WorldWideScience

Sample records for offer high security

  1. 12 CFR 563g.16 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.16 Delayed or continuous offering and sale of securities. Any offer or...

  2. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Special offers for our members       Go Sport in Val Thoiry is offering 15% discount on all purchases made in the shop upon presentation of the Staff Association membership card (excluding promotions, sale items and bargain corner, and excluding purchases using Go Sport  and Kadéos gift cards. Only one discount can be applied to each purchase).  

  3. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    L'Occitane en Provence proposes the following offer: 10 % discount on all products in all L'Occitane shops in Metropolitan France upon presentation of your Staff Association membership card and a valid ID. This offer is valid only for one person, is non-transferable and cannot be combined with other promotions.

  4. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    New offers : Discover the theater Galpon in Geneva. The Staff Association is happy to offer to its members a discount of 8.00 CHF on a full-price ticket (tickets of 15.00 CHF instead of 22.00 CHF) so do not hesitate anymore (mandatory reservation by phone + 4122 321  21 76 as tickets are quickly sold out!). For further information, please see our website: http://staff-association.web.cern.ch/fr/content/th%C3%A9%C3%A2tre-du-galpon  

  5. Offer

    CERN Multimedia

    Staff Association

    2016-01-01

    CERN was selected and participated in the ranking "Best Employers" organized by the magazine Bilan. To thank CERN for its collaboration, the magazine offers a reduction to the subscription fee for all employed members of personnel. 25% off the annual subscription: CHF 149.25 instead of CHF 199 .— The subscription includes the magazine delivered to your home for a year, every other Wednesday, as well as special editions and access to the e-paper. To benefit from this offer, simply fill out the form provided for this purpose. To get the form, please contact the secretariat of the Staff Association (Staff.Association@cern.ch).

  6. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    SPECIAL OFFER FOR OUR MEMBERS Prices Spring and Summer 2013 Day ticket: same price weekends, public holidays and weekdays: Children from 5 to 15 years old: 30 CHF instead of 39 CHF Adults from 16 years old: 36 CHF instead of 49 CHF Bonus! Free for children under 5 Tickets available at the Staff Association Secretariat.

  7. Offers

    CERN Multimedia

    Association du personnel

    2013-01-01

    SPECIAL OFFER FOR OUR MEMBERS Prices Spring and Summer 2013 Day ticket: same price weekends, public holidays and weekdays: – Children from 5 to 15 years old: 30 CHF instead of 39 CHF – Adults from 16 years old: 36 CHF instead of 49 CHF – Bonus! Free for children under 5 Tickets available at the Staff Association Secretariat.

  8. Offers

    CERN Document Server

    Staff Association

    2015-01-01

    New offer for our members. The Staff Association CERN staff has recently concluded a framework agreement with AXA Insurance Ltd, General-Guisan-Strasse 40, 8401 Winterthur. This contract allows you to benefit from a preferential tariff and conditions for insurances: Motor vehicles for passenger cars and motorcycles of the product line STRADA: 10% discount Household insurance (personal liability and household contents) the product line BOX: 10% discount Travel insurance: 10% discount Buildings: 10% discount Legal protection: 10% discount AXA is number one on the Swiss insurance market. The product range encompasses all non-life insurance such as insurance of persons, property, civil liability, vehicles, credit and travel as well as innovative and comprehensive solutions in the field of occupational benefits insurance for individuals and businesses. Finally, the affiliate AXA-ARAG (legal expenses insurance) completes the offer. Armed with your staff association CERN card, you can always get the off...

  9. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    proposes the following offer: 15% discount for the Staff Association members who enroll their children in summer FUTUREKIDS activities. Extracurricular Activities For Your Children The FUTUREKIDS Geneva Learning Center is open 6 days a week and offers a selection of after-school extracurricular activities for children and teenagers (ages 5 to 16). In addition to teaching in its Learning Centers, Futurekids collaborates with many private schools in Suisse Romande (Florimont, Moser, Champittet, Ecole Nouvelle, etc.) and with the Département de l'Instruction Publique (DIP) Genève. Courses and camps are usually in French but English groups can be set up on demand. FUTUREKIDS Computer Camps (during school holidays) FUTUREKIDS Computer Camps are a way of having a great time during vacations while learning something useful, possibly discovering a new hobby or even, why not, a future profession. Our computer camps are at the forefront of technology. Themes are diverse and suit all ...

  10. Offer

    CERN Multimedia

    Staff Association

    2010-01-01

      Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 22th to 29th November 2010

  11. Offer

    CERN Multimedia

    Staff Association

    2011-01-01

      Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 25th to 27th March 2011  

  12. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    SPECIAL OFFER FOR OUR MEMBERS Single tariff Adulte/Enfant Tickets “Zone terrestre” 20 euros instead of 25 euros. Access to Aqualibi: 5 euros instead of 8 euros on presentation of your ticket SA member. Free for children under 3, with limited access to the attractions. More information on our website : http://association.web.cern.ch/association/en/OtherActivities/Walibi.html

  13. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    SPECIAL OFFER FOR OUR MEMBERS Prices Spring and Summer 2012 Half-day ticket: 5 hours, same price weekends, public holidays and weekdays. Children from 5 to 15 years old: 26 CHF instead of 35 CHF Adults from 16 years old: 32 CHF instead of 43 CHF Bonus! Free for children under 5. Aquaparc Les Caraïbes sur Léman 1807 Le Bouveret (VS)

  14. Offer

    CERN Multimedia

    CARLSON WAGONLIT TRAVEL

    2011-01-01

    Special offer   From 14th to 28th February 2011: no CWT service fee! For any new reservation of a holiday package (flight + hotel/apartment) from a catalog “summer 2011” For any additional information our staff is at your disposal from Monday – Friday, from 8h30 to 16h30. Phone number 72763 or 72797 Carlson Wagonlit Tavel, Agence du CERN  

  15. Offers

    CERN Document Server

    Staff Association

    2011-01-01

    Banque cantonale de Genève (BCGE) The BCGE Business partner programme devised for members of the CERN Staff Association offers personalized banking solutions with preferential conditions. The advantages are linked to salary accounts (free account keeping, internet banking, free Maestro and credit cards, etc.), mortgage lending, retirement planning, investment, credit, etc. The details of the programme and the preferential conditions are available on our website: http://association.web.cern.ch/association/en/OtherActivities/BCGE.html.  

  16. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    Special offer for members of the Staff Association and their families 10 % reduction on all products in the Sephora shop (sells perfume, beauty products etc.) in Val Thoiry all year round. Plus 20 % reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * next “vente privée” from 21st November to 1st December 2012 Please contact the Staff Association Secretariat to get the discount voucher.

  17. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 21st to 26th May 2012 Please contact the Staff Association Secretariat to get the discount voucher  

  18. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    The « Théâtre de Carouge » offers a 5.- CHF discount for all shows (30.- CHF instead of 35.- CHF) and for the season tickets "Premières représentations" (132.- CHF instead of 162.- CHF) and "Classique" (150.- CHF instead of 180.- CHF). Please send your reservation by email to smills@tcag.ch via your professional email address. Please indicate the date of your reservation, your name and firstname and your telephone number A confirmation will be sent by email. Your membership card will be asked when you collect the tickets. More information on www.tcag.ch and www.tcag.ch/blog/

  19. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Special offer for members of the Staff Association and their families 10 % reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20 % reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 11th to 23rd November 2013 Please contact the Staff Association Secretariat to get the discount voucher.  

  20. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    Special offer for members of the Staff Association and their families 10 % reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Simply present your Staff Association membership card when you make your purchase. Plus 20 % reduction during their “vente privée”* three or four times a year. * Next “vente privée” from 24th September to 6th November 2014 Please contact the Staff Association Secretariat to get the discount voucher.  

  1. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    Passeport Gourmand   Are you dying for a nice meal? The “Passeport Gourmand” offers discounted prices to the members of the Staff Association (available until April 2015 and on sale in the Staff Association Secretariat): Passeport gourmand Ain / Savoie/ Haute Savoie: 56 CHF instead of 79 CHF. Passeport gourmand Geneva / neighbouring France:72 CHF instead of 95 CHF. To the members of the Staff Association: Benefit of reduced tickets: CHF 10 (instead of  18 CHF at the desk) on sale to the secretariat of the Staff Association, Building 510-R010 (in front of the Printshop).

  2. Offers

    CERN Multimedia

    Staff Association

    2015-01-01

    New season 2015-2016 The new season was revealed in May, and was warmly welcomed by the press, which is especially enthusiastic about the exceptional arrival of Fanny Ardand in September in the framework of Cassandre show. Discover the programme 2015-2016. The theatre La Comédie proposes different offers to our members Benefit from a reduction of 20 % on a full price ticket during all the season: from 38 CHF to 23 CHF ticket instead of 50 CHF to 30 CHF depending on the show. Buy two seasonal tickets at the price of one (offers valid upon availability, and until 30 september 2015) 2 Cards Libertà for 240 CHF instead of 480 CHF. Cruise freely through the season with 8 perfomances of your choice per season. These cards are transferrable, and can be shared with one or more accompanying persons. 2 Abo Piccolo for 120 CHF instead of 240 CHF. Let yourself be surprised a theatre performance with our discovery seasonal tickets, which includes 4 flagship perfomances for the season. ...

  3. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    At the UN Cultural kiosk (door C6) This offer is meant for international civil servants, members of diplomatic missions as well as official delegates under presentation of their accreditation card. Matthew Lee & 5 musiciens Du Blues, du Boogie, du Rock’n’Roll 28 octobre 2011 à 20h30 Théâtre du Léman Quai du Mont-Blanc 19 Hôtel Kempinski Genève Matthew Lee is an exciting pianist singer combining classic Rock’n’Roll with timeless ballads. He revisits the standards, being alternately Jerry Lee Lewis, Chuck Berry, Little Richards and many others... He is a showman with a soulful voice and displays virtuosity during his piano solos. Simply amazing! 20 % reduction Tickets from 32 to 68 CHF Kiosque Culturel ONU Palais des Nations Porte 6 Avenue de la Paix 8-14 1211 Genève 10 Tél. 022 917 11 11 info@kiosqueonu.ch

  4. Offers

    CERN Multimedia

    Association du personnel

    2010-01-01

    THEATRE FORUM DE MEYRIN 1, place des Cinq-Continents 1217 Meyrin    Special offer for members of the Staff Association: Reduced ticket prices for the play Love is my sin (in English) from 15 to 17 March at 8.30pm http://www.forum-meyrin.ch/main.php?page=119&s=12   First category: 37 CHF instead of 46 CHF Second category (seats towards the sides): 30 CHF instead of 38 CHF Please present your CERN card and your Staff Association membership card at the ticket office. Ticket reservation: tel. 022 989 34 34 (from Monday to Friday 2pm to 6pm) or e-mail : billetterie@forum-meyrin.ch  

  5. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    FUTUREKIDS proposes 15% discount for the Staff Association members who enroll their children in FUTUREKIDS activities. New workshop for 12-15 year olds, on how to develop applications for Android phones. Easter activities calendar Extracurricular Activities For Your Children The FUTUREKIDS Geneva Learning Center is open 6 days a week and offers a selection of after-school extracurricular activities for children and teenagers (ages 5 to 16). In addition to teaching in its Learning Centers, Futurekids collaborates with many private schools in Suisse Romande (Florimont, Moser, Champittet, Ecole Nouvelle, etc.) and with the Département de l'Instruction Publique (DIP) Genève. Courses and camps are usually in French but English groups can be set up on demand. FUTUREKIDS Computer Camps (during school holidays) FUTUREKIDS Computer Camps are a way of having a great time during vacations while learning something useful, possibly discovering a new hobby or even, why not, a fut...

  6. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Do not hesitate to benefit of our offers in our partners: Théâtre de Carouge Discount of 5 CHF for all shows (30 CHF instead of 35 CHF) and on season tickets « first performance » ( 132 CHF instead 162 CHF) and also on « classical » ( 150 CHF instead of 180 CHF) upon presentation of your Staff Association membership card before payment. Théâtre La Comédie de Genève  20% off on tickets (full price – also available for partner): from 24 to 32 CHF a ticket instead of 30 to 40 CHF depending on the shows. 40% off on annual subscriptions (access to the best seats, pick up tickets at the last minute): 200 CHF for 9 shows (about 22 CHF a ticket instead of 30 to 40 CHF. Discounted card: 60 CHF and single price ticket of 16 CHF.

  7. Offer

    CERN Multimedia

    Staff Association

    2015-01-01

    RRP Communication organizes cultural events such as concerts, shows, sporting events. The members of the Staff Association profits from a reduction of 10 CHF per ticket. How to proceed: The ticket reservation is made by mail info@rrp.ch. You need to give the following information: Name of the show, and which date chosen Number of tickets, and category Name and surname Address Telephone number Mention “offer CERN”, and attach a photocopy of your Staff Association member card. After your reservation, you will be sent a copy with a payslip to the address mentioned above. Once paid, the members have the possibility to: pick up their ticket(s) from the cash register the evening of the show (opens 1 hour before the show) by showing their member card; receive the ticket(s) to the address indicated above, by registered mail, subject to an extra cost of 10CHF. Next show : More information at http://www.rrp.ch/

  8. Offer

    CERN Document Server

    Staff Association

    2011-01-01

    DETAILS OF THE AGREEMENT WITH BCGE The BCGE Business partner programme devised for members of the CERN Staff Association offers personalized banking solutions with preferential conditions. The advantages are linked to salary accounts (free account keeping, internet banking, free Maestro and credit cards, etc.), mortgage lending, retirement planning, investment, credit, etc. The details of the programme and the preferential conditions are available on the Staff Association web site and from the secretariat (http://cern.ch/association/en/OtherActivities/BCGE.html). To benefit from these advantages, you will need to fill in the form available on our site, which must then be stamped by the Staff Association as proof that you are a paid-up member.  

  9. Offer

    CERN Multimedia

    Staff Association

    2016-01-01

    The “La Comédie” theatre unveiled its programme for the season 2016–2017 in late May, and it was met with great enthusiasm by the press. Leading names of the European and Swiss theatre scenes, such as director Joël Pommerat who recently won four Molière awards, will make an appearance! We are delighted to share this brand new, rich and varied programme with you. The “La Comédie” theatre has various discounts for our members Buy 2 subscriptions for the price of 1 : 2 cards “Libertà” for CHF 240.- instead of CHF 480.- Cruise freely through the season with an 8-entry card valid for the shows of your choice. These cards are transferable and can be shared with one or more accompanying persons. 2 cards “Piccolo” for CHF 120 instead of CHF 240.- This card lets you discover 4 shows which are suitable for all audiences (offers valid while stock lasts and until October 31, 20...

  10. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 21st to 26th November 2011 New BCGE Business partner benefits As you may remember thanks to our BCGE business partner agreement you benefit from various advantages such as free annual subscription on your Silver or Gold credit card both for yourself and your partner (joint account). Please be informed that as of October 1st  2011 the below mentioned features will be added to your annual credit card subscription : MasterCard/Visa Silver and Gold: travel cancellation as well as related services such as holiday interruption best guaranteed price Only for Ma...

  11. 17 CFR 230.415 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-04-01

    ... majority-owned subsidiary; or (xi) Shares of common stock which are to be offered and sold on a delayed or... an existing trading market for outstanding shares of the same class at other than a fixed price. (5... and sale of securities. 230.415 Section 230.415 Commodity and Securities Exchanges SECURITIES AND...

  12. Framatome offers new high density Cadminox racks

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    Framatome have developed a new material called Cadminox for use in high density spent fuel storage racks. It is claimed that Cadminox will remain stable stable in pond storage when racks submerged in boronated water are irradiated by the spent fuel they contain. A brief description of the storage module is given, including the aseismic bearing device which minimises loads on pond walls, racks and fuel assemblies. (UK)

  13. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  14. High-testosterone men reject low ultimatum game offers.

    Science.gov (United States)

    Burnham, Terence C

    2007-09-22

    The ultimatum game is a simple negotiation with the interesting property that people frequently reject offers of 'free' money. These rejections contradict the standard view of economic rationality. This divergence between economic theory and human behaviour is important and has no broadly accepted cause. This study examines the relationship between ultimatum game rejections and testosterone. In a variety of species, testosterone is associated with male seeking dominance. If low ultimatum game offers are interpreted as challenges, then high-testosterone men may be more likely to reject such offers. In this experiment, men who reject low offers ($5 out of $40) have significantly higher testosterone levels than those who accept. In addition, high testosterone levels are associated with higher ultimatum game offers, but this second finding is not statistically significant.

  15. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  16. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  17. High-testosterone men reject low ultimatum game offers

    OpenAIRE

    Burnham, Terence C

    2007-01-01

    The ultimatum game is a simple negotiation with the interesting property that people frequently reject offers of ‘free’ money. These rejections contradict the standard view of economic rationality. This divergence between economic theory and human behaviour is important and has no broadly accepted cause. This study examines the relationship between ultimatum game rejections and testosterone. In a variety of species, testosterone is associated with male seeking dominance. If low ultimatum game...

  18. CERN to offer secure grid, published in itWorldCanada

    CERN Multimedia

    Broersma, Matthew

    2006-01-01

    CERN, the Geneva-based nuclear physics research center, has launched a collaborative effort with some of the biggest name in IT to tighten up security on its landmark Large Hadron Collider (LHC) project, as well as working on platform virtualization and the interoperability of grid software (1 page)

  19. 17 CFR 230.463 - Report of offering of securities and use of proceeds therefrom.

    Science.gov (United States)

    2010-04-01

    ... effective registration statement for securities to be issued: (1) In a business combination described in Rule 145(a) (§ 230.145(a)); (2) By an issuer which pursuant to a business combination described in Rule 145(a) has succeeded to another issuer that prior to such business combination had a registration...

  20. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  1. An Architecture Offering Mobile Pollution Sensing with High Spatial Resolution

    Directory of Open Access Journals (Sweden)

    Oscar Alvear

    2016-01-01

    Full Text Available Mobile sensing is becoming the best option to monitor our environment due to its ease of use, high flexibility, and low price. In this paper, we present a mobile sensing architecture able to monitor different pollutants using low-end sensors. Although the proposed solution can be deployed everywhere, it becomes especially meaningful in crowded cities where pollution values are often high, being of great concern to both population and authorities. Our architecture is composed of three different modules: a mobile sensor for monitoring environment pollutants, an Android-based device for transferring the gathered data to a central server, and a central processing server for analyzing the pollution distribution. Moreover, we analyze different issues related to the monitoring process: (i filtering captured data to reduce the variability of consecutive measurements; (ii converting the sensor output to actual pollution levels; (iii reducing the temporal variations produced by mobile sensing process; and (iv applying interpolation techniques for creating detailed pollution maps. In addition, we study the best strategy to use mobile sensors by first determining the influence of sensor orientation on the captured values and then analyzing the influence of time and space sampling in the interpolation process.

  2. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  3. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  4. Security of highly radioactive sources in Nepal

    International Nuclear Information System (INIS)

    Shrestha, Kamal K.

    2010-01-01

    Subsequent to 9/11, concerned countries and UN agencies have taken especial interest in the security of highly radioactive sources throughout the world. The IAEA Nuclear Security Plan (2006-2009) consequently made as a result of UN Security Council Resolution 1540 is binding to all States. The Global Threat Reduction Initiative (GTRI) of the US and the Global Threat Reduction Programme (GTRP) of UK have assisted the four hospitals in Nepal having more than 1,000 Curies of radioactivity in their Cobalt-60 sources used for teletherapy. The physical upgrade of the security of the nuclear materials has also been launched in Nepal for prevention of theft with malicious intention or threats. In this presentation, the radioisotopes in Nepal that comes under different categories according to TECDOC-1355 of IAEA will be described. Problems and issues regarding the security and protection of radioactive sources at hospitals, academic and research institutions that could be prevalent in many developing counties too will be discussed by taking a case study of one of the cancer hospitals in Kathmandu valley. (author)

  5. 17 CFR 230.903 - Offers or sales of securities by the issuer, a distributor, any of their respective affiliates...

    Science.gov (United States)

    2010-04-01

    ... applicable) are denominated in a currency other than U.S. dollars and such securities are neither convertible into U.S. dollar-denominated securities nor linked to U.S. dollars (other than through related currency or interest rate swap transactions that are commercial in nature) in a manner that in effect converts...

  6. Suicide in high security hospital patients.

    Science.gov (United States)

    Jones, Roland M; Hales, Heidi; Butwell, Martin; Ferriter, Mike; Taylor, Pamela J

    2011-08-01

    People with mental disorder and people who are violent are separately recognised as being at high risk of suicide. People detained in high security hospitals are recognised for their violence to others, but perhaps less so for their suicide potential. We aimed to investigate suicide rates among such patients during and after their high security hospital residency, and to establish risk factors for suicide. We extracted data from the Special Hospitals' Case Register on each person resident at any time between 1 January 1972 and 31 December 2000. Suicide rates were calculated for the whole period. We compared rates to the general population using standardised mortality ratios (SMRs). We used poisson regression to estimate the effects of gender, legal category of detention, offending history and length of admission on the suicide rate. Of the 5,955 individuals, 218 completed suicide. The suicide rate was nearly 7 times higher among resident men (SMR 662, 95% CI 478-845) and over 40 times higher in resident women (SMR 4,012, 95% CI 2,526-5,498) than in the general population; it was 23 times higher (SMR 2,325, 95% CI 1,901-2,751) and 45 times higher (SMR 4,486, 95% CI 2,727-6,245) among post-discharge men and women, respectively. The suicide rate was significantly higher among women than men inside high security but not after discharge. The suicide rate among high security hospital patients was significantly higher than in the general population. Women were especially at risk while resident, whereas for men, the risk was higher after discharge.

  7. 17 CFR 230.504 - Exemption for limited offerings and sales of securities not exceeding $1,000,000.

    Science.gov (United States)

    2010-04-01

    ... require the public filing and delivery to investors of a substantive disclosure document before sale, and... only to “accredited investors” as defined in § 230.501(a). (2) The aggregate offering price for an... § 230.504 fails to meet the limitation on the aggregate offering price, it does not affect the...

  8. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  9. Offering an Anatomy and Physiology Course through a High School-University Partnership: The Minnesota Model

    Science.gov (United States)

    Jensen, Murray; Mattheis, Allison; Loyle, Anne

    2013-01-01

    This article describes a one-semester anatomy and physiology course that is currently offered through the concurrent enrollment program at the University of Minnesota. The article explains how high school teachers are prepared to teach the course and describes efforts to promote program quality, student inquiry, and experiential learning.…

  10. Retail offer advantage through brand orientation in Luxury, high fashion stores

    OpenAIRE

    Grujic, Maja

    2007-01-01

    This thesis provides a conceptualisation of brand orientation within the context of fashion retailing, specially the luxury, or, so-called, high fashion retailing. Most of the high fashion sold today is ready to wear collections and diffusion lines, targeted to customers of particular class, age, income, social status, and with particular orientations to fashion. In plethora of offers, retailer need to work on a number of distinctive features that will make its store special, not only because...

  11. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  12. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  13. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  14. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  15. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  16. High Security at a Low Cost

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    In the future tiny devices with microcontrollers and sensors will be in charge of numerous activities in our lives. Tracking our energy consumption and CO2 emission, controlling our living conditions, enforcing security, and monitoring our health will be some examples of their functions These dev......In the future tiny devices with microcontrollers and sensors will be in charge of numerous activities in our lives. Tracking our energy consumption and CO2 emission, controlling our living conditions, enforcing security, and monitoring our health will be some examples of their functions...

  17. Introducing high-cost health care to patients: dentists' accounts of offering dental implant treatment.

    Science.gov (United States)

    Vernazza, Christopher R; Rousseau, Nikki; Steele, Jimmy G; Ellis, Janice S; Thomason, John Mark; Eastham, Jane; Exley, Catherine

    2015-02-01

    The decision-making process within health care has been widely researched, with shared decision-making, where both patients and clinicians share technical and personal information, often being cited as the ideal model. To date, much of this research has focused on systems where patients receive their care and treatment free at the point of contact (either in government-funded schemes or in insurance-based schemes). Oral health care often involves patients making direct payments for their care and treatment, and less is known about how this payment affects the decision-making process. It is clear that patient characteristics influence decision-making, but previous evidence suggests that clinicians may assume characteristics rather than eliciting them directly. The aim was to explore the influences on how dentists' engaged in the decision-making process surrounding a high-cost item of health care, dental implant treatments (DITs). A qualitative study using semi-structured interviews was undertaken using a purposive sample of primary care dentists (n = 25). Thematic analysis was undertaken to reveal emerging key themes. There were differences in how dentists discussed and offered implants. Dentists made decisions about whether to offer implants based on business factors, professional and legal obligations and whether they perceived the patient to be motivated to have treatment and their ability to pay. There was evidence that assessment of these characteristics was often based on assumptions derived from elements such as the appearance of the patient, the state of the patient's mouth and demographic details. The data suggest that there is a conflict between three elements of acting as a healthcare professional: minimizing provision of unneeded treatment, trying to fully involve patients in shared decisions and acting as a business person with the potential for financial gain. It might be expected that in the context of a high-cost healthcare intervention for which

  18. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Naughton, III, Thomas J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  19. Video performance for high security applications

    International Nuclear Information System (INIS)

    Connell, Jack C.; Norman, Bradley C.

    2010-01-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  20. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  1. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Walibi Rhône-Alpes is open until 31 October. Reduced prices for children and adults at this French attraction park in Les Avenières. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  2. High enrichment to low enrichment core's conversion. Technical securities

    International Nuclear Information System (INIS)

    Abbate, P.; Madariaga, M.R.

    1990-01-01

    This work presents the fulfillment of the technical securities subscribed by INVAP S.E. for the conversion of a high enriched uranium core. The reactor (of 5 thermal Mw), built in the 50's and 60's, is of the 'swimming pool' type, with light water and fuel elements of the curve plates MTR type, enriched at 93.15 %. These are neutronic and thermohydraulic securities. (Author) [es

  3. Special offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  4. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. Walibi: reduced prices for children and adults at this French attraction park in Les Avenières. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  5. Delivering high-level food industry skills for future food security through Advanced Training Partnerships

    OpenAIRE

    Frazier, Richard A.

    2013-01-01

    The UK Biotechnology and Biological Sciences Research Council’s Advanced Training Partnerships initiative represents a significant investment in the provision of high-level skills for the UK food industry sector to address global food security from farm to fork. This paper summarises the background, aims and scope of the Advanced Training Partnerships, their development so far, and offers a view on future directions and evaluation of impact.

  6. Offers INTERSOCCER

    CERN Multimedia

    Staff Association

    2014-01-01

      Summer Football camps   New offer to the members of the Staff Association – INTERSOCCER: 12% discount on summer football camps and courses for children (bilingual) so do not hesitate anymore!    

  7. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  8. Special Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for all active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  9. Offering a Forensic Science Camp to Introduce and Engage High School Students in Interdisciplinary Science Topics

    Science.gov (United States)

    Ahrenkiel, Linda; Worm-Leonhard, Martin

    2014-01-01

    In this article, we present details of a one-week interdisciplinary science camp for high school students in Denmark, "Criminal Camp". We describe the use of forensic science and simulated crimes as a common foundation for teaching the theory and practice of concepts in chemistry, physics, and medicine or biology. The main goal of the…

  10. Offering a Forensic Science Camp To Introduce and Engage High School Students in Interdisciplinary Science Topics

    DEFF Research Database (Denmark)

    Ahrenkiel, Linda; Worm-Leonhard, Martin

    2014-01-01

    In this article, we present details of a one-week interdisciplinary science camp for high school students in Denmark, “Criminal Camp”. We describe the use of forensic science and simulated crimes as a common foundation for teaching the theory and practice of concepts in chemistry, physics...... of the subjects taught and scientific literacy in general....

  11. Stricter School Soda Limits Offered: Facing Lawsuit Threat, Beverage Industry Vows to Curb High-Calorie Drinks

    Science.gov (United States)

    Samuels, Christina A.

    2006-01-01

    The soft-drink industry vowed to voluntarily curb selling sugary sodas and other high-calorie beverages in schools, a move that was taken under threat of litigation by critics who see the industry as a prime culprit in a national obesity crisis. The promise offered no guarantee that schools would go along with the restrictions, though many…

  12. Special offer

    CERN Multimedia

    Staff Association

    2010-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * next “vente privée” from 24th to 29th May 2010  

  13. Special offer

    CERN Multimedia

    Staff Association

    2011-01-01

    SPECIAL OFFER FOR OUR MEMBERS Tarif unique Adulte/Enfant Entrée Zone terrestre 19 euros instead of 23 euros Entrée “Zone terrestre + aquatique” 24 euros instead of 31 euros Free for children under 3, with limited access to the attractions. Walibi Rhône-Alpes is open daily from 22 June to 31 August, and every week end from 3 September until 31 October. Closing of the “zone aquatique” 11 September.

  14. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  15. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  16. High-throughput sequencing offers insight into mechanisms of resource partitioning in cryptic bat species

    DEFF Research Database (Denmark)

    Razgour, Orly; Clare, Elizabeth L.; Zeale, Matt R. K.

    2011-01-01

    Sympatric cryptic species, characterized by low morphological differentiation, pose a challenge to understanding the role of interspecific competition in structuring ecological communities. We used traditional (morphological) and novel molecular methods of diet analysis to study the diet of two...... of the cryptic bats, 60% of which were assigned to a likely species or genus. The findings from the molecular study supported the results of microscopic analyses in showing that the diets of both species were dominated by lepidopterans. However, HTS provided a sufficiently high resolution of prey identification...

  17. Laparoscopic Nissen fundoplication offers high patient satisfaction with relief of extraesophageal symptoms of gastroesophageal reflux disease.

    Science.gov (United States)

    Rakita, Steven; Villadolid, Desiree; Thomas, Ashley; Bloomston, Mark; Albrink, Michael; Goldin, Steven; Rosemurgy, Alexander

    2006-03-01

    Nissen fundoplication is applied for patients with gastroesophageal reflux disease (GERD), usually because of symptoms of esophageal injury. When presenting symptoms are extraesophageal, there is less enthusiasm for operative control of reflux because of concerns of etiology and efficacy. This study was undertaken to evaluate the efficacy of laparoscopic Nissen fundoplication in palliating extraesophageal symptoms of GERD. Patients were asked to score their symptoms before and after laparoscopic Nissen fundoplication on a Likert scale (0 = never/none to 5 = always/every time I eat). A total of 322 patients with extraesophageal symptoms (asthma, cough, gas/bloat, chest pain, and odynophagia) of 4 to 5 were identified and analyzed. After fundoplication, all extraesophageal symptom scores improved (P < 0.0001 for all, Wilcoxon matched-pairs test). Likewise, postoperative symptoms were noted to be greatly improved or resolved in 67 per cent to 82 per cent of patients for each symptom. Furthermore, after fundoplication, patients were less likely to modify their dietary (82% vs 49%) or sleeping habits (70% vs 28%) to avoid initiating/ exacerbating symptoms. Although extraesophageal symptoms are conventionally thought to be inadequately palliated by surgery, this study documents excellent relief of extraesophageal symptoms after laparoscopic Nissen fundoplication, denotes high patient satisfaction, and encourages application of laparoscopic Nissen fundoplication.

  18. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  19. 17 CFR 240.13e-102 - Schedule 13E-4F. Tender offer statement pursuant to section 13(e) (1) of the Securities Exchange...

    Science.gov (United States)

    2010-04-01

    ... enforcement by investors of civil liabilities under the federal securities laws may be affected adversely by... disclosure requirements of the country in which the issuer is incorporated or organized, investors should be... directors are residents of a foreign country. “Investors should be aware that the issuer or its affiliates...

  20. Integrated safeguards and security for a highly automated process

    International Nuclear Information System (INIS)

    Zack, N.R.; Hunteman, W.J.; Jaeger, C.D.

    1993-01-01

    Before the cancellation of the New Production Reactor Programs for the production of tritium, the reactors and associated processing were being designed to contain some of the most highly automated and remote systems conceived for a Department of Energy facility. Integrating safety, security, materials control and accountability (MC and A), and process systems at the proposed facilities would enhance the overall information and protection-in-depth available. Remote, automated fuel handling and assembly/disassembly techniques would deny access to the nuclear materials while upholding ALARA principles but would also require the full integration of all data/information systems. Such systems would greatly enhance MC and A as well as facilitate materials tracking. Physical protection systems would be connected with materials control features to cross check activities and help detect and resolve anomalies. This paper will discuss the results of a study of the safeguards and security benefits achieved from a highly automated and integrated remote nuclear facility and the impacts that such systems have on safeguards and computer and information security

  1. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  2. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  3. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  4. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  5. Optimizing a physical security configuration using a highly detailed simulation model

    NARCIS (Netherlands)

    Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.

    2009-01-01

    This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security

  6. OFFER SOLUTIONS FOR THE DEVELOPMENT OF PROJECTS OF ENERGY-EFFICIENT HIGH-RISE BUILDINGS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    DYACHENKO L. Yu.

    2016-04-01

    Full Text Available Raising of problem. Today, the question of ecology is in the first place all over the world. Our homes are not just destroying nature, but also need a lot of energy. 40% of the world's energy goes to lighting, air conditioning, heating, etc. Ukraine is a country, in which there are many cities with large industrial zones. By introducing a number of innovations for increasing energy efficiency we can improve the ecological situation in the country. The purpose of the article is offer solutions for the development of projects of energy-efficient high-rise buildings in Ukraine. Conclusion. Proposed solutions for the development of projects of energy-efficient high-rise buildings in Ukraine will allow to solve the problems: ecology, energy saving, saving of natural resources in the country in the near future.

  7. White paper for a competitive energy offer at the service of an achieved energy transition and of a guaranteed security of supply

    International Nuclear Information System (INIS)

    2017-02-01

    Published by a professional body (AFIEG, Independent French Association of Electricity and Gas)), this white paper first gives an overview and some critics on the French energy policy, and then aims at outlining and discussing three main objectives of an energy policy: security of supply, energy competitiveness, and a realistic and successful energy transition. It proposes measures to reach these objectives while taking regulatory stability, and equal treatment of operators in terms of regulation into account. Recommendations are stated regarding these objectives and requirements

  8. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  9. Visceral organ weights, digestion and carcass characteristics of beef bulls differing in residual feed intake offered a high concentrate diet.

    Science.gov (United States)

    Fitzsimons, C; Kenny, D A; McGee, M

    2014-06-01

    This study examined the relationship of residual feed intake (RFI) with digestion, body composition, carcass traits and visceral organ weights in beef bulls offered a high concentrate diet. Individual dry matter (DM) intake (DMI) and growth were measured in a total of 67 Simmental bulls (mean initial BW 431 kg (s.d.=63.7)) over 3 years. Bulls were offered concentrates (860 g/kg rolled barley, 60 g/kg soya bean meal, 60 g/kg molasses and 20 g/kg minerals per vitamins) ad libitum plus 0.8 kg grass silage DM daily for 105 days pre-slaughter. Ultrasonic muscle and fat depth, body condition score (BCS), muscularity score, skeletal measurements, blood metabolites, rumen fermentation and total tract digestibility (indigestible marker) were determined. After slaughter, carcasses and perinephric and retroperitoneal fat were weighed, carcasses were graded for conformation and fat score and weight of non-carcass organs, liver, heart, kidneys, lungs, gall bladder, spleen, reticulo-rumen full and empty and intestines full, were determined. The residuals of the regression of DMI on average daily gain (ADG), mid-test metabolic BW (BW0.75) and the fixed effect of year, using all animals, were used to compute individual RFI coefficients. Animals were ranked on RFI and assigned to high (inefficient), medium or low groupings. Overall mean ADG and daily DMI were 1.6 kg (s.d.=0.36) and 9.4 kg (s.d.=1.16), respectively. High RFI bulls consumed 7 and 14% more DM than medium and low RFI bulls, respectively (P0.05) for ADG, BW, BCS, skeletal measurements, muscularity scores, ultrasonic measurements, carcass weight, perinephric and retroperitoneal fat weight, kill-out proportion and carcass conformation and fat score. However, regression analysis indicated that a 1 kg DM/day increase in RFI was associated with a decrease in kill-out proportion of 20 g/kg (Pcarcass conformation of 0.74 units (Pcarcass organs did not differ (P>0.05) between RFI groups except for the empty weight of reticulo

  10. Improving STD testing behavior among high-risk young adults by offering STD testing at a vocational school

    Directory of Open Access Journals (Sweden)

    Hoebe Christian JPA

    2011-09-01

    Full Text Available Abstract Background Chlamydia trachomatis infection (CT is the most prevalent bacterial STD. Sexually active adolescents and young adults are the main risk group for CT. However, STD testing rates in this group are low since exposed individuals may not feel at risk, owing-at least in part-to the infection's largely asymptomatic nature. Designing new testing environments that are more appealing to young people who are most at risk of acquiring chlamydia can be an important strategy to improve overall testing rates. Here we evaluate the effect of a school-based sexual health program conducted among vocational school students, aiming to obtain better access for counseling and enhance students' STD testing behavior. Methods Adolescents (median age 19 years attending a large vocational school were provided with sexual health education. Students filled in a questionnaire measuring CT risk and were offered STD testing. Using univariate and multivariate analysis, we assessed differences between men and women in STD-related risk behavior, sexual problems, CT testing behavior and determinants of CT testing behavior. Results Of 345 participants, 70% were female. Of the 287 sexually active students, 75% were at high risk for CT; one third of women reported sexual problems. Of sexually active participants, 61% provided a self-administered specimen for STD testing. Independent determinants for testing included STD related symptoms and no condom use. All CT diagnoses were in the high-CT-risk group. In the high-risk group, STD testing showed an increased uptake, from 27% (previous self-reported test to 65% (current test. CT prevalence was 5.7%. Conclusions Vocational school students are a target population for versatile sexual health prevention. When provided with CT testing facilities and education, self selection mechanisms seemed to increase CT testing rate dramatically in this high-CT-risk population expressing sexual problems. Considering the relative ease

  11. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  12. Highly Luminescent Dual Mode Polymeric Nanofiber-Based Flexible Mat for White Security Paper and Encrypted Nanotaggant Applications.

    Science.gov (United States)

    Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar

    2018-05-23

    Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. CONSIDERATIONS REGARDING THE 21st CENTURY’s HIGH QUALITY SECURITY CONCEPT

    Directory of Open Access Journals (Sweden)

    Eugen SITEANU

    2017-12-01

    Full Text Available The present paper is devoted to qualitative security which today has to become a topic issue of world security. The opinions regarding the 21st century’s security concept are contradictory since people have different understandings and perceptions of security, respectively insecurity, and do not agree to analyze the security concept as a function of the system. Our take is that implementation of some new security concepts should aim an analysis and understanding of security in an integrating view, in order to make the most comprehensive security environment possible. Therefore, we do believe that it is necessary to define the concept of high quality security, which is translated in our current paper.

  14. 17 CFR 240.14d-102 - Schedule 14D-1F. Tender offer statement pursuant to rule 14d-1(b) under the Securities Exchange...

    Science.gov (United States)

    2010-04-01

    ... satisfy the legibility requirements for the required legends relating to type size and font by presenting... bold-face roman type at least as high as ten-point modern type and at least two points leaded: “This...

  15. Quantum secure direct communication with high-dimension quantum superdense coding

    International Nuclear Information System (INIS)

    Wang Chuan; Li Yansong; Liu Xiaoshu; Deng Fuguo; Long Guilu

    2005-01-01

    A protocol for quantum secure direct communication with quantum superdense coding is proposed. It combines the ideas of block transmission, the ping-pong quantum secure direct communication protocol, and quantum superdense coding. It has the advantage of being secure and of high source capacity

  16. Vraaggestuurd Programma 2012-2014. Voortgangsrapportage 2013, VP Security, Thema VII High Tech Systemen en Materialen

    NARCIS (Netherlands)

    Don, J.A.

    2014-01-01

    De roadmap Security voor topsector High Tech Systems & Materials wordt gedragen door een breed consortium van bedrijven, overheden, TNO, NLR en STW/NWO (zie www.htsm.nl). Onder regie van het roadmapteam Security is het plan 2013 voor TNO-Vraaggestuurd Onderzoeksprogramma Security 2012-2014 opgesteld

  17. 17 CFR 230.253 - Offering circular.

    Science.gov (United States)

    2010-04-01

    .... Repetition of information should be avoided; cross-referencing of information within the document is... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...

  18. Ultra-high bandwidth quantum secured data transmission

    Science.gov (United States)

    Dynes, James F.; Tam, Winci W.-S.; Plews, Alan; Fröhlich, Bernd; Sharpe, Andrew W.; Lucamarini, Marco; Yuan, Zhiliang; Radig, Christian; Straw, Andrew; Edwards, Tim; Shields, Andrew J.

    2016-10-01

    Quantum key distribution (QKD) provides an attractive means for securing communications in optical fibre networks. However, deployment of the technology has been hampered by the frequent need for dedicated dark fibres to segregate the very weak quantum signals from conventional traffic. Up until now the coexistence of QKD with data has been limited to bandwidths that are orders of magnitude below those commonly employed in fibre optic communication networks. Using an optimised wavelength divisional multiplexing scheme, we transport QKD and the prevalent 100 Gb/s data format in the forward direction over the same fibre for the first time. We show a full quantum encryption system operating with a bandwidth of 200 Gb/s over a 100 km fibre. Exploring the ultimate limits of the technology by experimental measurements of the Raman noise, we demonstrate it is feasible to combine QKD with 10 Tb/s of data over a 50 km link. These results suggest it will be possible to integrate QKD and other quantum photonic technologies into high bandwidth data communication infrastructures, thereby allowing their widespread deployment.

  19. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  20. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation

  1. 75 FR 32840 - Securities Offering Disclosures

    Science.gov (United States)

    2010-06-09

    ... make an informed investment decision regarding a possible purchase or sale of a savings association's... control number. As part of the approval process, we invite comments on the following information...

  2. What benefits do initiatives such as Industry 4.0 offer for production locations in high-wage countries?

    OpenAIRE

    Schönsleben, Paul; Fontana, Filippo; Duchi, Aldo

    2017-01-01

    According to claims made by the proponents of initiatives such as Industry 4.0, information technologies will in the future play a substantially more significant role in production processes both for the service sector and for the production of physical goods than they do today. This paper starts by discussing the origins, essence and expectations of initiatives such as Industry 4.0. It then proceeds to outline concepts and examples around such initiatives. Finally, it offers a realistic view...

  3. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

    Science.gov (United States)

    Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2013-12-01

    Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.

  4. Defining the Needs of Patients with Intellectual Disabilities in the High Security Psychiatric Hospitals in England

    Science.gov (United States)

    Thomas, S. D.; Dolan, M.; Johnston, S.; Middleton, H.; Harty, M. A.; Carlisle, J.; Thornicroft, G.; Appleby, L.; Jones, P.

    2004-01-01

    Previous studies have suggested that a substantial proportion of the patients with intellectual disabilities (ID) in the high security psychiatric hospitals (HSPHs) should be transferred to more appropriate services to cater for their specific needs in the longer term. The individual and placement needs of high secure psychiatric patients detained…

  5. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  6. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  7. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  8. 17 CFR 230.802 - Exemption for offerings in connection with an exchange offer or business combination for the...

    Science.gov (United States)

    2010-04-01

    ... connection with an exchange offer or business combination for the securities of foreign private issuers. 230... Offers and Business Combinations § 230.802 Exemption for offerings in connection with an exchange offer or business combination for the securities of foreign private issuers. Offers and sales in any...

  9. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  10. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...... huge losses. Although OpenADR specificationsprovide continuous, secure and reliable two-way communications in application level defined in ISO model, which is also an open architecture for security is adopted by it and no specific or proprietary technologies is restricted to OpenADR itself....... It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...

  11. 17 CFR 230.419 - Offerings by blank check companies.

    Science.gov (United States)

    2010-04-01

    ... derivative securities relating to securities held in the escrow or trust account may be exercised or... other derivative securities issued in the initial offering are exercisable, there is a continuous... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offerings by blank check...

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. 12 CFR 563g.21 - Filing of copies of offering circulars in certain exempt offerings.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Filing of copies of offering circulars in certain exempt offerings. 563g.21 Section 563g.21 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.21 Filing of copies of offering circulars in certain...

  14. Missed opportunities to offer HIV tests to high-risk groups during general practitioners’ STI-related consultations: an observational study.

    NARCIS (Netherlands)

    Joore, I.K.; Reukers, D.F.M.; Donker, G.A.; Sighem, A.I. van; Coul, E.L.M. Op de; Prins, J.M.; Geerlings, S.E.; Barth, S.R.E.; Bergen, J.E.A.M. van; Broek, I.V.F. van den

    2016-01-01

    Objectives: Prior research has shown that Dutch general practitioners (GPs) do not always offer HIV testing and the number of undiagnosed HIV patients remains high. We aimed to further investigate the frequency and reasons for (not) testing for HIV and the contribution of GPs to the diagnosis of HIV

  15. Modern, PC based, high resolution portable EDXRF analyzer offers laboratory performance for field, in-situ analysis of environmental contaminants

    International Nuclear Information System (INIS)

    Piorek, Stanislaw

    1994-01-01

    The introduction of a new, high resolution, portable probe that has improved the sensitivity of the conventional field portable X-ray fluorescence (FPXRF) by up to an order of magnitude had been reported earlier [S. Piorek and J.R. Pasmore, Proc. 2nd Int. Symp. on Field Screening Methods for Hazardous Wastes and Toxic Chemicals, Las Vegas, 1991, p. 737]. A high resolution Si(Li) detector probe operates connected to a multichannel X-ray analyzer (2048 channels) which is housed in a portable, battery powered industrial computer. An improved energy resolution of the detector allows the implementation of more sophisticated data treatment methods to convert the measured intensities into mass concentrations of the analytes. A backscatter with a fundamental parameters approach (BFP) is one of the best methods, specifically for metallic contaminants in soil. A program has been written based on the BFP method for use with the new probe. The new software/probe combination enables one to quickly assess levels of contaminants on the site without the need of analyzed samples for instrument calibration. The performance of the EDXRF system in application to analysis of metals in contaminated soil is discussed in this paper. Also discussed is the extension of this method in the analysis of other types of environmental samples such as air particulates collected on filter paper. ((orig.))

  16. Offering lung cancer screening to high-risk medicare beneficiaries saves lives and is cost-effective: an actuarial analysis.

    Science.gov (United States)

    Pyenson, Bruce S; Henschke, Claudia I; Yankelevitz, David F; Yip, Rowena; Dec, Ellynne

    2014-08-01

    By a wide margin, lung cancer is the most significant cause of cancer death in the United States and worldwide. The incidence of lung cancer increases with age, and Medicare beneficiaries are often at increased risk. Because of its demonstrated effectiveness in reducing mortality, lung cancer screening with low-dose computed tomography (LDCT) imaging will be covered without cost-sharing starting January 1, 2015, by nongrandfathered commercial plans. Medicare is considering coverage for lung cancer screening. To estimate the cost and cost-effectiveness (ie, cost per life-year saved) of LDCT lung cancer screening of the Medicare population at high risk for lung cancer. Medicare costs, enrollment, and demographics were used for this study; they were derived from the 2012 Centers for Medicare & Medicaid Services (CMS) beneficiary files and were forecast to 2014 based on CMS and US Census Bureau projections. Standard life and health actuarial techniques were used to calculate the cost and cost-effectiveness of lung cancer screening. The cost, incidence rates, mortality rates, and other parameters chosen by the authors were taken from actual Medicare data, and the modeled screenings are consistent with Medicare processes and procedures. Approximately 4.9 million high-risk Medicare beneficiaries would meet criteria for lung cancer screening in 2014. Without screening, Medicare patients newly diagnosed with lung cancer have an average life expectancy of approximately 3 years. Based on our analysis, the average annual cost of LDCT lung cancer screening in Medicare is estimated to be $241 per person screened. LDCT screening for lung cancer in Medicare beneficiaries aged 55 to 80 years with a history of ≥30 pack-years of smoking and who had smoked within 15 years is low cost, at approximately $1 per member per month. This assumes that 50% of these patients were screened. Such screening is also highly cost-effective, at <$19,000 per life-year saved. If all eligible Medicare

  17. 12 CFR 563g.4 - Non-public offering.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Non-public offering. 563g.4 Section 563g.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.4 Non-public offering. Offers and sales of securities by an issuer that satisfy the conditions of...

  18. Selective extraction of actinides from high level liquid wastes. Study of the possibilities offered by the Redox properties of actinides

    International Nuclear Information System (INIS)

    Adnet, J.M.

    1991-07-01

    Partitioning of high level liquid wastes coming from nuclear fuel reprocessing by the PUREX process, consists in the elimination of minor actinides (Np, Am, and traces of Pu and U). Among the possible processes, the selective extraction of actinides with oxidation states higher than three is studied. First part of this work deals with a preliminary step; the elimination of the ruthenium from fission products solutions using the electrovolatilization of the RuO4 compound. The second part of this work concerns the complexation and oxidation reactions of the elements U, Np, Pu and Am in presence of a compound belonging to the insaturated polyanions family: the potassium phosphotungstate. For actinide ions with oxidation state (IV) complexed with phosphotungstate anion the extraction mechanism by dioctylamine was studied and the use of a chromatographic extraction technic permitted successful separations between tetravalents actinides and trivalents actinides. Finally, in accordance with the obtained results, the basis of a separation scheme for the management of fission products solutions is proposed

  19. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    Science.gov (United States)

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  20. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. A PROFICIENT MODEL FOR HIGH END SECURITY IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    R. Bala Chandar

    2014-01-01

    Full Text Available Cloud computing is an inspiring technology due to its abilities like ensuring scalable services, reducing the anxiety of local hardware and software management associated with computing while increasing flexibility and scalability. A key trait of the cloud services is remotely processing of data. Even though this technology had offered a lot of services, there are a few concerns such as misbehavior of server side stored data , out of control of data owner's data and cloud computing does not control the access of outsourced data desired by the data owner. To handle these issues, we propose a new model to ensure the data correctness for assurance of stored data, distributed accountability for authentication and efficient access control of outsourced data for authorization. This model strengthens the correctness of data and helps to achieve the cloud data integrity, supports data owner to have control on their own data through tracking and improves the access control of outsourced data.

  2. Threats to information security in a highly organized system of the “Smart city”

    Science.gov (United States)

    Kurcheeva, G. I.; Denisov, V. V.; Khvorostov, V. A.

    2017-01-01

    The article discusses issues related to comprehensive development and introduction of technologies such as “Smart city”. The urgency of accelerating the development of such highly organized systems, primarily in terms of reducing threats to information security, is emphasized in the paper. In accordance with authors’ analysis of the composition and structure of the threats to information security, “Accessibility”, “Integrity” and “Confidentiality” are highlighted. Violation of any of them leads to harmful effects on the information and other system resources. The protection of “Accessibility” mobilizes one third of all efforts to ensure information security that must be taken into account when allocating protective actions. The threats associated with failure of the supporting infrastructure are also significantly reduced. But the threats associated with failures of the system itself and failures of users are clearly increasing. There is a high level of society and production informatization, and the threats to information security are changing accordingly.

  3. Innovative gas offers

    International Nuclear Information System (INIS)

    Sala, O.; Mela, P.; Chatelain, F.

    2007-01-01

    New energy offers are progressively made available as the opening of gas market to competition becomes broader. How are organized the combined offers: gas, electricity, renewable energies and energy services? What are the marketing strategies implemented? Three participants at this round table present their offer and answer these questions. (J.S.)

  4. 12 CFR 335.501 - Tender offers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Tender offers. 335.501 Section 335.501 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY SECURITIES OF NONMEMBER INSURED BANKS § 335.501 Tender offers. The provisions of the applicable and currently...

  5. Security of bottle to fill in a high pressure air

    Science.gov (United States)

    Todic, M.; Latinovic, T.; Golubovic-Bugarski, V.; Majstorovic, A.

    2018-01-01

    Charging the bottle of high pressure air isolation devices is performed by a high-pressure compressor. The charging time is in function of the compressor capacity and the intensity of the nominal pressure of the air in the bottle. However, in accident situations this time is long and therefore high-pressure accumulators are used where the filling time of the bottle of isolation apparatus has been drastically reduced. Due to the short filling time of the bottle through the air flow, there is a thermodynamic load of bottle material that could endanger the safety of users and other participants in the area. It is therefore necessary to determine the critical parameters of the rapid charge and their intensity.

  6. Thin film CdTe based neutron detectors with high thermal neutron efficiency and gamma rejection for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Smith, L.; Murphy, J.W. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Kim, J. [Korean Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of); Rozhdestvenskyy, S.; Mejia, I. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Park, H. [Korean Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of); Allee, D.R. [Flexible Display Center, Arizona State University, Phoenix, AZ 85284 (United States); Quevedo-Lopez, M. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Gnade, B., E-mail: beg031000@utdallas.edu [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States)

    2016-12-01

    Solid-state neutron detectors offer an alternative to {sup 3}He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10{sup −6} gamma-ray efficiency.

  7. Leadership in organizations with high security and reliability requirements

    International Nuclear Information System (INIS)

    Gonzalez, F.

    2013-01-01

    Developing leadership skills in organizations is the key to ensure the sustainability of excellent results in industries with high requirements safety and reliability. In order to have a model of leadership development specific to this type of organizations, Tecnatom in 2011, we initiated a project internal, to find and adapt a competency model to these requirements.

  8. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

    Directory of Open Access Journals (Sweden)

    A. Yesu Raj

    2015-12-01

    Full Text Available Data security is the very important part in the network data communication. Avoidance of the information hacking and steeling are very challenging part for network data communication. Now-a-days people are using many encryption and decryption techniques for data security. But all encryption and decryption techniques are having more time occupation or less security for the process. This paper proposed high level security approach to encryption and decryption for data security. Two levels of securities are used in this proposed method. First one is data encryption and the second one is hash value generation. The proposed Weaving based Superior Encryption Standard (WSES uses a novel weaving based approach. The weaving array generation is done by Elementary Number Theory Notation (ENTN method. The weaving array has multiple private keys for XOR encryption. After encryption the error value is extracted from the encrypted array and weaving array. This error value is sent to the other side. The novel approach for hash value generation uses the encrypted array. After encryption, the encrypted array is rotated into four degrees and each degree data are converted to vector format and arranged on by one under the vector. Finally a 2D Rotational Encryption Matrix (REM is obtained. After this process a REM copy is converted to mirror flip and it is need as Flipped Matrix (FM. The FM is concatenated under the REM and converted to vector using the zigzag operation. Finally this process gives two bytes hash value from the vector. This proposed method executes very fast and provide high security. This method is much reliable to small size applications and also used for any type of data security.

  9. Education and Outreach Programs Offered by the Center for High Pressure Research and the Consortium for Materials Properties Research in Earth Sciences

    Science.gov (United States)

    Richard, G. A.

    2003-12-01

    Major research facilities and organizations provide an effective venue for developing partnerships with educational organizations in order to offer a wide variety of educational programs, because they constitute a base where the culture of scientific investigation can flourish. The Consortium for Materials Properties Research in Earth Sciences (COMPRES) conducts education and outreach programs through the Earth Science Educational Resource Center (ESERC), in partnership with other groups that offer research and education programs. ESERC initiated its development of education programs in 1994 under the administration of the Center for High Pressure Research (CHiPR), which was funded as a National Science Foundation Science and Technology Center from 1991 to 2002. Programs developed during ESERC's association with CHiPR and COMPRES have targeted a wide range of audiences, including pre-K, K-12 students and teachers, undergraduates, and graduate students. Since 1995, ESERC has offered inquiry-based programs to Project WISE (Women in Science and Engineering) students at a high school and undergraduate level. Activities have included projects that investigated earthquakes, high pressure mineral physics, and local geology. Through a practicum known as Project Java, undergraduate computer science students have developed interactive instructional tools for several of these activities. For K-12 teachers, a course on Long Island geology is offered each fall, which includes an examination of the role that processes in the Earth's interior have played in the geologic history of the region. ESERC has worked with Stony Brook's Department of Geosciences faculty to offer courses on natural hazards, computer modeling, and field geology to undergraduate students, and on computer programming for graduate students. Each summer, a four-week residential college-level environmental geology course is offered to rising tenth graders from the Brentwood, New York schools in partnership with

  10. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  11. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  12. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  13. Development of national standards related to the integrated safety and security of high-rise buildings

    Science.gov (United States)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  14. Development of national standards related to the integrated safety and security of high-rise buildings

    Directory of Open Access Journals (Sweden)

    Voskresenskaya Elena

    2018-01-01

    Full Text Available The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  15. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  16. Postgraduates courses offered to nursing

    Directory of Open Access Journals (Sweden)

    Pedro Jorge Araujo

    2011-07-01

    Full Text Available Aim: To know the official masters that the Spanish Universities have offered during the academic course 2010/2011.Material and methods: Descriptive observational and transversal court study, in which it has analysed 170 university official masters and in which it has used a questionnaire with a total of 15 questions elaborated for this work.Results: 52 Spanish Universities of the 75 that there is have offered during the academic course 2010/2011 official masters that can realise for graduated in infirmary. By areas, the official masters more offered have been the ones of nutrition and alimentary security. 76,33% of the official masters have a length of 1 academic year. Almost the half of the official masters have an orientation researcher-professional and almost 40% researcher. 62,65% of the masters give of face-to-face way. In 52,1% of the official masters do not realise external practices and 86,2% has continuity with the doctorate.Conclusions: It has seen that it is necessary that expand the number of masters including other fields of study that contribute to a main specialisation of the professionals of the infirmary. An important percentage of official masters give in face-to-face modality, and there is very few offered on-line or to distance.

  17. Design of High-Security USB Flash Drives Based on Chaos Authentication

    Directory of Open Access Journals (Sweden)

    Teh-Lu Liao

    2018-05-01

    Full Text Available This paper aims to propose a novel design of high-security USB flash drives with the chaos authentication. A chaos authentication approach with the non-linear encryption and decryption function design is newly proposed and realized based on the controller design of chaos synchronization. To complete the design of high-security USB flash drives, first, we introduce six parameters into the original Henon map to adjust and obtain richer chaotic state responses. Then a discrete sliding mode scheme is proposed to solve the synchronization problem of discrete hyperchaotic Henon maps. The proposed sliding mode controller can ensure the synchronization of the master-slave Henon maps. The selection of the switching surface and the existence of the sliding motion are also addressed. Finally, the obtained results are applied to design a new high-security USB flash drive with chaos authentication. We built discrete hyperchaotic Henon maps in the smartphone (master and microcontroller (slave, respectively. The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both the USB flash drive and smartphone, and pass the chaos authentication. When users need to access data in the flash drive, they can easily enable the encryption APP in the smartphone (master for chaos authentication. After completing the chaos synchronization and authentication, the ARM-based microcontroller allows the computer to access the data in the high-security USB flash drive.

  18. High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Luo-Ming, Meng; Fu-Chen, Zhu

    2009-01-01

    Two efficient protocols of quantum secure direct communication with authentication [Chin. Phys. Lett. 25 (2008) 2354] were recently proposed by Liu et al. to improve the efficiency of two protocols presented in [Phys. Rev. A 75 (2007) 026301] by four Pauli operations. We show that the high efficiency of the two protocols is at the expense of their security. The authenticator Trent can reach half the secret by a particular attack strategy in the first protocol. In the second protocol, not only Trent but also an eavesdropper outside can elicit half-information about the secret from the public declaration

  19. H.R. 4895: a bill to establish a requirement that no person may offer any high-level radioactive waste for transportation in interstate commerce unless licensed for such offering by the Nuclear Regulatory Commission, and for other purposes. Introduced in the House of Representatives, Ninety-Ninth Congress, Second Session, May 22, 1986

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    The Nuclear Waste Transportation Act requires that anyone offering high-level radioactive waste for transportation in interstate commerce must be licensed. The bill describes the qualifications and requirements for obtaining a license either to offer the wastes or to transport it, the procedures for issuance, notification to political subdivisions and Indian tribes, and routing. It also includes time restrictions and enforcement authority. High-level radioactive materials include spent nuclear fuel and reprocessing materials

  20. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  1. 12 CFR 563g.8 - Use of the offering circular.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Use of the offering circular. 563g.8 Section 563g.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.8 Use of the offering circular. (a) An offering circular or amendment declared effective by the...

  2. 12 CFR 563g.2 - Offering circular requirement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Offering circular requirement. 563g.2 Section 563g.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.2 Offering circular requirement. (a) General. No savings association shall offer or sell, directly...

  3. Synchronization and secure communication of chaotic systems via robust adaptive high-gain fuzzy observer

    International Nuclear Information System (INIS)

    Hyun, Chang-Ho; Park, Chang-Woo; Kim, Jae-Hun; Park, Mignon

    2009-01-01

    This paper proposes an alternative robust adaptive high-gain fuzzy observer design scheme and its application to synchronization and secure communication of chaotic systems. It is assumed that their states are immeasurable and their parameters are unknown. The structure of the proposed observer is represented by Takagi-Sugeno fuzzy model and has the integrator of the estimation error. It improves the performance of high-gain observer and makes the proposed observer robust against noisy measurements, uncertainties and parameter perturbations as well. Using Lyapunov stability theory, an adaptive law is derived to estimate the unknown parameters and the stability of the proposed observer is analyzed. Some simulation result of synchronization and secure communication of chaotic systems is given to present the validity of theoretical derivations and the performance of the proposed observer as an application.

  4. Looking back, looking forward: Recovery journeys in a high secure hospital.

    Science.gov (United States)

    McKeown, Mick; Jones, Fiona; Foy, Paul; Wright, Karen; Paxton, Tracey; Blackmon, Mike

    2016-06-01

    A qualitative study of staff and service users' views of recovery was undertaken in a UK high secure hospital working to implement recovery practices. 30 staff and 25 service users participated in semi-structured interviews or focus groups. Thematic analysis identified four broad accounts of how recovery was made sense of in the high secure environment: the importance of meaningful occupation; valuing relationships; recovery journeys and dialogue with the past; and recovery as personal responsibility. These themes are discussed with an emphasis on service user strategies of cooperation or resistance, respectively advancing or impeding progress through the system. In this context the notion of cooperation is, for many, commensurate with compliance with a dominant medical model. The policy framing of recovery opens up contemplation of treatment alternatives, more participatory approaches to risk management, and emphasise the value of relational skills, but may not elude the overarching bio-psychiatric episteme. © 2016 Australian College of Mental Health Nurses Inc.

  5. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  6. FOOD SECURITY SITUATION OF SELECTED HIGHLY DEVELOPED COUNTRIES AGAINST DEVELOPING COUNTRIES

    OpenAIRE

    Karolina Pawlak

    2016-01-01

    The aim of the paper is to present the food security situation in selected highly developed countries and to identify consumption disparities between them and developing countries. The research is based on the data from the United Nations Food and Agriculture Organization (FAO), the Statistical Office of the European Union (Eurostat), the United Nations Statistics Division, the Organisation for Economic Co-operation and Development (OECD), World Food Programme (WFP) and selected measures used...

  7. Secure data storage by three-dimensional absorbers in highly scattering volume medium

    International Nuclear Information System (INIS)

    Matoba, Osamu; Matsuki, Shinichiro; Nitta, Kouichi

    2008-01-01

    A novel data storage in a volume medium with highly scattering coefficient is proposed for data security application. Three-dimensional absorbers are used as data. These absorbers can not be measured by interferometer when the scattering in a volume medium is strong enough. We present a method to reconstruct three-dimensional absorbers and present numerical results to show the effectiveness of the proposed data storage.

  8. Household food security status and associated factors among high-school students in Esfahan, Iran.

    Science.gov (United States)

    Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza

    2010-10-01

    The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.

  9. Offers for our members

    CERN Multimedia

    Staff Association

    2013-01-01

    The Courir shops propose the following offer: 15% discount on all articles (not on sales) in the Courir shops (Val Thoiry, Annemasse and Neydens) and 5% discount on sales upon presentation of your Staff Association membership card and an identity card before payment. Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 21 € instead of 26 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 30 CHF instead of 39 CHF – Adults : 36 CHF instead of 49 CHF Bonus! Free for children under 5.

  10. Midterm prospective evaluation of TVT-Secur reveals high failure rate.

    Science.gov (United States)

    Cornu, Jean-Nicolas; Sèbe, Philippe; Peyrat, Laurence; Ciofu, Calin; Cussenot, Olivier; Haab, Francois

    2010-07-01

    TVT-Secur has been described as a new minimally invasive sling for women's stress urinary incontinence (SUI) management, showing promising results in short-term studies. Our goal was to evaluate the outcome of this procedure after a midterm follow-up. A prospective evaluation involved 45 consecutive patients presenting SUI associated with urethral hypermobility. Fourteen patients preoperatively reported overactive bladder (OAB) symptoms, but none had objective detrusor overactivity. Eight patients had low maximal urethral closure pressure (MUCP). Four patients had pelvic organ prolapse (POP). Patients with POP were treated under general anesthesia by Prolift and TVT-Secur procedure. The 41 other patients received TVT-Secur under local anesthesia on an outpatient basis. All interventions were made by the same surgeon. Postoperative assessment included pad count, bladder diary, clinical examination with stress test, evaluation of satisfaction with the Patient Global Impression of Improvement (PGI-I) scale, and evaluation of side effects. Patients were classified as cured if they used no pads, had no leakage, and had a PGI-I score 50% and PGI-I score TVT or transobturator tape during follow-up. Age, MUCP, or OAB were not associated with failure. Side effects were limited to five cases of de novo OAB and three cases of urinary tract infection. This work is limited by the absence of a comparison group. Our experience shows that despite its good short-term efficacy, TVT-Secur is associated with a high recurrence rate of SUI. Therefore, TVT-Secur does not seem appropriate for SUI first-line management in women. Copyright 2010 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  11. Offers for our members

    CERN Multimedia

    Staff Association

    2018-01-01

    Summer is coming, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 25 € instead of 31 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your Staff Association member ticket. Free for children under 100 cm. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.  

  12. Offers for our members

    CERN Multimedia

    Staff Association

    2017-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 24 € instead of 30 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children under 100 cm. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  13. Offers for our members

    CERN Multimedia

    Staff Association

    2017-01-01

    Summer is coming, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 24 € instead of 30 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children under 100 cm. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  14. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  15. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  16. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  17. The offerings from the Hyperboreans.

    Science.gov (United States)

    Ruck, C A

    1983-08-01

    The ancient Greeks believed that the fruits of agriculture could be harvested only if one first appeased the spirit of the primitive avatars from which the edible crop had been evolved over the centuries through hybridization and cultivation. On occasion, this appeasement was secured through the sacrifice of a human victim, a person who for various reasons could be considered to represent a similar primitivism. By the classical age, this extreme form of sacrificial appeasement appears to have been reserved for times of unusual crisis, such as pestilence or natural disaster, for at such times, the resurgent forces of primitivism seemed to threaten the entire civilization with regression back to its wilder origins. Other forms of appeasement were ordinarily substituted for the actual offering of a human victim. Amongst these was the enactment of puberty rites, for the natural growth and maturation of an individual could be thought to symbolize this same evolutionary process. Each infant is born as a wild creature who must develop into a socialized adult through the metaphoric death of its former self as it assumes the responsibilities of civilized life in crossing the threshold to sexual maturity. A similar symbolic victim was customarily represented by the offering of first fruits. A portion of the cultivated crop was prematurely cut and consecrated to redeem and release the ripening harvest from the dangerous contamination with the spirits of its pre-agricultural precedents. On the island of Delos, a special version of this consecration was performed. Each year, the various Greek cities would send a sheaf of unripened grain to the sanctuary of the god Apollo and his twin sister Artemis. Amongst these annual offerings, there was one that was supposed to have originated from the Hyperboreans, a mythical people who were thought to live in the original homeland of the two gods. This special Hyperborean offering differed from the others, for it was said to contain a

  18. Offers for our members

    CERN Multimedia

    Staff Association

    2013-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 21 € instead of 26 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 30 CHF instead of 39 CHF – Adults : 36 CHF instead of 49 CHF Bonus! Free for children under 5.

  19. Offers for our members

    CERN Multimedia

    Staff Association

    2015-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 21,50 € instead of 27 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12:00 p.m. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  20. Offers for our members

    CERN Multimedia

    Staff Association

    2016-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 23 € instead of 29 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12:00 p.m. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  1. Offers for our members

    CERN Multimedia

    Staff Association

    2017-01-01

    Summer is here, enjoy our offers for the water parks! Walibi: Tickets "Zone terrestre": 24 € instead of 30 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your ticket purchased at the Staff Association. Bonus! Free for children under 100 cm, with limited access to the attractions. Free car park. *  *  *  *  *  *  *  * Aquaparc: Day ticket: -  Children: 33 CHF instead of 39 CHF -  Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5 years old.

  2. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  3. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  4. FOOD SECURITY SITUATION OF SELECTED HIGHLY DEVELOPED COUNTRIES AGAINST DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Karolina Pawlak

    2016-06-01

    Full Text Available The aim of the paper is to present the food security situation in selected highly developed countries and to identify consumption disparities between them and developing countries. The research is based on the data from the United Nations Food and Agriculture Organization (FAO, the Statistical Office of the European Union (Eurostat, the United Nations Statistics Division, the Organisation for Economic Co-operation and Development (OECD, World Food Programme (WFP and selected measures used by the Economist Intelligence Unit (EIU for the construction of the Global Food Security Index. It has been showed that to the greatest extent the problem of maintaining food security occur in developing countries which are characterised by low per capita income, while in developed countries the scale of hunger is marginal and it afflicts less than 1% of the population. On a regional scale the daily dietary energy supply is greater than the minimum dietary energy requirement in all regions of the world, but the extent to which the dietary needs are satisfied increases along with the increase in national income. In order to reduce the problem of hunger it is necessary to solve the problem of asymmetrical distribution of global income, e.g. by taking actions to accelerate the economic growth in less developed regions and increase the purchasing power of the population.

  5. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  6. Offer for our members

    CERN Document Server

    Staff Association

    2017-01-01

    The Staff Association CERN staff has recently concluded a framework agreement with AXA Insurance Ltd, General-Guisan-Strasse 40, 8401 Winterthur. This contract allows you to benefit from a preferential tariff and conditions for insurances: Motor vehicles for passenger cars and motorcycles of the product line STRADA: 10% discount Household insurance (personal liability and household contents) the product line BOX: 10% discount Travel insurance: 10% discount Buildings: 10% discount Legal protection: 10% discount AXA is number one on the Swiss insurance market. The product range encompasses all non-life insurance such as insurance of persons, property, civil liability, vehicles, credit and travel as well as innovative and comprehensive solutions in the field of occupational benefits insurance for individuals and businesses. Finally, the affiliate AXA-ARAG (legal expenses insurance) completes the offer. For those of you already insured with the company, contact your current advisor. Others may contact a counsel...

  7. Offers for our members

    CERN Multimedia

    Association du personnel

    2013-01-01

    La banque LCL propose aux membres de l’Association du personnel les avantages suivants : – Un barème Privilège sur le Prêt immobilier – Des avantages tarifaires sur l’épargne, notamment l’assurance-vie. – Un taux préférentiel de prêt à la consommation. En outre, jusqu’au 30 septembre 2013, elle offre 50€ à tous les nouveaux clients, membres de l'Association du personnel. Summer is here, enjoy our offers for the aquatic parcs! Tickets "Zone terrestre" : 21 € instead of de 26 €. Access to Aqualibi : 5 euros instead of 8 euros on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Free car park. * * * * * * * Full day ticket: – Children : 30 CHF instead of 39 CHF &...

  8. Offers for our members

    CERN Multimedia

    Staff Association

    2013-01-01

    The warm weather arrives, it's time to take advantage of our offers Walibi and Aquapark! Walibi : Tickets "Zone terrestre": 21 € instead of 26 € Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Half-day ticket (5 hours): – Children: 26 CHF instead of 35 CHF – Adults : 32 CHF instead of 43 CHF Day ticket: – Children: 30 CHF instead of 39 CHF – Adults : 36 CHF instead of 49 CHF Free for children under 5.

  9. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  10. High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with Hyperentanglement

    International Nuclear Information System (INIS)

    Wang Tie-Jun; Li Tao; Du Fang-Fang; Deng Fu-Guo

    2011-01-01

    We present a quantum hyperdense coding protocol with hyperentanglement in polarization and spatial-mode degrees of freedom of photons first and then give the details for a quantum secure direct communication (QSDC) protocol based on this quantum hyperdense coding protocol. This QSDC protocol has the advantage of having a higher capacity than the quantum communication protocols with a qubit system. Compared with the QSDC protocol based on superdense coding with d-dimensional systems, this QSDC protocol is more feasible as the preparation of a high-dimension quantum system is more difficult than that of a two-level quantum system at present. (general)

  11. 19 CFR 172.32 - Authority to accept offers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Authority to accept offers. 172.32 Section 172.32 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE....32 Authority to accept offers. The authority to accept offers in compromise, subject to the...

  12. Electroplating offers embrittlement protection

    Science.gov (United States)

    Daniels, C. M., Jr.

    1970-01-01

    Thin copper electrodeposited layer protects metal parts in environments with which they may be incompatible. Originally developed for main engine of Space Shuttle where high strength nickle alloy bellows must operate in high-pressure hydrogen, technique protects nickel and is unaffected by forming process or subsequent heat treatment and preinstallation processing.

  13. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    Science.gov (United States)

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  14. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  15. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  16. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  17. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. Development and applications of diffractive optical security devices for banknotes and high value documents

    Science.gov (United States)

    Drinkwater, John K.; Holmes, Brian W.; Jones, Keith A.

    2000-04-01

    Embossed holograms and othe rdiffractive optically variable devices are increasingly familiar security items on plastic cards, banknotes, securyt documetns and on branded gods and media to protect against counterfeit, protect copyright and to evidence tamper. This paper outlines some of the diffractive optical seuryt and printed security develoepd for this rapidly growing field and provides examles of some current security applications.

  19. High-Capacity Quantum Secure Communication with Authentication Using Einstein-Podolsky-Rosen Pairs

    International Nuclear Information System (INIS)

    Xiao Min; Xu Hong-Wei

    2015-01-01

    A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. The security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security. (paper)

  20. Comparative consideration and design of a security depot for high radioactive glass-enclosed materials

    International Nuclear Information System (INIS)

    Jaroni, U.

    1985-01-01

    From the beginning of 1990 the COGEMA shall supply glass-enclosed high radioactive waste of the reprocessing of German fuel elements back to the Federal Republic of Germany. As to this time the final waste storage in the salt stock of Gorleben will not be available the glass cannisters have to be deposited above ground. First a comparison is made out of a number of proposed storage concepts for the deposition of HAW-glass blocks. The safety technical behaviour of the facility is considered. On the basis of the gained results a new facility design is presented, which can take 450 glass cannisters in a discoid built up cast-steel vessel and makes possible the utilization of the resulting radioactive heat of dissociation. During the development of this concept besides a compact, reasonable method of building and the thermodynamic behaviour of the storage the aspect of high security against release of radioactive materials was emphasized. (orig.) [de

  1. Method and device for secure, high-density tritium bonded with carbon

    Science.gov (United States)

    Wertsching, Alan Kevin; Trantor, Troy Joseph; Ebner, Matthias Anthony; Norby, Brad Curtis

    2016-04-05

    A method and device for producing secure, high-density tritium bonded with carbon. A substrate comprising carbon is provided. A precursor is intercalated between carbon in the substrate. The precursor intercalated in the substrate is irradiated until at least a portion of the precursor, preferably a majority of the precursor, is transmutated into tritium and bonds with carbon of the substrate forming bonded tritium. The resulting bonded tritium, tritium bonded with carbon, produces electrons via beta decay. The substrate is preferably a substrate from the list of substrates consisting of highly-ordered pyrolytic graphite, carbon fibers, carbon nanotunes, buckministerfullerenes, and combinations thereof. The precursor is preferably boron-10, more preferably lithium-6. Preferably, thermal neutrons are used to irradiate the precursor. The resulting bonded tritium is preferably used to generate electricity either directly or indirectly.

  2. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  3. 17 CFR 240.14e-1 - Unlawful tender offer practices.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Unlawful tender offer... Securities Exchange Act of 1934 Regulation 14e § 240.14e-1 Unlawful tender offer practices. As a means... section 14(e) of the Act, no person who makes a tender offer shall: (a) Hold such tender offer open for...

  4. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    Science.gov (United States)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  5. Peer-to-peer computing for secure high performance data copying

    International Nuclear Information System (INIS)

    Hanushevsky, A.; Trunov, A.; Cottrell, L.

    2001-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model--if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, the authors present the bbcp architecture, it's various features, and the reasons for their inclusion

  6. Peer-to-Peer Computing for Secure High Performance Data Copying

    International Nuclear Information System (INIS)

    2002-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model -- if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, we preset the bbcp architecture, it's various features, and the reasons for their inclusion

  7. Lived experience of working with female patients in a high-secure mental health setting.

    Science.gov (United States)

    Beryl, Rachel; Davies, Jason; Völlm, Birgit

    2018-02-01

    Women's secure hospitals are often considered to be stressful and demanding places to work, with these environments characterized as challenging and violent. However, the staff experience of working in this environment is not well represented in the literature. The present study is the first to examine the 'lived experience' of seven nurses working in the National High Secure Healthcare Service for Women. Interview transcripts were analysed with the use of interpretative phenomenological analysis, and the findings presented within four superordinate themes 'horror', 'balancing acts', 'emotional hard labour', and 'the ward as a community'. These themes all depict the challenges that participants experience in their work, the ways in which they cope with these challenges, and how they make sense of these experiences. A meta-theme of 'making sense by understanding why' is also presented, which represents the importance for participants to attempt to make sense of the tensions and challenges by formulating a fuller meaning. The findings suggest the importance of workforce development in terms of allowing sufficient protected time for reflection and formulation (e.g. within the format of group supervision or reflective practice), and for staff-support mechanisms (e.g. clinical supervision, counselling, debriefs) to be inbuilt into the ethos of a service, so as to provide proactive support for staff 'on the frontline'. © 2016 Australian College of Mental Health Nurses Inc.

  8. Quality assurance programs from laboratories offering radiological protection services

    International Nuclear Information System (INIS)

    Marrero Garcia, M.; Prendes Alonso, M.; Jova Sed, L.; Morales Monzon, J.A.

    1998-01-01

    The implementation of an adequate program for quality assurance in institutions servicing radiological protection programs will become an additional tool to achieve security targets included in that program. All scientific and technical services offered by CPHR employ quality assurance systems

  9. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  10. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    Science.gov (United States)

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  11. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  12. 48 CFR 570.303-3 - Late offers, modifications of offers, and withdrawals of offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Late offers, modifications of offers, and withdrawals of offers. 570.303-3 Section 570.303-3 Federal Acquisition Regulations... PROPERTY Contracting Procedures for Leasehold Interests in Real Property 570.303-3 Late offers...

  13. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    Science.gov (United States)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  14. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    International Nuclear Information System (INIS)

    Sau, Suman; Chakrabarti, Amlan; Saini, Jogender; Chattopadhyay, Subhasis; Mandal, Swagata

    2015-01-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  15. An overview of the roles and structure of international high-security veterinary laboratories for infectious animal diseases.

    Science.gov (United States)

    Murray, P K

    1998-08-01

    The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.

  16. The International Glaciological Society: offering opportunity to publish in high quality, open access journals and to attend several targeted symposia and workshops every year.

    Science.gov (United States)

    Magnusson, M. M.; MacAyeal, D. R.

    2017-12-01

    The International Glaciological Society (IGS) was founded in 1936 to provide a focus for individuals interested in practical and scientific aspects of snow and ice. At the start of 2016 all IGS publications, the Journal of Glaciology (impact factor 3.643) and topically oriented Annals of Glaciology (impact factor 2.349), became `Gold Open Access'. Author publication charges (APCs) are also competitive because the IGS partners with Cambridge University Press (CUP), and scientific editing and review is quick and in tune with what authors value. In addition to publishing, the IGS organizes and facilitates several International Symposia a year on trending topics proposed by the scientific community (often associated with topical issues of the Annals of Glaciology) as well as many branch meetings, workshops and summer training schools for students. The international symposia are located in diverse areas, recently including Nepal, France, Australia, New Zealand, Iceland and Beijing. Often our meetings coincide with opportunities for travel experience, such as visiting Tibet or hiking the Annapurna circuit in Nepal. Membership in the IGS offers good services and value, including: 10% discount on author processing charges (APCs), special registration rates for IGS symposia and workshops, belonging to an old and established learned society with worldwide membership and access to an extended peer group.

  17. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  18. Offer

    CERN Multimedia

    Staff Association

    2015-01-01

    Le parc ouvre ses portes le samedi 4 avril 2015!   La Chasse aux Oeufs du 4 au 26 avril En plus de ses 25 attractions et spectacles, le parc proposera aux enfants de 3 à 12 ans de relever le challenge d’une course aux oeufs dans un jardin de Pâques reconstitué ! Autant de petits oeufs à trouver dans un temps limite ; tout cela au milieu de lapins, poules, fleurs et autres oeufs géants pour repartir avec des gourmandises en chocolat de la marque Revillon Chocolatier.   Profitez de notre offre spéciale pour nos membres : Tarif unique Adulte/Enfant Entrée Zone terrestre 21,50 euros au lieu de 27 euros Accès à l’Aqualibi : 5 euros au lieu de 8 euros sur présentation du billet d’entrée au tarif membre AP. Entrée gratuite pour les enfants de moins de 3 ans, avec accès limité aux attractions. Les billet...

  19. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

      Bénéficiez du tarif spécial de 35 CHF/personne + 1 accompagnant au Théâtre de Carouge  en étant membre de l’Association du personnel.  Envoyez votre réservation par mail à smills@tcag.ch via votre adresse mail professionnelle. Indiquez la date de votre réservation, votre nom, prénom et numéro de téléphone. Une confirmation de réservation vous sera retournée par mail. La présentation de votre carte de membre sera demandée lors du retrait des billets.   De Molière – Mise en scène de Jean Liermier Argan, veuf, remarié avec Béline qui n’attend que la mort de son mari pour hériter, multiplie saignées, purges et autres ingestions de remèdes. Angélique, sa fille, vuet &a...

  20. OFFERS

    CERN Multimedia

    Staff Association

    2014-01-01

    Nouveau partenaire - Joy’s Club   Venez profiter des remises au Joy’s Club / Minigolf à Divonne-les-bains en tant que membre de l’Association ! Sur présentation de votre carte membre, vous bénéficierez d’une remise immédiate telle que : - Pour une partie adulte : 6 euros au lieu de 7 euros - Pour une partie enfant : 4 euros au lieu de 5 euros - Pour le mini Park : 6 euros au lieu de 7 euros Pour plus de renseignements, n’hésitez pas à demander au Secrétariat de l’Association ou à consulter notre site web: http://staff-association.web.cern.ch/fr/socioculturel/offres  

  1. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    12 % discount on football camps and courses for children from 3 to 13 years old, with bilingual coaches.   Now also courses during the autumn holidays! In order to get the discount you need to register online, then send a mail to info@intersoccer.ch with a scan of your membership card to recieve a refund of the discount.

  2. Offers

    CERN Multimedia

    Staff association

    2014-01-01

        Envie de soirée au théâtre, n’hésitez pas à bénéficier de nos offres pour nos membres ! Théâtre de Carouge : Réduction de 5 CHF pour tous les spectacles (30 CHF au lieu de 35 CHF) Le théâtre de Carouge vous présente sa nouvelle pièce : La double insconstance Du vedredi 21 mars au dimanche 6 avril 2014 De Marivaux Mise en scène de Philippe Mentha Audio-description le mardi 1er avril et le samedi 5 avril 2014 Il règne un doux mélange de révoltes et de séductions, de ruses et de fatalité dans cette Double Inconstance de Marivaux que met en scène Philippe Mentha, membre fondateur du Théâtre de Carouge et directeur depuis plus de trente ans du Théâtre Kléber-Méleau. L’allure d...

  3. Offers

    CERN Multimedia

    Staff Association

    2015-01-01

    Tickets "Zone terrestre": 21 € instead of 27 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free.

  4. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Découvrez les plus belles tables de Suisse romande et de France voisine en bénéficiant des réductions suivantes sur chaque repas, pendant une année : 50 % pour 2 personnes, 40 % pour 3 personnes, 30 % pour 4 personnes, 20 % pour 5 à 6 personnes. Comment ça marche ? Faites votre choix parmi les 110 restaurants de votre région et réservez votre table pour 2, 3, 4, 5 ou 6 personnes. Présentez votre Passeport Gourmand dès votre arrivée. Savourez votre repas et profitez d’une réduction exceptionnelle sur votre addition (hors boissons, menu du jour et business lunch). Quels sont vos avantages ? Profitez du prix préférentiel pour les membres de l’association du CERN : – Passeport Gourmand Genève : CHF 75.- (au lieu de CHF 95.-) – Passeport Gourmand Ain/Savoie/Haute-Savoie : CHF 59.- (au lieu de CH...

  5. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    Si cette offre vous intéresse, merci d’envoyer un mail à mh.boulanger@comedie.ch avec le détail de votre réservation via votre adresse mail professionnelle. Le retrait des places se fait à la billetterie sur présentation de votre carte de membre de l’Association du personnel. Pour toute commande d’abonnement ou de carte de réduction par courrier ou internet, cocher le tarif collectif en indiquant le nom de l’entreprise et en joignant un justificatif nominatif. Pour tout renseignement, n’hésitez pas à contacter Marie-Hélène Boulanger : –  Tel. : 022 809 60 86 –  email : mh.boulanger@comedie.ch

  6. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Découvrez les plus belles tables de Suisse romande et de France voisine en bénéficiant des réductions suivantes sur chaque repas, pendant une année : 50 % pour 2 personnes / 40 % pour 3 personnes / 30 % pour 4 personnes / 20 % pour 5 à 6 personnes. Comment ça marche ? Faites votre choix parmi les 110 restaurants de votre région et réservez votre table pour 2, 3, 4, 5 ou 6 personnes. Présentez votre Passeport Gourmand dès votre arrivée. Savourez votre repas et profitez d’une réduction exceptionnelle sur votre addition (hors boissons, menu du jour et business lunch). Quels sont vos avantages ? Profitez du prix préférentiel pour les membres de l’association du CERN : – Passeport Gourmand Genève : CHF 75.- (au lieu de CHF 95.-) – Passeport Gourmand Ain/Savoie/Haute-Savoie : CHF 59.- (au lieu de...

  7. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Concert Scoop music tour sur le parc Walibi ! Vendredi 12 Juillet Vous trouverez la présentation de l’événement et les vidéos des artistes attendus avec leurs titres faisant vibrer les radios en ce moment sur le site internet http://www.walibi.com/rhone-alpes/fr-fr/evenements/scoop-music-tour. Le concert est gratuit et débute à la fermeture du parc avec une première partie surprise. Profitez donc d’une belle journée sur le parc et finissez en beauté avec le concert de l’été !

  8. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    To our members 5% discount on Fnac vouchers Vouchers of 50.-, 100.- et 200. - CHF Valid in the 4 shops in Switzerland without restriction on purchases. On sale in the office of Secretariat of the staff Association.

  9. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  10. Multi-Agent System based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems

    DEFF Research Database (Denmark)

    Dou, Chun-Xia; Yue, Dong; Guerrero, Josep M.

    2017-01-01

    This paper proposes multi-agent system based event- triggered hybrid controls for guaranteeing energy supply of a hybrid energy generation system with high security. First, a mul-ti-agent system is constituted by an upper-level central coordi-nated control agent combined with several lower......-level unit agents. Each lower-level unit agent is responsible for dealing with internal switching control and distributed dynamic regula-tion for its unit system. The upper-level agent implements coor-dinated switching control to guarantee the power supply of over-all system with high security. The internal...

  11. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    policies, which are superior in terms of their welfare effects and fiscal costs and might also be politically feasible. These findings have important implications on the ongoing debates on India's food security policy, particularly in relation to the discussion on its National Food Security Act....

  12. Providing strong Security and high privacy in low-cost RFID networks

    DEFF Research Database (Denmark)

    David, Mathieu; Prasad, Neeli R.

    2009-01-01

    Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security...

  13. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  14. What do prisoners eat? Nutrient intakes and food practices in a high-secure prison.

    Science.gov (United States)

    Hannan-Jones, Mary; Capra, Sandra

    2016-04-01

    There are limited studies on the adequacy of prisoner diet and food practices, yet understanding these are important to inform food provision and assure duty of care for this group. The aim of this study was to assess the dietary intakes of prisoners to inform food and nutrition policy in this setting. This research used a cross-sectional design with convenience sampling in a 945-bed male high-secure prison. Multiple methods were used to assess food available at the group level, including verification of food portion, quality and practices. A pictorial tool supported the diet history method. Of 276 eligible prisoners, 120 dietary interviews were conducted and verified against prison records, with 106 deemed plausible. The results showed the planned food to be nutritionally adequate, with the exception of vitamin D for older males and long-chain fatty acids, with Na above upper limits. The Australian dietary targets for chronic disease risk were not achieved. High energy intakes were reported with median 13·8 (se 0·3) MJ. Probability estimates of inadequate intake varied with age groups: Mg 8 % (>30 years), 2·9 % (70 years), 1·5 % (food provision in the prison environment and also poses questions for population-level dietary guidance in delivering appropriate nutrients within energy limits.

  15. The Impact of Investor Demand on Security Offerings

    NARCIS (Netherlands)

    E. Duca (Eric)

    2011-01-01

    textabstractThe studies in this thesis contribute to a growing stream of papers showing that capital structure decisions are not only influenced by corporate determinants, but also by fluctuations in investor tastes and capital available for investment. This is a relatively new way of looking at

  16. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  17. The role of high work-function metallic nanodots on the performance of a-Si:H solar cells: offering ohmic contact to light trapping.

    Science.gov (United States)

    Kim, Jeehwan; Abou-Kandil, Ahmed; Fogel, Keith; Hovel, Harold; Sadana, Devendra K

    2010-12-28

    Addition of carbon into p-type "window" layers in hydrogenated amorphous silicon (a-Si:H) solar cells enhances short circuit currents and open circuit voltages by a great deal. However, a-Si:H solar cells with high carbon-doped "window" layers exhibit poor fill factors due to a Schottky barrier-like impedance at the interface between a-SiC:H windows and transparent conducting oxides (TCO), although they show maximized short circuit currents and open circuit voltages. The impedance is caused by an increasing mismatch between the work function of TCO and that of p-type a-SiC:H. Applying ultrathin high-work-function metals at the interface between the two materials results in an effective lowering of the work function mismatch and a consequent ohmic behavior. If the metal layer is sufficiently thin, then it forms nanodots rather than a continuous layer which provides light-scattering effect. We demonstrate 31% efficiency enhancement by using high-work-function materials for engineering the work function at the key interfaces to raise fill factors as well as photocurrents. The use of metallic interface layers in this work is a clear contrast to previous work where attempts were made to enhance the photocurrent using plasmonic metal nanodots on the solar cell surface.

  18. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas

    2012-01-01

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, general MPC remains relevant as it has shown promising performance metrics in real...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  19. THE SECURITY AUDIT WITHIN INFORMATION SYSTEMS

    OpenAIRE

    Dan Constantin TOFAN

    2011-01-01

    The information security audit is definitely a tool for determining, achieving, and maintaining a proper level of security in an organization. This article offers a comprehensive review of the world's most popular standards related to information systems security audit.

  20. Bridging nuclear safety, security and safeguards at geological disposl of high level radioactive waste and spent nuclear fuel

    International Nuclear Information System (INIS)

    Niemeyer, Irmgard; Deissmann, Guido; Bosbach, Dirk

    2016-01-01

    Findings and recommendations: • Further R&D needed to identify concepts, methods and technologies that would be best suited for the holistic consideration of safety, security and safeguards provisions of geological disposal. • 3S ‘toolbox’, including concepts, methods and technologies for: ■ material accountancy, ■ measurement techniques for spent fuel verification, ■ containment and surveillance, ■ analysis of open source information, ■ environmental sampling and monitoring, ■ continuity of knowledge, ■ design implications. •: Bridging safety, security and safeguards in research funding and research activities related to geological disposal of high-level radioactive waste and spent nuclear fuel.

  1. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  2. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  3. Plasmodium falciparum transfected with ultra bright NanoLuc luciferase offers high sensitivity detection for the screening of growth and cellular trafficking inhibitors.

    Directory of Open Access Journals (Sweden)

    Mauro F Azevedo

    Full Text Available Drug discovery is a key part of malaria control and eradication strategies, and could benefit from sensitive and affordable assays to quantify parasite growth and to help identify the targets of potential anti-malarial compounds. Bioluminescence, achieved through expression of exogenous luciferases, is a powerful tool that has been applied in studies of several aspects of parasite biology and high throughput growth assays. We have expressed the new reporter NanoLuc (Nluc luciferase in Plasmodium falciparum and showed it is at least 100 times brighter than the commonly used firefly luciferase. Nluc brightness was explored as a means to achieve a growth assay with higher sensitivity and lower cost. In addition we attempted to develop other screening assays that may help interrogate libraries of inhibitory compounds for their mechanism of action. To this end parasites were engineered to express Nluc in the cytoplasm, the parasitophorous vacuole that surrounds the intraerythrocytic parasite or exported to the red blood cell cytosol. As proof-of-concept, these parasites were used to develop functional screening assays for quantifying the effects of Brefeldin A, an inhibitor of protein secretion, and Furosemide, an inhibitor of new permeation pathways used by parasites to acquire plasma nutrients.

  4. Offering Incentives from the Outside

    DEFF Research Database (Denmark)

    Emmanuel, Nikolas G.

    2017-01-01

    Incentives offer a good deal of underexplored opportunities to help manage conflict by encouraging political bargaining. This study has two primary objectives. First, it furthers the discussion of how external third parties can help manage conflicts. Second, it offers a typology of the available ...

  5. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  6. High-Temperature Coatings Offer Energy Savings

    Science.gov (United States)

    2012-01-01

    The U.S. X-Plane Program included the first-of-its-kind research in aerodynamics and astronautics with experimental vehicles, including the first aircraft to break the sound barrier; the first aircraft to fly in excess of 100,000, then 200,000, and then 300,000 feet; and the first aircraft to fly at three, four, five, and then six times the speed of sound. During the 1990s, NASA started developing a new thermal protection material to test on the X-33 and X-34 supersonic aircraft. The X-33 was intended to demonstrate the technologies needed for a new reusable launch vehicle and was projected to reach an altitude of approximately 50 miles and speeds of more than Mach 11. The X-34, a small, reusable technology demonstrator for a launch vehicle, was intended to reach an altitude of 250,000 feet and fly at speeds of Mach 8. As a result of its research and development efforts, NASA s Ames Research Center invented the Protective Ceramic Coating Material (PCCM). Applied to a surface, the thin, lightweight coating could protect the material underneath from extreme temperatures. The capability of the technology came from its emissivity, which radiated heat away from the surface it covered, thereby decreasing the amount of heat transferred to the underlying material. PCCM not only increased the capability of materials to withstand higher temperatures, it also exhibited impressive thermal shock, vibration, and acoustic performance. In addition, it proved to be resistant to abrasion and mechanical damage and was also environmentally safe, due to it being water-based and containing no solvents. Even though funding for the X-33 and X-34 ended in 2001, PCCM continued on a path of innovation.

  7. Mitigating Docker Security Issues

    OpenAIRE

    Yasrab, Robail

    2018-01-01

    It is very easy to run applications in Docker. Docker offers an ecosystem that offers a platform for application packaging, distributing and managing within containers. However, Docker platform is yet not matured. Presently, Docker is less secured as compare to virtual machines (VM) and most of the other cloud technologies. The key of reason of Docker inadequate security protocols is containers sharing of Linux kernel, which can lead to risk of privileged escalations. This research is going t...

  8. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  9. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  10. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  11. Water sovereignty and security, high politics and hard power: the dangers of borrowing discourses!

    NARCIS (Netherlands)

    Gupta, J.; Dellapenna, J.W.; van den Heuvel, M.; Pahl-Wostl, C.; Bhaduri, A.; Gupta, J.

    2016-01-01

    This chapter argues that water security has many meanings. It addresses the question: will framing water in terms of ‘water security’ be likely to do a disservice to the water governance challenge of the 21st century? Isn’t there a real risk that the term will become hostage to a much more sinister

  12. Damage invariant and high security acquisition of the internal fingerprint using optical coherence tomography

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-11-01

    Full Text Available representation they offer. Using an emerging fingerprint acquisition technology – optical coherence tomography – to access an internal fingerprint under the skin surface, this paper serves to address two limitations of conventional scanners: fingertip skin damage...

  13. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. High reliability - low noise radionuclide signature identification algorithms for border security applications

    Science.gov (United States)

    Lee, Sangkyu

    Illicit trafficking and smuggling of radioactive materials and special nuclear materials (SNM) are considered as one of the most important recent global nuclear threats. Monitoring the transport and safety of radioisotopes and SNM are challenging due to their weak signals and easy shielding. Great efforts worldwide are focused at developing and improving the detection technologies and algorithms, for accurate and reliable detection of radioisotopes of interest in thus better securing the borders against nuclear threats. In general, radiation portal monitors enable detection of gamma and neutron emitting radioisotopes. Passive or active interrogation techniques, present and/or under the development, are all aimed at increasing accuracy, reliability, and in shortening the time of interrogation as well as the cost of the equipment. Equally important efforts are aimed at advancing algorithms to process the imaging data in an efficient manner providing reliable "readings" of the interiors of the examined volumes of various sizes, ranging from cargos to suitcases. The main objective of this thesis is to develop two synergistic algorithms with the goal to provide highly reliable - low noise identification of radioisotope signatures. These algorithms combine analysis of passive radioactive detection technique with active interrogation imaging techniques such as gamma radiography or muon tomography. One algorithm consists of gamma spectroscopy and cosmic muon tomography, and the other algorithm is based on gamma spectroscopy and gamma radiography. The purpose of fusing two detection methodologies per algorithm is to find both heavy-Z radioisotopes and shielding materials, since radionuclides can be identified with gamma spectroscopy, and shielding materials can be detected using muon tomography or gamma radiography. These combined algorithms are created and analyzed based on numerically generated images of various cargo sizes and materials. In summary, the three detection

  16. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  17. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  18. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  19. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  20. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  1. New offer for our members

    CERN Document Server

    Staff Association

    2018-01-01

    Evolution 2, your specialist for Outdoor Adventures Be it for a ski lesson, a parachute jump or for a mountain bike descent, come live an unforgettable experience with our outdoor specialists. Benefit from a 10 % discount on all activities: Offer is open to SA members and their family members living in the same household, upon presentation of the membership card. Offer available for all bookings made between 1 June 2018 and 30 May 2019. Offer available on all the Evoltion2 sites. A wide range of summer and winter activities. More information on http://evolution2.com/ Contact and reservation : +33 (0)4.50.02.63.35 management@evolution2.com

  2. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  3. Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing.

    Science.gov (United States)

    Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A

    2017-11-01

    Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. A Common Criteria-Based Team Project for High Assurance Secure Systems

    Science.gov (United States)

    2005-01-01

    experience in the FHM, full system documentation, and plenty of time. The students had little experience and little time. The MINIX operating... MINIX is a very appropriate target for student enhancements. Since the principle objective of Secure Systems is to teach the concepts of...to construct a system when one of the developmental threats is subversion. Because students were studying MINIX in a prerequisite operating systems

  5. 17 CFR 240.14e-5 - Prohibiting purchases outside of a tender offer.

    Science.gov (United States)

    2010-04-01

    ...(s); (iv) The intention of the offeror to make purchases pursuant to the foreign tender offer(s) is... consideration paid outside of the tender offer that is greater than the tender offer price; and (G) Purchases or... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Prohibiting purchases outside...

  6. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  9. Convergence of Corporate and Information Security

    OpenAIRE

    Syed; Rahman, M.; Donahue, Shannon E.

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  10. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  11. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  12. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  13. 17 CFR 230.254 - Solicitation of interest document for use prior to an offering statement.

    Science.gov (United States)

    2010-04-01

    ... subject to the antifraud provisions of the federal securities laws. No solicitation or acceptance of money... document for use prior to an offering statement. 230.254 Section 230.254 Commodity and Securities Exchanges...-Conditional Small Issues Exemption § 230.254 Solicitation of interest document for use prior to an offering...

  14. Experimental realization of a highly secure chaos communication under strong channel noise

    International Nuclear Information System (INIS)

    Ye Weiping; Dai Qionglin; Wang Shihong; Lu Huaping; Kuang Jinyu; Zhao Zhenfeng; Zhu Xiangqing; Tang Guoning; Huang Ronghuai; Hu Gang

    2004-01-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work

  15. Experimental realization of a highly secure chaos communication under strong channel noise

    Science.gov (United States)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  16. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  17. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  18. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  19. Visible and NIR spectral band combination to produce high security ID tags for automatic identification

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2006-09-01

    Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

  20. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety.

    Science.gov (United States)

    Speed, Kelsey A; Meyer, Samantha B; Hanning, Rhona M; Majowicz, Shannon E

    2017-10-01

    Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  1. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety

    Directory of Open Access Journals (Sweden)

    Kelsey A. Speed

    2017-10-01

    Full Text Available Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1 how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2 that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3 that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4 that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  2. Economic security of modern Russia: the current state and prospects

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2018-01-01

    Full Text Available In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.

  3. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    Science.gov (United States)

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  4. Security "high-tech" individual extra-light device mask 2.0: CAD/CAM evolution.

    Science.gov (United States)

    Ramieri, V; Vellone, V; Crimi, S; Cascone, P

    2017-06-01

    In 2008, we presented our security "high-tech" individual extra-light device mask (SHIELD), a protective shield based on the face cast of an injured soccer player that can be customised. It allows a shortened convalescent period, is comfortable, fits well, and allows the patient to continue to play at a professional level in their chosen sport or activity in the shortest time possible. It has been used often in both amateur and professional categories of many sports, and we now present an update. Copyright © 2017 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  5. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  6. Initial Public Offering – Finance Source of Stock

    Directory of Open Access Journals (Sweden)

    Sorin Claudiu Radu

    2013-10-01

    Full Text Available Capital market offers a wide range of options for financing companies, which can be tailored to meet their exact needs. Thus, they have the opportunity of primary security sale (shares and bonds on the stock exchange, which may take place through a tender, in which case the financial instruments issued by a company are underwritten at the date of issue, or through a secondary offer, in which case they are issued and offered for sale by the issuer. If the public sale offer focuses on shares and aims at transforming the issuing company into a public one, then it bears the name of IPO (Initial Public Offering. The present work aims for the evolution of IPO trends on the European market in the aftermath of the global crisis outbreak. The market of IPO carried out by BSE is also analyzed herewith.

  7. Audit Characteristics for Information System Security

    OpenAIRE

    Marius POPA; Mihai DOINEA

    2007-01-01

    The paper presents the main aspects regarding the development of the information security and assurance of their security. The information systems, standards and audit processes definitions are offered. There are presented the most important security standards used in information system security assessment

  8. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  9. Characteristics and Pathways of Long-Stay Patients in High and Medium Secure Settings in England; A Secondary Publication From a Large Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Birgit A. Völlm

    2018-04-01

    Full Text Available Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood.Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England.Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings.Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent, 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60% followed by personality disorder (47%, predominantly antisocial and borderline types; 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample.Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of

  10. Natural gas market review 2008 - optimising investments and ensuring security in a high-priced environment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-18

    Over the last 18 months, natural gas prices have continued to rise steadily in all IEA markets. What are the causes of this steady upward trend? Unprecedented oil and coal prices which have encouraged power generators to switch to gas, together with tight supplies, demand for gas in new markets and delayed investments all played a role. Investment uncertainties, cost increases and delays remain major concerns in most gas markets and are continuing to constitute a threat to long-term security of supply. A massive expansion in LNG production is expected in the short term to 2012, but the lag in LNG investment beyond 2012 is a concern for all gas users in both IEA and non-IEA markets. Despite this tight market context, regional markets continue on their way to globalisation. This tendency seems irreversible, and it impacts even the most independent markets. Price linkages and other interactions between markets are becoming more pronounced. This publication addresses these major developments, assessing investment in natural gas projects (LNG, pipelines, upstream), escalating costs, the activities of international oil and gas companies, and gas demand in the power sector. In addition, the publication includes data and forecasts on OECD and non-OECD regions to 2015 and in-depth reviews of five OECD countries and regions including the European Union. It also provides analysis of 34 non-OECD countries in South America, the Middle East, Africa, and Asia, including a detailed assessment of the outlook for gas in Russia, as well as insights on new technologies to deliver gas to markets.

  11. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  12. Policy offers protection from harassment

    Science.gov (United States)

    McNutt, Marcia

    We face a number of legal and ethical issues in our work as scientists and as AGU members. To uphold the highest ethical standards in our professional activities, the Council has adopted policies on free access to published material, ethics in publishing, and misconduct in science. But what about guidelines to govern the personal behavior that constitutes harassment, sexual or otherwise?For years the AGU headquarters staff has had a policy that offers protection from harassment and rules for dealing with it, but the membership went without one until 1994. That year the Council adopted a policy that extends to the membership as well as to the staff and the vendors they encounter at meetings. The law only requires a policy to prevent harassment in the workplace, but the Council felt that a harassment policy was particularly important for members because the subtle behavior that can constitute harassment is most likely to occur at events that combine work and social interaction, such as the meetings, conferences, and training seminars that AGU members attend.

  13. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  14. Predictors of admission to a high-security hospital of people with intellectual disability with and without schizophrenia.

    Science.gov (United States)

    Doody, G A; Thomson, L D; Miller, P; Johnstone, E C

    2000-04-01

    reduction in the number of admissions to high-security hospitals in the UK. In people with comorbid intellectual disability and schizophrenia, males with an early age of onset and no known family history are more likely to require care and treatment in a secure psychiatric setting. Such comorbid subjects may be suffering from a particular malignant form of schizophrenia, manifesting in childhood as cognitive impairment prior to the early onset of psychosis in teenage years.

  15. Envisioning Urban Farming for Food Security during the Climate Change Era. Vertical Farm within Highly Urbanized Areas

    Science.gov (United States)

    Januszkiewicz, Krystyna; Jarmusz, Małgorzata

    2017-10-01

    Global climate change constitutes a serious threat to global security including food production in the following decades. This paper is focused on a new possibility and advisability of creating a systemic solution to resolve the problem of food security in highly-urbanized areas. The first part of the paper deal with historical development vertical farms ideas and defines the main environmental and spatial constrains also it indicates that vertical farms are going to be part of the future horticultural production. The second part presents results of the research program undertaken at West Pomeranian University of Technology in Szczecin by authors. The program goes on to attempt to solve the problem through architectural design. This study highlights an integrating large-scale horticultural production directly into the cities, where the most of the food consumption takes place. In conclusions emphasizes, that the design will force architects, engineers and urban planners to completely revise and redefine contemporary design process and understanding of the idea-fix of sustainable design. To successfully migrate food production from extensive rural areas to dense environment of city centres, a new holistic approach, integrating knowledge and advances of multiple fields of science, have to develop.

  16. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  17. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  18. Formulating a strategy for securing high-speed rail in the United States.

    Science.gov (United States)

    2013-03-01

    This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...

  19. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  20. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  1. Location iron-Mantua an area with high securities gives natural radioactivity

    International Nuclear Information System (INIS)

    Alcaide Orpi, J.; Oliveira Acosta, J.; Valdes Hernadez, G.M.; Leal Ramirez, M.R.; Blanco Jorrin, N.

    1998-01-01

    The work shows the high natural radioactivity and the concentration to the natural radioelements (U,Th, Ra, K) it is exists in the sulfurous Hierro Mantua location. The objective is to know the possible radiological risk to that would be subjected the workers during the mining exploitation, because the high gamma radiation doses that could receive and to the risks product the internal contamination due to the inhalation the radon 222 and uranium aerosols and particles

  2. Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES.

    Science.gov (United States)

    Adeshina, A M; Hashim, R

    2017-03-01

    Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare procedures have immensely benefitted from the contemporary information technology revolutions, apparently revolutionizing those approaches to acquiring, storing and sharing of diagnostic data for efficient and timely diagnosis of diseases. Connected health network was introduced as an alternative to the ageing traditional concept in healthcare system, improving hospital-physician connectivity and clinical collaborations. Undoubtedly, the modern medicinal approach has drastically improved healthcare but at the expense of high computational cost and possible breach of diagnosis privacy. Consequently, a number of cryptographical techniques are recently being applied to clinical applications, but the challenges of not being able to successfully encrypt both the image and the textual data persist. Furthermore, processing time of encryption-decryption of medical datasets, within a considerable lower computational cost without jeopardizing the required security strength of the encryption algorithm, still remains as an outstanding issue. This study proposes a secured radiology-diagnostic data framework for connected health network using high-performance GPU-accelerated Advanced Encryption Standard. The study was evaluated with radiology image datasets consisting of brain MR and CT datasets obtained from the department of Surgery, University of North Carolina, USA, and the Swedish National Infrastructure for Computing. Sample patients' notes from the University of North Carolina, School of medicine at Chapel Hill were also used to evaluate the framework for its strength in encrypting-decrypting textual data in the form of medical report. Significantly, the framework is not only able to accurately encrypt and decrypt medical image datasets, but it also

  3. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  4. Service Offering at Electrical Equipment Manufacturers

    Directory of Open Access Journals (Sweden)

    Lucie Kaňovská

    2015-09-01

    Full Text Available Purpose of the article: The aim of the paper is to uncover ways of managing service offering provided by electrical equipment manufactures in the Czech Republic. The segment is extremely important for Czech industry nowadays, especially because of many companies being subcontractors for the car industry and mechanical engineering. The producers of electric equipment comply with the Czech industry classification CZ-NACE 27. Methodology/methods: The questionnaire in the form of the Likert scale was prepared to gather information about customer services. The respondents were usually directors or managers, e.g. employees with high competencies of knowing customer services in this particular market. The total of 22 companies were included in the survey. Research was focused on the following industries classifications belonging to CZ-NACE 27: CZ-NACE 27, CZ-NACE 271 and CZ-NACE 273. According to Czech Statistical Office the total number of companies belonging to these 3 segments is 136. It means 16,2% companies belonging to CZ-NACE 27 participated in our research. Basic statistical methods were used to analyse the complete database. Scientific aim: The paper deals with the problem of service offering provided by today’s manufacturers. Global understanding of services that manufacturers really develop, sell, deliver and manage is still limited. Findings: Managing service offering provided by today‘s manufacturers shows that 1 Manufacturers not offer only tangible products, but also wide range of services and even information and support. 2 New products are not designed only according to company technicians, but also according to their customers. Their products and services are developed, tested and improved according to their needs. 3 Services provide complex customer care from time product selection to its end. Conclusions: Manufacturers of tangible products need to enlarge their product offering to be able to satisfy customers. Therefore

  5. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  6. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...... to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...

  7. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2009-01-01

    The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink(reg s ign), an extension of MATLAB(reg s ign), is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub

  8. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  9. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  10. A kidney offer acceptance decision tool to inform the decision to accept an offer or wait for a better kidney.

    Science.gov (United States)

    Wey, Andrew; Salkowski, Nicholas; Kremers, Walter K; Schaffhausen, Cory R; Kasiske, Bertram L; Israni, Ajay K; Snyder, Jon J

    2018-04-01

    We developed a kidney offer acceptance decision tool to predict the probability of graft survival and patient survival for first-time kidney-alone candidates after an offer is accepted or declined, and we characterized the effect of restricting the donor pool with a maximum acceptable kidney donor profile index (KDPI). For accepted offers, Cox proportional hazards models estimated these probabilities using transplanted kidneys. For declined offers, these probabilities were estimated by considering the experience of similar candidates who declined offers and the probability that declining would lead to these outcomes. We randomly selected 5000 declined offers and estimated these probabilities 3 years post-offer had the offers been accepted or declined. Predicted outcomes for declined offers were well calibrated (offers been accepted, the probabilities of graft survival and patient survival were typically higher. However, these advantages attenuated or disappeared with higher KDPI, candidate priority, and local donor supply. Donor pool restrictions were associated with worse 3-year outcomes, especially for candidates with high allocation priority. The kidney offer acceptance decision tool could inform offer acceptance by characterizing the potential risk-benefit trade-off associated with accepting or declining an offer. © 2017 The American Society of Transplantation and the American Society of Transplant Surgeons.

  11. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2010-01-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  12. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    Energy Technology Data Exchange (ETDEWEB)

    Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

    2010-10-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  13. Re-designing the PhEDEx Security Model

    Science.gov (United States)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  14. Re-designing the PhEDEx security model

    International Nuclear Information System (INIS)

    Huang C-H; Wildish, T; Zhang X

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  15. 48 CFR 25.503 - Group offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Group offers. 25.503... PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 25.503 Group offers. (a) If the solicitation or an offer specifies that award can be made only on a group of line items or on all line items...

  16. 48 CFR 570.306 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Evaluating offers. 570.306... Real Property 570.306 Evaluating offers. (a) You must evaluate offers solely in accordance with the... solicitation. The file must include the basis for evaluation, an analysis of each offer, and a summary of...

  17. 48 CFR 225.503 - Group offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Group offers. 225.503... OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 225.503 Group offers. Evaluate group offers in accordance with FAR 25.503, but apply the evaluation...

  18. Design of High-Fidelity Testing Framework for Secure Electric Grid Control

    Energy Technology Data Exchange (ETDEWEB)

    Yoginath, Srikanth B [ORNL; Perumalla, Kalyan S [ORNL

    2014-01-01

    A solution methodology and implementation components are presented that can uncover unwanted, unintentional or unanticipated effects on electric grids from changes to actual electric grid control software. A new design is presented to leapfrog over the limitations of current modeling and testing techniques for cyber technologies in electric grids. We design a fully virtualized approach in which actual, unmodified operational software under test is enabled to interact with simulated surrogates of electric grids. It enables the software to influence the (simulated) grid operation and vice versa in a controlled, high fidelity environment. Challenges in achieving such capability include achieving low-overhead time control mechanisms in hypervisor schedulers, network capture and time-stamping, translation of network packets emanating from grid software into discrete events of virtual grid models, translation back from virtual sensors/actuators into data packets to control software, and transplanting the entire system onto an accurately and efficiently maintained virtual-time plane.

  19. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  20. Securing energy efficiency as a high priority. Scenarios for common appliance electricity consumption in Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Foran, T. [Unit for Social and Environmental Research USER, Faculty of Social Sciences, Chiang Mai University, P.O. Box 144, Chiang Mai, 50200 (Thailand); Du Pont, P.T. [International Resources Group and Joint Graduate School of Energy and Environment, Bangkok (Thailand); Parinya, P. [The Joint Graduate School of Energy and Environment, King Mongkut' s University of Technology Thonburi, Bangkok (Thailand); Phumaraphand, N. [Electricity Generating Authority of Thailand, Nonthaburi (Thailand)

    2010-11-15

    Between 1995 and 2008, Thailand's energy efficiency programs produced an estimated total of 8,369 GWh/year energy savings and 1,471 MW avoided peak power. Despite these impressive saving figures, relatively little future scenario analysis is available to policy makers. Before the 2008 global financial crisis, electricity planners forecasted 5-6% long-term increases in demand. We explored options for efficiency improvements in Thailand's residential sector, which consumes more than 20% of Thailand's total electricity consumption of 150 TWh/year. We constructed baseline and efficient scenarios for the period 2006-2026, for air conditioners, refrigerators, fans, rice cookers, and compact fluorescent light bulbs. We drew on an appliance database maintained by Electricity Generating Authority of Thailand's voluntary labeling program. For the five appliances modeled, the efficiency scenario results in total savings of 12% of baseline consumption after 10 years and 29% of baseline after 20 years. Approximately 80% of savings come from more stringent standards for air conditioners, including phasing out unregulated air conditioner sales within 6 years. Shifting appliance efficiency standards to current best-in-market levels within 6 years produces additional savings. We discuss institutional aspects of energy planning in Thailand that thus far have limited the consideration of energy efficiency as a high-priority resource.

  1. Psychotropic prescribing in seriously violent men with schizophrenia or personality disorder in a UK high security hospital.

    Science.gov (United States)

    Stone-Brown, Keir; Naji, Mahmood; Francioni, Alex; Myers, Kyle; Samarendra, Harsh; Mushtaq-Chaudhry, Haseeb; Heslop, Stephen; Sengupta, Samrat; Ross, Callum C; Larkin, Fintan; Das, Mrigendra

    2016-02-01

    To analyze antipsychotic prescribing patterns in a UK high security hospital (HSH) that treats seriously violent men with either schizophrenia or personality disorder and examine how different groups consented to treatment and prescribing for metabolic conditions. We hypothesized that there would be high prevalence of antipsychotic polypharmacy, and high-dose antipsychotic and clozapine prescribing. HSHs treat seriously violent, mentally disordered offenders, and the extant literature on prescribing patterns in forensic settings is sparse. Prescribing and clinical data on all 189 patients in a UK HSH were collected from the hospital's databases. Data were analyzed using SPSS. The population was split into the following groups: schizophrenia spectrum disorder (SSD-only), personality disorder (PD-only), and comorbid schizophrenia spectrum disorder and PD. The majority (93.7%) of all patients were prescribed at least one antipsychotic, and (27.5%) were on clozapine. Polypharmacy was prevalent in 22.2% and high-dose antipsychotic in 27.5%. Patients on clozapine were more likely to be prescribed antidiabetic, statins, or antihypertensive medication. Patients in the PD-only group were more likely to be deemed to have the capacity to consent to treatment and be prescribed clozapine in contrast to the SSD-only group. Rates of clozapine and high-dose antipsychotic prescribing were higher than in other psychiatric settings, while polypharmacy prescribing rates were lower. Higher clozapine prescribing rates may be a function of a treatment-resistant and aggressive population. A higher proportion of PD-only patients consented to treatment and received clozapine compared with in-house SSD-only as well as other psychiatric settings. Implications of the findings are discussed.

  2. Prevalence and correlates of latent tuberculosis infection among employees of a high security prison in Malaysia.

    Science.gov (United States)

    Al-Darraji, Haider Abdulrazzaq Abed; Tan, Cynthia; Kamarulzaman, Adeeba; Altice, Frederick L

    2015-06-01

    Although prison employees share the same tuberculosis (TB) risk environment with prisoners, the magnitude of TB problems among prison employees is unknown in most resource-limited prisons. This survey was conducted to investigate the prevalence and correlates of tuberculin skin test (TST) positivity among employees in Malaysia's largest prison. Consented, full-time prison employees were interviewed using a structured questionnaire that included sociodemographic data, history of working in the correctional system and TB-related risk. TST was placed intradermally and read after 48-72 h. Induration size of ≥10 mm was considered positive. Logistic regression analyses were conducted to explore associations with TST positivity. Of the 445 recruited prison employees, 420 (94.4%) had complete data. Most were young (median=30.0 years) men (88.8%) who had only worked at this prison (76.4%) for a median total employment period of 60 months (IQR 34.5-132.0). The majority were correctional officers, while civilian employees represented only 7.6% of the sample. Only 26 (6.2%) reported having ever been screened for TB since employment. Prevalence of TST positivity was 81% and was independently associated with longer (≥12 months) prison employment (AOR 4.9; 95% CI 1.5 to 15.9) and current tobacco smoking (AOR=1.9, 95% CI 1.2 to 3.2). Latent TB prevalence was high in this sample, approximating that of prisoners in this setting, perhaps suggesting within prison TB transmission in this facility. Formal TB control programmes for personnel and prisoners alike are urgently needed within the Malaysian correctional system. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  3. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  4. Characteristic mTOR activity in Hodgkin-lymphomas offers a potential therapeutic target in high risk disease – a combined tissue microarray, in vitro and in vivo study

    International Nuclear Information System (INIS)

    Márk, Ágnes; Kopper, László; Sebestyén, Anna; Hajdu, Melinda; Váradi, Zsófia; Sticz, Tamás Béla; Nagy, Noémi; Csomor, Judit; Berczi, Lajos; Varga, Viktória; Csóka, Monika

    2013-01-01

    Targeting signaling pathways is an attractive approach in many malignancies. The PI3K/Akt/mTOR pathway is activated in a number of human neoplasms, accompanied by lower overall and/or disease free survival. mTOR kinase inhibitors have been introduced in the therapy of renal cell carcinoma and mantle cell lymphoma, and several trials are currently underway. However, the pathological characterization of mTOR activity in lymphomas is still incomplete. mTOR activity and the elements of mTOR complexes were investigated by immunohistochemistry on tissue microarrays representing different human non-Hodgkin-lymphomas (81 cases) and Hodgkin-lymphomas (87 cases). The expression of phospho-mTOR, phospho-4EBP1, phospho-p70S6K, phospho-S6, Rictor, Raptor and Bcl-2, Bcl-xL, Survivin and NF-kappaB-p50 were evaluated, and mTOR activity was statistically analyzed along with 5-year survival data. The in vitro and in vivo effect of the mTOR inhibitor rapamycin was also examined in human Hodgkin-lymphoma cell lines. The majority (>50%) of mantle cell lymphoma, Burkitt lymphoma, diffuse large B-cell lymphoma, anaplastic large-cell lymphoma and Hodgkin-lymphoma cases showed higher mTOR activity compared to normal lymphoid tissues. Hodgkin-lymphoma was characterized by high mTOR activity in 93% of the cases, and Bcl-xL and NF-kappaB expression correlated with this mTOR activity. High mTOR activity was observed in the case of both favorable and unfavorable clinical response. Low mTOR activity was accompanied by complete remission and at least 5-year disease free survival in Hodgkin-lymphoma patients. However, statistical analysis did not identify correlation beetween mTOR activity and different clinical data of HL patients, such as survival. We also found that Rictor (mTORC2) was not overexpressed in Hodgkin-lymphoma biopsies and cell lines. Rapamycin inhibited proliferation and induced apoptosis in Hodgkin-lymphoma cells both in vitro and in vivo, moreover, it increased the apoptotic

  5. 17 CFR 240.13e-4 - Tender offers by issuers.

    Science.gov (United States)

    2010-04-01

    ... begins the running of such time period shall be included except that if such event occurs on other than a business day such period shall begin to run on and shall include the first business day thereafter. (4) The... offer. (6) The term security holders means holders of record and beneficial owners of securities of the...

  6. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  7. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  8. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  9. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2014-01-01

    Full Text Available Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS. The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.

  10. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  11. High security container

    International Nuclear Information System (INIS)

    Moreau, P.J.-M.; Monsterleet, G.A.

    1979-01-01

    This invention concerns containments, vessels or tanks for containing and protecting products or installations of various kinds, to be called by the general denomination 'containers'. Such products can be, inter alia, liquids such as natural gas, ammonia, vinyle chloride and hydrocarbons. Far from just forming simple means of storage, the containers used for this must now be capable of withstanding fire, sabotage for instance rocket fire, even impacts from aircraft, earthquakes and other aggressions of the same kind. The particular object of this invention is to create a container withstanding all these various agressions. It must also be considered that this container can not only be used for storing products or materials but also for enclosing particularly dangerous or delicate installations, such as nuclear or chemical reactors [fr

  12. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  13. A New Secure Pairing Protocol using Biometrics

    NARCIS (Netherlands)

    Buhan, I.R.

    2008-01-01

    Secure Pairing enables two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping or to a

  14. It Security and EO Systems

    Science.gov (United States)

    Burnett, M.

    2010-12-01

    One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.

  15. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  16. High Fidelity Down-Conversion Source for Secure Communications using On-Demand Single Photons, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — To provide reliably secure communications, development of quantum optical devices for encrypted ground-to-space communications is a necessity. The overall goal of...

  17. 43 CFR 12.715 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Evaluating offers. 12.715 Section 12.715... Act-Supplies § 12.715 Evaluating offers. (a) Unless the head of the grantee organization or a designee at a level no lower than the grantee's designated awarding official determines otherwise, the offered...

  18. 5 CFR 536.104 - Reasonable offer.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Reasonable offer. 536.104 Section 536.104... Provisions § 536.104 Reasonable offer. (a) For the purpose of determining whether grade retention eligibility or entitlement must be terminated under § 536.207 or 536.208, the offer of a position is a reasonable...

  19. 7 CFR 3560.656 - Incentives offers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Incentives offers. 3560.656 Section 3560.656... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Housing Preservation § 3560.656 Incentives offers. (a) The Agency will offer a borrower, who submits a prepayment request meeting the conditions of § 3560...

  20. 48 CFR 12.205 - Offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Offers. 12.205 Section 12... ACQUISITION OF COMMERCIAL ITEMS Special Requirements for the Acquisition of Commercial Items 12.205 Offers. (a) Where technical information is necessary for evaluation of offers, agencies should, as part of market...

  1. 32 CFR 536.64 - Final offers.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Final offers. 536.64 Section 536.64 National... UNITED STATES Investigation and Processing of Claims § 536.64 Final offers. (a) When claims personnel... less than the amount claimed, a settlement authority will make a written final offer within his or her...

  2. The primary relevance of subconsciously offered attitudes

    DEFF Research Database (Denmark)

    Kristiansen, Tore

    2015-01-01

    ) and subconsciously (covertly) offered attitudes – because subconsciously offered attitudes appear to be a driving force in linguistic variation and change in a way that consciously offered attitudes are not. The argument is based on evidence from empirical investigations of attitudes and use in the ‘...

  3. Innovative gas offers; Les offres gazieres innovantes

    Energy Technology Data Exchange (ETDEWEB)

    Sala, O.; Mela, P. [Gaz de France (GDF), 75 - Paris (France); Chatelain, F. [Primagaz, 75 - Paris (France)

    2007-07-01

    New energy offers are progressively made available as the opening of gas market to competition becomes broader. How are organized the combined offers: gas, electricity, renewable energies and energy services? What are the marketing strategies implemented? Three participants at this round table present their offer and answer these questions. (J.S.)

  4. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  5. Investor Reaction to Mandatory Offers on the Warsaw Stock Exchange

    Directory of Open Access Journals (Sweden)

    Szymon Okoń

    2012-06-01

    Full Text Available The following paper aims to assess investor reaction to mandatory offers on the Warsaw Stock Exchange, which is important because knowledge about these reactions can be used to make better investment decisions. This paper highlights the importance of procedure in making a mandatory offer and its grounds in the Polish legal system. Additionally, it presents empirical research on the reactions of investors to mandatory offers on the Warsaw Stock Exchange. It has been provided that mandatory offers have a significant impact on the price of a company’s shares listed on the Warsaw Stock Exchange. Knowledge about the reactions of investors to a mandatory offer may be used when selecting securities for an investment portfolio. The findings may provide guidance in deciding whether to begin or end investment in the company, both for individual and institutional investors. The event study methodology approach used in the paper is regarded as valuable and can be the basis for further research in other areas of the capital market research, especially in the context of information efficiency.

  6. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  7. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  8. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  9. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  10. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    ... of various GA operations. While some recent high-profile breaches of GA security point to persisting vulnerabilities and limited intelligence information suggests a continued terrorist interest in using GA aircraft...

  11. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  12. The Informatics Security Cost of Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2010-01-01

    Full Text Available The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The security requirements of distributed informatics applications are determined. Aspects regarding design, development and implementation are established. Influence factors for informatics security are presented and their correlation is analyzed. The costs associated to security processes are studied. Optimal criteria for informatics security are established. The security cost of the informatics application for validating organizational identifiers is determined using theoretical assumptions made for cost models. The conclusions highlight the validity of research results and offer perspectives for future research.

  13. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  14. Managerial segmentation of service offerings in work commuting.

    Science.gov (United States)

    2015-03-01

    Methodology to efficiently segment markets for public transportation offerings has been introduced and exemplified in an : application to an urban travel corridor in which high tech companies predominate. The principal objective has been to introduce...

  15. Marketing strategy to differentiate the offer

    OpenAIRE

    Miceski, Trajko; Pasovska, Silvana

    2013-01-01

    The marketing strategy for differentiation of the offers is important and accepted strategy especially by the bigger legal entities. The differentiation of the offers leads to bigger profit and bigger profitability in operation, through targeting of the demand towards the product of the enterprise. The vertical differentiation of the offers is directed towards the quality of the product itself which is observed as a something superior despite the competitive product which is observed as somet...

  16. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  18. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  19. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  20. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  1. Understanding High Incidence of Severe Obesity and Very Low Food Security in Food Pantry Clients: Implications For Social Work.

    Science.gov (United States)

    Kaiser, Michelle L; Cafer, Anne

    2018-01-01

    The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.

  2. 43 CFR 12.815 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Evaluating offers. 12.815 Section 12.815 Public Lands: Interior Office of the Secretary of the Interior ADMINISTRATIVE AND AUDIT REQUIREMENTS AND... Act-Construction Materials § 12.815 Evaluating offers. (a) The restrictions of the Buy American Act do...

  3. 48 CFR 2825.203 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Evaluating offers. 2825.203 Section 2825.203 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE Socioeconomic Programs FOREIGN ACQUISITION Buy American Act-Construction Materials 2825.203 Evaluating offers. The HCA, or...

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. 17 CFR 240.14e-2 - Position of subject company with respect to a tender offer.

    Science.gov (United States)

    2010-04-01

    ... disclosing that the subject company: (1) Recommends acceptance or rejection of the bidder's tender offer; (2... accordance with such laws, regulations and policies. (d) Exemption for cross-border tender offers. The... with respect to a tender offer. 240.14e-2 Section 240.14e-2 Commodity and Securities Exchanges...

  6. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  7. Social Security, Intergenerational Transfers, and Endogenous Growth

    OpenAIRE

    Junsen Zhang; Junxi Zhang

    1998-01-01

    In this paper, the effects of social security in a simple model of endogenous growth with alternative motives of having children are analyzed. It shows how the effects of social security depend on the size of the social security tax, the motive to have children, and the pattern of intergenerational transfers. The pattern of intergenerational transfers itself, however, is shown to change with the social security tax rate. When the social security tax is not too high, social security increases ...

  8. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  9. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  10. Successful Characterization and Remedial Contour of Highly Contaminated Mercury Soil at the Y-12 National Security Complex - 13593

    Energy Technology Data Exchange (ETDEWEB)

    White, Aaron; Rigas, Michael [U.S. Department of Energy Oak Ridge Operations, Oak Ridge, TN 37830 (United States); Birchfield, Joseph W. III [1528 Paxton Drive Knoxville, TN 37918 (United States)

    2013-07-01

    An area known as the 81-10 pad within the footprint of the Y-12 National Security Complex, suspected to be heavily contaminated with mercury, was slated for characterization in support of a Federal Facilities Agreement (FFA) milestone to be accomplished by September 30, 2012. A full remedial design report (RDR) required the soil in Exposure Unit -9 (EU-9) to be fully characterized for a number of contaminates of concern including mercury. The goal of this characterization effort was to determine what soil, if any, would need to be removed for the protection of industrial workers and impacts to the surface and ground water. Funding for this project was made available using buy-back scope under the American Recovery and Reinvestment Act (ARRA). The EU-9 soil unit involved 3 different classifications which were determined as follows: Class 1: Known to have been impacted, contamination is likely; Class 2: Suspected to have been impacted, contamination is unknown; Class 3: Area not known to have been impacted, contamination unlikely. Due to various sampling and analysis events since the 1980's, significant mercury contamination was expected under the concrete pad of an area known as 81-10. Mercury contamination outside of the boundary of this pad within the EU-9 footprint was not known and therefore an original planned estimate of 1,461 cubic meters of material were expected to be heavily contaminated with mercury requiring removal, treatment and disposal. Through the use of a highly effective nature and extent sampling and analysis design that involved a hybrid of statistically-based and judgmental sampling, the actual remedial contour requiring removal was approximately 717 cubic meters, roughly 12% of the original estimate. This characterization approach was executed in full compliance with the Record of Decision (ROD) [1] documents that were agreed upon by the U.S. Department of Energy, Environmental Protection Agency and Tennessee Department of Environment and

  11. Market Design and Supply Security in Imperfect Power Markets

    DEFF Research Database (Denmark)

    Schwenen, Sebastian

    2014-01-01

    Supply security in imperfect power markets is modelled under different market designs. In a uniform price auction for electricity with two firms, strategic behaviour may leave firms offering too few capacities and unable to supply all realized demand. Market design that relies oncapacity markets...... increases available generation capacities for sufficiently high capacity prices and consequently decreases energy prices. However, equilibrium capacity prices are non-competitive. Capacity markets can increase security of supply, but cannot mitigate market power, which is exercised in the capacity market...

  12. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  13. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  14. Perceived value creation process: focus on the company offer

    Directory of Open Access Journals (Sweden)

    Irena Pandža Bajs

    2012-12-01

    Full Text Available In the competitive business environment, as the number of rational consumers faced with many choices increases, companies can achieve their dominance best by applying the business concepts oriented to consumers in order to deliver a value which is different and better than that of their competitors. Among the various products on the market, an educated consumer chooses the offer that provides the greatest value for him/her. Therefore, it is essential for each company to determine how consumers perceive the value of its offer, and which factors determine the high level of perceived value for current and potential consumers. An analysis of these factors provides guidance on how to improve the existing offer and what the offer to be delivered in the future should be like. That could increase the perceived value of the company offer and result in a positive impact on consumer satisfaction and on establishing a stronger, longterm relationship with consumers. The process of defining the perceived value of a particular market offer is affected by the factors of the respective company’s offer as well as by competition factors, consumer factors and buying process factors. The aim of this paper is to analyze the relevant knowledge about the process of creating the perceived value of the company’s market offer and the factors that influence this process. The paper presents a conceptual model of the perceived value creation process in consumers’ mind.

  15. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  16. Association of market, mission, operational, and financial factors with hospitals' level of cash and security investments.

    Science.gov (United States)

    McCue, M J; Thompson, J M; Dodd-McCue, D

    Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.

  17. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  18. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  19. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  20. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  1. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  2. Hospitalized Patients' Responses to Offers of Prayer.

    Science.gov (United States)

    McMillan, Kathy; Taylor, Elizabeth Johnston

    2018-02-01

    Most Americans pray; many pray about their health. When they are hospitalized, however, do patients want an offer of prayer from a healthcare provider? This project allowed for the measurement of hospitalized patient's responses to massage therapists' offers of a colloquial prayer after a massage. After the intervention, 78 patients completed questionnaires that elicited quantitative data that were analyzed using uni- and bivariate statistical analyses. In this sample, 88% accepted the offer of prayer, 85% found it helpful, and 51% wanted prayer daily. Patients may welcome prayer, as long as the clinician shows "genuine kindness and respect."

  3. 75 FR 29358 - Maritime Security Directive 104-6 (Rev 2 and 3); Guidelines for U.S. Vessels Operating in High...

    Science.gov (United States)

    2010-05-25

    ... designated high risk waters, and provides additional anti-piracy guidance and mandatory measures for these vessels operating in these areas where acts of piracy and armed robbery against ships are prevalent... piratical activities. The combination of piracy and weak rule of law in the region offers a potential...

  4. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  5. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  6. 17 CFR 8.16 - Settlement offers.

    Science.gov (United States)

    2010-04-01

    ... Section 8.16 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.16 Settlement... the disciplinary committee at any time after the investigation report is completed. The disciplinary...

  7. 16 CFR 238.2 - Initial offer.

    Science.gov (United States)

    2010-01-01

    ... § 238.2 Initial offer. (a) No statement or illustration should be used in any advertisement which creates a false impression of the grade, quality, make, value, currency of model, size, color, usability...

  8. Sustainable Offering Practices Through Stakeholders Engagement

    Directory of Open Access Journals (Sweden)

    Bijay Prasad Kushwaha

    2018-02-01

    Full Text Available Sustainable development is achieved by satisfying the current ends without shrinking the existing means which can serve as needs for the society in the future. It has become global motive and responsibility of present community to utilize resources in an optimum way with minimum environmental damage. The objective of this paper is to study theoretical framework and practical approaches on sustainable offering practices through customer engagement. The study has also examined the opportunities and challenges of sustainable offering practices in India. The study is based on a previous study and secondary data has been used for analysis. The outcome revealed the process for successful sustainable offering practices in context of Indian consumers. The analysis has helped to understand different practices of sustainable offering through engaging stakeholders.

  9. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  10. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  11. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  12. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  13. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  14. Secure steganography designed for mobile platforms

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  15. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  16. Improving computer security by health smart card.

    Science.gov (United States)

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  17. Avaliação de máquinas e equipamentos que oferecem riscos à segurança do trabalhador nas etapas de pós-colheita do café Evaluation of machines and equipment that offer risks to the security of the worker in the stages of after-harvest of the coffee

    Directory of Open Access Journals (Sweden)

    Cinara da Cunha Siqueira Carvalho

    2008-12-01

    Full Text Available A Lei Brasileira nº 6.514, de 22 de dezembro de 1977 (BRASIL, 2004 e as leis aprovadas pela portaria nº3.067, de 12 de abril de 1988 que cuida das questões de saúde e segurança do trabalhador, prometem o direito subjetivo do trabalhador urbano e rural, a redução dos riscos do trabalho mediante normas de saúde, higiene e segurança. Considerando que essas leis atualmente estão sendo aplicadas em fazendas e unidades de processamento de café, no intuito de preservar o bem-estar do trabalhador, conduziu-se este trabalho, com o objetivo de avaliar o estado de conservação de máquinas e equipamentos que podem oferecer riscos à saúde e comprometer a segurança do funcionário, e verificar sua conformidade com as normas regulamentadoras durante a fase de pós-colheita de café. Foram observados e registrados os riscos oferecidos pelas máquinas e equipamentos, existentes em trinta unidades de beneficiamento de café do município de São Sebastião do Paraíso - MG, e avaliados de forma qualitativa. Foi observado que o estado de conservação desses equipamentos é irregular, pois apresentam ruído, temperaturas extremas, poeira e oferecem riscos de choques e acidentes mecânicos que comprometem a saúde do trabalhador.The Brazilian Law nº. 6.514, of December 22, 1977 and the approved laws for the entrance nº3.067, of April 12, 1988 that take care of the subjects of health and the worker's safety, promise the urban and rural worker's subjective rights, such as the reduction of the risks of the work by norms of health, hygiene and safety. Considering that those laws are now being applied in farms and processing coffee units aiming of preserving the worker's well-being, the present work had as objective to evaluate the state of conservation of the machines and equipments that can offer risks to the health to compromise the employee's safety and to verify their conformity with the regulating norms during the stage of coffee after

  18. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  19. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  20. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  1. Decision support for organ offers in liver transplantation.

    Science.gov (United States)

    Volk, Michael L; Goodrich, Nathan; Lai, Jennifer C; Sonnenday, Christopher; Shedden, Kerby

    2015-06-01

    Organ offers in liver transplantation are high-risk medical decisions with a low certainty of whether a better liver offer will come along before death. We hypothesized that decision support could improve the decision to accept or decline. With data from the Scientific Registry of Transplant Recipients, survival models were constructed for 42,857 waiting-list patients and 28,653 posttransplant patients from 2002 to 2008. Daily covariate-adjusted survival probabilities from these 2 models were combined into a 5-year area under the curve to create an individualized prediction of whether an organ offer should be accepted for a given patient. Among 650,832 organ offers from 2008 to 2013, patient survival was compared by whether the clinical decision was concordant or discordant with model predictions. The acceptance benefit (AB)--the predicted gain or loss of life by accepting a given organ versus waiting for the next organ--ranged from 3 to -22 years (harm) and varied geographically; for example, the average benefit of accepting a donation after cardiac death organ ranged from 0.47 to -0.71 years by donation service area. Among organ offers, even when AB was >1 year, the offer was only accepted 10% of the time. Patient survival from the time of the organ offer was better if the model recommendations and the clinical decision were concordant: for offers with AB > 0, the 3-year survival was 80% if the offer was accepted and 66% if it was declined (P decision support may improve patient survival in liver transplantation. © 2015 American Association for the Study of Liver Diseases.

  2. The ultimatum game: Discrete vs. continuous offers

    Science.gov (United States)

    Dishon-Berkovits, Miriam; Berkovits, Richard

    2014-09-01

    In many experimental setups in social-sciences, psychology and economy the subjects are requested to accept or dispense monetary compensation which is usually given in discrete units. Using computer and mathematical modeling we show that in the framework of studying the dynamics of acceptance of proposals in the ultimatum game, the long time dynamics of acceptance of offers in the game are completely different for discrete vs. continuous offers. For discrete values the dynamics follow an exponential behavior. However, for continuous offers the dynamics are described by a power-law. This is shown using an agent based computer simulation as well as by utilizing an analytical solution of a mean-field equation describing the model. These findings have implications to the design and interpretation of socio-economical experiments beyond the ultimatum game.

  3. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ruthruff, Joseph. R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Armstrong, Robert C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Davis, Benjamin Garry [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Mayo, Jackson R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2012-09-01

    Formal methods describe a class of system analysis techniques that seek to prove specific properties about analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest from both internal and external customers of Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquely positioned to advance the state-of-the-art with respect to several research and application areas within formal methods. This research project was a one-year effort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research & Development program to investigate the opportunities for formal methods to impact Sandia's present mission areas, more fully understand the needs of the research community in the area of formal methods and where Sandia can contribute, and clarify from those potential research paths those that would best advance the mission-area interests of Sandia. The accomplishments from this project reinforce the utility of formal methods in Sandia, particularly in areas relevant to Cyber Security, and set the stage for continued Sandia investments to ensure this capabilityis utilized and advanced within this laboratory to serve the national interest.

  4. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  5. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  6. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  7. Improving Tamper Detection for Hazardous Waste Security

    International Nuclear Information System (INIS)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-01-01

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them

  8. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  9. Cu-TDPAT, an rht -type dual-functional metal-organic framework offering significant potential for use in H 2 and natural gas purification processes operating at high pressures

    KAUST Repository

    Wu, Haohan; Yao, Kexin; Zhu, Yihan; Li, Baiyan; Shi, Zhan; Krishna, Rajamani A A; Li, Jing

    2012-01-01

    The separations of CO 2/CO/CH 4/H 2, CO 2/H 2, CH 4/H 2, and CO 2/CH 4 mixtures at pressures ranging to 7 MPa are important in a variety of contexts, including H 2 production, natural gas purification, and fuel-gas processing. The primary objective of this study is to demonstrate the selective adsorption potential of an rht-type metal-organic framework [Cu 3(TDPAT)(H 2O) 3]·10H 2O·5DMA (Cu-TDPAT), possessing a high density of both open metal sites and Lewis basic sites. Experimental high pressure pure component isotherm data for CO 2, CO, CH 4, and H 2 are combined with the Ideal Adsorbed Solution Theory (IAST) for estimation of mixture adsorption equilibrium. The separation performance of Cu-TDPAT is compared with four other microporous materials, specifically chosen in order to span a wide range of physicochemical characteristics: MgMOF-74, MIL-101, LTA-5A, and NaX. For all mixtures investigated, the capacity of Cu-TDPAT to produce the desired product, H 2 or CH 4, satisfying stringent purity requirements, in a fixed bed operating at pressures exceeding about 4 MPa, is either comparable to, or exceeds, that of other materials. © 2012 American Chemical Society.

  10. Cu-TDPAT, an rht -type dual-functional metal-organic framework offering significant potential for use in H 2 and natural gas purification processes operating at high pressures

    KAUST Repository

    Wu, Haohan

    2012-08-09

    The separations of CO 2/CO/CH 4/H 2, CO 2/H 2, CH 4/H 2, and CO 2/CH 4 mixtures at pressures ranging to 7 MPa are important in a variety of contexts, including H 2 production, natural gas purification, and fuel-gas processing. The primary objective of this study is to demonstrate the selective adsorption potential of an rht-type metal-organic framework [Cu 3(TDPAT)(H 2O) 3]·10H 2O·5DMA (Cu-TDPAT), possessing a high density of both open metal sites and Lewis basic sites. Experimental high pressure pure component isotherm data for CO 2, CO, CH 4, and H 2 are combined with the Ideal Adsorbed Solution Theory (IAST) for estimation of mixture adsorption equilibrium. The separation performance of Cu-TDPAT is compared with four other microporous materials, specifically chosen in order to span a wide range of physicochemical characteristics: MgMOF-74, MIL-101, LTA-5A, and NaX. For all mixtures investigated, the capacity of Cu-TDPAT to produce the desired product, H 2 or CH 4, satisfying stringent purity requirements, in a fixed bed operating at pressures exceeding about 4 MPa, is either comparable to, or exceeds, that of other materials. © 2012 American Chemical Society.

  11. Oral live attenuated human rotavirus vaccine (RotarixTM offers sustained high protection against severe G9P[8] rotavirus gastroenteritis during the first two years of life in Brazilian children

    Directory of Open Access Journals (Sweden)

    Maria Cleonice A Justino

    2012-11-01

    Full Text Available In a large Phase III trial conducted in 10 Latin American countries, the safety and efficacy of the live attenuated monovalent rotavirus vaccine RIX4414 was evaluated in 15,183 healthy infants followed up during the first two years of life. Belém was the only site in Brazil included in this multicentre trial. The study in Belém included a subset of 653 infants who were followed up until 24 months of age for protection against severe rotavirus gastroenteritis. These subjects were randomly assigned in a 1:1 ratio to receive two doses of vaccine (n = 328 or two doses of placebo (n = 325 at approximately two and four months of age. Of the 653 enrolled infants, 23 dropped out during the study period. For the combined two-year period, the efficacy of RIX4414 was 72.3% [95% confidence interval (CI 37.5-89.1%] against severe rotavirus-related gastroenteritis, reaching a protection rate of 81.8% (95% CI 36.4-96.6% against circulating wild-type G9 rotavirus strains. It is concluded that two doses of RIX4414 are highly efficacious against severe rotavirus gastroenteritis in Belém during the first two years of life and provide high protection against the worldwide emergence and spread of G9P[8] strains.

  12. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  13. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  14. Secure Architectures in the Cloud

    NARCIS (Netherlands)

    De Capitani di Vimercati, Sabrina; Pieters, Wolter; Probst, Christian W.

    2011-01-01

    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud‿. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces

  15. News Quantum physics: German Physical Society spring meeting Journal access: American Physical Society's online journals will be available for free in all US high schools Award: High-school physics teacher receives American award for excellence Teacher training: Fobinet offers coordination of teacher-training activities Astronomy: Astronomy fans see stars at Astrofest Conference: Delegates enjoy the workshops and activities at CPD conference Forthcoming events

    Science.gov (United States)

    2011-05-01

    Quantum physics: German Physical Society spring meeting Journal access: American Physical Society's online journals will be available for free in all US high schools Award: High-school physics teacher receives American award for excellence Teacher training: Fobinet offers coordination of teacher-training activities Astronomy: Astronomy fans see stars at Astrofest Conference: Delegates enjoy the workshops and activities at CPD conference Forthcoming events

  16. The Etiquette of Accepting a Job Offer

    Science.gov (United States)

    Perlmutter, David D.

    2013-01-01

    The academic job market is overcrowded, but departments are hiring, and each year thousands of graduate students and other candidates will get phone calls offering them tenure-track positions. It is typically a moment of mutual giddiness. The department heads are excited at the prospect of a terrific new colleague; the job applicants now know that…

  17. 16 CFR 502.101 - Introductory offers.

    Science.gov (United States)

    2010-01-01

    ... Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENT OF GENERAL POLICY OR... FAIR PACKAGING AND LABELING ACT Retail Sale Price Representations § 502.101 Introductory offers. (a... retail sale at a price lower than the anticipated ordinary and customary retail sale price. (b) The...

  18. Scientific Library Offers New Training Options | Poster

    Science.gov (United States)

    The Scientific Library is expanding its current training opportunities by offering webinars, allowing employees to take advantage of trainings from the comfort of their own offices. Due to the nature of their work, some employees find it inconvenient to attend in-person training classes; others simply prefer to use their own computers. The Scientific Library has been

  19. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  20. High resolution melting curve analysis targeting the HBB gene mutational hot-spot offers a reliable screening approach for all common as well as most of the rare beta-globin gene mutations in Bangladesh.

    Science.gov (United States)

    Islam, Md Tarikul; Sarkar, Suprovath Kumar; Sultana, Nusrat; Begum, Mst Noorjahan; Bhuyan, Golam Sarower; Talukder, Shezote; Muraduzzaman, A K M; Alauddin, Md; Islam, Mohammad Sazzadul; Biswas, Pritha Promita; Biswas, Aparna; Qadri, Syeda Kashfi; Shirin, Tahmina; Banu, Bilquis; Sadya, Salma; Hussain, Manzoor; Sarwardi, Golam; Khan, Waqar Ahmed; Mannan, Mohammad Abdul; Shekhar, Hossain Uddin; Chowdhury, Emran Kabir; Sajib, Abu Ashfaqur; Akhteruzzaman, Sharif; Qadri, Syed Saleheen; Qadri, Firdausi; Mannoor, Kaiissar

    2018-01-02

    Bangladesh lies in the global thalassemia belt, which has a defined mutational hot-spot in the beta-globin gene. The high carrier frequencies of beta-thalassemia trait and hemoglobin E-trait in Bangladesh necessitate a reliable DNA-based carrier screening approach that could supplement the use of hematological and electrophoretic indices to overcome the barriers of carrier screening. With this view in mind, the study aimed to establish a high resolution melting (HRM) curve-based rapid and reliable mutation screening method targeting the mutational hot-spot of South Asian and Southeast Asian countries that encompasses exon-1 (c.1 - c.92), intron-1 (c.92 + 1 - c.92 + 130) and a portion of exon-2 (c.93 - c.217) of the HBB gene which harbors more than 95% of mutant alleles responsible for beta-thalassemia in Bangladesh. Our HRM approach could successfully differentiate ten beta-globin gene mutations, namely c.79G > A, c.92 + 5G > C, c.126_129delCTTT, c.27_28insG, c.46delT, c.47G > A, c.92G > C, c.92 + 130G > C, c.126delC and c.135delC in heterozygous states from the wild type alleles, implying the significance of the approach for carrier screening as the first three of these mutations account for ~85% of total mutant alleles in Bangladesh. Moreover, different combinations of compound heterozygous mutations were found to generate melt curves that were distinct from the wild type alleles and from one another. Based on the findings, sixteen reference samples were run in parallel to 41 unknown specimens to perform direct genotyping of the beta-thalassemia specimens using HRM. The HRM-based genotyping of the unknown specimens showed 100% consistency with the sequencing result. Targeting the mutational hot-spot, the HRM approach could be successfully applied for screening of beta-thalassemia carriers in Bangladesh as well as in other countries of South Asia and Southeast Asia. The approach could be a useful supplement of hematological and

  1. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  2. Virtual queuing at airport security lanes

    NARCIS (Netherlands)

    Lange, de R.; Samoilovich, I.; Rhee, van der B.

    2013-01-01

    Airports continuously seek opportunities to reduce the security costs without negatively affecting passenger satisfaction. In this paper, we investigate the possibilities of implementing virtual queuing at airport security lanes, by offering some passengers a time window during which they can arrive

  3. Teaching Case: Security Breach at Target

    Science.gov (United States)

    Plachkinova, Miloslava; Maurer, Chris

    2018-01-01

    This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…

  4. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  5. Cyber Security--Are You Prepared?

    Science.gov (United States)

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  6. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  7. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  8. PREDICTION OF DEMAND FOR PRIMARY BOND OFFERINGS USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Michal Tkac

    2014-12-01

    Full Text Available Purpose: Primary bond markets represent an interesting investment opportunity not only for banks, insurance companies, and other institutional investors, but also for individuals looking for capital gains. Since offered securities vary in terms of their rating, industrial classification, coupon, or maturity, demand of buyers for particular offerings often overcomes issued volume and price of given bond on secondary market consequently rises. Investors might be regarded as consumers purchasing required service according to their specific preferences at desired price. This paper aims at analysis of demand for bonds on primary market using artificial neural networks.Design/methodology: We design a multilayered feedforward neural network trained by Levenberg-Marquardt algorithm in order to estimate demand for individual bonds based on parameters of particular offerings. Outcomes obtained by artificial neural network are compared with conventional econometric methods.Findings: Our results indicate that artificial neural network significantly outperformed standard econometric techniques and on examined sample of primary bond offerings achieved considerably better performance in terms of prediction accuracy and mean squared error.Originality: We show that proposed neural network is able to successfully predict demand for primary obligation offerings based on their specifications. Moreover, we identify relevant parameters of issues which are able to considerably affect total demand for given security.  Our findings might not only help investors to detect marketable securities, but also enable issuing entities to increase demand for their bonds in order to decrease their offering price. 

  9. Offer patterns of nationally placed livers by donation service area.

    Science.gov (United States)

    Lai, Jennifer C; Feng, Sandy; Vittinghoff, Eric; Roberts, John P

    2013-04-01

    We previously reported that national liver distribution is highly concentrated in 6 US centers, and this raises the possibility of expedited placement. Therefore, we evaluated all national offers of nationally placed livers (n=1625) to adult wait-list candidates from February 2005 to January 2010. We developed a model to predict national utilization pathways; pathways exceeding the best-fit linear unbiased predictions by ≥3 standard errors were defined as preferred. All 51 donation service areas (DSAs) placed 1 or more livers nationally, but the percentage per DSA ranged from 1% to 36%. Of 2830 possible national DSA-center pathways, 87% were used. Five hundred eighty livers (36%) were accepted on the first national offer. Four DSAs accounted for 47% of first-national-offer livers, and 44% of these were accepted by a single center. In comparison with first-offer livers using nonpreferred pathways, first offers along a preferred pathway were offered to fewer status 1 candidates (19% versus 61%) and had lower median model for end-stage liver disease (MELD) scores (22 versus 36, Poffer to non-status 1 candidates with MELD scores less than their local transplant MELD scores. Although this practice may facilitate liver placement, it raises the possibility of expedience trumping patient need. Here we propose changes to the national liver distribution system that will help to balance equity, efficiency, and transparency. Copyright © 2013 American Association for the Study of Liver Diseases.

  10. Personality traits as predictors of inpatient aggression in a high-security forensic psychiatric setting: prospective evaluation of the PCL-R and IPDE dimension ratings.

    Science.gov (United States)

    Langton, Calvin M; Hogue, Todd E; Daffern, Michael; Mannion, Aisling; Howells, Kevin

    2011-05-01

    The Dangerous and Severe Personality Disorder (DSPD) initiative in England and Wales provides specialized care to high-risk offenders with mental disorders. This study investigated the predictive utility of personality traits, assessed using the Psychopathy Checklist-Revised (PCL-R) and the International Personality Disorder Examination, with 44 consecutive admissions to the DSPD unit at a high-security forensic psychiatric hospital. Incidents of interpersonal physical aggression (IPA) were observed for 39% of the sample over an average 1.5-year period following admission. Histrionic personality disorder (PD) predicted IPA, and Histrionic, Borderline, and Antisocial PDs all predicted repetitive (2+ incidents of) IPA. PCL-R Factor 1 and Facets 1 and 2 were also significant predictors of IPA. PCL-R Factor 1 and Histrionic PD scores were significantly associated with imminence of IPA. Results were discussed in terms of the utility of personality traits in risk assessment and treatment of specially selected high-risk forensic psychiatric patients in secure settings.

  11. Receipt of a pediatric liver offer as the first offer reduces waitlist mortality for adult women.

    Science.gov (United States)

    Ge, Jin; Gilroy, Richard; Lai, Jennifer C

    2018-03-31

    In liver transplantation, adults with small stature have a greater susceptibility to waitlist mortality. This may explain the persistent waitlist mortality disparity that exists for women. We hypothesized that women who receive early offers of pediatric donor livers have improved waitlist survival, and that preferentially offering these organs to women mitigates this sex-based disparity. We analyzed donor liver offers from 2010 to 2014. Adult candidates who received a first offer that ranked within the first three match run positions from the donors' perspective were classified based on gender and whether they received a pediatric versus adult offer. We used competing risks regression to associate first offer type and waitlist mortality. 8,101 waitlist candidates received a first offer that was ranked within the first three match run positions: 5.6% (293/5,202) men and 6.2% (179/2,899) women received a pediatric donor liver as their first offer. In multivariable analyses, compared to adult-first men, adult-first women (sHR1.33, 95%CI 1.17-1.51, p offer had a lower risk of waitlist mortality compared to those who receive adult offers. Our data provides a simple approach to mitigating the increased waitlist mortality experienced by women by incorporating donor and recipient size, as variables, into organ allocation. This article is protected by copyright. All rights reserved. © 2018 by the American Association for the Study of Liver Diseases.

  12. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  13. Competition, Speculative Risks, and IT Security Outsourcing

    Science.gov (United States)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  14. Western Australian food security project

    Directory of Open Access Journals (Sweden)

    Maycock Bruce

    2007-08-01

    Full Text Available Abstract Background The aim of the Western Australian (WA Food Security Project was to conduct a preliminary investigation into issues relating to food security in one region within the Perth metropolitan area in Western Australia. The first phase of the project involved a food audit in one lower income area that was typical of the region, to identify the range, variety and availability of foods in the region. Methods A comprehensive food audit survey was provided to all food outlet owners/operators in one lower socio-economic region within the City of Mandurah (n = 132 outlets. The purpose of the survey was to investigate the range, variety and availability of foods in the Mandurah region as well as examining specific in-store characteristics such as the types of clientele and in-store promotions offered. Surveys were competed for 99 outlets (response rate = 75%. Results The range of foods available were predominantly pre-prepared with more than half of the outlets pre-preparing the majority of their food. Sandwiches and rolls were the most popular items sold in the outlets surveyed (n = 51 outlets followed by pastries such as pies, sausage rolls and pasties (n = 33 outlets. Outlets considered their healthiest food options were sandwiches or rolls (n = 51 outlets, salads (n- = 50 outlets, fruit and vegetables (n = 40 outlets, seafood (n = 27 outlets, meats such as chicken (n = 26 outlets and hot foods such as curries, soups or quiches (n = 23 outlets. The majority of outlets surveyed considered pre-prepared food including sandwiches, rolls and salads, as healthy food options regardless of the content of the filling or dressings used. Few outlets (n = 28% offered a choice of bread type other than white or wholemeal. High fat pastries and dressings were popular client choices (n = 77% as were carbonated drinks (n = 88% and flavoured milks (n = 46%. Conclusion These findings clearly indicate the need for further investigation of the impact of

  15. Computer Security Day

    CERN Multimedia

    CERN Bulletin

    2010-01-01

      Viruses, phishing, malware and cyber-criminals can all threaten your computer and your data, even at CERN! Experts will share their experience with you and offer solutions to keep your computer secure. Thursday, 10 June 2010, 9.30, Council Chamber Make a note in your diary! Presentations in French and English: How do hackers break into your computer? Quels sont les enjeux et conséquences des attaques informatiques contre le CERN ? How so criminals steal your money on the Internet? Comment utiliser votre ordinateur de manière sécurisée ? and a quiz: test your knowledge and win one of the many prizes that will be on offer! For more information and to follow the day's events via a live webcast go to: http://cern.ch/SecDay.  

  16. DSA for Secured Optical Communication

    International Nuclear Information System (INIS)

    Shojaei, A.A.; Amiri, I.S.

    2011-01-01

    Novel system of dark soliton array (DSA) for secured communication is proposed. The DSA are obtained by using a series micro ring resonators where the input wavelengths of λ 1 = 1516 nm, λ 2 = 1518 nm and λ 3 =1520 nm propagate inside the system and finally will be multiplexed. For security applications, the DSA can be tuned and amplified. The use of DSA for high capacity can be realized by using proposed secured system. (author)

  17. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  18. Wind offering in energy and reserve markets

    DEFF Research Database (Denmark)

    Soares, Tiago; Pinson, Pierre; Morais, Hugo

    2016-01-01

    The increasing penetration of wind generation in power systems to fulfil the ambitious European targets will make wind power producers to play an even more important role in the future power system. Wind power producers are being incentivized to participate in reserve markets to increase...... their revenue, since currently wind turbine/farm technologies allow them to provide ancillary services. Thus, wind power producers are to develop offering strategies for participation in both energy and reserve markets, accounting for market rules, while ensuring optimal revenue. We consider a proportional...... offering strategy to optimally decide upon participation in both markets by maximizing expected revenue from day-ahead decisions while accounting for estimated regulation costs for failing to provide the services. An evaluation of considering the same proportional splitting of energy and reserve in both...

  19. FOREIGN LANGUAGE PROGRAMS OFFERED IN TURKISH UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Bengül CETINTAS

    2016-10-01

    Full Text Available n this study, the departments of philology and teaching, which take place in higher education programs in Turkey and give education in foreign language, have been examined. 23 different languages are offered to philology students who wants to attend to faculty of literature. Students can prefer classical languages besides modern languages. However, English, German, French, Arabic and Japanese are offered to the students of teaching department. To teach another foreign language, pedagogical formation is also required.This study focuses on the departments of German Language Teaching and German Language and Literature. From this point, the place and the importance of other philology and foreign language teaching departments in Turkish higher education have been examined.

  20. Strategies and tactics in structuring equity offerings

    International Nuclear Information System (INIS)

    Emes, A. F.

    1998-01-01

    Volatile changes in the oil and gas sector investment climate within the last few months were reviewed in an effort to illustrate that despite the sharp downturn in the attractiveness of gas and oil sector investments, certain financing transactions are still being completed, and 'deals' are still available, provided that they are made attractive to investors. Investors may be more selective, may be looking more carefully at the issuing company's track record and management, but they are still there for the right deal. Flow-through offerings, share-for-share, or share-for-property acquisitions, joint ventures, sale of assets as alternative to equity, the junior capital pool as an alternative to initial public offering, the reverse take over, use of the royalty tax market, project financing, convertible debentures, and the use of warrants were explored as options available to issuers to attract investors even during difficult times

  1. CJEP will offer open science badges.

    Science.gov (United States)

    Pexman, Penny M

    2017-03-01

    This editorial announces the decision of the Canadian Journal of Experimental Psychology (CJEP) to offer Open Science Framework (OSF) Badges. The Centre for Open Science provides tools to facilitate open science practices. These include the OSF badges. The badges acknowledge papers that meet standards for openness of data, methods, or research process. They are now described in the CJEP Submission Guidelines, and are provided in the editorial. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Petroleum development offers way out of poverty

    International Nuclear Information System (INIS)

    Mollet, P.

    1996-01-01

    The North African states of Algeria, Libya, Tunisia and Egypt are starting to explore the possibility of fuelling their economic development using their petroleum reserves which have not, as yet, been exploited. Poverty and Islamic extremism is widespread, leading to political difficulties domestically and a reluctance on the part of international oil companies to reinvest in the region. Despite these problems, growth in the local petroleum industry may yet offer a path to economic growth. (UK)

  3. An Analysis of Students Enrolled to an Undergraduate University Course Offered Also Online

    Science.gov (United States)

    Scarabottolo, Nello

    2016-01-01

    This paper analyzes the main characteristics of the students enrolled to a three-years undergraduate course on Security of Computer Systems and Networks, offered in traditional, classroom based fashion as well as online at the University of Milan (Italy). This allows to compare classroom and online students from several points of view, and gives…

  4. 44 CFR 79.7 - Offers and appeals under the SRL program.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...

  5. 17 CFR 230.165 - Offers made in connection with a business combination transaction.

    Science.gov (United States)

    2010-04-01

    ... a business combination transaction. 230.165 Section 230.165 Commodity and Securities Exchanges... Offers made in connection with a business combination transaction. Preliminary Note: This section is available only to communications relating to business combinations. The exemption does not apply to...

  6. 17 CFR 230.236 - Exemption of shares offered in connection with certain transactions.

    Science.gov (United States)

    2010-04-01

    ... Exemptions § 230.236 Exemption of shares offered in connection with certain transactions. Shares of stock or... securities in lieu of issuing fractional shares, script certificates or order forms, in connection with a stock dividend, stock split, reverse stock split, conversion, merger or similar transaction, shall be...

  7. 76 FR 54998 - Request for Information on Consumer Financial Products and Services Offered to Servicemembers

    Science.gov (United States)

    2011-09-06

    ... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...

  8. Highly processed, highly packaged, very unhealthy. But they are low risk”: exploring intersections between community food security and food safety

    Science.gov (United States)

    Kelsey A., Speed; Samantha B., Meyer; Rhona M., Hanning; Shannon E., Majowicz

    2017-01-01

    Abstract Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat. PMID:29043759

  9. Evaluation of the security of a hydrogen producing plant by means of the S I cycle coupled to a nuclear reactor of high temperature

    International Nuclear Information System (INIS)

    Ruiz S, T.; Francois, J. L.; Nelson, P. F.; Cruz G, M. J.

    2011-11-01

    At the present one of the processes that demonstrates, theoretically, to be one of the most efficient for the hydrogen production is the thermal-chemistry cycle Sulfur-Iodine. One way of obtaining the temperature ranges required by the process is through the helium coming from a very high temperature reactor. The coupling of the chemical plant with the nuclear plant presents aspects of security that should be analyzed; among them the analysis of the danger of the process materials is, with the purpose of implementing security measures to protect the facilities and equipment s, the environment and the population. These measures can be: emergency answer plans of the stations, definition of the minimum distance required among facilities, determination of the exclusion area, etc. In this study simulations were made with the computer code Phast in order to knowing the possible affectation areas due to the liberation of a great quantity of energy due to a helium leak to very high temperature, of toxic materials or by a possible hydrogen combustion. The results for the liberations of sulfuric acid, hydrogen, iodine, helium and sulfur dioxide are shown, specially. The operation conditions were taken of a combination of the preliminary design proposed by General Atomics and the optimized conditions by the Korea Advanced Institute of Science and Technology, considering a production of 1 kg-mol/s of hydrogen. The iodine was the material that presented a major affectation area. (Author)

  10. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  11. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  12. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  13. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  14. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  15. Tender offers in South America: Are abnormal returns really high?

    Directory of Open Access Journals (Sweden)

    Darcy Fuenzalida

    2006-01-01

    Full Text Available Diferentes estudios realizados en mercados de capital desarrollados han revelado tasas de retorno positivas inusuales de por lo menos 15% durante la fecha de anuncio de la oferta pública de adquisición de acciones. Aunque casi no se han llevado a cabo estudios sobre los mercados bursátiles en Sudamérica, algunos estudios han reportado tasas de retorno positivas inusuales en un rango del 25% al 50%, las cuales están relacionadas con el anuncio de la primera oferta de adquisición. En el presente estudio, se argumenta que las tasas de retorno positivas inusuales estimadas en los mercados emergentes son altas porque los estudios se han basado en un mercado de capitales totalmente segmentado aplicando el modelo de mercado y utilizando un índice del mercado bursátil local. Al considerar la integración parcial entre los cinco mercados emergentes en Sudamérica, se demuestra que efectivamente existen tasas de retorno positivas inusuales antes, durante y después de la fecha de anuncio de la primera oferta de adquisición. Sin embargo, el retorno positivo inusual asociado a la fecha del anuncio se encuentra en el orden del 8%. Utilizando un modelo de mercado que considere la integración parcial y el riesgo a la baja, se obtiene una tasa de retorno inusual ligeramente mayor. Estos resultados señalan una menor tasa de retorno positiva inusual en la muestra de las empresas sudamericanas incluidas en el estudio.

  16. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  17. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  18. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  19. Is the secure base phenomenon evident here, there, and anywhere? A cross-cultural study of child behavior and experts' definitions.

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J; Peña, Paola P; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the organization of children's behavior in naturalistic settings. Children (N = 547) were 10-72 months old. Child development experts (N = 81) from all countries provided definitions of optimal child secure base use. Findings indicate that children from all countries use their mother as a secure base. Children's organization of secure base behavior was modestly related to each other both within and across countries. Experts' descriptions of the optimally attached child were highly similar across cultures. © 2013 The Authors. Child Development © 2013 Society for Research in Child Development, Inc.

  20. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  1. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  2. Genesis of enterprise financial security

    Directory of Open Access Journals (Sweden)

    Davydenko N. M.

    2015-05-01

    Full Text Available The article analyzes the scientific approaches to the definition of «financial security of entities», advantages and disadvantages of these approaches are highlighted. The own definition of financial security of entities is given. The composition of elements of enterprise financial security and principles of its provision are defined. Тhe role of individual elements of financial security to ensure high efficiency operation and development of enterprises is significant and has a direct impact on their solvency, liquidity and profitability.

  3. PRIVATE BANKING AND WEALTH MANAGEMENT SERVICES OFFERED BY BANKS

    OpenAIRE

    IMOLA DRIGĂ; DORINA NIŢĂ; IOAN CUCU

    2009-01-01

    The paper examines the features of private banking business focusing on the substantial growth in private banking over the last decade as commercial banks have targeted upmarket high net worth individuals. The accumulation of wealth has prompted the development of private banking services for high net worth individuals, offering special relationships and investment services. Private banking is about much more than traditional banking services of deposits and loans. It's about providing a one-...

  4. [Biological security confronting bioterrorism].

    Science.gov (United States)

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  5. Today's School Security

    Science.gov (United States)

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  6. Application Security Automation

    Science.gov (United States)

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  7. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  8. Turnkey offering a claimed sector 'first'.

    Science.gov (United States)

    Law, Oliver

    2011-01-01

    Manufacturer and supplier of LED theatre lights, HD camera systems, video integration technologies, and ceiling support units, Trumpf Medical Systems UK, and "logistical services" company Canute International Medical Services (CIMS), one of whose specialities is providing mobile medical units for diagnostic imaging, have entered into a partnership that will see the two companies offer fully fitted out modular operating theatres and other medical/clinical buildings incorporating the latest technology and equipment, on a fully project-managed, "turnkey" basis. Oliver Law, Trumpf Medical Systems UK managing director, explains the background, and the new service's anticipated customer benefits.

  9. Albania, offshore subscribed, offering EOR opportunities

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Albania is starting a campaign to offer field development/enhanced recovery projects to foreign companies. The fields chosen for EOR projects and their producing lithologies are: Patos-Marinza, sandstone. Kucova-Arrza, sandstone. Gorisht-Kocul, limestone. Ballsh-Hekal, limestone. Cakran-Mollaj, limestone. Visoka, limestone. Delvina, limestone. Field locations mostly lie along Albania's Adriatic Sea coast. Oil production began in Albania in 1929, peaked at about 60,000 b/d in 1975 and has steadily fallen

  10. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  11. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  12. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  13. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  14. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  15. 12 CFR 344.7 - Settlement of securities transactions.

    Science.gov (United States)

    2010-01-01

    ... of securities transactions. (a) A bank shall not effect or enter into a contract for the purchase or... for payment of funds and delivery of securities later than the third business day after the date of... offering. A bank shall not effect or enter into a contract for the purchase or sale of the securities that...

  16. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  17. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  18. Offer - La Comédie theatre

    CERN Multimedia

    Staff Association

    2017-01-01

    The “La Comédie” theatre unveiled its programme for the season 2017–2018. We are delighted to share this brand new, rich and varied programme with you. The “La Comédie” theatre has various discounts for our members Buy 2 subscriptions for the price of 1 : 2 cards “Libertà” for CHF 240.- instead of CHF 480.- Cruise freely through the season with an 8-entry card valid for the shows of your choice. These cards are transferable and can be shared with one or more accompanying persons. 2 cards “Piccolo” for CHF 120 instead of CHF 240.- This card lets you discover 4 shows which are suitable for all audiences (offers valid while stock lasts) Benefit from a reduction of 20 % on a full price ticket during all the season: from CHF 40.- to CHF 24.- ticket instead of CHF 50.- to CHF 30.- depending on the show (Also valid for one accompanying person). Interested in one of these offers? Create an ac...

  19. Wind offering in energy and reserve markets

    Science.gov (United States)

    Soares, T.; Pinson, P.; Morais, H.

    2016-09-01

    The increasing penetration of wind generation in power systems to fulfil the ambitious European targets will make wind power producers to play an even more important role in the future power system. Wind power producers are being incentivized to participate in reserve markets to increase their revenue, since currently wind turbine/farm technologies allow them to provide ancillary services. Thus, wind power producers are to develop offering strategies for participation in both energy and reserve markets, accounting for market rules, while ensuring optimal revenue. We consider a proportional offering strategy to optimally decide upon participation in both markets by maximizing expected revenue from day-ahead decisions while accounting for estimated regulation costs for failing to provide the services. An evaluation of considering the same proportional splitting of energy and reserve in both day- ahead and balancing market is performed. A set of numerical examples illustrate the behavior of such strategy. An important conclusion is that the optimal split of the available wind power between energy and reserve strongly depends upon prices and penalties on both market trading floors.

  20. CURRICULAR OFFER INFLUENCING STUDENTS’ SATISFACTION: COMPARATIVE STUDY

    Directory of Open Access Journals (Sweden)

    Oana DUMITRASCU

    2014-11-01

    Full Text Available The main objective of the study is the determination of students’ satisfaction regarding curricular activities. The study has been accomplished using the qualitative and quantitative research, using the bibliographic study, various secondary sources and different primary sources. The study is developed with a marketing research and accomplished using the survey method. 699 students from four universities have been questioned. Due to a comparative study the University of Applied Sciences Worms, University of Applied Sciences Wiesbaden Rüsselsheim, University of Applied Sciences Frankfurt am Main and Nürtingen-Geislingen University have been analysed and their similarities and differences have been identified. The collected data, based on the established sample, is evaluated through univariate and bivariate analysis. In accordance with the evaluated sample, specific gaps from each region are identified regarding the curricular offer of the analysed universities. As a result to the conducted study, recommendations for the University of Applied Sciences Worms regarding the student’s satisfaction concerning the curricular offer are presented.

  1. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  2. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  3. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to

  4. An Offer You Cannot Refuse: Obtaining Efficiency and Fairness in Preplay Negotiation Games with Conditional Offers

    DEFF Research Database (Denmark)

    Goranko, Valentin; Turrini, Paolo

    2013-01-01

    . Such offers transform the payoff matrix of the original game and allow for some degree of cooperation between rational players while preserving the non-cooperative nature of the game. We focus on 2-player negotiations games arising in the preplay phase when offers for payments are made conditional...... on a suggested matching offer of the same kind being made in return by the receiver. We study and analyze such bargaining games, obtain results describing their possible solutions and discuss the degrees of efficiency and fairness that can be achieved in such negotiation process depending on whether time...

  5. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  8. Bulk delivery of explosives offers positive advantages

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-09-01

    The bulk delivery of precisely-formulated explosives directly to the shothole is a safe, secure and cost effective way of bringing rock to the quarry floor. This article describes several of the latest generation of Anfo trucks. The typical Anfo truck carries ammonium nitrate and fuel oil in bulk, together with several other mix constituents, including an emulsifying agent. These are designed to form the basis of a range of emulsion-type explosives. In effect, these are water in oil emulsions where the water phase consists of droplets of a saturated solution of the oxidizing material suspended in oil. The formulations may be further tailored to the shothole requirements by the addition of oils or waxes, which can alter the viscosity of the explosive. The precise and programmable controls which determine the exact quantities of materials delivered to the mixer mean that the explosive mixtures can be tailored exactly to the requirements of the blasting operation, be it the amount of rock to be dislodged, the geological conditions, or the state of the shothole - either wet or dry. 4 systems are described in detail. 3 figs.

  9. INTERCULTURAL ISSUES OF THE TOURIST OFFER

    Directory of Open Access Journals (Sweden)

    Cristina Elena ALBU

    2015-03-01

    Full Text Available Tourism is an opportunity for people from different cultures to meet and interact, to exchange ideas, traditions and ways of thinking. In this industry it is very easy to judge a person just after taking an overall look and studying her general behavior. The aim of this article is to determine the intercultural issues that can show up during the tourist act, while people belonging to different cultures interact. The research method used for creating this article is documentary study. The tourist offer shall be adapted to different types of tourist, taking into consideration some aspects as tourists’ behavior, the type of tourism they prefer and, most of all, the culture they belong to and the culture of the people from the place they visit. Despite the immense diversity of our minds, there is a structure that can serve as a basis for mutual understanding.

  10. 75 FR 64182 - Issuer Review of Assets in Offerings of Asset-Backed Securities

    Science.gov (United States)

    2010-10-19

    ... review your comments more efficiently, please use only one method. The Commission will post all comments... originated in compliance with applicable laws, including predatory lending and Truth in Lending statutes..., including predatory lending and Truth in Lending statutes? Should we establish standards for a review of the...

  11. 76 FR 4231 - Issuer Review of Assets in Offerings of Asset-Backed Securities

    Science.gov (United States)

    2011-01-25

    .... The issuing entity is designed to be a passive entity, and in order to meet the definition of ABS... other issuers, and because of the structure of ABS issuers as typically passive pools of assets, the... commentator, such originators use electronic decision-making systems as a first filter for applications. Most...

  12. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  13. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  14. The Supply of Medical Radioisotopes. Final Report of the Third Mandate of the High-level Group on the Security of Supply of Medical Radioisotopes (2013-2015)

    International Nuclear Information System (INIS)

    Charlton, Kevin; )

    2016-07-01

    At the request of its member countries, the Organisation for Economic Co-operation and Development (OECD) Nuclear Energy Agency (NEA) became involved in global efforts to ensure a secure supply of molybdenum-99 ( 99 Mo)/technetium-99m ( 99m Tc). In April 2009, the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR) was created and received an initial, two-year mandate from the NEA Steering Committee for Nuclear Energy to examine the causes of supply shortages of 99 Mo/ 99m Tc and develop a policy approach to address them. In its first mandate, the HLG-MR conducted a comprehensive economic study of the 99 Mo/ 99m Tc supply chain, which identified the key areas of vulnerability and major issues to be addressed. The HLG-MR released a policy approach, including six principles (Appendix 1) and supporting recommendations to help resolve the issues in the 99 Mo/ 99m Tc market. In the second mandate (2011-2013), the HLG-MR worked to encourage the implementation of the six policy principles and promoted an industry transition away from the use of highly enriched uranium (HEU) targets for 99 Mo production. Projects were undertaken by the NEA that resulted in the publication of documents and reports to assist in implementing the HLG-MR policy approach. The second mandate showed that, while commendable progress had occurred in many areas, there were still major issues in the 99 Mo/ 99m Tc market, with some continued government subsidisation, insufficient ORC and inadequate reimbursement for 99 mTc. Potential future periods of supply shortage were identified, particularly concerning the likely loss of significant capacity around 2016. In the third mandate, the HLG-MR continued its efforts to help ensure the global security of supply of 99 Mo/ 99m Tc through implementation of the six policy principles. The NEA undertook a further self-assessment review of the 99 Mo/ 99m Tc supply chain, focusing again on progress with implementing FCR and paid ORC and

  15. Problems in use and security of measurement of high temperature strain gages at various temperature limits up to 10000C

    International Nuclear Information System (INIS)

    Ziegler, K.

    1982-01-01

    The examples given show the quality and use of manufacturers' data for a series of behaviour criteria for strain gages in the high temperature region. These results should not only be regarded critically. The manufacturer must appreciate that the very costly programme of investigations on the users' side represents a product development for large parts for the manufacturer of the strain gauges. It would therefore be desirable if these considerations were to initiate investigations on the manufacturer's part, in order to clear up the problematic are of the use of strain gages in the high temperature field, in order to provide the customer with more reliable and better strain gage characteristics for very expensive high temperature strain measurements. (orig.) [de

  16. Who are the adolescents saying "No" to cannabis offers.

    Science.gov (United States)

    Burdzovic Andreas, Jasmina; Pape, Hilde; Bretteville-Jensen, Anne Line

    2016-06-01

    Adolescents who refuse direct cannabis offers and remain non-users represent a potentially very informative, yet surprisingly understudied group. We examined a range of risk and protective factors putatively associated with this poorly understood "cannabis-resilient" profile. Paper-and-pencil questionnaires assessing substance use, peer and family relations, and behavioral and personality characteristics were completed by 19,303 middle- and high-school students from 82 schools in Norway (response rate 84%) The lifetime prevalence of cannabis use was 7.6%. Another 10.4% reported no use of the drug despite having received recent cannabis offers. Results from the multinomial logistic regression revealed a set of characteristics differentiating adolescents who resisted such offers from those who: (a) neither received the offers nor used, and, more importantly, (b) used the drug. Specifically, parent-child relationship quality, negative drug-related beliefs, absence of close relationships with cannabis-users, low delinquency, no regular tobacco use, and infrequent alcohol intoxication were all associated with increased odds of being in the cannabis-resilient vs. cannabis-user group. This pattern of results was comparable across middle- and high-school cohorts, but the parent-child relationship quality and delinquency were significantly associated with cannabis-resilient vs. cannabis-use outcome only among younger and older adolescents, respectively. Among other low-risk characteristics, better relationships with parents and beliefs that drug use is problematic were associated with adolescents' refusals to accept cannabis offers. These results may have implications for novel preventive strategies targeting cannabis-exposed adolescents. Copyright © 2016. Published by Elsevier Ireland Ltd.

  17. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  20. Leadership in organizations with high security and reliability requirements; Liderazgo en organizaciones con altos requisitos de seguridad y fiabilidad

    Energy Technology Data Exchange (ETDEWEB)

    Gonzalez, F.

    2013-07-01

    Developing leadership skills in organizations is the key to ensure the sustain ability of excellent results in industries with high requirements safety and reliability. In order to have a model of leadership development specific to this type of organizations, Tecnatom in 2011, we initiated a project internal, to find and adapt a competency model to these requirements.

  1. CERN Computing Colloquia Spring Series: IT Security - A High-Performance Pattern Matching Engine for Intrusion Detection

    CERN Multimedia

    CERN. Geneva

    2006-01-01

    The flexible and modular design of the engine allows a broad spectrum of applications, ranging from high-end enterprise level network devices that need to match hundreds of thousands of patterns at speeds of tens of gigabits per second, to low-end dev...

  2. Potential roles of research in enhancing the performance of management in securing high quality visitor experiences in wilderness

    Science.gov (United States)

    Stephen F. McCool

    2012-01-01

    Does research help managers provide opportunities for visitors to have high quality experiences in wilderness? Difficulties in applying visitor experience research result from several factors: the nature of wilderness itself, the character of the wilderness visitor experience challenge as a research and management topic, and the paradigm of research applications...

  3. ATM Security via "Stargate" Solution

    National Research Council Canada - National Science Library

    Hensley, Katrina

    1999-01-01

    .... The authenticating device, Stargate, utilizes a high speed, low level authentication protocol that offers the low cost, flexibility, and extensibility of software, while still capable of yielding...

  4. Industrial Heritage in Tuzla Canton Tourist Offer

    Directory of Open Access Journals (Sweden)

    Edin Jahić

    2014-04-01

    Full Text Available Industrial heritage has a great importance in development of tourism of Tuzla Canton because this is a region which had well developed industry in the past. Major part of this industry has been destroyed and now can be used for touristic purposes Besides this function, industrial plants can be used for development of culture, education, etc., and we already have such positive examples in wealthier European countries. The aim of the survey was to examine the opinion of tourist agencies, which are providers of tourist services, on further development of tourism in the region of Tuzla Canton, with special emphasis on industrial tourism, because tourist agencies are one of the key factors in creation of tourism development. Methods used for data collecting, processing and analysis are: historical, descriptive, comparative, case study, survey (SPSS version 20. Elements that need improving and further development are highlighted. The research results can help the tourist destination management, in this case TC, but also all segments of the tourism industry of TC, improve their offer and communication with a potential tourism market.

  5. CEE region offers ample value proposition

    Energy Technology Data Exchange (ETDEWEB)

    Dobrova, Helena; Gawenda, Piotr [IHS, Geneva (Switzerland)

    2008-12-15

    The Central-Eastern Europe region (CEE) continues to evolve and offer ample value propositions to various types of operators. This area experiences a surge of exploration and production (E and P) interest over the past years. The bulk of the present-day production in the CEE countries is derived from mature oil and gas fields situated in prolific hydrocarbon provinces known since the mid-XIX century (e.g., the Carpathians in Poland and Romania). Yet, these areas still remain the major exploration targets to this day. The authors of the contribution under consideration summarize the E and P activities in the CEE countries during the past 12 to 18 months. This summary shows a fairly heterogeneous petroleum-related exploration picture: some countries have yet to launch their first E and P operations, others maintain a somewhat limited level of activities, while a few states, namely Bulgaria, Hungary, Poland and Romania, show a very busy contractual and operational shedule. The effords are yielding astounding results in some countries, delivered principally by small-size to medium-size independent explorers, as well as former state entities and a few remaining NOCs.

  6. Ottawa offers funds for particle accelerator

    International Nuclear Information System (INIS)

    1991-01-01

    The federal government has offered to contribute at least $236 million toward the controversial KAON particle accelerator facility in Vancouver. Justice Minister Kim Campbell says that no deal on the project has been signed, but negotiations with British Columbia are going well. She said Ottawa is prepared to contribute a third of the operating costs. The facility is intended to investigate the basic structure of matter by smashing atoms into their tiniest components known as quarks. It's estimated that operating costs will be in the range of $90 million a year. Campbell said the United States is willing to contribute $100 million toward the project, but did not know what this would be for. Debate about the KAON facility within the scientific community has been raging for years. Many scientists fear KAON would draw money away from other areas of research, which already face chronic financial problems. Campbell insisted that KAON would not distort overall research priorities, but made no firm commitments about increases for other areas of science. She said money for KAON, assuming the project does get final approval, will not be delivered before the 1994 fiscal year and won't affect efforts to reduce the federal deficit

  7. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  8. A Study on the Dependable and Secure Relaying Scheme under High Resistance Earth Faults on HV, EHV Line

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.D.; Han, K.N. [Korea Electric Power Research Institute, Taejeon (Korea, Republic of)

    1997-12-31

    This report contains following items for the purpose of investigating and analyzing characteristics of high impedance ground faults. - Reason and characteristics identification of HIF - Modeling of power system - Testing of protective relays using RTD(Real Time Digital Simulator) - Staged ground faults test - Development of new algorithm to detect HIF - Protective coordination schemes between different types of relays - HIF monitoring and relaying scheme and H/W prototyping. (author). 22 refs., 28 figs., 21 tabs.

  9. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  10. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... political complexity. Despite these efforts, piracy persists and the combination of piracy and weak rule of... Development, Naval Criminal Investigative Service, Customs and Border Protection, Transportation Security...

  11. Secure public cloud platform for medical images sharing.

    Science.gov (United States)

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  12. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  13. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  14. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  15. Offering Strategy of a Flexibility Aggregator in a Balancing Market Using Asymmetric Block Offers

    DEFF Research Database (Denmark)

    Bobo, Lucien Ali; Delikaraoglou, Stefanos; Vespermann, Niklas

    2018-01-01

    scenarios are used to find optimal load-shifting offers under uncertainty. The problem is formulated as a stochastic mixed-integer linear program and can be solved with reasonable computational time. This work is taking place in the framework of the real-life demonstration project EcoGrid 2.0, which......In order to enable large-scale penetration of renewables with variable generation, new sources of flexibility have to be exploited in the power systems. Allowing asymmetric block offers (including response and rebound blocks) in balancing markets can facilitate the participation of flexibility...... aggregators and unlock load-shifting flexibility from, e.g., thermostatic loads. In this paper, we formulate an optimal offering strategy for a risk-averse flexibility aggregator participating in such a market. Using a price-taker approach, load flexibility characteristics and balancing market price forecast...

  16. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    Science.gov (United States)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations

  17. Security Architecture of Cloud Computing

    OpenAIRE

    V.KRISHNA REDDY; Dr. L.S.S.REDDY

    2011-01-01

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages o...

  18. Secure computing on reconfigurable systems

    OpenAIRE

    Fernandes Chaves, R.J.

    2007-01-01

    This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performa...

  19. Clozapine: an effective treatment for seriously violent and psychopathic men with antisocial personality disorder in a UK high-security hospital.

    Science.gov (United States)

    Brown, Darcy; Larkin, Fintan; Sengupta, Samrat; Romero-Ureclay, Jose L; Ross, Callum C; Gupta, Nitin; Vinestock, Morris; Das, Mrigendra

    2014-10-01

    A number of studies have demonstrated the anti-aggressive properties of clozapine in schizophrenia and its positive effect in borderline personality disorder. There is no published literature on the treatment of antisocial personality disorder (ASPD) with clozapine. We present a case series of 7 patients with primary ASPD and high psychopathic traits treated with clozapine, having a significant history of serious violence and currently detained in a UK based high-security hospital. A retrospective review of case notes was carried out to formulate Clinical Global Impression (CGI) scores and record incidents of violence and aggression. Effect on specific symptom domains (cognitive-perceptual, impulsive-behavioural dyscontrol, affective dysregulation) was also noted. Metabolic parameters and serum clozapine levels were also sampled. All 7 patients showed significant improvement on clozapine. It was shown to benefit all symptom domains, especially impulsive behavioral dyscontrol and anger. The number of violent incidents committed by 6 of the 7 patients reduced significantly, and all patients' risk of violence reduced. Clozapine serum levels for 6 of the 7 patients were in the range 150-350 ng/mL. Clozapine is of benefit in reducing the clinical severity of ASPD. It improved all symptom domains, especially impulsive-behavioral dyscontrol and anger, and reduced levels of aggression and violence, especially at lower doses (serum levels <350 ng/m). To our knowledge, this is the first account of clozapine treatment in patients with ASPD and high psychopathy.

  20. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...