WorldWideScience

Sample records for secure cover file

  1. Covered Bridge Security Manual

    Science.gov (United States)

    Brett Phares; Terry Wipf; Ryan Sievers; Travis Hosteng

    2013-01-01

    The design, construction, and use of covered timber bridges is all but a lost art in these days of pre-stressed concrete, high-performance steel, and the significant growth both in the volume and size of vehicles. Furthermore, many of the existing covered timber bridges are preserved only because of their status on the National Registry of Historic Places or the...

  2. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  3. A secure file manager for UNIX

    Energy Technology Data Exchange (ETDEWEB)

    DeVries, R.G.

    1990-12-31

    The development of a secure file management system for a UNIX-based computer facility with supercomputers and workstations is described. Specifically, UNIX in its usual form does not address: (1) Operation which would satisfy rigorous security requirements. (2) Online space management in an environment where total data demands would be many times the actual online capacity. (3) Making the file management system part of a computer network in which users of any computer in the local network could retrieve data generated on any other computer in the network. The characteristics of UNIX can be exploited to develop a portable, secure file manager which would operate on computer systems ranging from workstations to supercomputers. Implementation considerations making unusual use of UNIX features, rather than requiring extensive internal system changes, are described, and implementation using the Cray Research Inc. UNICOS operating system is outlined.

  4. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  5. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  6. Print and supply of envelopes and file covers

    Indian Academy of Sciences (India)

    “Tender for Supply of Printed Envelopes and File Covers". Tender ... Twenty Five Thousand Only) in the form of Demand Draft drawn on any Nationalized. Bank and .... m) The finalized contract shall be interpreted under Indian Laws. In case of ...

  7. 75 FR 32977 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-06-10

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Permit Opening Transactions by Market Makers To Accommodate Closing Transactions of Other Market... International Securities Exchange, LLC (``Exchange'' or ``ISE'') filed with the Securities and Exchange...

  8. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  9. 75 FR 75711 - Securities Investor Protection Corporation; Notice of Filing of a Proposed Bylaw Change Relating...

    Science.gov (United States)

    2010-12-06

    ... Securities Investor Protection Corporation (``SIPC'') filed with the Securities and Exchange Commission... Members, Rel. No. SIPA-156, 56 FR 51952 (Oct. 16, 1991). \\6\\ Securities Investor Protection Corporation... SECURITIES AND EXCHANGE COMMISSION [Release No. SIPA-169; File No. SIPC-2010-01] Securities...

  10. Security Functions for a File Repository

    NARCIS (Netherlands)

    Helme, A.; Helme, Arne; Stabell-Kulo, Tage

    1997-01-01

    When personal machines are incorporated into distributed systems a new mixture of threats is exposed. The security effort in the MobyDick project is aimed at understanding how privacy can be protected in this new environment. Our claim is that a two-step process for authentication and authorisation

  11. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Science.gov (United States)

    2011-08-11

    ... listed on the Nasdaq Capital Market (``NCM'') as Covered Securities for purposes of Section 18(b) of the... posed above, commenters are welcome to offer their views on any other matter raised by the proposed..., competition and capital formation. We have considered, and discuss below, the effects of the proposed...

  12. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  13. Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations

    International Nuclear Information System (INIS)

    Schreiner, Steffen; Banerjee, Subho Sankar; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Bagnasco, Stefano; Zhu Jianlin

    2011-01-01

    The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.

  14. ITIL Based Service Level Management if SLAs Cover Security

    Directory of Open Access Journals (Sweden)

    Tomas Feglar

    2005-08-01

    Full Text Available Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level Management (SLM perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM's importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure environment.

  15. Derived virtual devices: a secure distributed file system mechanism

    Science.gov (United States)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  16. 76 FR 32382 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-06-06

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Second Market Fees May 27, 2011. Pursuant to Section 19(b)(1) of the Securities..., 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the...

  17. 77 FR 34436 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-06-11

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Temporarily... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange... Clearing and Outsourcing Solutions, Inc. (``Apex Clearing'') as an ISE member organization, subject to Apex...

  18. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  19. 77 FR 15417 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-03-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66566; File No. SR-ISE-2012-21] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to a... Ownership Interest in ISE Holdings, Inc. to a Newly Formed Swiss Corporation, Eurex Global Derivatives AG...

  20. 76 FR 47627 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-05

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Two Market Data Feeds August 1, 2011. Pursuant to Section 19(b)(1) of the... on August 1, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...

  1. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ... the amount fixed by the Office, or deposit negotiable securities under §§ 703.306 and 703.307 in that... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...

  2. 78 FR 6155 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-01-29

    ... virtually impossible for any exchange to identify, and thus assess fees such as an ORF on, each executing... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68711; File No. SR-MIAX-2013-01] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate...

  3. 78 FR 79028 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2013-12-27

    ... finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By order... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71156; File No. SR-NSCC-2013-13] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change...

  4. Annotated bibliography covering generation and use of evaluated cross section uncertainty files

    International Nuclear Information System (INIS)

    Peelle, R.W.; Burrows, T.W.

    1983-03-01

    Literature references related to definition, generation, and use of evaluated cross section uncertainty (variance-covariance) files are listed with comments intended primarily to guide the reader toward materials of immediate interest. Papers are also cited that cover covariance information for individual experiments and that relate to production and use of multigroup covariance matrices. Titles are divided among several major categories

  5. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    . Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...... flexible sharing of cached files among unauthenticated users, i.e. unlike most distributed file systems CryptoCache does not require a global authentication framework.Files are encrypted when they are transferred over the network and while stored on untrusted servers. The system uses public key......Small mobile computers are now sufficiently powerful to run many applications, but storage capacity remains limited so working files cannot be cached or stored locally. Even if files can be stored locally, the mobile device is not powerful enough to act as server in collaborations with other users...

  6. 76 FR 37863 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-06-28

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to Appointments to Competitive Market Makers June 22, 2011. Pursuant to Section 19(b)(1) of the Securities... that on June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  7. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  8. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with hi......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network.......In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with high...... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load...

  9. Survey on Security Issues in File Management in Cloud Computing Environment

    Science.gov (United States)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  10. 75 FR 66410 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-28

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... hereby given that, on October 14, 2010, the International Securities Exchange, LLC (the ``Exchange'' or...

  11. 20 CFR 416.305 - You must file an application to receive supplemental security income benefits.

    Science.gov (United States)

    2010-04-01

    ... benefits will be stopped because you are no longer eligible and you again meet the requirements for... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false You must file an application to receive supplemental security income benefits. 416.305 Section 416.305 Employees' Benefits SOCIAL SECURITY...

  12. 78 FR 17970 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-25

    ... product users and they have indicated a preference that premium pricing for mini-options match what is... market participants clarity as to the minimum pricing increments for mini-options, the filing would harmonize penny pricing between mini-options and standard options on the same security. \\3\\ See Securities...

  13. 77 FR 37722 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Eliminate the Rules and Fees Related to the Second Market June 18, 2012. Pursuant to...\\ notice is hereby given that on June 6, 2012, the International Securities Exchange, LLC (the ``Exchange...

  14. 78 FR 24271 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-24

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Market Maker Plus Rebate Program April 18, 2013. Pursuant to Section 19(b)(1... hereby given that on April 10, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the...

  15. 77 FR 1757 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-01-11

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options January 5, 2012...,\\2\\ notice is hereby given that on December 28, 2011, the International Securities Exchange, LLC (the...

  16. 78 FR 17988 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-25

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Regarding Market Maker Quoting Requirements March 19, 2013. Pursuant to Section 19(b)(1) of... given that on March 5, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  17. 75 FR 62900 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-13

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on October 4, 2010, International Securities...

  18. 78 FR 45580 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-07-29

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend Certain Market Maker Fees July 23, 2013. Pursuant to Section 19(b)(1) of the... hereby given that on July 11, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the...

  19. 77 FR 31680 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-05-29

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate May 22, 2012...-4 thereunder,\\2\\ notice is hereby given that on May 15, 2012, the International Securities Exchange...

  20. 76 FR 56832 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-09-14

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a New Market Data Feed September 8, 2011. Pursuant to Section 19(b)(1) of the... on August 31, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  1. 77 FR 37944 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-06-25

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Allow Competitive Market Makers To Use Their Membership Points To Enter Multiple Quotes in an Options Class June 19... 19b-4 thereunder,\\2\\ notice is hereby given that on June 6, 2012, the International Securities...

  2. 75 FR 42812 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-07-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options July 15, 2010..., \\2\\ notice is hereby given that on June 30, 2010, International Securities Exchange, LLC (``ISE'' or...

  3. 76 FR 64417 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-10-18

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Competitive Market Maker Trading Rights October 12, 2011. Pursuant to Section...\\ notice is hereby given that on October 3, 2011, the International Securities Exchange, LLC (the...

  4. 20 CFR 703.205 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ...— (1) Deposit with the Branch indemnity bonds or letters of credit in the amount fixed by the Office... and payable from the proceeds of the deposited security; (b) Give security in the amount fixed in the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit...

  5. 78 FR 62901 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-10-22

    ... per contract from its prior rate of $0.05 per contract. See Securities Exchange Act Release No. 69768... similar products.\\13\\ \\13\\ At least one other exchange currently trades foreign currency options. While... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70647; File No. SR-ISE-2013-50] Self-Regulatory...

  6. 78 FR 70382 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-11-25

    ..., with respect to index options, restrictions on exercise may be in effect until the opening of business... security of an option contract that is scheduled to be released just after the close on the business day... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70900; File No. SR-ISE-2013-58] Self-Regulatory...

  7. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  8. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  9. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  10. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  11. Security option file - After closure (DOS-AF)

    International Nuclear Information System (INIS)

    2016-01-01

    A first volume presents the context and scope of the Cigeo project, and the scope of this document. It proposes a general presentation of Cigeo, the regulatory framework and standards. It describes the different aspects and components of the security strategy: principles, security functions after closure, objectives of protection, global approach. It proposes a security assessment: objectives, consistency with international practices, assessment steps, scenarios, scenario quantitative assessment. The next part addresses security management. The second volume contains a description of the storage system: site characteristics, types of stored parcels, the future of the installation after its closure. The third volume proposes a security assessment. It addresses the management of risks and uncertainties, describes a scenario of normal evolution and also scenarios of altered evolutions, scenarios of unintentional human intrusion, and what-if type scenarios. The fourth volume reports lessons at the current stage of the project, and gives an overview of important activities from storage design to storage closure

  12. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2010-01-28

    ....; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... determination about whether to grant BATS Y Exchange's request to be registered as a national securities...

  13. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2013-03-07

    ...; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... Topaz Exchange's request to be registered as a national securities exchange. The Commission will grant...

  14. The Design of a Secure File Storage System

    Science.gov (United States)

    1979-12-01

    ERROR _CODE (Przi SUCO COPE) !01ile not found; write access to dtrectorv not permitted I t := GATEKEFPER?.TICKFT ’MAIL BOX, 0) G ATE KF YP F I ~D iNC...BOX.MS’T.SUCC CODE F’OF COD? (DIOR SUCO CODE) Ifile_ not found.; Fead acceLss to directoryv file t ~TRKEPE.TIKFT MIT BOX C) GATHYP~PE-I.AWAIT (MAILBOX, C. (t+2

  15. 75 FR 44828 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2010-07-29

    ... the SBP process to mitigate risks that the SBP poses to NSCC. \\6\\ 15 U.S.C. 78q-1. B. Self-Regulatory...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Amend Addendum C of Its Rules and Procedures To Implement Risk Enhancements to Its Stock Borrow...

  16. 78 FR 61424 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2013-10-03

    ... decommission the DTCC Trade Risk Pro service as more fully described below. II. Self-Regulatory Organization's... no Members that currently use Trade Risk Pro. (C) Self-Regulatory Organization's Statement on...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change...

  17. 76 FR 1488 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-01-10

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 28, 2010, the International...

  18. 75 FR 2913 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-01-19

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options...\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 31, 2009, the International...

  19. 75 FR 4894 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2010-01-29

    ... processing accounts will be revised from a tiered structure to a flat monthly charge per account. A change...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate...-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change The purpose of the...

  20. 75 FR 42801 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-07-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... at or under the threshold are charged the constituent's prescribed execution fee. This waiver applies... members to execute large-sized FX options orders on the Exchange in a manner that is cost effective. The...

  1. 78 FR 76667 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-18

    ... principles of trade, to remove impediments to and perfect the mechanism of a free and open market and a... personnel or the security of facilities and records, thereby enhancing business continuity, workplace safety... filed with the Commission, and all written communications relating to the proposed rule change between...

  2. 77 FR 35723 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-14

    ... Priority Customer orders the Complex Order Taker Fee and this proposed rule change will fully accomplish... change that are filed with the Commission, and all written communications relating to the proposed rule... Rule Change To Delete Certain Fees June 8, 2012. Pursuant to Section 19(b)(1) of the Securities...

  3. 75 FR 61795 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63017; File No. SR-ISE-2010-95] Self-Regulatory...\\ 15 U.S.C. 78s(b)(3)(A). \\4\\ 17 CFR 240.19b-4(f)(6). I. Self-Regulatory Organization's Statement of... Exchange, and at the Commission's Public Reference Room. II. Self-Regulatory Organization's Statement of...

  4. 76 FR 77275 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-12-12

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65900; File No. SR-ISE-2011-82] Self-Regulatory... text of these statements may be examined at the places specified in Item IV below. The self-regulatory... such statements. A. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis for...

  5. Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security

    Directory of Open Access Journals (Sweden)

    Lirong Qiu

    2017-01-01

    Full Text Available Multimedia applications in smart electronic commerce (e-commerce, such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos. This study addresses the problem of security in e-commerce and proposes a unified framework to analyze the security data. First, to allocate the definite security resources optimally, we build our e-commerce monitoring model as an undirected network, where a monitored node is a vertex of the graph and a connection between vertices is an undirected edge. Moreover, we aim to find a minimal cover for the monitoring network as the optimal solution of resource allocation, which is defined as the network monitoring minimization problem (NMM. This problem is proved to be NP-hard. Second, by analyzing the latent threats, we design a novel and trusted monitoring system that can integrate incident monitoring, data analysis, risk assessment, and security warnings. This system does not touch users’ privacy data. Third, we propose a sequential model-based risk assessment method, which can predict the risk according to the text semantics. Our experimental results on web scale data demonstrate that our system is flexible enough when monitoring, which also verify the effectiveness and efficiency of our system.

  6. [The genetic fingerprints file in France: between security and freedom].

    Science.gov (United States)

    Manaouil, C; Gignon, M; Werbrouck, A; Jarde, O

    2008-01-01

    In France, the French National File Automated with Genetic fingerprints (FNAEG) is a bank automated by genetic data which is used in penal domain. It facilitates search of the authors of malpractices, or the missing people. Since 1998, it has enabled to resolve numerous criminal cases. An extension of the field of application has been observed. It is a confidential register which is subjected to numerous controls. Nevertheless, private character of the data and its functioning (criminal character of the refusal of taking, periods of answer, and problem of data's conservation) explain the important contesting of associations worried about the respect of personal freedoms.

  7. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  8. Publicity in secured transactions law: Towards a European public notice filing system for non-possessory security rights in movable assets?

    NARCIS (Netherlands)

    Hamwijk, D.J.Y.

    2014-01-01

    There is a growing call to introduce a European public notice filing system for security rights in movable goods comparable to the notice filing system of Art. 9 UCC. A proposal to this effect has been adopted in Book IX DCFR, which represents a comprehensive framework of rules for proprietary

  9. Security in the CernVM File System and the Frontier Distributed Database Caching System

    International Nuclear Information System (INIS)

    Dykstra, D; Blomer, J

    2014-01-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  10. Security in the CernVM File System and the Frontier Distributed Database Caching System

    Science.gov (United States)

    Dykstra, D.; Blomer, J.

    2014-06-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  11. Electrical markets, energy security and technology diversification: nuclear as cover against gas and carbon price risks?

    International Nuclear Information System (INIS)

    Roques, F.A.; Newbery, D.M.; Nuttall, W.J.; Neufville, R. de

    2005-01-01

    Recent tension in the oil and gas markets has brought back the concept of energy offer diversification. Electrical production technology diversification in a country helps improve the security of supply and make up for the negative effects of hydrocarbons price variations. The portfolio and real options theories help to quantify the optimum diversification level for a country or a power company. The cover value of a nuclear investment for a power company facing cost uncertainties (price of gas and of carbon dioxide emission permit) and proceeds (price of electricity) is assessed. A strong link between the prices of gas and electricity reduces incentives to private producers to diversify, disputing the capacity of a liberalized electrical market to achieve optimum technology diversity from a domestic point of view. (authors)

  12. A Study on the Motif Pattern of Dark-Cloud Cover in the Securities

    Directory of Open Access Journals (Sweden)

    Long Jing

    2017-01-01

    Full Text Available Morphological analysis is the analysis and mining of the graphics formed of the securities price changes. Investors need to forecast the trend of future before buying and selling points, which can avoid great loss. Therefore, the analysis of motif pattern of K-line in the form of futures investment technology analysis is very significant. Based on the thoughts of short-term trend clustering, this paper proposes a method of detecting the motif pattern of Dark-Cloud Cover in stock time series by analysing stock historic data and K-line shape, in order to predict the stock market trends. And we prove the effectiveness and practicality of the method by a series of experimental analysis.

  13. Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security

    Science.gov (United States)

    Rachmawati, Dian; Amalia, Amalia; Elviwani

    2018-03-01

    Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).

  14. Use of the Social Security Administration Death Master File for ascertainment of mortality status

    Directory of Open Access Journals (Sweden)

    Whitcomb Brian W

    2004-03-01

    Full Text Available Abstract Objectives Internet sources that use the Social Security Administration's (SSA Death Master File have demonstrated high sensitivity among males for detection of mortality status in comparisons to the National Death Index, but the sensitivity has not been investigated for other demographic groups. Methods The authors used the SSA Death Master File to determine the mortality status of 374 decedents from the ongoing Patient Outcomes Study at Cedars-Sinai Medical Center whose deaths were confirmed by physicians using hospital records. Results Decedents identified by the SSA Death Master File were significantly older than those not identified. Foreign-born decedents were significantly less likely to be identified as dead than American-born decedents. Gender and marital status were not significant factors for identification by the SSA Death Master File. Conclusion The results of this study suggest that Internet sources may be used as an inexpensive and effective tool for determination of mortality status. However, among certain populations use of these databases alone may provide incomplete information.

  15. Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Jessica

    2018-03-01

    This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.

  16. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  17. DoDs Policies, Procedures, and Practices for Information Security Management of Covered Systems (REDACTED)

    Science.gov (United States)

    2016-08-15

    authentication factors, such as: • something known to the user, such as a password or personal identification number; • an access device provided to the...user, such as a cryptographic identification device or token; or • a unique biometric characteristic of the user, such as fingerprints or face...to authenticate themselves (through the use of passwords or other identifiers) and limit the files and other resources that authenticated users can

  18. COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES

    Science.gov (United States)

    2017-04-06

    Today, one such weakness is the seams that exist in the system. Organizational criteria like geography, functions, and responsibilities often create...climate change are a potential “’threat multiplier’ that intensifies instability around the world by worsening water shortages, food insecurity...system. One significant study, the Project on National Security Reform (PNSR), developed a recommendation “that the president selectively shift

  19. Web application security is a stack how to CYA (cover your apps) completely

    CERN Document Server

    Mac Vittie, Lori

    2015-01-01

    The web application stack - a growing threat vector   Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio

  20. A unified framework for risk and vulnerability analysis covering both safety and security

    International Nuclear Information System (INIS)

    Aven, Terje

    2007-01-01

    Recently, we have seen several attempts to establish adequate risk and vulnerability analyses tools and related management frameworks dealing not only with accidental events but also security problems. These attempts have been based on different analysis approaches and using alternative building blocks. In this paper, we discuss some of these and show how a unified framework for such analyses and management tasks can be developed. The framework is based on the use of probability as a measure of uncertainty, as seen through the eyes of the assessor, and define risk as the combination of possible consequences and related uncertainties. Risk and vulnerability characterizations are introduced incorporating ideas both from vulnerability analyses literature as well as from the risk classification scheme introduced by Renn and Klinke

  1. 78 FR 45588 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-07-29

    ... Effectiveness of a Proposed Rule Change to Delay the Operative Date of a Recent Change to Exchange Rule 514 July... filing a proposal to delay the operative date of a recent change to Rule 514. There are no proposed..._RC_2013_31.pdf . The purpose of this rule filing is to delay the operative date of the change to Rule...

  2. 78 FR 45586 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-07-29

    ... Effectiveness of a Proposed Rule Change to Delay the Operative Date of a Recent Change to Exchange Rule 506 July... filing a proposal to delay the operative date of a recent change to Rule 506. There are no proposed... delay the operative date of the change to Rule 506 in rule filing SR-MIAX-2013-18 until MIAX has...

  3. Trends in mortality differentials and life expectancy for male social security-covered workers, by socioeconomic status.

    Science.gov (United States)

    Waldron, Hilary

    2007-01-01

    This article presents an analysis of trends in mortality differentials and life expectancy by average relative earnings for male Social Security-covered workers aged 60 or older. Because average relative earnings are measured at the peak of the earnings distribution (ages 45-55), it is assumed that they act as a rough proxy for socioeconomic status. The historical literature reviewed in this analysis generally indicates that mortality differentials by socioeconomic status have not been constant over time. For this study, time trends are examined by observing how mortality differentials by average relative earnings have been changing over 29 years of successive birth cohorts that encompass roughly the first third of the 20th century. Deaths for these birth cohorts are observed at ages 60-89 from 1972 through 2001, encompassing roughly the last third of the 20th century. The large size and long span of death observations allow for disaggregation by age and year-of-birth groups in the estimation of mortality differentials by socioeconomic status. This study finds a difference in both the level and the rate of change in mortality improvement over time by socioeconomic status for male Social Security-covered workers. Average relative earnings (measured as the relative average positive earnings of an individual between ages 45 and 55) are used as a proxy for adult socioeconomic status. In general, for birth cohorts spanning the years 1912-1941 (or deaths spanning the years 1972-2001 at ages 60-89), the top half of the average relative earnings distribution has experienced faster mortality improvement than has the bottom half. Specifically, male Social Security-covered workers born in 1941 who had average relative earnings in the top half of the earnings distribution and who lived to age 60 would be expected to live 5.8 more years than their counterparts in the bottom half. In contrast, among male Social Security-covered workers born in 1912 who survived to age 60, those

  4. 78 FR 42989 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2013-07-18

    ... for, the Proposed Rule Change (i) NSCC provides a framework for the comparison and recording of... and on NSCC's Web site ( http://www.dtcc.com/legal/rule_filings/nscc/2013.php ). All comments received...

  5. 75 FR 57318 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2010-09-20

    ... 1970s, NSCC has provided a framework for the clearance and settlement of transactions executed on... office and NSCC's Web site ( http://www.dtcc.com/legal/rule_filings/nscc/2010.php ). All comments...

  6. 76 FR 25390 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-05-04

    ... calculates the CBOE Gold ETF Volatility Index (``GVZ''), which is based on the VIX methodology applied to options on the SPDR Gold Trust (``GLD''). The current filing would permit $0.50 strike price intervals for...

  7. 78 FR 62867 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-10-22

    ... securities.'' This definition is consistent with the definition of ``investment strategy involving a security... proposed definition of SMMP includes a reference to the term ``investment strategies'' to be consistent...), and Put option bonds: safekeeping, pricing (February 18, 1983); and the following Rule G-15...

  8. 76 FR 60953 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-09-30

    ... changes would be a de-emphasis on non-sales aspects of the activities of securities professionals. In... professional was qualified to perform municipal securities activities other than sales to, and purchases from... Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011...

  9. 78 FR 11921 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-02-20

    ...) underlying securities: SPDR S&P 500 ETF (``SPY''), Apple Inc. (``AAPL''), SPDR Gold Trust (``GLD''), Google... permitted for standard options on the same underlying security. Mini Options overlie 10 equity or ETF shares... three classes are the Nasdaq-100 Index Tracking Stock (``QQQQ''), the SPDR S&P 500 ETF (``SPY'') and the...

  10. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  11. Privacy Act System of Records: Freedom of Information Act Request and Appeal File, EPA-9

    Science.gov (United States)

    Learn more about the Freedom of Information Act Request and Appeal File System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  12. Privacy Act System of Records: EPA Personnel Emergency Contact Files, EPA-44

    Science.gov (United States)

    Learn about the EPA Personnel Emergency Contact Files System, including including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedure.

  13. 77 FR 42036 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-07-17

    ... Exchange is not proposing any change to the ``taker'' fees for Non-ISE Market Maker and Priority Customer... respect to the proposed rule change that are filed with the Commission, and all written communications... Rule Change To Amend Fees and Rebates for Certain Complex Orders Executed on the Exchange July 11, 2012...

  14. 76 FR 2174 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-01-12

    ... traders additional opportunities and strategies to hedge high priced securities. Currently, Exchange Rule... example if Apple, Inc. (``AAPL'') would trade at $310 \\6\\ with approximately two months remaining until...

  15. 77 FR 15171 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2012-03-14

    ..., omissions or delays which may occur in the absence of gross negligence on NSCC's part, in the transmission...'' for purposes of federal securities law, the sale of which is subject to regulation by the Commission...

  16. 76 FR 39463 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2011-07-06

    ... time was included in ESS, from ESS in order to facilitate what was then NSCC's guaranty of settlement... declined in recent years due to increased dematerialization of securities and automation of transactions...

  17. 78 FR 26838 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2013-05-08

    ... was enacted on March 18, 2010, as part of the Hiring Incentives to Restore Employment Act, and became... securities transactions is a key component of NSCC's business. The globalization of financial markets, the...

  18. 78 FR 62736 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-10-22

    ... commended the leadership of the MSRB on improving market transparency because retail investors do not have... violated a sense of fairness since they have no continued financial interest in the securities being...

  19. 78 FR 17729 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-22

    ... securities: SPDR S&P 500 ETF (``SPY''), Apple Inc. (``AAPL''), SPDR Gold Trust (``GLD''), Google Inc. (``GOOG... related to Mini Options traded on the Exchange. Mini Options overlie 10 equity or ETF shares, rather than...

  20. Earnings Public-Use File, 2006

    Data.gov (United States)

    Social Security Administration — Social Security Administration released Earnings Public-Use File (EPUF) for 2006. File contains earnings information for individuals drawn from a systematic random...

  1. 78 FR 1901 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-01-09

    ... Direct Edge ECN LLC (``DE ECN''), DE ECN is no longer a facility of the Exchange, and ISE (including its...-reference number in paragraph (a), as well as to add non-substantive words to correct the sentence structure..., competition, and capital formation. See 15 U.S.C. 78c(f). At any time within 60 days of the filing of the...

  2. Indicators of the Legal Security of Indigenous and Community Lands. Data file from LandMark: The Global Platform of Indigenous and Community Lands.

    NARCIS (Netherlands)

    Tagliarino, Nicholas Korte

    2016-01-01

    L. Alden Wily, N. Tagliarino, Harvard Law and International Development Society (LIDS), A. Vidal, C. Salcedo-La Vina, S. Ibrahim, and B. Almeida. 2016. Indicators of the Legal Security of Indigenous and Community Lands. Data file from LandMark: The Global Platform of Indigenous and Community Lands.

  3. 75 FR 14646 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2010-03-26

    ... 6753 (February 10, 2010) (SR-ISE-2009-106). Under current Rule 502(h), only Exchange-Traded Fund Shares, or ETFs, that are traded on a national securities exchange and are defined as an ``NMS'' stock under... specified non-U.S. currency or currencies deposited with the trust when aggregated in some specified minimum...

  4. 78 FR 16726 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-03-18

    ... Price, Managing Director, Securities Industry and Financial Markets Association, dated October 4, 2012... other industry professionals will have difficulty pricing options during Limit States and Straddle... conditions have changed and (ii) gaming the obvious error rule to retroactively adjust market maker quotes by...

  5. 75 FR 54930 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-09-09

    ... offer or sale of a primary offering of municipal securities on behalf of an issuer; (iii) the provision... political parties, and bond ballot campaigns, as well as other information, on Form G-37 to allow public... contributions to issuer officials, state or local political parties, and bond ballot campaigns would be subject...

  6. 75 FR 79061 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-12-17

    ... securities advisors--the Commission seeks comment on whether the proposed structure of the MSRB Nominating... membership on the Board, in order to establish a Nominating Committee in compliance with MSRB transitional... appropriate prior to the creation of the Nominating Committee of the MSRB (hereinafter, ``Nominating and...

  7. 78 FR 69468 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-11-19

    ... provide that in situations of a regulatory halt, trading pause or market-wide trading halt, a Post-Halt... situation of a halt pursuant to Rule 504(a), just as today, the Post-Halt Notification will continue to be..., Securities and Exchange Commission, 100 F Street NE., Washington, DC 20549-1090. All submissions should refer...

  8. 77 FR 18283 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2012-03-27

    ...-dealer must establish that the uncertificated securities are lodged in what are generally referred to as...) \\19\\ will be making continual and ongoing representations and assurances to the controlling AIP... Manufacturer or its designee in the name of the controlling AIP Distributor on behalf of its customer; 5. In...

  9. 78 FR 44607 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-07-24

    ... (collectively ``regulated entities''). It is governed by a 21- member board composed of eleven independent... directors in overseeing the municipal securities market, it is imperative that the board identify candidates... non- dealer municipal advisors. The public representatives must be independent of any regulated entity...

  10. 76 FR 55449 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-09-07

    ... purchasing of supplies. SIFMA noted that it understood why the wording of the gift prohibition for municipal... the Municipal Securities Rulemaking Board Consisting of Amendments to MSRB Rule G-20 (Gifts and... Commission a proposed rule change consisting of proposed amendments to MSRB Rule G-20 (on gifts and...

  11. 76 FR 20754 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-04-13

    ... members for potential participation and/or price improvement. \\9\\ A Complex Order is defined in Exchange...\\ An order means a commitment to buy or sell securities as defined in Exchange Rule 715. The proposed... applies.\\20\\ Both the Phlx and the CBOE fees are in essence fees charged by those exchanges for services...

  12. 75 FR 79433 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-12-20

    ... Effectiveness of Proposed Rule Change Relating to Fees and Rebates for Adding and Removing Liquidity December 13, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule... and rebates for adding and removing liquidity. The text of the proposed rule change is available on...

  13. 76 FR 56844 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-09-14

    ... Rule Change Relating to Fees and Rebates for Adding and Removing Liquidity September 8, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2... transaction fees and rebates for adding and removing liquidity. The text of the proposed rule change is...

  14. 75 FR 78288 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-12-15

    ... Effectiveness of Proposed Rule Change Relating to Fees and Rebates for Adding and Removing Liquidity December 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule... proposed rule change, as described in Items I and II, and below, which items have been prepared by the self...

  15. 76 FR 21934 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-04-19

    ... Rule Change Relating to Fees and Rebates for Adding and Removing Liquidity April 13, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2... transaction fees and rebates for adding and removing liquidity. The text of the proposed rule change is...

  16. 75 FR 70059 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-11-16

    ... Effectiveness of Proposed Rule Change Relating to Fees and Rebates for Adding and Removing Liquidity November 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule... amend its transaction fees and rebates for adding and removing liquidity. The text of the proposed rule...

  17. 75 FR 39070 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2010-07-07

    .... Accordingly, a 10% price movement in a leveraged ETP may not signify extraordinary volatility. Because the... that securities that experienced volatility on May 6, 2010, including ETFs, should be included in the... existing 10% price movement applicable before invoking a trading pause may be appropriate for the Russell...

  18. 78 FR 56253 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-09-12

    ... number of strike prices being opened above and below the value of the underlying security at about the... the Exchange Act. To the contrary, the Exchange believes the proposal is pro-competitive. In this... the same manner as other exchanges.\\12\\ In sum, the proposed rule change presents no novel issues, and...

  19. 75 FR 6237 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2010-02-08

    ... additional one hour after the decision making cut off time of 5:30 p.m. to submit a CEA to the various.... The Exchange will continue to enforce the 5:30 p.m. decision making requirement, while also allowing..., processing information with respect to, and facilitating transactions in securities, to remove impediments to...

  20. 75 FR 30876 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-06-02

    ... financial statements pursuant to generally accepted accounting principles (``GAAP'') as established by the Governmental Accounting Standards Board (``GASB''), or pursuant to GAAP as established by the Financial... Access System (EMMA[supreg]) May 26, 2010. I. Introduction On July 14, 2009, the Municipal Securities...

  1. 75 FR 14233 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-03-24

    ... Proposed Rule Change 1. Purpose Before a Primary Market Maker (``PMM'') sends a customer order to another... communications relating to the proposed rule change between the Commission and any person, other than those that... Rule Change To Adopt a Fee Credit March 18, 2010. Pursuant to Section 19(b)(1) of the Securities...

  2. 75 FR 30095 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-05-28

    ... Rule Change Relating to Professional Customer Fees May 21, 2010. Pursuant to Section 19(b)(1) of the... the Commission, and all written communications relating to the proposed rule change between the... with the Securities and Exchange Commission the proposed rule change, as described in Items I, II, and...

  3. 78 FR 21487 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2013-04-10

    ... To Institute Supplemental Liquidity Deposits to Its Clearing Fund Designed To Increase Liquidity Resources To Meet Its Liquidity Needs April 4, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange... meet its liquidity requirements, NSCC is proposing to amend its Rules & Procedures (``Rules'') to...

  4. 78 FR 32292 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Science.gov (United States)

    2013-05-29

    ..., To Institute Supplemental Liquidity Deposits to Its Clearing Fund Designed To Increase Liquidity Resources To Meet Its Liquidity Needs May 22, 2013. On March 21, 2013, National Securities Clearing... liquidity deposits to NSCC's Clearing Fund, in order to increase NSCC's liquidity resources to meet its...

  5. 76 FR 71398 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-11-17

    ... practices and display execution and trading systems. While the examination is primarily dedicated to topics related to proprietary trading, the Series 56 examination also covers a few general concepts relating to... on competition, and, by its terms, does not become operative for 30 days from the date on which it...

  6. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  7. International pooling of operators' funds: an option to increase the amount of financial security to cover nuclear liability?

    International Nuclear Information System (INIS)

    Pelzer, N.

    2007-01-01

    This paper aims at answering the question whether international pooling of operators funds could open a viable avenue to complement financial security provided by insurance and thus to either fill gaps in insurance coverage or increase amount of compensation for nuclear damage. (author)

  8. 76 FR 45309 - Social Security Ruling 11-1p; Titles II and XVI: Procedures for Handling Requests To File...

    Science.gov (United States)

    2011-07-28

    ... request to file a disability claim when you have a pending claim of the same title and benefit type in our... time. If you want to file a new disability claim under the same title and of the same type as a... Pending Disability Claim Instead of Filing a New Claim Under the Same Title and of the Same Type If you...

  9. Source Reference File

    Data.gov (United States)

    Social Security Administration — This file contains a national set of names and contact information for doctors, hospitals, clinics, and other facilities (known collectively as sources) from which...

  10. RRB Earnings File (RRBERN)

    Data.gov (United States)

    Social Security Administration — RRBERN contains records for all beneficiaries on the RRB's PSSVES file who's SSNs are validated through the SVES processing. Validated output is processed through...

  11. CryptosFS: Fast Cryptographic Secure NFS

    OpenAIRE

    O'Shanahan, Declan

    2000-01-01

    The issue of security in file-systems is as relevant today as when the first file system was developed. Current file system implementations rely heavily on centralised security mechanisms such as access control lists. The problem of security in file systems was made more complicated by the introduction of remote access to files. Storing information on a remote server has the potential to introduce additional security weaknesses into the file system model. The client, the commun...

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Exploring patient satisfaction levels, self-rated oral health status and associated variables among citizens covered for dental insurance through a National Social Security Scheme in India.

    Science.gov (United States)

    Singh, Abhinav; Purohit, Bharathi M

    2017-06-01

    To assess patient satisfaction, self-rated oral health and associated factors, including periodontal status and dental caries, among patients covered for dental insurance through a National Social Security Scheme in New Delhi, India. A total of 1,498 patients participated in the study. Satisfaction levels and self-rated oral-health scores were measured using a questionnaire comprising 12 closed-ended questions. Clinical data were collected using the Community Periodontal Index (CPI) and the decayed, missing and filled teeth (DMFT) index. Regression analysis was conducted to evaluate factors associated with dental caries, periodontal status and self-rated oral health. Areas of concern included poor cleanliness within the hospital, extensive delays for appointments, waiting time in hospital and inadequate interpersonal and communication skills among health-care professionals. Approximately 51% of the respondents rated their oral health as fair to poor. Younger age, no tobacco usage, good periodontal status and absence of dental caries were significantly associated with higher oral health satisfaction, with odds ratios of 3.94, 2.38, 2.58 and 2.09, respectively (P ≤ 0.001). The study indicates poor satisfaction levels with the current dental care system and a poor self-rated oral health status among the study population. Some specific areas of concern have been identified. These findings may facilitate restructuring of the existing dental services under the National Social Security Scheme towards creating a better patient care system. © 2017 FDI World Dental Federation.

  14. Evapotranspiration Cover for the 92-Acre Area Retired Mixed Waste Pits, Area 5 Waste Management Division, Nevada National Security Site, Final CQA Report

    International Nuclear Information System (INIS)

    2012-01-01

    The report is the Final Construction Quality Assurance (CQA) Report for the 92-Acrew Evapotranspiration Cover, Area 5 Waste Management Division Retired Mixed Waste Pits, Nevada National Security Site, Nevada, for the period of January 20, 2011, to January 31, 2012 The Area 5 RWMS uses engineered shallow-land burial cells to dispose of packaged waste. The 92-Acre Area encompasses the southern portion of the Area 5 RWMS, which has been designated for the first final closure operations. This area contains 13 Greater Confinement Disposal (GCD) boreholes, 16 narrow trenches, and 9 broader pits. With the exception of two active pits (P03 and P06), all trenches and pits in the 92-Acre Area had operational covers approximately 2.4 meters thick, at a minimum, in most areas when this project began. The units within the 92-Acre Area are grouped into the following six informal categories based on physical location, waste types and regulatory requirements: (1) Pit 3 Mixed Waste Disposal Unit (MWDU); (2) Corrective Action Unit (CAU) 111; (3) CAU 207; (4) Low-level waste disposal units; (5) Asbestiform low-level waste disposal units; and (6) One transuranic (TRU) waste trench.

  15. 78 FR 79530 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing of a...

    Science.gov (United States)

    2013-12-30

    ... its By-Laws to correspond with an Equity Rights Program (``ERP'') recently established by the Exchange... No. 10-207). The filing corresponds with the recently implemented ERP, pursuant to which units... to the extent necessary to incorporate rights to participating Members in an ERP to appoint...

  16. Search the SEC website for the latest EDGAR filings

    Data.gov (United States)

    Securities and Exchange Commission — This listing contains the most recent filings for the current official filing date (including filings made after the 5:30pm deadline on the previous filing day)....

  17. 77 FR 33206 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-06-05

    ... Reliability Standard CIP- 006--Cyber Security--Physical Security of Critical Cyber Assets. Filed Date: 5/23/12... Commission received the following electric securities filings: Docket Numbers: ES12-31-000. Applicants...

  18. Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB)

    Science.gov (United States)

    Nasution, A. B.; Efendi, S.; Suwilo, S.

    2018-04-01

    The amount of data inserted in the form of audio samples that use 8 bits with LSB algorithm, affect the value of PSNR which resulted in changes in image quality of the insertion (fidelity). So in this research will be inserted audio samples using 5 bits with MLSB algorithm to reduce the number of data insertion where previously the audio sample will be compressed with Arithmetic Coding algorithm to reduce file size. In this research will also be encryption using Triple DES algorithm to better secure audio samples. The result of this research is the value of PSNR more than 50dB so it can be concluded that the image quality is still good because the value of PSNR has exceeded 40dB.

  19. An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.

    2018-03-01

    MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

  20. 76 FR 12353 - Combined Notice of Filings #2

    Science.gov (United States)

    2011-03-07

    ... PowerSecure Inc. at Washington, NC Walmart. Filed Date: 07/02/2010. Accession Number: 20100702-5029...: Self-Certification of PowerSecure Inc. at Laurinburg, NC Walmart. Filed Date: 07/02/2010. Accession...Secure, Inc. Description: Self-Certification of PowerSecure Inc. at Wilson, NC Walmart. Filed Date: 07/02...

  1. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  2. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  3. RRB / SSI Interface Checkwriting Integrated Computer Operation Extract File (CHICO)

    Data.gov (United States)

    Social Security Administration — This monthly file provides SSA with information about benefit payments made to railroad retirement beneficiaries. SSA uses this data to verify Supplemental Security...

  4. 12 CFR 16.33 - Filing fees.

    Science.gov (United States)

    2010-01-01

    ... Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.33 Filing fees. (a) Filing fees must accompany certain filings made under the provisions of this part... Comptroller of the Currency Fees published pursuant to § 8.8 of this chapter. (b) Filing fees must be paid by...

  5. 76 FR 46603 - Security Ratings

    Science.gov (United States)

    2011-08-03

    ... settled derivative securities). See Simplification of Registration of Reporting Requirements for Foreign... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No. 33-9245; 34-64975; File No. S7-18-08] RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange...

  6. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  7. Land Cover

    Data.gov (United States)

    Kansas Data Access and Support Center — The Land Cover database depicts 10 general land cover classes for the State of Kansas. The database was compiled from a digital classification of Landsat Thematic...

  8. NASA ARCH- A FILE ARCHIVAL SYSTEM FOR THE DEC VAX

    Science.gov (United States)

    Scott, P. J.

    1994-01-01

    The function of the NASA ARCH system is to provide a permanent storage area for files that are infrequently accessed. The NASA ARCH routines were designed to provide a simple mechanism by which users can easily store and retrieve files. The user treats NASA ARCH as the interface to a black box where files are stored. There are only five NASA ARCH user commands, even though NASA ARCH employs standard VMS directives and the VAX BACKUP utility. Special care is taken to provide the security needed to insure file integrity over a period of years. The archived files may exist in any of three storage areas: a temporary buffer, the main buffer, and a magnetic tape library. When the main buffer fills up, it is transferred to permanent magnetic tape storage and deleted from disk. Files may be restored from any of the three storage areas. A single file, multiple files, or entire directories can be stored and retrieved. archived entities hold the same name, extension, version number, and VMS file protection scheme as they had in the user's account prior to archival. NASA ARCH is capable of handling up to 7 directory levels. Wildcards are supported. User commands include TEMPCOPY, DISKCOPY, DELETE, RESTORE, and DIRECTORY. The DIRECTORY command searches a directory of savesets covering all three archival areas, listing matches according to area, date, filename, or other criteria supplied by the user. The system manager commands include 1) ARCHIVE- to transfer the main buffer to duplicate magnetic tapes, 2) REPORTto determine when the main buffer is full enough to archive, 3) INCREMENT- to back up the partially filled main buffer, and 4) FULLBACKUP- to back up the entire main buffer. On-line help files are provided for all NASA ARCH commands. NASA ARCH is written in DEC VAX DCL for interactive execution and has been implemented on a DEC VAX computer operating under VMS 4.X. This program was developed in 1985.

  9. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  10. Car Covers | Outdoor Covers Canada

    OpenAIRE

    Covers, Outdoor

    2018-01-01

    Protect your car from the elements with Ultimate Touch Car Cover. The multi-layer non-woven fabric is soft on the finish and offers 4 seasons all weather protection.https://outdoorcovers.ca/car-covers/

  11. 6 CFR 13.26 - Filing, form and service of papers.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Filing, form and service of papers. 13.26 Section 13.26 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.26 Filing, form and service of papers. (a) Filing and form. (1) Documents filed with...

  12. GrabBlur--a framework to facilitate the secure exchange of whole-exome and -genome SNV data using VCF files.

    Science.gov (United States)

    Stade, Björn; Seelow, Dominik; Thomsen, Ingo; Krawczak, Michael; Franke, Andre

    2014-01-01

    Next Generation Sequencing (NGS) of whole exomes or genomes is increasingly being used in human genetic research and diagnostics. Sharing NGS data with third parties can help physicians and researchers to identify causative or predisposing mutations for a specific sample of interest more efficiently. In many cases, however, the exchange of such data may collide with data privacy regulations. GrabBlur is a newly developed tool to aggregate and share NGS-derived single nucleotide variant (SNV) data in a public database, keeping individual samples unidentifiable. In contrast to other currently existing SNV databases, GrabBlur includes phenotypic information and contact details of the submitter of a given database entry. By means of GrabBlur human geneticists can securely and easily share SNV data from resequencing projects. GrabBlur can ease the interpretation of SNV data by offering basic annotations, genotype frequencies and in particular phenotypic information - given that this information was shared - for the SNV of interest. GrabBlur facilitates the combination of phenotypic and NGS data (VCF files) via a local interface or command line operations. Data submissions may include HPO (Human Phenotype Ontology) terms, other trait descriptions, NGS technology information and the identity of the submitter. Most of this information is optional and its provision at the discretion of the submitter. Upon initial intake, GrabBlur merges and aggregates all sample-specific data. If a certain SNV is rare, the sample-specific information is replaced with the submitter identity. Generally, all data in GrabBlur are highly aggregated so that they can be shared with others while ensuring maximum privacy. Thus, it is impossible to reconstruct complete exomes or genomes from the database or to re-identify single individuals. After the individual information has been sufficiently "blurred", the data can be uploaded into a publicly accessible domain where aggregated genotypes are

  13. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  14. Benthic Cover

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Benthic cover (habitat) maps are derived from aerial imagery, underwater photos, acoustic surveys, and data gathered from sediment samples. Shallow to moderate-depth...

  15. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  16. Web application security: a beginner's guide

    National Research Council Canada - National Science Library

    Sullivan, Bryan; Liu, Vincent

    2012-01-01

    .... This practical resource includes chapters on authentication, authorization, and session management, along with browser, database, and file security--all supported by true stories from industry...

  17. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  18. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  19. Download this PDF file

    African Journals Online (AJOL)

    PROF. MADUKWE

    Fadama Development Project (1991), National Special Programme for Food Security ... production of arable crops only and covered few states in the country. .... education has been largely associated with a higher level of career commitment ...

  20. WinSCP for Windows File Transfers | High-Performance Computing | NREL

    Science.gov (United States)

    WinSCP for Windows File Transfers WinSCP for Windows File Transfers WinSCP for can used to securely transfer files between your local computer running Microsoft Windows and a remote computer running Linux

  1. 17 CFR 229.1003 - (Item 1003) Identity and background of filing person.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1003) Identity and background of filing person. 229.1003 Section 229.1003 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  2. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  3. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  4. 78 FR 66318 - Securities Investor Protection Corporation

    Science.gov (United States)

    2013-11-05

    ...] Securities Investor Protection Corporation AGENCY: Securities and Exchange Commission. ACTION: Proposed rule. SUMMARY: The Securities Investor Protection Corporation (``SIPC'') filed a proposed rule change with the... satisfaction of customer claims for standardized options under the Securities Investor Protection Act of 1970...

  5. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  6. 12 CFR 207.6 - Disclosure of covered agreements.

    Science.gov (United States)

    2010-01-01

    ... DISCLOSURE AND REPORTING OF CRA-RELATED AGREEMENTS (REGULATION G) § 207.6 Disclosure of covered agreements... CRA public file by insured depository institution or affiliate. An insured depository institution and...) by placing a copy of the covered agreement in the insured depository institution's CRA public file if...

  7. Considerations for Cloud Security Operations

    OpenAIRE

    Cusick, James

    2016-01-01

    Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.

  8. Modified Small Business Network Security

    OpenAIRE

    Md. Belayet Ali; Oveget Das; Md. Shamim Hossain

    2012-01-01

    This paper covers some likely threats and effectivesteps for a secure small business. It also involves a flowchart tocomprehend the overall small business network security easilyand we identify a set of security issues and applyappropriate techniques to satisfy the correspondingsecurity requirements. In respect of all, this document isstrong enough for any small business network security.

  9. 77 FR 12367 - Agency Information Collection and Reporting Activities; Electronic Filing of Bank Secrecy Act...

    Science.gov (United States)

    2012-02-29

    ... capability of electronically filing BSA reports through its system called BSA E-Filing. Effective August 2011... Accounts (FBAR) report. BSA E-Filing is a secure, web-based electronic filing system. It is a flexible... filing institutions or individuals, thereby providing a significant improvement in data quality. BSA E...

  10. Sganzerla Cover

    Directory of Open Access Journals (Sweden)

    Victor da Rosa

    2014-06-01

    Full Text Available Neste artigo, realizo uma leitura do cinema de Rogério Sganzerla, desde o clássico O bandido da luz vermelha até os documentários filmados na década de oitenta, a partir de duas noções centrais: cover e over. Para isso, parto de uma controvérsia com o ensaio de Ismail Xavier, Alegorias do subdesenvolvimento, em que o crítico realiza uma leitura do cinema brasileiro da década de sessenta através do conceito de alegoria; depois releio uma série de textos críticos do próprio Sganzerla, publicados em Edifício Sganzerla, procurando repensar as ideias de “herói vazio” ou “cinema impuro” e sugerindo assim uma nova relação do seu cinema com o tempo e a representação; então busco articular tais ideias com certos procedimentos de vanguarda, como a falsificação, a cópia, o clichê e a colagem; e finalmente procuro mostrar que, no cinema de Sganzerla, a partir principalmente de suas reflexões sobre Orson Welles, a voz é usada de maneira a deformar a interpretação naturalista.

  11. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  12. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  13. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  14. Company's Data Security - Case Study

    Science.gov (United States)

    Stera, Piotr

    This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company's server by a dishonest employee.

  15. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  16. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  17. Analyzing Android Browser Apps for file:// Vulnerabilities

    OpenAIRE

    Wu, Daoyuan; Chang, Rocky K. C.

    2014-01-01

    Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated s...

  18. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  19. 12 CFR 11.4 - Filing fees.

    Science.gov (United States)

    2010-01-01

    ... Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES EXCHANGE ACT DISCLOSURE RULES... part before it will accept the filing. The OCC provides an applicable fee schedule for such filings in the “Notice of Comptroller of the Currency Fees” described in 12 CFR 8.8. (b) Fees must be paid by...

  20. 8 CFR 236.14 - Filing.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Filing. 236.14 Section 236.14 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS APPREHENSION AND DETENTION OF INADMISSIBLE... initial denial, to allow the alien the opportunity to file a new Form I-817 application in order to...

  1. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  2. 17 CFR 201.152 - Filing of papers: Form.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Form. 201... PRACTICE Rules of Practice General Rules § 201.152 Filing of papers: Form. (a) Specifications. Papers filed... white paper measuring 81/2×11 inches, except that, to the extent that the reduction of larger documents...

  3. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Download this PDF file

    African Journals Online (AJOL)

    Mo

    enriched diet, for the soil and for food security of smallholder farm families. ... farmers in Malawi. human diets, as well as the long-term sustainabilityof ..... Difficult to intercrop at a high density, Good cover of soil hence control weed, Not heavily attacked by pests. 5. G'nut + PP intercrop year. 1, rotation with maize year 2.

  8. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  9. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  10. 12 CFR 533.6 - Disclosure of covered agreements.

    Science.gov (United States)

    2010-01-01

    ... REPORTING OF CRA-RELATED AGREEMENTS § 533.6 Disclosure of covered agreements. (a) Applicability date. This... mailing the agreement. (7) Use of CRA public file by insured depository institution or affiliate. An... institution's CRA public file if the institution makes the agreement available in accordance with the...

  11. 12 CFR 346.6 - Disclosure of covered agreements.

    Science.gov (United States)

    2010-01-01

    ... POLICY DISCLOSURE AND REPORTING OF CRA-RELATED AGREEMENTS § 346.6 Disclosure of covered agreements. (a... exceed the cost of copying and mailing the agreement. (7) Use of CRA public file by insured depository... the insured depository institution's CRA public file if the institution makes the agreement available...

  12. 17 CFR 229.1008 - (Item 1008) Interest in securities of the subject company.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1008) Interest in securities of the subject company. 229.1008 Section 229.1008 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  13. Niveles de plomo sanguíneo en madres y recién nacidos derechohabientes del Instituto Mexicano del Seguro Social Blood lead levels in newborn children and mothers covered by the Mexican Institute of Social Security

    Directory of Open Access Journals (Sweden)

    Joel Navarrete-Espinosa

    2000-09-01

    Full Text Available OBJETIVO: Establecer la relación entre el nivel de plomo sanguíneo materno (PSM y el de sangre en cordón umbilical (PSC al momento del parto, así como determinar los principales predictores del PSM en derechohabientes del Instituto Mexicano del Seguro Social (IMSS, en el Distrito Federal (D.F.. MATERIAL Y MÉTODOS: Se realizó un estudio transversal en el que se reclutaron voluntarias con embarazo normoevolutivo y se les tomaron muestras de sangre al momento del parto, en cuatro hospitales del IMSS en el D.F., de 1991 a 1993. Se tomó, además, muestra de sangre de cordón umbilical. Los datos fueron analizados mediante regresión lineal simple y múltiple. RESULTADOS: Se estudiaron un total de 1 404 binomios madre-hijo; el promedio de edad de las madres fue de 25 años. La media de PSM fue 10.7 ± 6.5 µg/dl; no se encontraron variaciones significativas por hospital, edad o estado civil. Para el PSC la media fue de 10.4 ± 6.2 µg/dl. Por cada aumento en una unidad logarítmica de PSM, el PSC aumenta 0.62 (pOBJECTIVE: To establish the relation between maternal blood lead (MBL and umbilical cord blood lead (CBL levels during delivery, and to determine the major predictors for MBL in women covered by the Mexican Institute of Social Security (MISS, in Mexico City. MATERIAL AND METHODS: From 1991 to 1993, a cross-sectional study was conducted in four MISS hospitals, among normal pregnant women who volunteered to participate. Blood samples were taken from women and from the umbilical cord during delivery. Statistical analysis consisted of descriptive statistics and simple and multiple linear regression. RESULTS: A total of 1 404 mother-newborn pairs were studied. Mean maternal age was 25 years. MBL average was 10.7 ± 6.5 µg/dl; no significant differences were found by hospital, age, or marital status. Mean CBL was 10.4 ± 6.2 µg/dl. A log unit increase in MBL corresponded to a log increase of 0.62 in CBL (p< 0.01. Pearson's correlation was 0

  14. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  15. Land Cover - Minnesota Land Cover Classification System

    Data.gov (United States)

    Minnesota Department of Natural Resources — Land cover data set based on the Minnesota Land Cover Classification System (MLCCS) coding scheme. This data was produced using a combination of aerial photograph...

  16. 78 FR 50135 - Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading

    Science.gov (United States)

    2013-08-16

    ... SECURITIES AND EXCHANGE COMMISSION Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading August 14, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Soil Biogenics Ltd. because it has not filed [[Page 50136

  17. 17 CFR 270.24b-2 - Filing copies of sales literature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Filing copies of sales literature. 270.24b-2 Section 270.24b-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... literature. Copies of material filed with the Commission for the sole purpose of complying with section 24(b...

  18. 17 CFR 240.15Ca2-3 - Registration of successor to registered government securities broker or government securities...

    Science.gov (United States)

    2010-04-01

    ... business of a government securities broker or government securities dealer registered pursuant to section... the registration of the successor if the successor, within 30 days after such succession, files an... securities broker or government securities dealer succeeds to and continues the business of a predecessor...

  19. Multimedia forensics and security foundations, innovations, and applications

    CERN Document Server

    Fouad, Mohamed; Manaf, Azizah; Zamani, Mazdak; Ahmad, Rabiah; Kacprzyk, Janusz

    2017-01-01

    This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidence...

  20. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  1. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  2. 78 FR 54502 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2013-09-04

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of a Proposed Rule... Authority, Inc. (``FINRA'') filed with the Securities and Exchange Commission (``SEC'' or ``Commission... or manipulative motivation for the trading activity at issue.\\4\\ Specifically, proposed Supplementary...

  3. Old Age, Survivors, and Disability Insurance (OASDI) Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The OASDI Public-Use Microdata File contains an extract of data fields from SSA's Master Beneficiary Record file and consists of a 1 percent random, representative...

  4. 76 FR 20759 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2011-04-13

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing and Immediate..., 2011, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange.... For more information about the rulebook consolidation process, see Information Notice, March 12, 2008...

  5. 76 FR 40412 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2011-07-08

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing and Immediate..., Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange Commission... a more limited application by their terms. For more information about the rulebook consolidation...

  6. 75 FR 60157 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2010-09-29

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing and Immediate..., 2010, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange... information about the rulebook consolidation process, see Information Notice, March 12, 2008 (Rulebook...

  7. 75 FR 71164 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2010-11-22

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing and Immediate..., 2010, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange.... For more information about the rulebook consolidation process, see Information Notice, March 12, 2008...

  8. 76 FR 12380 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2011-03-07

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of Amendment No. 1..., the Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange... information about the rulebook consolidation process, see Information Notice, March 12, 2008 (Rulebook...

  9. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  10. XML Files

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  11. 29 CFR 70.54 - Employee Benefits Security Administration.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Employee Benefits Security Administration. 70.54 Section 70... Records and Filings § 70.54 Employee Benefits Security Administration. (a) The annual financial reports (Form 5500) and attachments/schedules as filed by employee benefit plans under the Employee Retirement...

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  14. DIRAC: Secure web user interface

    International Nuclear Information System (INIS)

    Casajus Ramo, A; Sapunov, M

    2010-01-01

    Traditionally the interaction between users and the Grid is done with command line tools. However, these tools are difficult to use by non-expert users providing minimal help and generating outputs not always easy to understand especially in case of errors. Graphical User Interfaces are typically limited to providing access to the monitoring or accounting information and concentrate on some particular aspects failing to cover the full spectrum of grid control tasks. To make the Grid more user friendly more complete graphical interfaces are needed. Within the DIRAC project we have attempted to construct a Web based User Interface that provides means not only for monitoring the system behavior but also allows to steer the main user activities on the grid. Using DIRAC's web interface a user can easily track jobs and data. It provides access to job information and allows performing actions on jobs such as killing or deleting. Data managers can define and monitor file transfer activity as well as check requests set by jobs. Production managers can define and follow large data productions and react if necessary by stopping or starting them. The Web Portal is build following all the grid security standards and using modern Web 2.0 technologies which allow to achieve the user experience similar to the desktop applications. Details of the DIRAC Web Portal architecture and User Interface will be presented and discussed.

  15. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  16. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  17. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  18. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  19. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  20. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  1. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    physical protection system is not covered by such studies, since this type of detection gives no information on either the effectiveness or the reliability of the MC and A systems. A critical scenario is defined as one which leads to discrepancies involving substantial amounts of NM or for which the detection delay is long. Special care is taken when analysing these scenarios. For critical scenarios, sensitivity analysis could be made to determine the smallest quantity of NM the disappearance of which could be detected or the criteria leading to the detection of the disappearance in the control system or in the accounting system. The threats taken into account are identified with reference to the design basis threat specified by the competent authority. Both internal and external threats are taken in account. Internal threats are defined as attempts by insiders to steal quantities of nuclear material, either once or on several occasions; accumulating these quantities leads to a significant quantity of NM. External threats are defined as attempts by groups of aggressors to steal significant amounts of nuclear material. Two hypotheses are taken into account to test the ability of the physical protection system to counter threats of this type. The first is based on a small group of aggressors with limited resources and the second involves a larger team with more sophisticated resources. Of course security studies have to be carried out in compliance with the corresponding confidentiality rules. In addition, such studies have to be regularly updated, notably if significant modifications are made in the MC and A or PP systems. It is important that security studies are available in the facilities for competent personnel, as it gives the rationale behind control and protection of NM. In particular, it could be used, in a performance-based approach, to support analysis reports or to illustrate that the required level of security has been reached. (author)

  2. Emerging trends in ICT security

    CERN Document Server

    Akhgar, Babak

    2013-01-01

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach

  3. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  4. 76 FR 4966 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2011-01-27

    ... wherever executed (except debt securities that are not TRAC-Eligible Securities), over-the-counter equity... share for each sale of a covered equity security, with a maximum charge of $3.75 per trade; $0.002 per... future; and $0.00075 per bond for each sale of a covered TRAC-Eligible Security and/or municipal security...

  5. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  6. 76 FR 799 - Publication of Year 2010 Form M-1 With Electronic Filing Option, Notice

    Science.gov (United States)

    2011-01-06

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Publication of Year 2010 Form M-1 With Electronic Filing Option, Notice AGENCY: Employee Benefits Security Administration, Department of... Employer Welfare Arrangements and Certain Entities Claiming Exception. It is generally identical to the...

  7. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  8. Analysis On Security Of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2017-01-01

    Full Text Available In this paper Author will be discussing the security issues and challenges faced by the industry in securing the cloud computing and how these problems can be tackled. Cloud computing is modern technique of sharing resources like data sharing file sharing basically sharing of resources without launching own infrastructure and using some third party resources to avoid huge investment . It is very challenging these days to secure the communication between two users although people use different encryption techniques 1.

  9. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  10. APLIKASI KEAMANAN FILE AUDIO WAV (WAVEFORM DENGAN TERAPAN ALGORITMA RSA

    Directory of Open Access Journals (Sweden)

    Raja Nasrul Fuad

    2017-03-01

    Full Text Available The WAV file format that is widely used rough on various kinds of multimedia and gaming platforms. Ease of access and technological development with a variety of media to facilitate the exchange of information to various places. The data are important and need to be kept confidential secret for a wide range of security threats so that data can be intercepted and acknowledged by third parties during the shipping process. Of these problems led to the idea to create an application data security functions can secure the data using the RSA algorithm. The programming language is C # with Visual Studio software, the processed data is a sample each byte in WAV file, the header will be the same as that originally WAV files can be played even if the information has been withheld. RSA algorithm can be implemented into a programming language that WAV files can be processed and secured the data.

  11. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  12. JENDL special purpose file

    International Nuclear Information System (INIS)

    Nakagawa, Tsuneo

    1995-01-01

    In JENDL-3,2, the data on all the reactions having significant cross section over the neutron energy from 0.01 meV to 20 MeV are given for 340 nuclides. The object range of application extends widely, such as the neutron engineering, shield and others of fast reactors, thermal neutron reactors and nuclear fusion reactors. This is a general purpose data file. On the contrary to this, the file in which only the data required for a specific application field are collected is called special purpose file. The file for dosimetry is a typical special purpose file. The Nuclear Data Center, Japan Atomic Energy Research Institute, is making ten kinds of JENDL special purpose files. The files, of which the working groups of Sigma Committee are in charge, are listed. As to the format of the files, ENDF format is used similarly to JENDL-3,2. Dosimetry file, activation cross section file, (α, n) reaction data file, fusion file, actinoid file, high energy data file, photonuclear data file, PKA/KERMA file, gas production cross section file and decay data file are described on their contents, the course of development and their verification. Dosimetry file and gas production cross section file have been completed already. As for the others, the expected time of completion is shown. When these files are completed, they are opened to the public. (K.I.)

  13. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits for fiscal...

  14. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits from fiscal...

  15. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  16. Branched polynomial covering maps

    DEFF Research Database (Denmark)

    Hansen, Vagn Lundsgaard

    1999-01-01

    A Weierstrass polynomial with multiple roots in certain points leads to a branched covering map. With this as the guiding example, we formally define and study the notion of a branched polynomial covering map. We shall prove that many finite covering maps are polynomial outside a discrete branch...... set. Particular studies are made of branched polynomial covering maps arising from Riemann surfaces and from knots in the 3-sphere....

  17. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  18. 75 FR 74036 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-11-30

    .... Description: McNees Wallace & Nurick LLC council to The Trustees of the University of PA, a PA Non-Profit Corp... Interconnection Financial Security of Calpine Corporation. Filed Date: 11/10/2010. Accession Number: 20101110-5186... on the Applicant. In reference to filings initiating a new proceeding, interventions or protests...

  19. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  20. 76 FR 46668 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Science.gov (United States)

    2011-08-03

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...

  1. 78 FR 28687 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2013-05-15

    ... ``any option, derivative, security-based swap, or other financial instrument overlying a security, the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69543; File No. SR-FINRA-2013-021] Self... (Front Running of Block Transactions) May 9, 2013. Pursuant to Section 19(b)(1) of the Securities...

  2. 78 FR 78424 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-12-26

    ... Tapes, eliminated the distinction between Derivative Securities Products and Non-Derivative Securities... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71137; File No. SR-CHX-2013-22] Self-Regulatory...) \\1\\ of the Securities Exchange Act of 1934 (``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is...

  3. 78 FR 62855 - Self-Regulatory Organizations; EDGX Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-10-22

    ... option, derivative, security-based swap, or other financial instrument overlying a security, the value of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70626; File No. SR-EDGX-2013-36] Self...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...

  4. 78 FR 77512 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-12-23

    ... transactions, to assure the safeguarding of securities and funds which are in the custody or control of the... securities clearing operations of CME or any rights or obligations of CME with respect to securities clearing... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71088; File No. SR-CME-2013-32] Self-Regulatory...

  5. 78 FR 62787 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-10-22

    ... changes contribute to the safeguarding of securities and funds in CME's custody or control or for which... securities clearing operations of CME or any rights or obligations of CME with respect to securities clearing... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70605; File No. SR-CME-2013-21] Self-Regulatory...

  6. A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

    OpenAIRE

    De Meo, Federico; Viganò, Luca

    2017-01-01

    Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application. Moreover, the analysis should take into consideration how file-system vulnerabilities might in- teract with other vulnerabilities leading an attacker to breach into the web application. In this paper, we first propose a classification of file-...

  7. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  8. 17 CFR 210.3-06 - Financial statements covering a period of nine to twelve months.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Financial statements covering... SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES... General Instructions As to Financial Statements § 210.3-06 Financial statements covering a period of nine...

  9. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  10. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  11. Branched polynomial covering maps

    DEFF Research Database (Denmark)

    Hansen, Vagn Lundsgaard

    2002-01-01

    A Weierstrass polynomial with multiple roots in certain points leads to a branched covering map. With this as the guiding example, we formally define and study the notion of a branched polynomial covering map. We shall prove that many finite covering maps are polynomial outside a discrete branch ...... set. Particular studies are made of branched polynomial covering maps arising from Riemann surfaces and from knots in the 3-sphere. (C) 2001 Elsevier Science B.V. All rights reserved.......A Weierstrass polynomial with multiple roots in certain points leads to a branched covering map. With this as the guiding example, we formally define and study the notion of a branched polynomial covering map. We shall prove that many finite covering maps are polynomial outside a discrete branch...

  12. Landfill Top Covers

    DEFF Research Database (Denmark)

    Scheutz, Charlotte; Kjeldsen, Peter

    2011-01-01

    The purpose of the final cover of a landfill is to contain the waste and to provide for a physical separation between the waste and the environment for protection of public health. Most landfill covers are designed with the primary goal to reduce or prevent infiltration of precipitation...... into the landfill in order to minimize leachate generation. In addition the cover also has to control the release of gases produced in the landfill so the gas can be ventilated, collected and utilized, or oxidized in situ. The landfill cover should also minimize erosion and support vegetation. Finally the cover...... is landscaped in order to fit into the surrounding area/environment or meet specific plans for the final use of the landfill. To fulfill the above listed requirements landfill covers are often multicomponent systems which are placed directly on top of the waste. The top cover may be placed immediately after...

  13. 17 CFR 240.12b-36 - Use of financial statements filed under other acts.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Use of financial statements... statements filed under other acts. Where copies of certified financial statements filed under other acts... manually signed or manually signed copies of the certificate shall be filed with the financial statements...

  14. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  15. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  16. 78 FR 65023 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Science.gov (United States)

    2013-10-30

    ... the Exchange, the name, address, and social security or tax identification number of any customer who... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70752; File No. SR-CBOE-2013-099] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate...

  17. 75 FR 21686 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2010-04-26

    ... to pay arbitration awards to remain in the securities industry presents regulatory risks and is...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of Proposed Rule... Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange Commission (``SEC'' or...

  18. 76 FR 22939 - Self-Regulatory Organizations; CBOE Futures Exchange, LLC; Notice of Filing and Immediate...

    Science.gov (United States)

    2011-04-25

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64153; File No. SR-CFE-2011-002] Self-Regulatory Organizations; CBOE Futures Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change Relating to Listing and Trading CBOE Gold ETF Volatility Index Security Futures...

  19. 78 FR 25128 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Amended...

    Science.gov (United States)

    2013-04-29

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69362A; File No. 600-23] Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Amended Application for Registration as a Clearing Agency; Correction AGENCY: Securities and Exchange Commission. ACTION: Notice; correction. SUMMARY...

  20. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  1. Protecting your files on the DFS file system

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The Windows Distributed File System (DFS) hosts user directories for all NICE users plus many more data.    Files can be accessed from anywhere, via a dedicated web portal (http://cern.ch/dfs). Due to the ease of access to DFS with in CERN it is of utmost importance to properly protect access to sensitive data. As the use of DFS access control mechanisms is not obvious to all users, passwords, certificates or sensitive files might get exposed. At least this happened in past to the Andrews File System (AFS) - the Linux equivalent to DFS) - and led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed recently to apply more stringent protections to all DFS user folders. The goal of this data protection policy is to assist users in pro...

  2. Protecting your files on the AFS file system

    CERN Multimedia

    2011-01-01

    The Andrew File System is a world-wide distributed file system linking hundreds of universities and organizations, including CERN. Files can be accessed from anywhere, via dedicated AFS client programs or via web interfaces that export the file contents on the web. Due to the ease of access to AFS it is of utmost importance to properly protect access to sensitive data in AFS. As the use of AFS access control mechanisms is not obvious to all users, passwords, private SSH keys or certificates have been exposed in the past. In one specific instance, this also led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed in April 2010 to apply more stringent folder protections to all AFS user folders. The goal of this data protection policy is to assist users in...

  3. Persepsi Wajib Pajak Mengenai E-Filing dan Pengaruhnya terhadap Tingkat Kepatuhan Wajib Pajak Orang Pribadi dalam Melaporkan Pajak

    OpenAIRE

    Gunawan, Teddy; Suprapti, Eny; Kurniawati, Eris Tri

    2017-01-01

    This research is aimed to examine the effect of taxpayer's perception toward e-Filing system ofindividual taxpayer's compliance in tax reporting. This research is associative research. Intaxpayer's perception there are e-Filing usefulness variable, e-Filing ease variable, e-Filingcomplexcity, e-Filing security and privacy variable and e-Filing readiness. The population of thisresearch is individual taxpayer listed in Tax Office Pratam Batu. Sampling used of this researchis convenience samplin...

  4. Armored Geomembrane Cover Engineering

    Directory of Open Access Journals (Sweden)

    Kevin Foye

    2011-06-01

    Full Text Available Geomembranes are an important component of modern engineered barriers to prevent the infiltration of stormwater and runoff into contaminated soil and rock as well as waste containment facilities—a function generally described as a geomembrane cover. This paper presents a case history involving a novel implementation of a geomembrane cover system. Due to this novelty, the design engineers needed to assemble from disparate sources the design criteria for the engineering of the cover. This paper discusses the design methodologies assembled by the engineering team. This information will aid engineers designing similar cover systems as well as environmental and public health professionals selecting site improvements that involve infiltration barriers.

  5. Percent Forest Cover (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — Forests provide economic and ecological value. High percentages of forest cover (FORPCTFuture) generally indicate healthier ecosystems and cleaner surface water....

  6. Percent Forest Cover

    Data.gov (United States)

    U.S. Environmental Protection Agency — Forests provide economic and ecological value. High percentages of forest cover (FORPCT) generally indicate healthier ecosystems and cleaner surface water. More...

  7. 19 CFR 24.5 - Filing identification number.

    Science.gov (United States)

    2010-04-01

    ... TREASURY CUSTOMS FINANCIAL AND ACCOUNTING PROCEDURE § 24.5 Filing identification number. (a) Generally..., the Social Security number. (2) If neither an Internal Revenue Service employer identification number nor a Social Security number has been assigned, the word “None” shall be written on the line provided...

  8. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  9. 17 CFR 31.8 - Cover of leverage contracts.

    Science.gov (United States)

    2010-04-01

    ... receipt for two business days: Provided, however, That the amount of physical commodities subject to such... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Cover of leverage contracts. 31.8 Section 31.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE...

  10. Analysis of BY-106 pump pit cover plate

    International Nuclear Information System (INIS)

    Coverdell, B.L.

    1994-01-01

    A new cover for the pump pit of Tank 241-BY-106 has been designed to allow the rotary core exhauster to be hooked up without requiring pit entry, riser modification, or equipment removal. The new pit cover is necessary to allow installation of two risers for reducing exposure, contamination, and waste. Computer analysis indicates that the safety margin of the pit cover plate with two risers is adequate. The computer stress model and input files are attached. The pit cover plate is a replacement for an existing plate; therefore seismic and wind loads were considered for the plate only

  11. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  12. 76 FR 2728 - Securities Investor Protection Corporation; Order Approving a Proposed Bylaw Change Relating to...

    Science.gov (United States)

    2011-01-14

    ... on SIPC Members January 10, 2011. On October 8, 2010, the Securities Investor Protection Corporation... pursuant to Section 3(e)(1) of the Securities Investor Protection Act of 1970 (``SIPA''), 15 U.S.C. 78ccc(e... SECURITIES AND EXCHANGE COMMISSION [Release No. SIPA-170; File No. SIPC-2010-01] Securities...

  13. Software For Computer-Security Audits

    Science.gov (United States)

    Arndt, Kate; Lonsford, Emily

    1994-01-01

    Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.

  14. Secure Distributed Databases Using Cryptography

    OpenAIRE

    Ion IVAN; Cristian TOMA

    2006-01-01

    The computational encryption is used intensively by different databases management systems for ensuring privacy and integrity of information that are physically stored in files. Also, the information is sent over network and is replicated on different distributed systems. It is proved that a satisfying level of security is achieved if the rows and columns of tables are encrypted independently of table or computer that sustains the data. Also, it is very important that the SQL - Structured Que...

  15. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  16. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  19. 78 FR 54720 - Registration and Financial Security Requirements for Brokers of Property and Freight Forwarders

    Science.gov (United States)

    2013-09-05

    ... trustee previously filed Forms BMC-84 or BMC-85, do I need to file a new one reflecting the new $75,000... jurisdiction must file new BMC-84 or BMC-85 forms reflecting the new minimum financial security amount of $75,000 as of October 1, 2013. FMCSA will develop new BMC forms for use by surety bonding companies and...

  20. PC Graphic file programing

    International Nuclear Information System (INIS)

    Yang, Jin Seok

    1993-04-01

    This book gives description of basic of graphic knowledge and understanding and realization of graphic file form. The first part deals with graphic with graphic data, store of graphic data and compress of data, programing language such as assembling, stack, compile and link of program and practice and debugging. The next part mentions graphic file form such as Mac paint file, GEM/IMG file, PCX file, GIF file, and TIFF file, consideration of hardware like mono screen driver and color screen driver in high speed, basic conception of dithering and conversion of formality.

  1. Covering folded shapes

    Directory of Open Access Journals (Sweden)

    Oswin Aichholzer

    2014-05-01

    Full Text Available Can folding a piece of paper flat make it larger? We explore whether a shape S must be scaled to cover a flat-folded copy of itself. We consider both single folds and arbitrary folds (continuous piecewise isometries \\(S\\to\\mathbb{R}^2\\. The underlying problem is motivated by computational origami, and is related to other covering and fixturing problems, such as Lebesgue's universal cover problem and force closure grasps. In addition to considering special shapes (squares, equilateral triangles, polygons and disks, we give upper and lower bounds on scale factors for single folds of convex objects and arbitrary folds of simply connected objects.

  2. Evapotranspiration (ET) covers.

    Science.gov (United States)

    Rock, Steve; Myers, Bill; Fiedler, Linda

    2012-01-01

    Evapotranspiration (ET) cover systems are increasingly being used at municipal solid waste (MSW) landfills, hazardous waste landfills, at industrial monofills, and at mine sites. Conventional cover systems use materials with low hydraulic permeability (barrier layers) to minimize the downward migration of water from the surface to the waste (percolation), ET cover systems use water balance components to minimize percolation. These cover systems rely on soil to capture and store precipitation until it is either transpired through vegetation or evaporated from the soil surface. Compared to conventional membrane or compacted clay cover systems, ET cover systems are expected to cost less to construct. They are often aesthetic because they employ naturalized vegetation, require less maintenance once the vegetative system is established, including eliminating mowing, and may require fewer repairs than a barrier system. All cover systems should consider the goals of the cover in terms of protectiveness, including the pathways of risk from contained material, the lifecycle of the containment system. The containment system needs to be protective of direct contact of people and animals with the waste, prevent surface and groundwater water pollution, and minimize release of airborne contaminants. While most containment strategies have been based on the dry tomb strategy of keeping waste dry, there are some sites where adding or allowing moisture to help decompose organic waste is the current plan. ET covers may work well in places where complete exclusion of precipitation is not needed. The U.S. EPA Alternative Cover Assessment Program (ACAP), USDOE, the Nuclear Regulatory Commission, and others have researched ET cover design and efficacy, including the history of their use, general considerations in their design, performance, monitoring, cost, current status, limitations on their use, and project specific examples. An on-line database has been developed with information

  3. Third party liability cover for nuclear damage and related problems

    International Nuclear Information System (INIS)

    Carbone, Ferdinando; Gambardella, Elio.

    1974-06-01

    This paper analyses the financial security and cover for third party liability for nuclear damage as provided for by Act No. 1860 of 31 December 1962 on the peaceful uses of nuclear energy. The relevant Sections of the Act are quoted and explained, as are the nuclear operator's obligation to furnish financial security for his liability. Different possible types of security and cover are described, also with reference to other national legislation. Finally, the author mentions the Paris Convention which provides the basis for Italian nuclear third party liability legislation. (NEA) [fr

  4. 31 CFR 363.9 - What does this subpart cover?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What does this subpart cover? 363.9 Section 363.9 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... cover? This subpart provides general rules governing securities held within the TreasuryDirect ® system...

  5. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  6. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  7. Security in wireless sensor networks

    CERN Document Server

    Oreku, George S

    2016-01-01

    This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

  8. Percent of Impervious Cover

    Data.gov (United States)

    U.S. Environmental Protection Agency — High amounts of impervious cover (parking lots, rooftops, roads, etc.) can increase water runoff, which may directly enter surface water. Runoff from roads often...

  9. GAP Land Cover - Image

    Data.gov (United States)

    Minnesota Department of Natural Resources — This raster dataset is a simple image of the original detailed (1-acre minimum), hierarchically organized vegetation cover map produced by computer classification of...

  10. GAP Land Cover - Vector

    Data.gov (United States)

    Minnesota Department of Natural Resources — This vector dataset is a detailed (1-acre minimum), hierarchically organized vegetation cover map produced by computer classification of combined two-season pairs of...

  11. Percent Wetland Cover

    Data.gov (United States)

    U.S. Environmental Protection Agency — Wetlands act as filters, removing or diminishing the amount of pollutants that enter surface water. Higher values for percent of wetland cover (WETLNDSPCT) may be...

  12. Percent Wetland Cover (Future)

    Data.gov (United States)

    U.S. Environmental Protection Agency — Wetlands act as filters, removing or diminishing the amount of pollutants that enter surface water. Higher values for percent of wetland cover (WETLNDSPCT) may be...

  13. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  14. Access Contested: Security, Identity, and Resistance in Asian ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-30

    Sep 30, 2011 ... Book cover Access Contested: Security, Identity, and Resistance in Asian ... examines the interplay of national security, social and ethnic identity, and ... Burmese media, and distributed-denial-of-service attacks and other ...

  15. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  16. Predicting Social Security numbers from public data

    OpenAIRE

    Acquisti, Alessandro; Gross, Ralph

    2009-01-01

    Information about an individual's place and date of birth can be exploited to predict his or her Social Security number (SSN). Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data and found that for younger cohorts the correlation allows statistical inference of private SSNs. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of per...

  17. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  18. 17 CFR 405.2 - Reports to be made by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... government securities broker or dealer shall file Part I of Form BD-Y2K (§ 249.618 of this title) prepared as..., shall file Part II of Form BD-Y2K (§ 249.618 of this title). Part II of Form BD-Y2K shall address each... registered government securities broker or dealer that was not required to file Part II of Form BD-Y2K under...

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  1. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  2. 27 CFR 73.30 - What does subpart C cover?

    Science.gov (United States)

    2010-04-01

    ...? 73.30 Section 73.30 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.30 What does subpart C cover? This subpart...

  3. 75 FR 25892 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Science.gov (United States)

    2010-05-10

    ... (Including Currencies) and Nasdaq Rule 5740 (Derivative Securities Traded Under Unlisted Trading Privileges... securities and/or any derivatives or non security components of any of the products listed and traded on the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62013; File No. SR-NYSEArca-2010-35] Self...

  4. 78 FR 21681 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change and...

    Science.gov (United States)

    2013-04-11

    ... LISTING SERVICES.'' ETPs are generally classified as either Derivative Securities Products or Structured...) average quoted spread, and (v) in the event that the security is a derivative security, the ability to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69335; File No. SR-NYSEArca-2013-34] Self...

  5. 76 FR 16844 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-03-25

    ... trading in each UTP Derivative Security contain applicable trading hours for the UTP Derivative Security... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64105; File No. SR-BX-2011-016] Self-Regulatory... Starting Time March 22, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act...

  6. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  7. SAFARI 2000 Land Cover from AVHRR, 8-km, 1984 (DeFries et al.)

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set consists of a southern African subset of the University of Maryland (UMD) 8-km Global Land Cover product in ASCII GRID and binary image files formats.

  8. SAFARI 2000 Land Cover from AVHRR, 8-km, 1984 (DeFries et al.)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: This data set consists of a southern African subset of the University of Maryland (UMD) 8-km Global Land Cover product in ASCII GRID and binary image files...

  9. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  10. Developing Scalable Information Security Systems

    Directory of Open Access Journals (Sweden)

    Valery Konstantinovich Ablekov

    2013-06-01

    Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.

  11. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  12. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  13. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  14. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  15. 78 FR 63159 - Amendment to Certification of Nebraska's Central Filing System

    Science.gov (United States)

    2013-10-23

    ..., Raspberries, Rye, Seed crops, Sheep & Lambs, Silage, Sorghum Grain, Soybeans, Squash, Strawberries, Sugar....usda.gov ). Farm products covered by a State's central filing system are also identified through the GIPSA Web site. The Nebraska central filing system covers specified farm products. We originally...

  16. Administrative requirements of financial securities to cover decommissioning operations

    International Nuclear Information System (INIS)

    Sanchez, J.L.

    1983-01-01

    This paper points out that the lack of experience in decommissioning of nuclear power plants is reflected by the absence of specific legislation regarding the economic, fiscal and accounting aspects of the process. The author suggests that a fund be created for decommissioning costs through contributions deriving from plant operation. The paper analyses the procedures to be followed and draws attention to the need for clear legislation on decommissioning. (NEA) [fr

  17. 77 FR 3590 - Covered Securities of Bats Exchange, Inc.

    Science.gov (United States)

    2012-01-25

    ... firms' incentives to list with one exchange versus another). \\78\\ It has been noted that NYSE and the...: A Theory of Cross-Listing and Endogenous Listing Standards, 82 J. Fin. Econ. 455, 456 (2006). See... exchanges (in terms of listings) will tend to be favored over smaller ones. In theory, this preference may...

  18. 77 FR 67722 - Self-Regulatory Organizations; BOX Options Exchange LLC; Notice of Filing of Proposed Minor Rule...

    Science.gov (United States)

    2012-11-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68170; File No. 4-655] Self-Regulatory Organizations; BOX Options Exchange LLC; Notice of Filing of Proposed Minor Rule Violation Plan November 6, 2012... Rule 19d-1(c)(1) of the Act \\3\\ requiring that a self- regulatory organization (``SRO'') promptly file...

  19. 78 FR 40788 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-07-08

    ... eliminate references in Sections E.1 and E.8 to ``Derivative Securities Products'' (``DSPs'') and ``Non-Derivative Securities Products'' (``Non-DSPs'') and to eliminate references in Section E.1 to ``Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69903; File No. SR-CHX-2013-12] Self-Regulatory...

  20. 78 FR 11258 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-02-15

    ....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68894; File No. SR-CHX-2013-06] Self-Regulatory...

  1. 77 FR 11179 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-02-24

    ... or less than issuers would pay at other exchanges. For instance, derivative securities products and... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66422; File No. SR-BATS-2012-010] Self... the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby...

  2. 78 FR 62842 - Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-10-22

    ... Rule 5270 defines the term ``related financial instrument'' as ``any option, derivative, security-based... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70625; File No. SR-EDGA-2013-29] Self...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...

  3. 75 FR 47049 - Self-Regulatory Organizations; National Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2010-08-04

    ... Derivative Security products under NSX Rule 15.9. Proposed Rule 11.1(c) provides for the benefit of ETP... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62601; File No. SR-NSX-2010-09] Self-Regulatory... Hours July 29, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act...

  4. 76 FR 72986 - Options Price Reporting Authority; Notice of Filing and Immediate Effectiveness of Proposed...

    Science.gov (United States)

    2011-11-28

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65795; File No. SR-OPRA-2011-04] Options Price... Implement the Datafeed Policy November 21, 2011. Pursuant to Section 11A of the Securities Exchange Act of... Options Price Reporting Authority (``OPRA'') submitted to the Securities and Exchange Commission...

  5. 76 FR 45638 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Science.gov (United States)

    2011-07-29

    ... business activities. (In the example, Dealer C may need to return the securities to Party Y depending upon... interbank securities substitutions begin to be permitted, FICC will announce this to members by important... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64955; File No. SR-FICC-2011-05] Self...

  6. 77 FR 38350 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Order...

    Science.gov (United States)

    2012-06-27

    ... Act because it helps to assure the safeguarding of securities and funds which are in its custody or... designated clearing organization; and (iii) the activity relating to the non-security clearing operations of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67232; File No. SR-CME-2012-24] Self-Regulatory...

  7. 78 FR 42579 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-07-16

    ..., contracts and transactions, and to assure the safeguarding of securities and funds which are in the custody... affect the security-based swap clearing operations of CME or any related rights or obligations of CME... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69957; File No. SR-CME-2013-10] Self-Regulatory...

  8. 78 FR 42572 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-07-16

    ... securities and funds which are in the custody or control of the clearing agency and, in general, help to...-based swap clearing operations of CME or any related rights or obligations of CME security-based swap... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69956; File No. SR-CME-2013-09] Self-Regulatory...

  9. 78 FR 67207 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-11-08

    ..., contracts, and transactions, to assure the safeguarding of securities and funds which are in the custody or... mixed swaps; and (b) does not significantly affect any securities clearing operations of CME or any... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70801; File No. SR-CME-2013-25] Self-Regulatory...

  10. 76 FR 13683 - Self-Regulatory Organizations; The Fixed Income Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2011-03-14

    ... request of The Securities Industry and Financial Markets Association (``SIFMA'') MBS Operations Committee... affect the safeguarding of securities or funds in the custody or control of FICC or for which it is... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64053; File No. SR-FICC-2011-01] Self...

  11. 78 FR 53490 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-08-29

    ... safeguarding of securities and funds which are in the custody or control of the clearing agency or for which it... operations of CME or any rights or obligations of CME with respect to securities clearing or persons using... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70247; File No. SR-CME-2013-16] Self-Regulatory...

  12. 76 FR 38245 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2011-06-29

    ... Insider Trading and Securities Fraud Enforcement Act of 1988 (``ITSFEA''),\\17\\ requires every registered... rules. \\16\\ 15 U.S.C. 78o(g). \\17\\ See Insider Trading and Securities Fraud Enforcement Act of 1988, Pub... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64736; File No. SR-FINRA-2011-028] Self...

  13. 78 FR 40792 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2013-07-08

    ...) Section 15(g) of the Act,\\17\\ adopted as part of the Insider Trading and Securities Fraud Enforcement Act...). \\18\\ See Insider Trading and Securities Fraud Enforcement Act of 1988, Pub. L. No. 100-704, 102 Stat... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69902; File No. SR-FINRA-2013-025] Self...

  14. 76 FR 45631 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2011-07-29

    ... Proposed Rule Change 1. Purpose (a) Background In light of well publicized securities frauds that resulted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64954; File No. SR-FINRA-2010-036] Self...-Case Referrals July 25, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...

  15. 75 FR 58007 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2010-09-23

    ... securities frauds that resulted in harm to investors, FINRA has reviewed its rule on arbitrator referrals and... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62930; File No. SR-FINRA-2010-036] Self... September 17, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and...

  16. 76 FR 34281 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2011-06-13

    ...-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing of Proposed Rule Change To Adopt a Risk Monitor Mechanism June 7, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of... NASDAQ Stock Market LLC (``NASDAQ'') filed with the Securities and Exchange Commission (``Commission...

  17. 75 FR 15476 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Science.gov (United States)

    2010-03-29

    ... virtually impossible in the liquid securities traded on the Exchange. \\7\\ This is similar to the method... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61756; File No. SR-NYSE-2010-24] Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate Effectiveness of...

  18. 76 FR 4141 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing of Amendment No. 1 and Order...

    Science.gov (United States)

    2011-01-24

    ... Stock Market LLC. The Exchange notes that it has found it to be difficult at times, if not impossible... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63717; File No. SR-Phlx-2010-145] Self... (``Phlx'' or the ``Exchange'') filed with the Securities and Exchange Commission (``Commission...

  19. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  20. Climate under cover

    CERN Document Server

    Takakura, Tadashi

    2002-01-01

    1.1. INTRODUCTION Plastic covering, either framed or floating, is now used worldwide to protect crops from unfavorable growing conditions, such as severe weather and insects and birds. Protected cultivation in the broad sense, including mulching, has been widely spread by the innovation of plastic films. Paper, straw, and glass were the main materials used before the era of plastics. Utilization of plastics in agriculture started in the developed countries and is now spreading to the developing countries. Early utilization of plastic was in cold regions, and plastic was mainly used for protection from the cold. Now plastic is used also for protection from wind, insects and diseases. The use of covering techniques started with a simple system such as mulching, then row covers and small tunnels were developed, and finally plastic houses. Floating mulch was an exception to this sequence: it was introduced rather recently, although it is a simple structure. New development of functional and inexpensive films trig...

  1. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  2. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  3. On Covering Approximation Subspaces

    Directory of Open Access Journals (Sweden)

    Xun Ge

    2009-06-01

    Full Text Available Let (U';C' be a subspace of a covering approximation space (U;C and X⊂U'. In this paper, we show that and B'(X⊂B(X∩U'. Also, iff (U;C has Property Multiplication. Furthermore, some connections between outer (resp. inner definable subsets in (U;C and outer (resp. inner definable subsets in (U';C' are established. These results answer a question on covering approximation subspace posed by J. Li, and are helpful to obtain further applications of Pawlak rough set theory in pattern recognition and artificial intelligence.

  4. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  5. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  7. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  8. Decay data file based on the ENSDF file

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, J. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1997-03-01

    A decay data file with the JENDL (Japanese Evaluated Nuclear Data Library) format based on the ENSDF (Evaluated Nuclear Structure Data File) file was produced as a tentative one of special purpose files of JENDL. The problem using the ENSDF file as primary source data of the JENDL decay data file is presented. (author)

  9. Security bingo for the paranoid

    CERN Multimedia

    Computer Security Team

    2011-01-01

    We have received complaints that the previous SECURITY BINGO was too easy… So, are you extremely cautious of computer security? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by October 31st 2011.   Winners[1] must show us that they follow at least five good practices in continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …encrypt all files on my computer. …have enabled Firefox’ NoScript plug-in. …will always call you back to verify your identity. …still employ a mobile phone without mail and Internet capabilities. …use multifactor authentication for logging into CERN. &h...

  10. 75 FR 33099 - Amendment to Municipal Securities Disclosure

    Science.gov (United States)

    2010-06-10

    ... delinquencies; (2) non-payment related defaults; (3) unscheduled draws on debt service reserves reflecting... to statistics assembled by the Securities Industry and Financial Markets Association (``SIFMA''), the....org/uploadedFiles/Research/Statistics/SIFMA_USMunicipalSecuritiesHolders.pdf ) (``SIFMA Report''). As...

  11. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  12. Covering tree with stars

    DEFF Research Database (Denmark)

    Baumbach, Jan; Guo, Jian-Ying; Ibragimov, Rashid

    2013-01-01

    We study the tree edit distance problem with edge deletions and edge insertions as edit operations. We reformulate a special case of this problem as Covering Tree with Stars (CTS): given a tree T and a set of stars, can we connect the stars in by adding edges between them such that the resulting ...

  13. UPIN Group File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Group Unique Physician Identifier Number (UPIN) File is the business entity file that contains the group practice UPIN and descriptive information. It does NOT...

  14. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  15. Development of Financial Security of Agro-Industrial Enterprises

    OpenAIRE

    Iryna Kryukova

    2012-01-01

    The concept of 'financial security' has been covered in the article. The theoretical basis of agro-industrial factories financial security development has been considered. In particular, the author has done an overview of different methodological approaches to determining the content of financial security and its components. The indicators of financial security of enterprise have been defined. Summing up the methodological aspects of providing business financial security the author proposes t...

  16. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  17. A File Archival System

    Science.gov (United States)

    Fanselow, J. L.; Vavrus, J. L.

    1984-01-01

    ARCH, file archival system for DEC VAX, provides for easy offline storage and retrieval of arbitrary files on DEC VAX system. System designed to eliminate situations that tie up disk space and lead to confusion when different programers develop different versions of same programs and associated files.

  18. Text File Comparator

    Science.gov (United States)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  19. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  20. Information Security and Integrity Systems

    Science.gov (United States)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  1. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  2. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  3. 76 FR 39447 - J.P. Morgan Securities LLC, et al.; Notice of Application and Temporary Order

    Science.gov (United States)

    2011-07-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29711; File No. 812-13914] J.P. Morgan... injunction entered against J.P. Morgan Securities LLC (``J.P. Morgan Securities'') on June 29, 2011 by the... order. Applicants: J.P. Morgan Securities; Bear Stearns Asset Management Inc. (``BSAM''); Bear Stearns...

  4. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  5. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  6. A novel fuzzy logic-based image steganography method to ensure medical data security.

    Science.gov (United States)

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Alternative cover design

    International Nuclear Information System (INIS)

    1988-11-01

    The special study on Alternative Cover Designs is one of several studies initiated by the US Department of Energy (DOE) in response to the proposed US Environmental Protection Agency (EPA) groundwater standards. The objective of this study is to investigate the possibility of minimizing the infiltration of precipitation through stabilized tailings piles by altering the standard design of covers currently used on the Uranium Mill Tailings Remedial Action (UMTRA) Project. Prior. to the issuance of the proposed standards, UMTRA Project piles had common design elements to meet the required criteria, the most important of which were for radon diffusion, long-term stability, erosion protection, and groundwater protection. The standard pile covers consisted of three distinct layers. From top to bottom they were: rock for erosion protection; a sand bedding layer; and the radon barrier, usually consisting of a clayey sand material, which also functioned to limit infiltration into the tailings. The piles generally had topslopes from 2 to 4 percent and sideslopes of 20 percent

  8. 2 CFR 180.215 - Which nonprocurement transactions are not covered transactions?

    Science.gov (United States)

    2010-01-01

    ... individual's present responsibility (but benefits received in an individual's business capacity are not excepted). For example, if a person receives social security benefits under the Supplemental Security Income provisions of the Social Security Act, 42 U.S.C. 1301 et seq., those benefits are not covered...

  9. 22 CFR 208.215 - Which nonprocurement transactions are not covered transactions?

    Science.gov (United States)

    2010-04-01

    ... individual's present responsibility (but benefits received in an individual's business capacity are not excepted). For example, if a person receives social security benefits under the Supplemental Security Income provisions of the Social Security Act, 42 U.S.C. 1301 et seq., those benefits are not covered...

  10. 21 CFR 1404.215 - Which nonprocurement transactions are not covered transactions?

    Science.gov (United States)

    2010-04-01

    ... individual's present responsibility (but benefits received in an individual's business capacity are not excepted). For example, if a person receives social security benefits under the Supplemental Security Income provisions of the Social Security Act, 42 U.S.C. 1301 et seq., those benefits are not covered...

  11. 34 CFR 85.215 - Which nonprocurement transactions are not covered transactions?

    Science.gov (United States)

    2010-07-01

    ... individual's present responsibility (but benefits received in an individual's business capacity are not excepted). For example, if a person receives social security benefits under the Supplemental Security Income provisions of the Social Security Act, 42 U.S.C. 1301 et seq., those benefits are not covered...

  12. 22 CFR 1006.215 - Which nonprocurement transactions are not covered transactions?

    Science.gov (United States)

    2010-04-01

    ... individual's present responsibility (but benefits received in an individual's business capacity are not excepted). For example, if a person receives social security benefits under the Supplemental Security Income provisions of the Social Security Act, 42 U.S.C. 1301 et seq., those benefits are not covered...

  13. 22 CFR 1508.215 - Which nonprocurement transactions are not covered transactions?

    Science.gov (United States)

    2010-04-01

    ... individual's present responsibility (but benefits received in an individual's business capacity are not excepted). For example, if a person receives social security benefits under the Supplemental Security Income provisions of the Social Security Act, 42 U.S.C. 1301 et seq., those benefits are not covered...

  14. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  15. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  16. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  17. 76 FR 61438 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Proposed Rule...

    Science.gov (United States)

    2011-10-04

    ... clarify that 2102(e) applies to trading halts in new derivative securities, so as to not be confused with... derivative securities products when a temporary interruption occurs in the calculation or wide dissemination... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65425; File No. SR-ISE-2011-61] Self-Regulatory...

  18. 77 FR 24752 - Self-Regulatory Organizations; EDGA Exchange, Inc.; EDGX Exchange, Inc.; International Securities...

    Science.gov (United States)

    2012-04-25

    ... Securities Holdings, Inc. (``ISE Holdings'') to a newly formed Swiss corporation, Eurex Global Derivatives AG... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66834; File Nos. SR-EDGA-2012-08; SR-EDGX-2012....; International Securities Exchange, LLC; Order Granting Approval of Proposed Rule Change Relating to a Corporate...

  19. 76 FR 2737 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2011-01-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63668; File No. SR-NSCC-2010-09] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change... Facility January 6, 2011. I. Introduction On August 30, 2010, the National Securities Clearing Corporation...

  20. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  1. 76 FR 51075 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval to...

    Science.gov (United States)

    2011-08-17

    ... Organizations; International Securities Exchange, LLC; Order Granting Approval to a Proposed Rule Change Relating to Appointments to Competitive Market Makers August 11, 2011. I. Introduction On June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities...

  2. 76 FR 64980 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2011-10-19

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65548; File No. SR-ISE-2011-39] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders October 13, 2011. I. Introduction On July 1, 2011, the International Securities Exchange...

  3. 77 FR 4852 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2012-01-31

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66234; File No. SR-ISE-2011-82] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Legging Orders January 25, 2012. I. Introduction On November 29, 2011, the International Securities...

  4. Security for small computer systems a practical guide for users

    CERN Document Server

    Saddington, Tricia

    1988-01-01

    Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the security and threats, and Chapter 2 covers the physical aspect of computer security. The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. The last chapter tackles security management from an organizational perspective. The bo

  5. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  6. Covering tree with stars

    DEFF Research Database (Denmark)

    Baumbach, Jan; Guo, Jiong; Ibragimov, Rashid

    2015-01-01

    We study the tree edit distance problem with edge deletions and edge insertions as edit operations. We reformulate a special case of this problem as Covering Tree with Stars (CTS): given a tree T and a set of stars, can we connect the stars in by adding edges between them such that the resulting...... tree is isomorphic to T? We prove that in the general setting, CST is NP-complete, which implies that the tree edit distance considered here is also NP-hard, even when both input trees having diameters bounded by 10. We also show that, when the number of distinct stars is bounded by a constant k, CTS...

  7. Alternate cover materials

    International Nuclear Information System (INIS)

    1988-09-01

    As an effort to enhance compliance with the proposed US Environmental Protection Agency (EPA) groundwater standards, several special studies are being performed by the Technical Assistance Contractor (TAC) to identify and evaluate various design features that may reduce groundwater-related releases from tailings piles. The objective of this special study is to assess the suitability of using alternate cover materials (other than geomembranes) as infiltration barriers in Uranium Mill Tailings Remedial Action (UMTRA) Project piles to minimize leachate generation. The materials evaluated in this study include various types of asphalts, concretes, and a sodium bentonite clay/polypropylene liner system

  8. Use of WebDAV to Support a Virtual File System in a Coalition Environment

    National Research Council Canada - National Science Library

    Bradney, Jeremiah A

    2006-01-01

    .... By enabling the use of WebDAV in MYSEA, this thesis provides a means for fulfilling the above requirement for secure remote access by creating a virtual web-based file system accessible from the MYSEA MLS network...

  9. 78 FR 140 - Self-Regulatory Organizations; The Options Clearing Corporation; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-01-02

    ...\\ thereunder so that the proposal was effective upon filing with the Commission. The Commission is publishing... initial Delivery Orders (``DO'') for a variety of reasons (e.g., DK, wrong quantity, wrong security, wrong...

  10. RRB's SVES Input File - Post Entitlement State Verification and Exchange System (PSSVES)

    Data.gov (United States)

    Social Security Administration — Several PSSVES request files are transmitted to SSA each year for processing in the State Verification and Exchange System (SVES). This is a first step in obtaining...

  11. Competitive Cyber-Insurance and Internet Security

    Science.gov (United States)

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  12. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  13. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  14. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  15. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  16. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  17. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  18. Outsourcing as a Mean of Service for Security Provision

    Directory of Open Access Journals (Sweden)

    D.I. Persanov

    2012-03-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion.

  19. 78 FR 37865 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-06-24

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69793; File No. SR-BATS-2013-034] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. June 18, 2013. Pursuant to Section 19(b)(1) of the...

  20. 76 FR 50803 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-08-16

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65085; File No. SR-BATS-2011-025] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. August 10, 2011. Pursuant to Section 19(b)(1) of...

  1. 75 FR 27847 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2010-05-18

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62074; File No. SR-BATS-2010-012] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. May 11, 2010. Pursuant to Section 19(b)(1) of the...

  2. 78 FR 77736 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-12-24

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71129; File No. SR-BATS-2013-062] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Modify BATS Options Market Maker Continuous Quoting Obligation Rules December 18, 2013...

  3. 76 FR 57092 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-09-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65307; File No. SR-BATS-2011-034] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Offer a Bulk-Quoting Interface To All Users of BATS Options September 9, 2011. Pursuant to...

  4. 77 FR 58195 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-09-19

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67855; File No. SR-BATS-2012-037] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. September 13, 2012. Pursuant to Section 19(b)(1) of...

  5. 76 FR 12155 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-03-04

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63969; File No. SR-BATS-2011-007] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change by BATS Exchange, Inc. to Adopt BATS Rule 11.21, entitled ``Input of Accurate Information...

  6. 78 FR 61422 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-10-03

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70548; File No. SR-BATS-2013-052] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Modify the Trading Halt Rule of BATS Options September 27, 2013. Pursuant to Section 19...

  7. 78 FR 51261 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-08-20

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70190; File No. SR-BATS-2013-042] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. August 14, 2013. Pursuant to Section 19(b)(1) of...

  8. 78 FR 78460 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-12-26

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71140; File No. SR-BATS-2013-063] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. December 19, 2013. Pursuant to Section 19(b)(1) of...

  9. 78 FR 53814 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-08-30

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70257; File No. SR-BATS-2013-047] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change Related to Registration and Continuing Education Fees for BATS Exchange, Inc. August 26...

  10. 77 FR 20858 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-04-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66723; File No. SR-BATS-2012-014] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend the Certificate of Incorporation of BATS Global Markets, Inc. April 3, 2012...

  11. 76 FR 9841 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-02-22

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63916; File No. SR-BATS-2011-005] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend BATS Rule 11.13, Entitled ``Order Execution'' February 15, 2011. Pursuant to Section 19(b...

  12. 77 FR 63396 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-10-16

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68026; File No. SR-BATS-2012-040] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. October 10, 2012. Pursuant to Section 19(b)(1) of...

  13. 77 FR 7216 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-02-10

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66327; File No. SR-BATS-2012-008] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. February 6, 2012. Pursuant to Section 19(b...

  14. 76 FR 61127 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-10-03

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65407; File No. SR-BATS-2011-037] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. September 27, 2011. Pursuant to Section 19(b)(1) of...

  15. 76 FR 28108 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-05-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64445; File No. SR-BATS-2011-017] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Add BATS Rule 11.22, Entitled ``Data Products'' May 9, 2011. Pursuant to Section 19(b)(1) of...

  16. 76 FR 70192 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-11-10

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65694; File No. SR-BATS-2011-046] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. November 4, 2011. Pursuant to Section 19(b)(1) of...

  17. 78 FR 16306 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-03-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69079; File No. SR-BATS-2013-017] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. March 8, 2013. Pursuant to Section 19(b)(1) of the...

  18. 76 FR 77576 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-12-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65907; File No. SR-BATS-2011-049] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. December 7, 2011. Pursuant to Section 19(b...

  19. 76 FR 1208 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-01-07

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63630; File No. SR-BATS-2010-039] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. January 3, 2011. Pursuant to Section 19(b)(1) of...

  20. 76 FR 2734 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-01-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63663; File No. SR-BATS-2011-001] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. January 6, 2011. Pursuant to Section 19(b)(1) of...

  1. 78 FR 56760 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-09-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70348; File No. SR-BATS-2013-048) Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. September 9, 2013. Pursuant to Section 19(b)(1) of...

  2. 78 FR 19555 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-04-01

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69238; File No. SR-BATS-2013-020] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. March 26, 2013. Pursuant to Section 19(b)(1) of the...

  3. 78 FR 16750 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-03-18

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69121; File No. SR-BATS-2013-014] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Modify the Operation of Market Orders for BATS Options March 12, 2013. Pursuant to Section 19(b...

  4. 75 FR 57097 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2010-09-17

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62901; File No. SR-BATS-2010-024] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Adopt BATS Rule 2.12, Entitled ``BATS Trading, Inc. as Inbound Router'' and To Make Related...

  5. 76 FR 7891 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2011-02-11

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63857; File No. SR-BATS-2011-004] Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Fees for Use of BATS Exchange, Inc. February 7, 2011. Pursuant to Section 19(b)(1) of...

  6. 76 FR 78325 - Self-Regulatory Organizations; NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Science.gov (United States)

    2011-12-16

    ...-Regulatory Organizations; NASDAQ Stock Market LLC; Notice of Filing and Immediate Effectiveness of a Proposed... November 30, 2011. The NASDAQ Stock Market LLC (``NASDAQ'' or ``Exchange'') filed with the Securities and... Change The NASDAQ Stock Market LLC proposes to amend Rule 7056 entitled ``NASDAQ Options Fee Disputes...

  7. 12 CFR 563g.21 - Filing of copies of offering circulars in certain exempt offerings.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Filing of copies of offering circulars in certain exempt offerings. 563g.21 Section 563g.21 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.21 Filing of copies of offering circulars in certain...

  8. 17 CFR 210.3-13 - Filing of other financial statements in certain cases.

    Science.gov (United States)

    2010-04-01

    ... EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933... Financial Statements § 210.3-13 Filing of other financial statements in certain cases. The Commission may... investors, permit the omission of one or more of the financial statements herein required or the filing in...

  9. 78 FR 8657 - Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-02-06

    ... (February 22, 2012) (SR-EDGA-2012- 05) (adopting EdgeBook Cloud service); see also, Securities Exchange Act...Book Cloud service). C. Self-Regulatory Organization's Statement on Comments on the Proposed Rule... its intent to file the proposed rule change at least five business days prior to the date of filing of...

  10. 77 FR 56243 - Options Price Reporting Authority; Notice of Filing and Immediate Effectiveness of Proposed...

    Science.gov (United States)

    2012-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67791; File No. SR-OPRA-2012-05] Options Price Reporting Authority; Notice of Filing and Immediate Effectiveness of Proposed Amendment to the Plan for...'') \\1\\ and Rule 608 thereunder,\\2\\ notice is hereby given that on August 27, 2012, the Options Price...

  11. 76 FR 56246 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2011-09-12

    ... Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule..., 2011, the Chicago Stock Exchange, Inc. (``CHX'' or ``Exchange'') filed with the Securities and Exchange... methodology is less subject to manipulation and will allow the Exchange to recoup some of the costs of...

  12. 76 FR 29018 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Order...

    Science.gov (United States)

    2011-05-19

    ... Participant's required deposit being fixed by FICC in accordance with formulas as specified in the Rules...-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Order Granting Accelerated..., the Fixed Income Clearing Corporation (``FICC'') filed with the Securities and Exchange Commission...

  13. 78 FR 51242 - Self-Regulatory Organizations; Topaz Exchange, LLC; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-08-20

    ... themselves as participants on another. It is virtually impossible for any exchange to identify, and thus... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70200; File No. SR-Topaz-2013-01] Self-Regulatory Organizations; Topaz Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule...

  14. 17 CFR 270.24b-3 - Sales literature deemed filed.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Sales literature deemed filed... (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.24b-3 Sales literature deemed filed. Any advertisement, pamphlet, circular, form letter or other sales literature addressed to or intended...

  15. 76 FR 50796 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2011-08-16

    ...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Increase the Position Limit for Options on the Standard and Poor's... Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange Commission...

  16. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  17. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  19. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  1. Internet Safety and Security Surveys - A Review

    DEFF Research Database (Denmark)

    Sharp, Robin

    This report gives a review of investigations into Internet safety and security over the last 10 years. The review covers a number of surveys of Internet usage, of Internet security in general, and of Internet users' awareness of issues related to safety and security. The focus and approach...... of the various surveys is considered, and is related to more general proposals for investigating the issues involved. A variety of proposals for how to improve levels of Internet safety and security are also described, and they are reviewed in the light of studies of motivational factors which affect the degree...

  2. Secure Distributed Databases Using Cryptography

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2006-01-01

    Full Text Available The computational encryption is used intensively by different databases management systems for ensuring privacy and integrity of information that are physically stored in files. Also, the information is sent over network and is replicated on different distributed systems. It is proved that a satisfying level of security is achieved if the rows and columns of tables are encrypted independently of table or computer that sustains the data. Also, it is very important that the SQL - Structured Query Language query requests and responses to be encrypted over the network connection between the client and databases server. All this techniques and methods must be implemented by the databases administrators, designer and developers in a consistent security policy.

  3. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  4. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  5. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  6. National Land Cover Database (NLCD) Land Cover Collection

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The National Land Cover Database (NLCD) Land Cover Collection is produced through a cooperative project conducted by the Multi-Resolution Land Characteristics (MRLC)...

  7. 78 FR 55769 - North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading

    Science.gov (United States)

    2013-09-11

    ... SECURITIES AND EXCHANGE COMMISSION North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading September 6, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of North China Horticulture, Inc...

  8. 76 FR 30418 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2011-05-25

    ... organization could not trade in an index-based or derivative security (e.g., a right or warrant) that is quoted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64522; File No. SR-NYSE-2011-22] Self... Premises in Certain OTC Bulletin Board and OTC Markets Securities May 19, 2011. Pursuant to Section 19(b)(1...

  9. 78 FR 69503 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change, As...

    Science.gov (United States)

    2013-11-19

    ... price or formula. \\10\\ Structured notes are derivative securities for which the amount of principal... security or market. The Fund will only enter into transactions in derivative instruments with... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70871; File No. SR-NYSEArca-2013-118] Self...

  10. 78 FR 38777 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-06-27

    ... market and to protect investors (Rule 3100(a)(2)); a halt in a Derivative Securities Product (as defined... Release No. 67091 (May 31, 2012), 77 FR 33498 (June 6, 2012). a trading halt in a Derivative Security... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69817; File No. SR-Phlx-2013-66] Self...

  11. 77 FR 76326 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List...

    Science.gov (United States)

    2012-12-27

    ... its investment objective. The Fund will not invest in derivative securities including options, swaps... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68488; File No. SR-NYSEArca-2012-14] Self... Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (``Act'' or ``Exchange Act'') \\2\\ and Rule 19b...

  12. 77 FR 71020 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Science.gov (United States)

    2012-11-28

    ... Products with that of derivative securities products, like ETFs, that are listed on the Exchange. In this regard, the Exchange believes that derivative securities products and Structured Products share certain... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68280; File No. SR-NYSEArca-2012-127] Self...

  13. 76 FR 14702 - Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by NASDAQ OMX PHLX LLC To...

    Science.gov (United States)

    2011-03-17

    ... and other derivative securities. As of December 31, 2010, the following were characteristics of the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64075; File No. SR-Phlx-2011-28] Self... and Traded March 11, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act...

  14. 78 FR 57909 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-09-20

    ... Products and Trust Issued Receipts under its fee schedule for Derivative Securities Products, which is the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70418; File No. SR-NASDAQ-2013-115] Self.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\, and Rule 19b-4...

  15. 76 FR 20775 - Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by NASDAQ OMX PHLX LLC To...

    Science.gov (United States)

    2011-04-13

    ... funds, preferred stocks, rights, warrants, units and other derivative securities. As of December 31... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64244; File No. SR-Phlx-2011-46] Self... Traded April 7, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1...

  16. 78 FR 29187 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-05-17

    ... disseminated as required (Rule 4120(a)(9)); a halt in a Derivative Securities Product (as defined in Rule 4120... trading halt in a Derivative Security Product traded pursuant to unlisted trading privileges for which a... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69563; File No. SR-NASDAQ-2013-073] Self...

  17. 78 FR 38747 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2013-06-27

    ... 4120(a)(8)); A halt in a Derivative Securities Product (as defined in Rule 4120(b)(4)(A)) for which a..., 2012), 77 FR 33498 (June 6, 2012). A trading halt in a Derivative Security Product traded pursuant to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69818; File No. SR-BX-2013-041] Self-Regulatory...

  18. 76 FR 25389 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2011-05-04

    ... advised by the Regulatory and Clearance Committee of the Securities Operations Section of SIFMA that...: ``Entities holding securities in custody should employ accounting practices and safekeeping procedures that... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64360; File No. SR-DTC-2011-05] Self-Regulatory...

  19. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  20. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  1. 76 FR 62092 - Filing Procedures

    Science.gov (United States)

    2011-10-06

    ... INTERNATIONAL TRADE COMMISSION Filing Procedures AGENCY: International Trade Commission. ACTION: Notice of issuance of Handbook on Filing Procedures. SUMMARY: The United States International Trade Commission (``Commission'') is issuing a Handbook on Filing Procedures to replace its Handbook on Electronic...

  2. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  3. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  4. The story of the social security number.

    Science.gov (United States)

    Puckett, Carolyn

    2009-01-01

    The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.

  5. Additional Security Considerations for Grid Management

    Science.gov (United States)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  6. Allegheny County Land Cover Areas

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The Land Cover dataset demarcates 14 land cover types by area; such as Residential, Commercial, Industrial, Forest, Agriculture, etc. If viewing this description on...

  7. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  8. 8 CFR 208.4 - Filing the application.

    Science.gov (United States)

    2010-01-01

    ... Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS PROCEDURES FOR ASYLUM AND... interview, or an immigration judge, in a hearing, shall review the application and give the applicant the opportunity to present any relevant and useful information bearing on any prohibitions on filing to determine...

  9. China's energy security and strategic choices

    International Nuclear Information System (INIS)

    Pellistrandi, J.

    2010-01-01

    Considering the present day international political and economical situation, China's energy security covers five important aspects: energy supplies security, energy prices security, environment security with respect to energy consumption, energy transport security, R and D security in the domain of energy resources exploration, exploitation and utilisation. Considering the above-mentioned aspects, China's strategic choices should include five major goals: counting on its own energy resources and giving priority to energy saving, participating to the international competition and implementing a national strategic reserves system, readjusting the energy consumption structure and promoting environment protection by developing nuclear energy, harmonizing China's relations with some countries and avoiding political and military conflicts, increasing investment in energy R and D, in particular in clean coal, nuclear, automotive, renewable energy and energy saving technologies. (J.S.)

  10. On approximating restricted cycle covers

    NARCIS (Netherlands)

    Manthey, Bodo

    2008-01-01

    A cycle cover of a graph is a set of cycles such that every vertex is part of exactly one cycle. An $L$-cycle cover is a cycle cover in which the length of every cycle is in the set $L$. The weight of a cycle cover of an edge-weighted graph is the sum of the weights of its edges. We come close to

  11. 26 CFR 1.1092(c)-1 - Qualified covered calls.

    Science.gov (United States)

    2010-04-01

    ... lowest qualified benchmark is determined using the adjusted applicable stock price, as defined in § 1... (CONTINUED) INCOME TAXES Wash Sales of Stock Or Securities § 1.1092(c)-1 Qualified covered calls. (a) In.... Under section 1092(d)(3)(B)(i)(I), stock is personal property if the stock is part of a straddle that...

  12. 31 CFR 344.0 - What does this part cover?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What does this part cover? 344.0 Section 344.0 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... from any eligible source of funds (as defined in § 344.1). (b) What types of SLGS securities are...

  13. FHEO Filed Cases

    Data.gov (United States)

    Department of Housing and Urban Development — The dataset is a list of all the Title VIII fair housing cases filed by FHEO from 1/1/2007 - 12/31/2012 including the case number, case name, filing date, state and...

  14. Combination of advanced encryption standard 256 bits with md5 to secure documents on android smartphone

    Science.gov (United States)

    Pasaribu, Hendra; Sitanggang, Delima; Rizki Damanik, Rudolfo; Rudianto Sitompul, Alex Chandra

    2018-04-01

    File transfer by using a smartphone has some security issues like data theft by irresponsible parties. To improve the quality of data security systems on smartphones, in this research the integration of AES 256 bit algorithm by using MD5 hashing is proposed. The use of MD5 aims to increase the key strength of the encryption and decryption process of document files. The test results show that the proposed method can increase the key strength of the encryption and decryption process in the document file. Encryption and decryption time by using AES and MD5 combination is faster than using AES only on *.txt file type and reverse results for *.docx, *.xlsx, *.pptx and *.pdf file files.

  15. Gainesville's urban forest canopy cover

    Science.gov (United States)

    Francisco Escobedo; Jennifer A. Seitz; Wayne Zipperer

    2009-01-01

    Ecosystem benefits from trees are linked directly to the amount of healthy urban forest canopy cover. Urban forest cover is dynamic and changes over time due to factors such as urban development, windstorms, tree removals, and growth. The amount of a city's canopy cover depends on its land use, climate, and people's preferences. This fact sheet examines how...

  16. Yearly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016 Onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from federal...

  17. Yearly Data for Spoken Language Preferences of Supplemental Security Income (Blind & Disabled) (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  18. Yearly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2011-Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year 2011...

  19. Yearly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  20. Yearly Data for Asian & Pacific Islander Language Preferences of Supplemental Security Income Aged Applicants (2016 Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for API language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year...

  1. Quarterly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits for fiscal years 2014 -...

  2. CCNA Security Study Guide, Exam 640-553

    CERN Document Server

    Boyles, Tim

    2010-01-01

    A complete study guide for the new CCNA Security certification exam. In keeping with its status as the leading publisher of CCNA study guides, Sybex introduces the complete guide to the new CCNA security exam. The CCNA Security certification is the first step towards Cisco's new Cisco Certified Security Professional (CCSP) and Cisco Certified Internetworking Engineer-Security. With a foreword by CCNA networking authority Todd Lammle, CCNA Security Study Guide fully covers every exam objective. The companion CD includes the Sybex Test Engine, flashcards, and a PDF of the book.: The CCNA Securit

  3. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  4. Authenticated Secure Container System (ASCS)

    International Nuclear Information System (INIS)

    1991-01-01

    Sandia National Laboratories developed an Authenticated Secure Container System (ASCS) for the International Atomic Energy Agency (IAEA). Agency standard weights and safeguards samples can be stored in the ASCS to provide continuity of knowledge. The ASCS consists of an optically clear cover, a base containing the Authenticated Item Monitoring System (AIMS) transmitter, and the AIMS receiver unit for data collection. The ASCS will provide the Inspector with information concerning the status of the system, during a surveillance period, such as state of health, tampering attempts, and movement of the container system. The secure container is located inside a Glove Box with the receiver located remotely from the Glove Box. AIMS technology uses rf transmission from the secure container to the receiver to provide a record of state of health and tampering. The data is stored in the receiver for analysis by the Inspector during a future inspection visit. 2 refs

  5. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  6. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  7. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  8. Versatile Endpoint Storage Security with Trusted Integrity Modules

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    2014-01-01

    . To counter such threats, and to remain trustworthy, personal devices should enforce storage security. State-of-the-art storage security solutions rely on hardware protected encryption. They cannot be deployed, as such, on personal devices either because they require additional hardware (e.g., NetApp’s Safe...... system and applications, that guarantee the durability, confidentiality and integrity of a configurable subset of the filesystem data and meta-data. While, we detail our design with the Linux virtual file system, we expect that our results can be applied to a range of different file systems. As Trusted...

  9. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  10. Data backup security in cloud storage system

    OpenAIRE

    Атаян, Борис Геннадьевич; Национальный политехнический университет Армении; Багдасарян, Татевик Араевна; Национальный политехнический университет Армении

    2016-01-01

    Cloud backup system is proposed, which provides means for effective creation, secure storage and restore of backups inCloud. For data archiving new efficient SGBP file format is being used in the system, which is based on DEFLATE compressionalgorithm. Proposed format provides means for fast archive creation, which can contain significant amounts of data. Modernapproaches of backup archive protection are described in the paper. Also the SGBP format is compared to heavily used ZIP format(both Z...

  11. 78 FR 10671 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing of...

    Science.gov (United States)

    2013-02-14

    ... customer bases of potential product users and they have indicated a preference that premium pricing for... market participants clarity as to the minimum pricing increments for mini-options, the filing would harmonize penny pricing between mini-options and standard options on the same security. \\3\\ See Securities...

  12. 75 FR 53998 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Science.gov (United States)

    2010-09-02

    ... characteristics and risks of security futures. \\6\\ 15 U.S.C. 78o-3(b)(6). B. Self-Regulatory Organization's...-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Security Futures Risk Disclosure Statement August 27, 2010...

  13. 75 FR 47666 - Self-Regulatory Organizations; National Futures Association; Notice of Filing and Immediate...

    Science.gov (United States)

    2010-08-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62624; File No. SR-NFA-2010-02] Self-Regulatory... Interpretive Notice Entitled ``NFA Compliance Rule 2-30(b): Risk Disclosure Statement for Security Futures... President and General Counsel, NFA, dated July 26, 2010. I. Self-Regulatory Organization's Description of...

  14. 17 CFR 17.02 - Form, manner and time of filing reports.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Form, manner and time of filing reports. 17.02 Section 17.02 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... markets located in that time zone, and central time for information concerning all other markets. (b...

  15. 20 CFR 404.630 - Use of date of written statement as filing date.

    Science.gov (United States)

    2010-04-01

    ... data on the Internet Social Security Benefit Application to us, we will use the date of the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Use of date of written statement as filing date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  16. 76 FR 62100 - Approval of Filing Fees for Exempt Reporting Advisers and Private Fund Advisers

    Science.gov (United States)

    2011-10-06

    ... fund assets, combined liquidity fund and registered money market fund assets or private equity fund... Fees for Exempt Reporting Advisers and Private Fund Advisers AGENCY: Securities and Exchange Commission... fund advisers filing Form PF. SUMMARY: The Securities and Exchange Commission (``Commission'') is...

  17. 76 FR 9067 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Science.gov (United States)

    2011-02-16

    ... Exchange Rule 1014(b) as a regular member or a foreign currency options participant of the Exchange located... Securities Exchange, LLC's (``ISE'') Schedule of Fees, specifically ISE's Select Symbols and the rates... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63880; File No. SR-Phlx-2011-12] Self...

  18. 78 FR 28666 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing of...

    Science.gov (United States)

    2013-05-15

    ... operations and their ability to sustain in the event something should effects its business. The Exchange is... nature of the TPH's business) to ensure prompt and accurate processing of securities transaction which... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69537; File No. SR-CBOE-2013-045] Self...

  19. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  20. Cryptonite: A Secure and Performant Data Repository on Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2012-06-29

    Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using a StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.