01

    Topics include: Fermi LAT Collaboration groups; galactic results from LAT; a GeV, wide-field instrument; the 1FGL catalog, the Fermi LAT 1FGL source catalog, unidentified gamma-ray sources; variability in 1FGL sources; curvature in 1FGL sources; spectral-variability classification; gamma-ray pulsars and MSPs; GeV PWN - where to look; Crab pulsar and nebula; Vela X nebular of Vela pulsar; MSH 15-52; GeV PWNe spectra; GeV nebula limits; Nebula search of LAT pulsars; supernova remnants; SNR: GeV morphology; SNR: molecular connection; SNR: GeV breaks; SNR: young vs. old. The summary includes slides about the Large Area Telescope (LAT) and LAT sensitivity with time.

  11. Performance of an optical identification and interrogation system

    NASA Astrophysics Data System (ADS)

    Venugopalan, A.; Ghosh, A. K.; Verma, P.; Cheng, S.

    2008-04-01

    A free space optics based identification and interrogation system has been designed. The applications of the proposed system lie primarily in areas which require a secure means of mutual identification and information exchange between optical readers and tags. Conventional RFIDs raise issues regarding security threats, electromagnetic interference and health safety. The security of RF-ID chips is low due to the wide spatial spread of radio waves. Malicious nodes can read data being transmitted on the network, if they are in the receiving range. The proposed system provides an alternative which utilizes the narrow paraxial beams of lasers and an RSA-based authentication scheme. These provide enhanced security to communication between a tag and the base station or reader. The optical reader can also perform remote identification and the tag can be read from a far off distance, given line of sight. The free space optical identification and interrogation system can be used for inventory management, security systems at airports, port security, communication with high security systems, etc. to name a few. The proposed system was implemented with low-cost, off-the-shelf components and its performance in terms of throughput and bit error rate has been measured and analyzed. The range of operation with a bit-error-rate lower than 10-9 was measured to be about 4.5 m. The security of the system is based on the strengths of the RSA encryption scheme implemented using more than 1024 bits.

  12. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  13. Bridging the Gap between Students and Computers: Supporting Activity Awareness for Network Collaborative Learning with GSM Network

    ERIC Educational Resources Information Center

    Liu, C.-C.; Tao, S.-Y.; Nee, J.-N.

    2008-01-01

    The internet has been widely used to promote collaborative learning among students. However, students do not always have access to the system, leading to doubt in the interaction among the students, and reducing the effectiveness of collaborative learning, since the web-based collaborative learning environment relies entirely on the availability…

  14. Faces of Science

    Science.gov Websites

    Innovation in New Mexico Los Alamos Collaboration for Explosives Detection (LACED) SensorNexus Exascale effects of tuberculosis infection on AIDS, and issues related to national security. Play video Read more

  15. Wide-area, real-time monitoring and visualization system

    DOEpatents

    Budhraja, Vikram S.; Dyer, James D.; Martinez Morales, Carlos A.

    2013-03-19

    A real-time performance monitoring system for monitoring an electric power grid. The electric power grid has a plurality of grid portions, each grid portion corresponding to one of a plurality of control areas. The real-time performance monitoring system includes a monitor computer for monitoring at least one of reliability metrics, generation metrics, transmission metrics, suppliers metrics, grid infrastructure security metrics, and markets metrics for the electric power grid. The data for metrics being monitored by the monitor computer are stored in a data base, and a visualization of the metrics is displayed on at least one display computer having a monitor. The at least one display computer in one said control area enables an operator to monitor the grid portion corresponding to a different said control area.

  16. Wide-area, real-time monitoring and visualization system

    DOEpatents

    Budhraja, Vikram S [Los Angeles, CA; Dyer, James D [La Mirada, CA; Martinez Morales, Carlos A [Upland, CA

    2011-11-15

    A real-time performance monitoring system for monitoring an electric power grid. The electric power grid has a plurality of grid portions, each grid portion corresponding to one of a plurality of control areas. The real-time performance monitoring system includes a monitor computer for monitoring at least one of reliability metrics, generation metrics, transmission metrics, suppliers metrics, grid infrastructure security metrics, and markets metrics for the electric power grid. The data for metrics being monitored by the monitor computer are stored in a data base, and a visualization of the metrics is displayed on at least one display computer having a monitor. The at least one display computer in one said control area enables an operator to monitor the grid portion corresponding to a different said control area.

  17. Concept of Operations for the Next Generation Air Transportation System. Version 3.2

    DTIC Science & Technology

    2011-01-01

    Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management

  18. World Organisation for Animal Health: strengthening Veterinary Services for effective One Health collaboration.

    PubMed

    Corning, S

    2014-08-01

    To effectively reduce health risks at the animal-human-ecosystems interface, a One Health strategy is crucially important to create strong national and regional animal health systems that are well coordinated with strong public health systems. Animal diseases, particularly those caused by new and emerging zoonotic pathogens, must be effectively controlled at their source to reduce their potentially devastating impact upon both animal and human health. As the international organisation responsible for developing standards, guidelines and recommendations for animal health, the World Organisation for Animal Health (OIE) plays an important role in minimising animal and public health risks attributable to zoonoses and other animal diseases, which can have severe consequences for global food safety and security. National Veterinary Services, which implement OIE animal health and welfare standards and other measures, are the first line of defence against these diseases, and must have the capacity to meet the core requirements necessary for their diagnosis and control. The OIE works collaboratively with the World Health Organization and Food and Agriculture Organization of the United Nations to improve the ability of national animal and public health systems to respond to current and emerging animal health risks with public health consequences. In addition to improving and aligning national laboratory capacities in high-risk areas, the OIE collaborates on One Health-oriented projects for key diseases, establishing model frameworks which can be applied to manage other existing and emerging priority diseases. This article reviews the role and activities of the OIE in strengthening the national Veterinary Services of its Member Countries for a more effective and sustainable One Health collaboration.

  19. Nurse faculty as international research collaborators.

    PubMed

    O'Keefe, Louise C; Frith, Karen H; Barnby, Elizabeth

    2017-03-01

    Nursing faculty who desire to expand their research portfolios will benefit from collaboration with researchers with complimentary interests from different universities across the world. International collaboration can enhance the productivity of researchers who seek to conduct studies with similar populations in different environments, and who desire a larger impact based on the findings of their studies. International collaborative teams have the potential to make important discoveries that affect the health of populations across the world. Communication is a critical step in defining the roles and professional relationships of researchers involved in international collaboration. Researchers need to be cognizant of rules affecting data security, intellectual property, data ownership, and funding sources in each country. International collaborative research can be exciting and rewarding, especially when participants are culturally aware, respect universities' policies, and are mindful of the ethical and legal principles for the countries in which the research is conducted. This article describes ways to enhance the success of nursing faculty who desire a rich experience with international research collaborators. © 2016 John Wiley & Sons Australia, Ltd.

  20. Information security requirements in patient-centred healthcare support systems.

    PubMed

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  1. An evaluation of the individual components and accuracies associated with the determination of impervious area

    USGS Publications Warehouse

    Slonecker, E.T.; Tilley, J.S.

    2004-01-01

    The percentage of impervious surface area in a watershed has been widely recognized as a key indicator of terrestrial and aquatic ecosystem condition. Although the use of the impervious indicator is widespread, there is currently no consistent or mutually accepted method of computing impervious area and the approach of various commonly used techniques varies widely. Further, we do not have reliable information on the components of impervious surfaces, which would be critical in any future planning attempts to remediate problems associated with impervious surface coverage. In cooperation with the USGS Geographic Analysis and Monitoring Program (GAM) and The National Map, and the EPA Landscape Ecology Program, this collaborative research project utilized very high resolution imagery and GIS techniques to map and quantify the individual components of total impervious area in six urban/suburban watersheds in different parts of the United States. These data were served as ground reference, or "truth," for the evaluation for four techniques used to compute impervious area. The results show some important aspects about the component make-up of impervious cover and the variability of methods commonly used to compile this critical emerging indicator of ecosystem condition. ?? 2004 by V. H. Winston and Sons, Inc. All rights reserved.

  2. Network Experiences from a Cross-Sector Biosafety Level-3 Laboratory Collaboration: A Swedish Forum for Biopreparedness Diagnostics.

    PubMed

    Thelaus, Johanna; Lindberg, Anna; Thisted Lambertz, Susanne; Byström, Mona; Forsman, Mats; Lindmark, Hans; Knutsson, Rickard; Båverud, Viveca; Bråve, Andreas; Jureen, Pontus; Lundin Zumpe, Annelie; Melefors, Öjar

    The Swedish Forum for Biopreparedness Diagnostics (FBD) is a network that fosters collaboration among the 4 agencies with responsibility for the laboratory diagnostics of high-consequence pathogens, covering animal health and feed safety, food safety, public health and biodefense, and security. The aim of the network is to strengthen capabilities and capacities for diagnostics at the national biosafety level-3 (BSL-3) laboratories to improve Sweden's biopreparedness, in line with recommendations from the EU and WHO. Since forming in 2007, the FBD network has contributed to the harmonization of diagnostic methods, equipment, quality assurance protocols, and biosafety practices among the national BSL-3 laboratories. Lessons learned from the network include: (1) conducting joint projects with activities such as method development and validation, ring trials, exercises, and audits has helped to build trust and improve communication among participating agencies; (2) rotating the presidency of the network steering committee has fostered trust and commitment from all agencies involved; and (3) planning for the implementation of project outcomes is important to maintain gained competencies in the agencies over time. Contacts have now been established with national agencies of the other Nordic countries, with an aim to expanding the collaboration, broadening the network, finding synergies in new areas, strengthening the ability to share resources, and consolidating long-term financing in the context of harmonized European biopreparedness.

  3. Network Experiences from a Cross-Sector Biosafety Level-3 Laboratory Collaboration: A Swedish Forum for Biopreparedness Diagnostics

    PubMed Central

    Lindberg, Anna; Thisted Lambertz, Susanne; Byström, Mona; Forsman, Mats; Lindmark, Hans; Knutsson, Rickard; Båverud, Viveca; Bråve, Andreas; Jureen, Pontus; Lundin Zumpe, Annelie; Melefors, Öjar

    2017-01-01

    The Swedish Forum for Biopreparedness Diagnostics (FBD) is a network that fosters collaboration among the 4 agencies with responsibility for the laboratory diagnostics of high-consequence pathogens, covering animal health and feed safety, food safety, public health and biodefense, and security. The aim of the network is to strengthen capabilities and capacities for diagnostics at the national biosafety level-3 (BSL-3) laboratories to improve Sweden's biopreparedness, in line with recommendations from the EU and WHO. Since forming in 2007, the FBD network has contributed to the harmonization of diagnostic methods, equipment, quality assurance protocols, and biosafety practices among the national BSL-3 laboratories. Lessons learned from the network include: (1) conducting joint projects with activities such as method development and validation, ring trials, exercises, and audits has helped to build trust and improve communication among participating agencies; (2) rotating the presidency of the network steering committee has fostered trust and commitment from all agencies involved; and (3) planning for the implementation of project outcomes is important to maintain gained competencies in the agencies over time. Contacts have now been established with national agencies of the other Nordic countries, with an aim to expanding the collaboration, broadening the network, finding synergies in new areas, strengthening the ability to share resources, and consolidating long-term financing in the context of harmonized European biopreparedness. PMID:28805472

  4. Combined Arms Maneuver, Wide Area Security, and Dynamic Capabilities

    DTIC Science & Technology

    2012-03-21

    Operation (COIN) had its origins in field manuals (FM’s), like FM 31-20, Operations against Guerrilla Forces (1951). The Army revised its doctrinal...work were the publication of a new counterinsurgency doctrinal manual , in December of 2006. Most of the work on this manual did not occur until 2005...October 2, 2007, http://www.washingtonpost.com/wp.dyn/content/article/2007/10/01/ ar2007100101760. htp (accessed January 15, 2012). 53 U.S

  5. Unified Land Operations in World War I and the Anglo-Irish War

    DTIC Science & Technology

    2012-05-17

    vignette to examine the new U.S. Army doctrine. The history of the British Army in the 19th century illustrates a force capable of fighting against both...possessions against rebels in Africa during the 19th century .6 Bryce Poe II examines the transition of the military through reforms in structure and...wars during the 19th century developed a military that made flexible transitions from combined arms maneuver to wide area security operations

  6. Littoral and Coastal Management in Supporting Maritime Security for Realizing Indonesia as World Maritime Axis

    NASA Astrophysics Data System (ADS)

    Brotosusilo, Agus; Wayan Agus Apriana, I.; Agung Satria, Afrizal; Jokopitoyo, Trisasono

    2016-02-01

    The Indonesian under President Joko Widodo has new goal to make Indonesia as the world maritime axis. This is supported by the geographic of Indonesia as the largest archipelagic country where the sea is two-thirds wide among the whole spacious. Indonesia is the world largest archipelagic state. More than two-third of its territory consist of seas. The ecosystem of littoral and coastal has correlative relationship with country development. There is no doubt of physically facts that Indonesian littoral and coastal with total wide of 5.8 million km2 is rich with various natural resources. Therefore, the condition of Indonesia with its world second longest coastline has several comparative advantages. Not only the country has an abundant natural resources, but it also blessed by demographic bonus advantage. The population of Indonesian is the fifth largest in the world which approximately 220 million people and approximately 60 percent among them live at coastal areas. The people in coastal area relies their live from its surrounding natural resource. Hence, most of their life and daily activity is related with the presence of natural resources. The dealing of conflict potential and attention to maritime security are important to be studied as a reference in preparing and facing the government policies that will lead to the development of maritime.

  7. A Collaborative Decision Environment for UAV Operations

    NASA Technical Reports Server (NTRS)

    D'Ortenzio, Matthew V.; Enomoto, Francis Y.; Johan, Sandra L.

    2005-01-01

    NASA is developing Intelligent Mission Management (IMM) technology for science missions employing long endurance unmanned aerial vehicles (UAV's). The IMM groundbased component is the Collaborative Decision Environment (CDE), a ground system that provides the Mission/Science team with situational awareness, collaboration, and decisionmaking tools. The CDE is used for pre-flight planning, mission monitoring, and visualization of acquired data. It integrates external data products used for planning and executing a mission, such as weather, satellite data products, and topographic maps by leveraging established and emerging Open Geospatial Consortium (OGC) standards to acquire external data products via the Internet, and an industry standard geographic information system (GIs) toolkit for visualization As a Science/Mission team may be geographically dispersed, the CDE is capable of providing access to remote users across wide area networks using Web Services technology. A prototype CDE is being developed for an instrument checkout flight on a manned aircraft in the fall of 2005, in preparation for a full deployment in support of the US Forest Service and NASA Ames Western States Fire Mission in 2006.

  8. 76 FR 61429 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-04

    ... Volatility) (i) To reflect changes to market-wide circuit breaker triggers for NMS stocks, and (ii) amend... trading in all OTC Equity Securities when a market-wide circuit breaker is in effect for NMS stocks. The... Equity Securities pursuant to its authority under Rule 6440(a)(3) \\3\\ until the market-wide circuit...

  9. 33 CFR 165.767 - Security Zone; Manbirtee Key, Port of Manatee, Florida.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Seventh Coast Guard District § 165.767 Security Zone; Manbirtee Key, Port of Manatee, Florida. (a) Regulated area. The following area...

  10. Open Access to Research Articles and Data: Library Roles

    NASA Astrophysics Data System (ADS)

    Joseph, Heather

    2015-08-01

    Over the past decade, a handful of key developments have caused scholars and researchers to rethink not only the way they conduct their work, but also the way in which they communicate it to others. The advent of the Internet has provided unprecedented opportunities for immediate, cost effective global connectivity, opening up new possibilities for collaboration and communication. This has resulted in scholarship increasingly being conducted in the online environment, and a vast amount of new digital information being generated and made widely available to those interested in using it. Additionally, the Internet is a dynamic environment, with new channels for producing and sharing information in a myriad of formats emerging frequently.In higher education, the momentum of the burgeoning movement towards "open" sharing of information of all kinds continues to gain traction. In particular, advancements in the areas of opening up access to articles and reserch data are increasingly visible. In both of these areas, academic and research libraries are playing important, central roles in promoting the awareness of the potential costs and benefits of a more open research environment, as well as defining new roles for libraries in this digital environment.As this push for grater openness continues, these fronts are intersecting in interesting and potentially transformative ways. The Open Access and Open Data movements share fundamental philosophical commonalities that make collaboration a natural outcome. Both movements place a premium on reducing barriers to discovering and accessing pertinent digital information. Perhaps even more significantly, both explicitly recognize that enabling productive use of digital information is key to unlocking its full value. As a result of these shared priorities, there are a wide variety of common strategies that libraries can take to help advance research, presenting new opportunities for deeper collaboration to take place.This talk will explore what is happening in these "open" movements from both a practical and policy standpoint; how this might directly impact academia, the research community, and especially, libraries.

  11. 2008 U.S. Coast Guard Innovation Expo

    DTIC Science & Technology

    2008-11-20

    for Capability (CG-7) Public Release Authorized DCO Outcomes • Mission Performance Plans, policies, strategic analysis and planning, assessments and...Untitled Document 2008 U.S.htm[5/26/ 2016 2:24:38 PM] 2008 U.S. Coast Guard Innovation Expo “Collaboration Fuels Innovation” Virginia Beach, Virginia...Untitled Document 2008 U.S.htm[5/26/ 2016 2:24:38 PM] Panelists: Mr. Tom Tomaiko, Maritime Security Program Manager, Borders and Maritime Security

  12. Analysis of Leading Edge and Trailing Edge Cover Glass Samples Before and After Treatment with Advanced Satellite Contamination Removal Techniques

    DTIC Science & Technology

    1993-04-01

    surface analysis, 40 contamination control, ANCC ( Aerogel Mesh Contamination Collector) iPRICECODE 17. SECURITY CLASSIFICATION 1 & SECURITY CLASSIFICATION...operational parameter space (temperature, vibration, radiation, vacuum and micrometorite environments). One embodiment of this device, the Aerogel Mesh...Lippey and Dan Demeo of Hughes Aircraft Corporation for their kind hospitality and research collaboration on the contamination removal phase of this work

  13. Hospital Security and Force Protection: A Guide to Ensuring Patient and Employee Safety

    DTIC Science & Technology

    2006-04-28

    leader and set up training camps for his recruits. Through these experiences, Osama Bin Laden was able to obtain money , weapons, and develop connections...options to deter counterfeits . Hospital Security 50 Membership within community collaboratives or community-based organizations provides excellent...iris or fingerprints scans are resistant to theft and counterfeit , assuring access to only authorized personnel. Many theme parks are utilizing this

  14. Creating widely accessible spatial interfaces: mobile VR for managing persistent pain.

    PubMed

    Schroeder, David; Korsakov, Fedor; Jolton, Joseph; Keefe, Francis J; Haley, Alex; Keefe, Daniel F

    2013-01-01

    Using widely accessible VR technologies, researchers have implemented a series of multimodal spatial interfaces and virtual environments. The results demonstrate the degree to which we can now use low-cost (for example, mobile-phone based) VR environments to create rich virtual experiences involving motion sensing, physiological inputs, stereoscopic imagery, sound, and haptic feedback. Adapting spatial interfaces to these new platforms can open up exciting application areas for VR. In this case, the application area was in-home VR therapy for patients suffering from persistent pain (for example, arthritis and cancer pain). For such therapy to be successful, a rich spatial interface and rich visual aesthetic are particularly important. So, an interdisciplinary team with expertise in technology, design, meditation, and the psychology of pain collaborated to iteratively develop and evaluate several prototype systems. The video at http://youtu.be/mMPE7itReds demonstrates how the sine wave fitting responds to walking motions, for a walking-in-place application.

  15. D3: A Collaborative Infrastructure for Aerospace Design

    NASA Technical Reports Server (NTRS)

    Walton, Joan; Filman, Robert E.; Knight, Chris; Korsmeyer, David J.; Lee, Diana D.; Clancy, Daniel (Technical Monitor)

    2001-01-01

    DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid dynamics) model executions. DARWIN captures, stores and indexes data, manages derived knowledge (such as visualizations across multiple data sets) and provides an environment for designers to collaborate in the analysis of the results of testing. DARWIN is an interesting application because it supports high volumes of data, integrates multiple modalities of data display (e.g. images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and view of data.

  16. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  17. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  18. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  19. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  20. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  1. Peer-to-Peer Science Data Environment

    NASA Astrophysics Data System (ADS)

    Byrnes, J. B.; Holland, M. P.

    2004-12-01

    The goal of P2PSDE is to provide a convenient and extensible Peer-to-Peer (P2P) network architecture that allows: distributed science-data services-seamlessly incorporating collaborative value-added services with search-oriented access to remote science data. P2PSDE features the real-time discovery of data-serving peers (plus peer-groups and peer-group services), in addition to the searching for and transferring of science data. These features are implemented using "Project JXTA", the first and only standardized set of open, generalized P2P protocols that allow arbitrary network devices to communicate and collaborate as peers. The JXTA protocols standardize the manner in which peers discover each other, self-organize into peer groups, advertise and discover network services, and securely communicate with and monitor each other-even across network firewalls. The key benefits include: Potential for dramatic improvements in science-data dissemination; Real-time-discoverable, potentially redundant (reliable), science-data services; Openness/Extensibility; Decentralized use of small, inexpensive, readily-available desktop machines; and Inherently secure-with ability to create variable levels of security by group.

  2. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  3. VALIDATION OF STANDARD ANALYTICAL PROTOCOL FOR ...

    EPA Pesticide Factsheets

    There is a growing concern with the potential for terrorist use of chemical weapons to cause civilian harm. In the event of an actual or suspected outdoor release of chemically hazardous material in a large area, the extent of contamination must be determined. This requires a system with the ability to prepare and quickly analyze a large number of contaminated samples for the traditional chemical agents, as well as numerous toxic industrial chemicals. Liquid samples (both aqueous and organic), solid samples (e.g., soil), vapor samples (e.g., air) and mixed state samples, all ranging from household items to deceased animals, may require some level of analyses. To meet this challenge, the U.S. Environmental Protection Agency (U.S. EPA) National Homeland Security Research Center, in collaboration with experts from across U.S. EPA and other Federal Agencies, initiated an effort to identify analytical methods for the chemical and biological agents that could be used to respond to a terrorist attack or a homeland security incident. U.S. EPA began development of standard analytical protocols (SAPs) for laboratory identification and measurement of target agents in case of a contamination threat. These methods will be used to help assist in the identification of existing contamination, the effectiveness of decontamination, as well as clearance for the affected population to reoccupy previously contaminated areas. One of the first SAPs developed was for the determin

  4. Operating a wide-area remote observing system for the W. M. Keck Observatory

    NASA Astrophysics Data System (ADS)

    Wirth, Gregory D.; Kibrick, Robert I.; Goodrich, Robert W.; Lyke, James E.

    2008-07-01

    For over a decade, the W. M. Keck Observatory's two 10-meter telescopes have been operated remotely from its Waimea headquarters. Over the last 6 years, WMKO remote observing has expanded to allow teams at dedicated sites in California to observe either in collaboration with colleagues in Waimea or entirely from the U.S. mainland. Once an experimental effort, the Observatory's mainland observing capability is now fully operational, supported on all science instruments (except the interferometer) and regularly used by astronomers at eight mainland sites. Establishing a convenient and secure observing capability from those sites required careful planning to ensure that they are properly equipped and configured. It also entailed a significant investment in hardware and software, including both custom scripts to simplify launching the instrument interface at remote sites and automated routers employing ISDN backup lines to ensure continuation of observing during Internet outages. Observers often wait until shortly before their runs to request use of the mainland facilities. Scheduling these requests and ensuring proper system operation prior to observing requires close coordination between personnel at WMKO and the mainland sites. An established protocol for approving requests and carrying out pre-run checkout has proven useful in ensuring success. The Observatory anticipates enhancing and expanding its remote observing system. Future plans include deploying dedicated summit computers for running VNC server software, implementing a web-based tracking system for mainland-based observing requests, expanding the system to additional mainland sites, and converting to full-time VNC operation for all instruments.

  5. FermiGrid—experience and future plans

    NASA Astrophysics Data System (ADS)

    Chadwick, K.; Berman, E.; Canal, P.; Hesselroth, T.; Garzoglio, G.; Levshina, T.; Sergeev, V.; Sfiligoi, I.; Sharma, N.; Timm, S.; Yocum, D. R.

    2008-07-01

    Fermilab supports a scientific program that includes experiments and scientists located across the globe. In order to better serve this community, Fermilab has placed its production computer resources in a Campus Grid infrastructure called 'FermiGrid'. The FermiGrid infrastructure allows the large experiments at Fermilab to have priority access to their own resources, enables sharing of these resources in an opportunistic fashion, and movement of work (jobs, data) between the Campus Grid and National Grids such as Open Science Grid (OSG) and the Worldwide LHC Computing Grid Collaboration (WLCG). FermiGrid resources support multiple Virtual Organizations (VOs), including VOs from the OSG, EGEE, and the WLCG. Fermilab also makes leading contributions to the Open Science Grid in the areas of accounting, batch computing, grid security, job management, resource selection, site infrastructure, storage management, and VO services. Through the FermiGrid interfaces, authenticated and authorized VOs and individuals may access our core grid services, the 10,000+ Fermilab resident CPUs, near-petabyte (including CMS) online disk pools and the multi-petabyte Fermilab Mass Storage System. These core grid services include a site wide Globus gatekeeper, VO management services for several VOs, Fermilab site authorization services, grid user mapping services, as well as job accounting and monitoring, resource selection and data movement services. Access to these services is via standard and well-supported grid interfaces. We will report on the user experience of using the FermiGrid campus infrastructure interfaced to a national cyberinfrastructure - the successes and the problems.

  6. Demonstration of an Integrated Pest Management Program for Wheat in Tajikistan.

    PubMed

    Landis, Douglas A; Saidov, Nurali; Jaliov, Anvar; El Bouhssini, Mustapha; Kennelly, Megan; Bahlai, Christie; Landis, Joy N; Maredia, Karim

    2016-01-01

    Wheat is an important food security crop in central Asia but frequently suffers severe damage and yield losses from insect pests, pathogens, and weeds. With funding from the United States Agency for International Development, a team of scientists from three U.S. land-grant universities in collaboration with the International Center for Agricultural Research in Dry Areas and local institutions implemented an integrated pest management (IPM) demonstration program in three regions of Tajikistan from 2011 to 2014. An IPM package was developed and demonstrated in farmer fields using a combination of crop and pest management techniques including cultural practices, host plant resistance, biological control, and chemical approaches. The results from four years of demonstration/research indicated that the IPM package plots almost universally had lower pest abundance and damage and higher yields and were more profitable than the farmer practice plots. Wheat stripe rust infestation ranged from 30% to over 80% in farmer practice plots, while generally remaining below 10% in the IPM package plots. Overall yield varied among sites and years but was always at least 30% to as much as 69% greater in IPM package plots. More than 1,500 local farmers-40% women-were trained through farmer field schools and field days held at the IPM demonstration sites. In addition, students from local agricultural universities participated in on-site data collection. The IPM information generated by the project was widely disseminated to stakeholders through peer-reviewed scientific publications, bulletins and pamphlets in local languages, and via Tajik national television.

  7. FermiGrid - experience and future plans

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chadwick, K.; Berman, E.; Canal, P.

    2007-09-01

    Fermilab supports a scientific program that includes experiments and scientists located across the globe. In order to better serve this community, Fermilab has placed its production computer resources in a Campus Grid infrastructure called 'FermiGrid'. The FermiGrid infrastructure allows the large experiments at Fermilab to have priority access to their own resources, enables sharing of these resources in an opportunistic fashion, and movement of work (jobs, data) between the Campus Grid and National Grids such as Open Science Grid and the WLCG. FermiGrid resources support multiple Virtual Organizations (VOs), including VOs from the Open Science Grid (OSG), EGEE and themore » Worldwide LHC Computing Grid Collaboration (WLCG). Fermilab also makes leading contributions to the Open Science Grid in the areas of accounting, batch computing, grid security, job management, resource selection, site infrastructure, storage management, and VO services. Through the FermiGrid interfaces, authenticated and authorized VOs and individuals may access our core grid services, the 10,000+ Fermilab resident CPUs, near-petabyte (including CMS) online disk pools and the multi-petabyte Fermilab Mass Storage System. These core grid services include a site wide Globus gatekeeper, VO management services for several VOs, Fermilab site authorization services, grid user mapping services, as well as job accounting and monitoring, resource selection and data movement services. Access to these services is via standard and well-supported grid interfaces. We will report on the user experience of using the FermiGrid campus infrastructure interfaced to a national cyberinfrastructure--the successes and the problems.« less

  8. Collaboration in Research and Engineering for Advanced Technology.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vrieling, P. Douglas

    SNL/CA proposes the Collaboration in Research and Engineering for Advanced Technology and Education (CREATE) facility to support customer-driven national security mission requirements while demonstrating a fiscally responsible approach to cost-control. SNL/CA realizes that due to the current backlog of capital projects in NNSA that following the normal Line Item process to procure capital funding is unlikely and therefore SNL/CA will be looking at all options including Alternative Financing.

  9. Latin American Security Challenges: A Collaborative Inquiry from North and South

    DTIC Science & Technology

    2004-01-01

    Jorge Eduardo Malena, and Gabriela E. Porn Conclusion 103 Bibliography 109 Abbreviations 115 Contributors 117 Collaborating Organizations 119 Titles...Malena of the Catholic University, Bue- nos Aires; and Gabriela E. Porn of the Centro de Estudios Hemisféricos on their chapter. With good fortune and...Malena of the Catholic University, Buenos Aires; and Gabriela E. Porn of the Centro de Estudios Hemisféricos assess “Chinese Interests in Latin

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, David G.; Cook, Marvin A.

    This report summarizes collaborative efforts between Secure Scalable Microgrid and Korean Institute of Energy Research team members . The efforts aim to advance microgrid research and development towards the efficient utilization of networked microgrids . The collaboration resulted in the identification of experimental and real time simulation capabilities that may be leveraged for networked microgrids research, development, and demonstration . Additional research was performed to support the demonstration of control techniques within real time simulation and with hardware in the loop for DC microgrids .

  11. The Secure Medical Research Workspace: An IT Infrastructure to Enable Secure Research on Clinical Data

    PubMed Central

    Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.

    2013-01-01

    Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029

  12. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

    PubMed

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.

  13. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...

  14. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...

  15. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...

  16. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...

  17. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...

  18. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... certificated repair stations located— (1) On airport. On an air operations area or security identification display area of an airport covered by an airport security program under 49 CFR part 1542 in the United States, or on the security restricted area of any commensurate airport outside the United States...

  19. Defense Security Cooperation Agency Vision 2020. Update 1

    DTIC Science & Technology

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  20. A Catalyst for Change: Drought and Food Security in the Near East Region (Invited)

    NASA Astrophysics Data System (ADS)

    Knutson, C. L.

    2010-12-01

    In the Near East, drought at the turn of the 21st century was reported to be the worst in 50 years, affecting millions of people across the region. The drought caused a wide range of effects, including widespread crop failures and livestock losses, increased drinking water shortages and disease stress, additional debt, and forced mass migrations to urban areas and other countries, all of which affected food security. As devastating as the drought was for people and the environment, the event created a “policy window” - a time during which the public’s and policy makers’ attention was directed toward a particular issue, creating an advantageous political environment for addressing the problem. In this case, the drought revealed the need for enhanced mitigation and drought relief coordination. It has served as the impetus for several countries and international organizations to work together to foster new policies and training activities to reduce drought risk and enhance food security in the region.

Top