WorldWideScience

Sample records for secure group formation

  1. Formation of nuclear security culture in Ukraine

    International Nuclear Information System (INIS)

    Gavrilyuk, V.Yi.; Gavrilyuk-Burakova, A.V.; Drapej, S.S.; Parkhomenko, V.V.; Proskuryin, D.V.; Romanova, O.P.

    2014-01-01

    Issues of nuclear security culture formation are considered in the article. Information on establishing and activity of Working Group for formation and development of nuclear security culture being held during 2010 - 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is illustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development

  2. Formation of nuclear security culture in Ukraine

    Directory of Open Access Journals (Sweden)

    V. I. Gavryliuk

    2014-06-01

    Full Text Available Issues of nuclear security culture formation are considered in the article. Information on establishing and ac-tivity of Working Group for formation and development of nuclear security culture being held during 2010 – 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is il-lustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development.

  3. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  4. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  5. Factors of Formation of the tax Potential of the Securities Market

    Directory of Open Access Journals (Sweden)

    Gumenniy Anatoliy A.

    2014-02-01

    Full Text Available The article is devoted to the problems of identification of factors that influence volumes and dynamics of the tax potential of the securities market. The goal of the article is detection and systematisation of factors of formation and realisation of the tax potential of the securities market. In the result of the conducted study it systemises factors of formation and realisation of the tax potential of the securities market by two groups: economic and legislatory organisational. The main of the economic factors are: state of economic development, degree of the shadow economy, level of savings of the population, level of trust of the population and level of inflation. The article justifies interconnection that exist between the said factors and volumes of the tax potential of the securities market. In particular, it proves that increase of volumes of the shadow economy facilitates reduction of the tax potential of the securities market, since it facilitates outflow of capital from the official sector of economy. Growth of unorganised savings of the population, the volume of which grows proportionally to the growth of the level of distrust of the population to the securities market, has a negative impact on formation of the tax potential of the securities market. Degree of the negative impact of the said factors grows in the event of deterioration of the state of the macro-economic situation and growth of inflation. The legislatory organisational factors are: object, base, rates of taxation of securities trading and the securities market infrastructure. The article proves that low level of infrastructure development could significantly reduce the tax potential of the securities market. The proposed approach to the study of factors of formation of the tax potential gives a possibility to mark out, apart from de-shadowing of operations and expansion of the taxation base, one more direction on increase of the tax potential of the securities market

  6. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing......Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task; as such systems may be operated very frequently, at a quick pace, and at times in emergency situations. Understandably, clinicians hold extra unproductive tasks in low regard...... wireless sensors to be both secure and usable by exploring different solutions on a fully functional prototype platform. In this paper, we present an Elliptic Curve Cryptography (ECC) based protocol, which offers fully secure sensor set-up in a few seconds on standard (Telos) hardware. We evaluate...

  7. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  8. Food security: what the community wants. Learning through focus groups.

    Science.gov (United States)

    Hargrove, D; Dewolfe, J A; Thompson, L

    1994-01-01

    We used focus groups to learn the range of issues threatening food security of low income residents in our community. Five major themes emerged from the discussions: literacy, money, time, mental health and self-esteem, suggesting several approaches that could help ensure food security: 1) education, 2) sharing of resources, 3) coalition building, and 4) advocacy. Education programs have to be practical, allowing for demonstrations and hands-on learning while emphasizing skill building and problem solving. Incorporating a social aspect into learning may compensate for the social isolation and would capitalize on the impressive mutual support we witnessed. Strategies based on self-help and peer assistance may counteract low self-esteem and overcome suspicion of health professionals. A community-wide effort is needed to address the factors contributing to food insecurity. We envision the formation of a coalition of professionals, agencies, and low income people to develop a comprehensive strategy for achieving food security.

  9. FORMATION OF FINANCIAL SECURITY OF THE ENTERPRISE BASED ON STRATEGIC PLANNING

    Directory of Open Access Journals (Sweden)

    Nadiya Rushchyshyn

    2017-09-01

    Full Text Available The purpose of the study is to improve ways of forming financial security of the enterprise based onstrategic planning. The subject of the research: formation of financial security of the enterprise on the basis of strategicplanning. The methodological background of the research is a set of theoretical and general scientific methods:analysis and synthesis, theoretical and logical generalization, grouping, abstraction, and others. The paper providesa general description of the core approaches defining the concept of “financial security of the enterprise”. Functionalgoals of financial security of the enterprise are outlined, namely: ensuring financial stability and independence;achievement of high competitiveness in the market of goods, works, services; ensuring high efficiency of financialand economic activity; ensuring high liquidity of assets, and increasing the market value of the enterprise; supportfor the appropriate level of business activity and image; formation of information security and commercialsecrets; efficient organization of security of share capital and assets of the enterprise. The scheme of organizationof financial security organization is considered based on strategic planning. It is determined that the strategicplanning results in strategic plan (strategy for ensuring the financial security of the enterprise. Such a strategyshould be consistent with both financial and the company’s overall strategies, as well as main goals and objectives.For the most effective implementation of the chosen financial security strategy at the enterprise, it is expedientto develop and implement a system of plans covering all aspects of the strategic planning process, including thetarget program, strategic, tactical, calendar, and individual plans. The system of plans should specify: the purpose ofchanges in the functioning of internal systems of the enterprise; terms of making changes; the work that needs tobe done to make changes; their

  10. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  11. Security Provision and Political Formation in Hybrid Orders

    Directory of Open Access Journals (Sweden)

    Michael Lawrence

    2017-08-01

    Full Text Available The security sector reform literature is increasingly turning towards the inclusion of non-state security providers, but the long-term patterns of political development to which such engagement might contribute remain underexplored. This article thus provides several lenses with which to understand the relationship between non-state security provision and political development. It first presents three perspectives (functionalism, political economy, and communitarianism with which to understand the nature and behavior of non-state security providers. Second, it outlines five possible long-term trajectories of political formation and the role of non-state security providers in each. These discussions highlight the idea of hybridity, and the remainder of the paper argues that the concept can be usefully applied in (at least two ways. The third section proposes that hybridity can help overcome longstanding but misleading conceptual binaries, while the fourth rearticulates hybridity as a dynamic developmental process – 'hybridization' – that can be contrasted with security politics as the underlying logic by which security providers (both state and non-state interact and change over time.

  12. Designing for informed group formation

    DEFF Research Database (Denmark)

    Nicolajsen, Hanne Westh; Juel Jacobsen, Alice; Riis, Marianne

    2012-01-01

    A new design ―project preparation‖ preparing for the group formation in problem based project work is proposed and investigated. The main problem is to overcome group formation based on existing relations. The hypothesis is that theme development and group formation are somewhat counterproductive...

  13. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing...

  14. Integrating security in a group oriented distributed system

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  15. Designing for informed group formation

    DEFF Research Database (Denmark)

    Nicolajsen, Hanne Westh; Juel Jacobsen, Alice; Riis, Marianne

    2012-01-01

    A new design ―project preparation‖ preparing for the group formation in problem based project work is proposed and investigated. The main problem is to overcome group formation based on existing relations. The hypothesis is that theme development and group formation are somewhat counterproductive....... Following research based design methodology an experiment separating the two was initiated.This was to provide for more openness and creativity in contrast to a design in which existing relations seem predominant....

  16. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  17. Authentic leadership, group cohesion and group identification in security and emergency teams.

    Science.gov (United States)

    García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio

    2015-01-01

    Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.

  18. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  19. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  20. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    Directory of Open Access Journals (Sweden)

    Ali Abdul Kadir Ali

    2015-07-01

    Full Text Available This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security refers to the general safety of inhabitants and the protection of human rights. This paper compares the security situation in so-called ‘rebel-held’ areas of Syria where alternative governance structures have emerged, examining the security approaches of Local Administrative Councils and Rebel Councils in Deir Azzor, Manbij, Dera, and areas dominated by the Kurdish Democratic Union Party (PYD. It argues that security and safety are strongly influenced by authority formation and the nature of deals and relationships involved in the formation of these nascent authorities. It also argues that security in these areas is strongly influenced by the Syrian government, which disrupts collectives that threaten its own collective security while giving limited support to those which serve its agenda of retaining power. It also demonstrates the limited utility of the ‘regime’ vs. ‘rebel-held’ dichotomy, as rebel groups at times must accommodate the Syrian state in limited ways for instrumental purposes. The article is based on fieldwork conducted in Turkey in 2013–2014, interviews conducted in 2015, and secondary sources based on field research.

  1. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  2. Consensus formation on coevolving networks: groups' formation and structure

    International Nuclear Information System (INIS)

    Kozma, Balazs; Barrat, Alain

    2008-01-01

    We study the effect of adaptivity on a social model of opinion dynamics and consensus formation. We analyse how the adaptivity of the network of contacts between agents to the underlying social dynamics affects the size and topological properties of groups and the convergence time to the stable final state. We find that, while on static networks these properties are determined by percolation phenomena, on adaptive networks the rewiring process leads to different behaviors: adaptive rewiring fosters group formation by enhancing communication between agents of similar opinion, though it also makes possible the division of clusters. We show how the convergence time is determined by the characteristic time of link rearrangement. We finally investigate how the adaptivity yields nontrivial correlations between the internal topology and the size of the groups of agreeing agents

  3. The Poverty of Population and its Impact on Formation of Food Security

    Directory of Open Access Journals (Sweden)

    Pchelianska Halyna O.

    2017-08-01

    Full Text Available The article is aimed at studying the causes of poverty, its negative manifestations, identifying the impact of poverty, determining its impact on food security, and finding ways to overcome it. It has been determined that the structural causes of poverty are considered to be the general macroeconomic and political living conditions of population. The individual approach implies that human poverty is influenced by both the subjective (family, education, skills, job availability or absence and the institutional factors. The author characterizes the economic, social, and political consequences of poverty, their impact on food security. The impact of structural factors on the level of poverty in Ukraine was analyzed. The article explores the level of poverty in different categories of households, i.e.: households in rural and urban areas, with and without children. It has been proven that the level of poverty affects the formation of household food security. The main directions for overcoming poverty and improving food security have been proposed.

  4. Socio-philosophical preconditions of formation of the concept of security in protosociology

    Directory of Open Access Journals (Sweden)

    L. V. Kalashnikova

    2016-08-01

    The development of the theory of security is impossible without taking into account the foundations of social and philosophical heritage in this area, which is often out of sight of researchers. Socio-philosophical prerequisites of security concept creates the necessary conditions for the formation of general ideas about it as an objective reality, the study of which with the use of scientific and special methods of knowledge allows us to formulate the basic laws, scientific system of safety management principles that will ensure the safe existence of the person, the effective functioning of society and the state.

  5. Group formation in early clinical project

    DEFF Research Database (Denmark)

    Østergaard, Gert Værge

    Research shows that getting involved is a key aspect of learning, and a way of getting involved is through study groups [1]. Forming groups are always a theme that is discussed, both amongst faculty and students. There is a different approach at different semesters regarding this formation...

  6. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  7. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  8. Fixed geometric formation structure in formation control problem for group of robots with dynamically changing number of robots in the group

    Directory of Open Access Journals (Sweden)

    N. S. Morozova

    2015-01-01

    Full Text Available The article considers a problem of the decentralization-based approach to formation control of a group of agents, which simulate mobile autonomous robots. The agents use only local information limited by the covering range of their sensors. The agents have to build and maintain the formation, which fits to the defined target geometric formation structure with desired accuracy during the movement to the target point. At any point in time the number of agents in the group can change unexpectedly (for example, as a result of the agent failure or if a new agent joins the group.The aim of the article is to provide the base control rule, which solves the formation control problem, and to develop its modifications, which provide the correct behavior in case the agent number in the group is not equal to the size of the target geometric formation structure. The proposed base control rule, developed by the author, uses the method of involving virtual leaders. The coordinates of the virtual leaders and also the priority to follow the specific leader are calculated by each agent itself according to specific rules.The following results are presented in the article: the base control rule for solving the formation control problem, its modifications for the cases when the number of agents is greater/less than the size of the target geometric formation structure and also the computer modeling results proving the efficiency of the modified control rules. The specific feature of the control rule, developed by the author, is that each agent itself calculates the virtual leaders and each agent performs dynamic choice of the place within the formation (there is no predefined one-to-one relation between agents and places within the geometric formation structure. The results, provided in this article, can be used in robotics for developing control algorithms for the tasks, which require preserving specific relational positions among the agents while moving. One of the

  9. 26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation...

  10. Security of Gas Supply in the Countries of the Visegrád Group

    Directory of Open Access Journals (Sweden)

    Michał Tarnawski

    2015-12-01

    Full Text Available In spite of efforts on the part of the European Union to promote renewable sources of energy, conventional resources such as oil, natural gas and coal still dominate in individual EU energy mixes. With the rising costs of resources, their uneven distribution and limited supply, each state is busy trying to ensure its energy security. Secure and stable supply of energy resources has becoming the main preoccupation, especially in the countries of Central and Eastern Europe. Over the recent years, the Visegrád Group states have made particularly intensive efforts to ensure their supply of natural gas. The unstable political situation in the east of Europe as well as changes in natural gas markets (shale gas revolution in the USA, increased importance of LNG gave rise to new challenges when it comes to ensuring gas security, but also new opportunities to become independent of eastern imports. It is precisely the fact of being dependent on natural gas imported from Russia that determines the situation of Visegrád Group states. The present paper tries to analyse the situation in Poland, the Czech Republic, Slovakia and Hungary in terms of security of their natural gas supply.

  11. EU-US standards harmonization task group report : feedback to standards development organizations - security

    Science.gov (United States)

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  12. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    Cotton, J.

    1991-01-01

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  13. The formation of group norms in computer-mediated communication

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    The formation of group norms in computer-mediated communication (CMC) was examined among students who used e-mail as part of a course. A network analysis of group structures revealed that (a) content and form of communication is normative, group norms defining communication patterns within groups,

  14. Field-based description of rhyolite lava flows of the Calico Hills Formation, Nevada National Security Site, Nevada

    Science.gov (United States)

    Sweetkind, Donald S.; Bova, Shiera C.

    2015-01-01

    Contaminants introduced into the subsurface of Pahute Mesa, Nevada National Security Site, by underground nuclear testing are of concern to the U.S. Department of Energy and regulators responsible for protecting human health and safety. The potential for contaminant movement away from the underground test areas at Pahute Mesa and into the accessible environment is greatest by groundwater transport through fractured volcanic rocks. The 12.9 Ma (mega-annums, million years) Calico Hills Formation, which consists of a mixture of rhyolite lava flows and intercalated nonwelded and bedded tuff and pyroclastic flow deposits, occurs in two areas of the Nevada National Security Site. One area is north of the Rainier Mesa caldera, buried beneath Pahute Mesa, and serves as a heterogeneous volcanic-rock aquifer but is only available to study through drilling and is not described in this report. A second accumulation of the formation is south of the Rainier Mesa caldera and is exposed in outcrop along the western boundary of the Nevada National Security Site at the Calico Hills near Yucca Mountain. These outcrops expose in three dimensions an interlayered sequence of tuff and lava flows similar to those intercepted in the subsurface beneath Pahute Mesa. Field description and geologic mapping of these exposures described lithostratigraphic variations within lava flows and assisted in, or at least corroborated, conceptualization of the rhyolite lava-bearing parts of the formation.

  15. Confidence- and security-building in South-East Asia. Working group II

    International Nuclear Information System (INIS)

    Alagappa, M.

    1991-01-01

    Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures

  16. SOCIAL CAPITAL AS THE BASIS FOR THE FORMATION OF SOCIO-ECONOMIC SECURITY IN RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Andrii Sukhostavets

    2017-09-01

    Full Text Available Social capital is the basis for the definition of the future concept of rural areas management. Therefore, one of the most important tasks is to determine the various factors of existence, development, and formation of social capital. One of these factors is the security of rural areas and the definition of how social capital affects it. The analysis of the available scientific works in various areas reveals the lack of consensus in the definition of the category “socio-economic security of rural areas”. This is due to the fact that the definition of social and economic security of rural areas is identified with such concepts as the ability to provide resistance to various internal and external environmental influences. The purpose of the study is to determine the nature of social capital, as well as to study its impact on the socio-economic security of the state. The methodology of the research is based on the monographic method, the method of dialectic cognition, the scenario methods used to find the optimal scenario implementation option; SWOT-analysis is used to assess the positive or negative impact of social capital on the socio-economic security of rural areas. Understanding the essence of socio-economic security has led to the conclusion that it consists of economic, social, environmental and other types of security. The term “social security” in the understanding of researchers usually has two interpretations: traditional (absence of threats to the society and alternative (absence of threats from the society. It is proved that the social security of the region should be focused on ensuring primarily human rights and freedoms, namely, personal, political, social, economic, cultural, environmental, and family ones. Social and economic security should also provide social standards and guarantees, as well as norms. The economic basis of the security of rural areas is manifested in the development of market relations, infrastructure

  17. The system of Collective Security of the Russian Federation in the format of CSTO and preconditions of its creation

    Directory of Open Access Journals (Sweden)

    Gontar Sergey Mikhailovich

    2013-11-01

    Full Text Available The article deals with the essence of the security of the States included in the Collective Security Treaty Organization. The author gives the definition to the system of collective security in the CSTO. The main intergovernmental bodies of the Organization and the structure of the forces and means of the CSTO collective security system are outlined. The author enumerates the main sources of a military threat and threats to the national security of the Russian Federation arising at the turn of the XXI century, as well as peculiarities of their arising and development. The prerequisites for a system of collective security of the Russian Federation in the format of CSTO are identified. On the basis of the conducted research the author proposes the basic directions of activity of the Russian leadership in the field of development of the CSTO as an integral part of Eurasian security.

  18. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  19. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  20. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  1. Eocene Yegua Formation (Claiborne group) and Jackson group lignite deposits of Texas

    Science.gov (United States)

    Hook, Robert W.; Warwick, Peter D.; Swanson, Sharon M.; Hackley, Paul C.; Warwick, Peter D.; Karlsen, Alexander K.; Merrill, Matthew D.; Valentine, Brett J.

    2011-01-01

    The lignite deposits within the upper Eocene Yegua Formation (Claiborne Group) and the overlying Jackson Group are among the coal resources that were not quantitatively assessed as part of the U.S. Geological Survey's (USGS) National Coal Resource Assessment (NCRA) program in the Gulf Coastal Plain coal province. In the past, these lignite-bearing stratigraphic units often have been evaluated together because of their geographic and stratigraphic proximity (Fisher, 1963; Kaiser, 1974; Kaiser et al., 1980; Jackson and Garner, 1982; Kaiser, 1996) (Figures 1, 2). The term “Yegua-Jackson trend“ is used informally herein for the lignite-bearing outcrops of these Late Eocene deposits in Texas. Lignite beds in the Yegua-Jackson trend generally are higher both in ash yield and sulfur content than those of the underlying Wilcox Group (Figure 2). Recent studies (Senkayi et al., 1987; Ruppert et al., 1994; Warwick et al., 1996, 1997) have shown that some lignite beds within the Yegua-Jackson trend contain partings of volcanic ash and host elevated levels of trace elements that have been identified as potentially hazardous air pollutants (HAPs) in the United States Clean Air Amendments of 1990. Lignite beds within the Yegua Formation are thin (less than or equal to 6 ft) and laterally discontinuous in comparison with most Wilcox Group deposits (Ayers, 1989a); in contrast, the Jackson Group lignite beds range up to 12 ft in total thickness and are relatively continuous laterally, extending nearly 32 mi along strike.

  2. Asynchronous Group Key Distribution on top of the CC2420 Security Mechanisms for Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    2009-01-01

    scheme with no time synchronization requirements. The scheme decreases the number of key updates by providing them on an as needed basis according to the amount of network traffic. We evaluate the CC2420 radio security mechanism and show how to use it as a basis to implement secure group communication......A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They often are deployed in hostile environments...... creating a demand for encryption and authentication of the messages sent between them. Due to severe resource constraints on the sensor nodes, efficient key distribution schemes and secure communication protocols with low overhead are desired. In this paper we present an asynchronous group key distribution...

  3. An Ontology Engineering Approach to the Realization of Theory-Driven Group Formation

    Science.gov (United States)

    Isotani, Seiji; Inaba, Akiko; Ikeda, Mitsuru; Mizoguchi, Riichiro

    2009-01-01

    One of the main difficulties during the design of collaborative learning activities is adequate group formation. In any type of collaboration, group formation plays a critical role in the learners' acceptance of group activities, as well as the success of the collaborative learning process. Nevertheless, to propose both an effective and…

  4. Group Supervision in Psychotherapy. Main Findings from a Swedish Research Project on Psychotherapy Supervision in a Group Format

    Science.gov (United States)

    Ogren, Marie-Louise; Sundin, Eva C.

    2009-01-01

    Psychotherapy supervision is considered crucial for psychotherapists in training. During the last decades, group supervision has been a frequently used format in many countries. Until recently, very few studies had evaluated the small-group format for training of beginner psychotherapists and psychotherapy supervisors. This article aims to…

  5. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  6. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  7. Format of medical order sheet improves security of antibiotics prescription: The experience of an intensive care unit.

    Science.gov (United States)

    Wasserfallen, Jean-Blaise; Bütschi, Anne-Joëlle; Muff, Patrik; Biollaz, Jérôme; Schaller, Marie-Denise; Pannatier, André; Revelly, Jean-Pierre; Chiolero, René

    2004-03-01

    To assess whether formatting the medical order sheet has an effect on the accuracy and security of antibiotics prescription. Prospective assessment of antibiotics prescription over time, before and after the intervention, in comparison with a control ward. The medical and surgical intensive care unit (ICU) of a university hospital. All patients hospitalized in the medical or surgical ICU between February 1 and April 30, 1997, and July 1 and August 31, 2000, for whom antibiotics were prescribed. Formatting of the medical order sheet in the surgical ICU in 1998. Compliance with the American Society of Hospital Pharmacists' criteria for prescription safety was measured. The proportion of safe orders increased in both units, but the increase was 4.6 times greater in the surgical ICU (66% vs. 74% in the medical ICU and 48% vs. 74% in the surgical ICU). For unsafe orders, the proportion of ambiguous orders decreased by half in the medical ICU (9% vs. 17%) and nearly disappeared in the surgical ICU (1% vs. 30%). The only missing criterion remaining in the surgical ICU was the drug dose unit, which could not be preformatted. The aim of antibiotics prescription (either prophylactic or therapeutic) was indicated only in 51% of the order sheets. Formatting of the order sheet markedly increased security of antibiotics prescription. These findings must be confirmed in other settings and with different drug classes. Formatting the medical order sheet decreases the potential for prescribing errors before full computerized prescription is available.

  8. Stepfamily Education: Benefits of a Group-Formatted Intervention

    Science.gov (United States)

    Skogrand, Linda; Torres, Eliza; Higginbotham, Brian J.

    2010-01-01

    This program evaluation was conducted by interviewing 40 low-income participants in a relationship education (RE) program for stepfamilies to determine specific benefits of a group-formatted intervention. The benefits that were most often identified were learning from others and having personal stepfamily challenges normalized. Participants also…

  9. A nitrous acid biosynthetic pathway for diazo group formation in bacteria.

    Science.gov (United States)

    Sugai, Yoshinori; Katsuyama, Yohei; Ohnishi, Yasuo

    2016-02-01

    Although some diazo compounds have bioactivities of medicinal interest, little is known about diazo group formation in nature. Here we describe an unprecedented nitrous acid biosynthetic pathway responsible for the formation of a diazo group in the biosynthesis of the ortho-diazoquinone secondary metabolite cremeomycin in Streptomyces cremeus. This finding provides important insights into the biosynthetic pathways not only for diazo compounds but also for other naturally occurring compounds containing nitrogen-nitrogen bonds.

  10. Government's role in power supply security. A working group report

    International Nuclear Information System (INIS)

    2004-01-01

    The working group was to analyse the Government's role in terms of improving the security of supply of the electricity market in exceptionally difficult capacity situations and to make propositions for the ways of arranging a tendering procedure concerning security of supply and capacity control, so as to meet the requirements of the EC Energy Internal Market Directives after 1 July 2004. The Working Group considers that there is no need at this stage to introduce a separate new system intended as a supplement to technical reserves in Finland. Such a system would not bring new capacity for the use of the power system, and in the case of existing capacity, production would only be transferred from one market to another. However, the situation may change from this, if there occur such factors on the market that aim to raise the market price of electricity or if it turned out that reserve power plants would be decommissioned on a large scale. The working group proposes that such a provision be added to the Electricity Market Act that would oblige the electricity supplier to notify the Energy Market Authority of a planned service outage of a power plant of at least 100 MVA producing electricity separately, which would fall within the time period 1 December - 28 February. The Energy Market Authority would be vested with the powers to postpone the outage due to a tight output situation, if there are not technical or safety- bound obstacles to this. It is important for the sufficiency of the power need of the Internal Market that the price signals of the market are reflected to both producers and consumers of electricity. The working group further proposes that the Ministry of Trade and Industry would look into development of the meter-reading requirements, so that they would, for their part, create the conditions for price flexibility in power consumption and for new sales products of electricity. In addition, tightening of the hourly metering requirement related to the

  11. A New Group-Formation Method for Student Projects

    Science.gov (United States)

    Borges, Jose; Dias, Teresa Galvao; Cunha, Joao Falcao E.

    2009-01-01

    In BSc/MSc engineering programmes at Faculty of Engineering of the University of Porto (FEUP), the need to provide students with teamwork experiences close to a real world environment was identified as an important issue. A new group-formation method that aims to provide an enriching teamwork experience is proposed. Students are asked to answer a…

  12. solving the cell formation problem in group technology

    Directory of Open Access Journals (Sweden)

    Prafulla Joglekar

    2001-01-01

    Full Text Available Over the last three decades, numerous algorithms have been proposed to solve the work-cell formation problem. For practicing manufacturing managers it would be nice to know as to which algorithm would be most effective and efficient for their specific situation. While several studies have attempted to fulfill this need, most have not resulted in any definitive recommendations and a better methodology of evaluation of cell formation algorithms is urgently needed. Prima facie, the methodology underlying Miltenburg and Zhang's (M&Z (1991 evaluation of nine well-known cell formation algorithms seems very promising. The primary performance measure proposed by M&Z effectively captures the objectives of a good solution to a cell formation problem and is worthy of use in future studies. Unfortunately, a critical review of M&Z's methodology also reveals certain important flaws in M&Z's methodology. For example, M&Z may not have duplicated each algorithm precisely as the developer(s of that algorithm intended. Second, M&Z's misrepresent Chandrasekharan and Rajagopalan's [C&R's] (1986 grouping efficiency measure. Third, M&Z's secondary performance measures lead them to unnecessarily ambivalent results. Fourth, several of M&Z's empirical conclusions can be theoretically deduced. It is hoped that future evaluations of cell formation algorithms will benefit from both the strengths and weaknesses of M&Z's work.

  13. Meteorological Support Interface Control Working Group (MSICWG) Instrumentation, Data Format, and Networks Document

    Science.gov (United States)

    Brenton, James; Roberts, Barry C.

    2017-01-01

    The purpose of this document is to provide an overview of instrumentation discussed at the Meteorological Interface Control Working Group (MSICWG), a reference for data formats currently used by members of the group, a summary of proposed formats for future use by the group, an overview of the data networks of the group's members. This document will be updated as new systems are introduced, old systems are retired, and when the MSICWG community necessitates a change to the formats. The MSICWG consists of personnel from the National Aeronautics and Space Administration (NASA) Kennedy Space Center (KSC), NASA Marshall Space Flight Center (MSFC), NASA Johnson Space Center (JSC), National Oceanic and Atmospheric Administration National Weather Service Spaceflight Meteorology Group (SMG), and the United States Air Force (USAF) 45th Space Wing and Weather Squadron. The purpose of the group is to coordinate the distribution of weather related data to support NASA space launch related activities.

  14. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  15. Acritarchs of the Ediacaran Frecheirinha Formation, Ubajara Group, Northeastern Brazil

    Directory of Open Access Journals (Sweden)

    Leticia Chiglino

    2015-06-01

    Full Text Available We report for the first time the occurrence of organic-walled microfossils in Ediacaran limestones and marls of the Frecheirinha Formation, Ubajara Group, and the first Precambrian acritarchs so far reported for northeastern Brazil. The assemblage of the Frecheirinha Formation represents a low-diversity microflora comprising Leiosphaeridia, Lophosphaeridium and subordinated Bavlinella (=Sphaerocongregus. Their thermal alteration index (TAI between 4+ and 5, suggests metamorphic temperatures exceeding 200-250°C. Higher temperatures are probably related to intruding granitic plutons (Meruoca, Mucambo. Reported δ13C values of carbonates of -3.5 ‰ VPDB (Vienna-Peedee Belemnite at the base, passing up section into a positive plateau of up to +3.7 ‰, and corresponding 87Sr/86Sr values between 0.7075 and 0.7080 suggest an Ediacaran age. The acritarch assemblage is comparable to the Late Ediacaran Leiosphere Palynoflora (LELP or Kotlin-Rovno assemblage, in broad agreement with chemostratigraphic data. Macrofossils belonging to the Ediacara fauna were reported from the overlying Jaibaras Group, which would constrain even further the depositional age of the Frecheirinha Formation to within ca. 575-555 Ma. A more comprehensive palynological study of the Frecheirinha Formation is necessary to confirm this age assignment.

  16. Conseptual framework of ensuring food security in the Ural federal district

    Directory of Open Access Journals (Sweden)

    Aleksandr Samvelovich Beletskiy

    2011-12-01

    Full Text Available The paper reviews the risks and threats to food security of the Ural Federal District which can significantly reduce its the level. The most significant risks are grouped according to the following classification: macroeconomic, technological, climatic, agro-ecological and foreign trade risks. The main directions of economic policy of the Ural Federal District in the area of food security are defined. Particular attention is paid to the improvement of economic and physical availability of food for all groups of population and to the problems of formation of the state material reserves and food safety. Strategic development priorities in the field of agricultural and fishery products, raw materials and food, sustainable development of rural areas in the field of foreign policy are formulated. Conceptual bases for the implementation mechanism of economic policies to ensure food security in the region are suggested.

  17. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  18. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  19. Risk-matching behavior in microcredit group formation: evidence from northern Ethiopia

    NARCIS (Netherlands)

    Berhane Tesfay, G.; Gardebroek, C.; Moll, H.A.J.

    2009-01-01

    Theoretical models on group lending assume the formation of groups of homogenous risk types. Recent theoretical and empirical findings challenge this view arguing that when markets for insurance are missing, risk homogeneity may not hold any more and risk heterogeneity can be the optimal outcome.

  20. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  1. Experimental and Kinetic Investigation of the Influence of OH Groups on NOX Formation

    KAUST Repository

    Bohon, Myles

    2016-05-04

    This work investigates the influence of one or more OH groups present on the fuel molecule and the resultant formation of NOX emissions. Combustion of oxygenated fuels has been increasing globally and such fuels offer significant potential in the reduction of pollutant emissions. One such emission class is the oxides of nitrogen, which typically form through a combination of two regimes: the thermal and non-thermal mechanisms. While thermal NO formation can be reduced by lowering the combustion temperature, non-thermal NO formation is coupled to the fuel chemistry. An experimental and computational investigation of NOX formation in three different burner configurations and under a range of equivalence ratios and temperature regimes explored the differences in NO formation. Measurements of temperature profiles and in-flame species concentrations, utilizing both probed and non-intrusive laser based techniques, allowed for the investigation of NO formation through non-thermal pathways and the differences that exist between fuels with varying numbers of OH groups. The first burner configuration was composed of a high swirl liquid spray burner with insulted combustion chamber walls designed specifically for the combustion of low energy density fuels. In this system the combustion of alcohols and glycerol (the largest by-product of biodiesel production), along with other fuels with multiple hydroxyl groups, was studied. Measurements of the mean flame temperature and exhaust gas measurements of NOX showed significant reductions in non-thermal NO concentrations with increasing numbers of OH groups. An accompanying modeling study and detailed reaction path analysis showed that fuel decomposition pathways through formaldehyde were shown a preference due to the presence of the OH groups which resulted in reduced contributions to the hydrocarbon radical pools subsequent reductions to the Prompt NO mechanism. Two burner configurations with reduced dimensionality facilitated

  2. Network formation under heterogeneous costs: The multiple group model

    NARCIS (Netherlands)

    Kamphorst, J.J.A.; van der Laan, G.

    2007-01-01

    It is widely recognized that the shape of networks influences both individual and aggregate behavior. This raises the question which types of networks are likely to arise. In this paper we investigate a model of network formation, where players are divided into groups and the costs of a link between

  3. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  4. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  5. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  6. The Theoretical Aspects of the Security of Human Development

    OpenAIRE

    Markova Natalia S.; Demyanenko Alina A.

    2017-01-01

    The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethink...

  7. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  8. Security Measures in Data Mining

    OpenAIRE

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  9. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  10. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  11. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  12. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  13. New polymers containing BF2-benzoylacetonate groups. Synthesis, luminescence, excimer and exciplex formation

    International Nuclear Information System (INIS)

    Fedorenko, Elena V.; Mirochnik, Anatolii G.; Beloliptsev, Anton Yu.

    2017-01-01

    In the present study, a new synthetic method for the functionalization of polystyrene (PS) and (styrene-methyl methacrylate) copolymer has been developed. Using the new method, polymers containing BF 2 -benzoylacetonate groups have been obtained through double acylation by acetic anhydride with boron trifluoride. Luminescence of the produced polymers in solutions and films has been studied. Quantum yields of polymer solution luminescence are significantly higher than those of the low-molecular-weight analog – boron difluoride benzoylacetonate. For the polymer, in which styrene fragments are separated by methyl methacrylate groups, at low concentrations of the polymer in solution one observes the monomer luminescence of BF 2 -benzoylacetonate groups, while at high concentrations – the excimer luminescence. In case of PS-based polymers, in which BF 2 -benzoylacetonate groups and phenyl rings are not separated, in diluted solutions one observes the fluorescence of the intramolecular exciplexes, while at the concentration increase – the luminescence of intermolecular exciplexes. The ability of excimer formation is responsible for the increased photostability of the produced polymers. - Highlights: •Polymers containing BF 2 -benzoylacetonate groups have been synthesized. •Luminescence of the produced polymers in solutions and films has been studied. •Formation of excimers and exciplexes in solution has been revealed. •Formation of excimers in films increases their photostability.

  14. Star Formation Histories of Local Group Dwarf Galaxies. (Ludwig Biermann Award Lecture 1996)

    Science.gov (United States)

    Grebel, E. K.

    The star formation histories of dwarf galaxies in the Local Group are reviewed. First the question of Local Group membership is considered based on various criteria. The properties of 31 (36) galaxies are consistent with likely (potential) Local Group membership. To study the star formation histories of these galaxies, a multi-parameter problem needs to be solved: Ages, metallicities, population fractions, and spatial variations must be determined, which depend crucially on the knowledge of reddening and distance. The basic methods for studying resolvable stellar populations are summarized. One method is demonstrated using the Fornax dwarf spheroidal galaxy. A comprehensive compilation of the star formation histories of dwarf irregulars, dwarf ellipticals, and dwarf spheroidals in the Local Group is presented and visualized through Hodge's population boxes. All galaxies appear to have differing fractions of old and intermediate-age populations, and those sufficiently massive and undisturbed to retain and recycle their gas are still forming stars today. Star formation has occurred either in distinct episodes or continuously over long periods of time. Metallicities and enrichment vary widely. Constraints on merger and remnant scenarios are discussed, and a unified picture based on the current knowledge is presented. Primary goals for future observations are: accurate age determinations based on turnoff photometry, detection of subpopulations distinct in age, metallicity, and/or spatial distribution; improved distances; and astrometric studies to derive orbits and constrain past and future interactions.

  15. Query translation for XPath-based security views

    NARCIS (Netherlands)

    Vercammen, R.; Hidders, A.J.H.; Paredaens, J.; Grust, T.; Hopfner, H.; Illarramendi, A.

    2006-01-01

    Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restricting access to data by certain users. This can, for example, be achieved by means of access rules or XML security views, which

  16. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  18. Community Savings Groups, Financial Security, and HIV Risk Among Female Sex Workers in Iringa, Tanzania.

    Science.gov (United States)

    Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna

    2018-02-24

    This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.

  19. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  20. Development of Innovative Component for the Region’s Economic Security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2017-12-01

    Full Text Available This article studies the development of innovative component for the region’s economic security. The hypothesis of the study is that in the context of globalization and development of network society, innovation is becoming one of the key elements ensuring the economic security of a region. We considered the relationship between the concepts of sustainable development and economic security. The authors show that currently, the economic security of the country directly depends on its place within the innovation chain. We substantiate that Russian Federation and its regions need to shift to the innovation development based on strengthening its own sources for long-term growth. The paper considers the basic theoretical and methodological problems in the formation of innovation component of the Russian regions’ economic security. We reveal the major essence and elements of the innovative component of the sustainable economic development of the region. The authors show that the formation of the innovative component of the region’s economic security demands the correlation of the strategy of regional innovation development and the production and technological type of territory. Additionally, this strategy should correlate with the desirable ways of production type transformation in the future, considering the trends of the world economy. We have highlighted the production and technological types of Russian regions as well as identified the features of relevant regional components for the innovation system of the Russian Federation to ensure sustainable development. The study defines the priority directions and goals for the development of economic security innovative component in the Russian regions. The authors’ calculations allowed to select a group of territorial subjects of the Russian Federation, which appear to be the most promising for the development of innovative activities for the elaboration of export-oriented high-tech industries

  1. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  2. Stimulation of Changes, Collective Commitment and The Patterns of Group Formation in Community Development in South Sulawesi

    Science.gov (United States)

    Saleh, Syafiuddin

    2018-05-01

    This study aims to examine the pattern of group formation, related to the stimulation of change through the empowerment of farmers and poor fishermen The pattern of group formation is the basis for sustainable development. The research method used is qualitative descriptive method and relevant research type such as case study and triangulasi. The results of the study showed that (1) stimulation of changes made through development programs or community empowerment in the areas studied both among farm households and poor fishermen households for some programs received positive response from farmers and fishermen. However, the collective commitment to the breeding is relatively weak, since the group formed in each program is not done through good planning and concepts. (2) there are two patterns of group formation that are natural and formed formations initiated by outsiders. Groups that are naturally formed are more institutionalized and have characteristics such as intense and relatively routine interaction, strong mutual trust, and have a common form or mechanism shared for common purposes. The group can form the basis for sustainable development in improving the welfare of the poor.

  3. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    OpenAIRE

    Ali, Ali Abdul Kadir

    2015-01-01

    This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security re...

  4. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  5. Group Formation Based on Learning Styles: Can It Improve Students' Teamwork?

    Science.gov (United States)

    Kyprianidou, Maria; Demetriadis, Stavros; Tsiatsos, Thrasyvoulos; Pombortsis, Andreas

    2012-01-01

    This work explores the impact of teacher-led heterogeneous group formation on students' teamwork, based on students' learning styles. Fifty senior university students participated in a project-based course with two key organizational features: first, a web system (PEGASUS) was developed to help students identify their learning styles and…

  6. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    Science.gov (United States)

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  7. FOREIGN EXPERIENCE OF THE FORMATION OF INFORMATION SECURITY CULTURE IN SOCIETY

    Directory of Open Access Journals (Sweden)

    A. A. Malyuk

    2016-12-01

    Full Text Available In the context of ever increasing information dependence of all spheres of activity of the company reliability and dependability of information and communication technologies (ICT, quality of information, which is used by members of the information society, saving secrets is of paramount importance. Users must trust all information services they use. Otherwise, the consequences for society and each individual can be simply disastrous. Thus, one of the main problems of the development of the information society is to ensure the information security of the individual, society and state. In order to successfully resist the flow of threats and challenges, each member of the information society must have a certain minimum knowledge, culture and appropriate information to be prepared for an active struggle for the purity of the various types of ICT cyber-hawks, cybercriminals, cyber-terrorists and just cyber-bullies. At the same time, as shown by statistics and sociological research, while rapidly increasing the level of the use of global information and communication networks the level of information literacy of users and their information culture is extremely low. Only about 10 percent of people are more or less aware of the dangers they face while working on the Internet, or they (unwillingly is subjected to its correspondents. Thus, today the key issue of the Information Society becomes the formation of information culture of users and, above all, raising their awareness in this area. Analysis of approaches and expertise to solve this problem (especially overseas is the subject of this article. The conceptual and substantive plans for the material of the article is based on a UN General Assembly resolution that approved in December 2002 the principles of formation of global culture of cybersecurity

  8. TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.

  9. Alliance group formation: enabling and constraining effects of embeddedness and social capital in strategic technology alliance networks

    NARCIS (Netherlands)

    Duysters, G.M.; Lemmens, C.E.A.V.

    2003-01-01

    The role of embeddedness and social capital in the process of alliance group formation in strategic technology alliance networks is examined. In particular, the social mechanisms that enable and enforce alliance group formation is studies. It is argued that the enabling effect of embeddedness during

  10. New polymers containing BF{sub 2}-benzoylacetonate groups. Synthesis, luminescence, excimer and exciplex formation

    Energy Technology Data Exchange (ETDEWEB)

    Fedorenko, Elena V., E-mail: gev@ich.dvo.ru [Institute of Chemistry, Far Eastern Branch of the Russian Academy of Sciences, 159, Prosp. 100 letiya Vladivostoka, Vladivostok 690022 (Russian Federation); Mirochnik, Anatolii G.; Beloliptsev, Anton Yu. [Institute of Chemistry, Far Eastern Branch of the Russian Academy of Sciences, 159, Prosp. 100 letiya Vladivostoka, Vladivostok 690022 (Russian Federation)

    2017-05-15

    In the present study, a new synthetic method for the functionalization of polystyrene (PS) and (styrene-methyl methacrylate) copolymer has been developed. Using the new method, polymers containing BF{sub 2}-benzoylacetonate groups have been obtained through double acylation by acetic anhydride with boron trifluoride. Luminescence of the produced polymers in solutions and films has been studied. Quantum yields of polymer solution luminescence are significantly higher than those of the low-molecular-weight analog – boron difluoride benzoylacetonate. For the polymer, in which styrene fragments are separated by methyl methacrylate groups, at low concentrations of the polymer in solution one observes the monomer luminescence of BF{sub 2}-benzoylacetonate groups, while at high concentrations – the excimer luminescence. In case of PS-based polymers, in which BF{sub 2}-benzoylacetonate groups and phenyl rings are not separated, in diluted solutions one observes the fluorescence of the intramolecular exciplexes, while at the concentration increase – the luminescence of intermolecular exciplexes. The ability of excimer formation is responsible for the increased photostability of the produced polymers. - Highlights: •Polymers containing BF{sub 2}-benzoylacetonate groups have been synthesized. •Luminescence of the produced polymers in solutions and films has been studied. •Formation of excimers and exciplexes in solution has been revealed. •Formation of excimers in films increases their photostability.

  11. An Agent-Based Simulation for Investigating the Impact of Stereotypes on Task-Oriented Group Formation

    Science.gov (United States)

    Maghami, Mahsa; Sukthankar, Gita

    In this paper, we introduce an agent-based simulation for investigating the impact of social factors on the formation and evolution of task-oriented groups. Task-oriented groups are created explicitly to perform a task, and all members derive benefits from task completion. However, even in cases when all group members act in a way that is locally optimal for task completion, social forces that have mild effects on choice of associates can have a measurable impact on task completion performance. In this paper, we show how our simulation can be used to model the impact of stereotypes on group formation. In our simulation, stereotypes are based on observable features, learned from prior experience, and only affect an agent's link formation preferences. Even without assuming stereotypes affect the agents' willingness or ability to complete tasks, the long-term modifications that stereotypes have on the agents' social network impair the agents' ability to form groups with sufficient diversity of skills, as compared to agents who form links randomly. An interesting finding is that this effect holds even in cases where stereotype preference and skill existence are completely uncorrelated.

  12. Controlling formation of single-molecule junctions by electrochemical reduction of diazonium terminal groups.

    Science.gov (United States)

    Hines, Thomas; Díez-Pérez, Ismael; Nakamura, Hisao; Shimazaki, Tomomi; Asai, Yoshihiro; Tao, Nongjian

    2013-03-06

    We report controlling the formation of single-molecule junctions by means of electrochemically reducing two axialdiazonium terminal groups on a molecule, thereby producing direct Au-C covalent bonds in situ between the molecule and gold electrodes. We report a yield enhancement in molecular junction formation as the electrochemical potential of both junction electrodes approach the reduction potential of the diazonium terminal groups. Step length analysis shows that the molecular junction is significantly more stable, and can be pulled over a longer distance than a comparable junction created with amine anchoring bonds. The stability of the junction is explained by the calculated lower binding energy associated with the direct Au-C bond compared with the Au-N bond.

  13. The Quality of Maternal Secure-Base Scripts Predicts Children's Secure-Base Behavior at Home in Three Sociocultural Groups

    Science.gov (United States)

    Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan

    2007-01-01

    The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…

  14. INMM Physical Protection Technical Working Group Workshops

    International Nuclear Information System (INIS)

    Williams, J.D.

    1982-01-01

    The Institute of Nuclear Materials Management (INMM) established the Physical Protection Technical Working Group to be a focal point for INMM activities related to the physical protection of nuclear materials and facilities. The Technical Working Group has sponsored workshops with major emphasis on intrusion detection systems, entry control systems, and security personnel training. The format for these workshops has consisted of a series of small informal group discussions on specific subject matter which allows direct participation by the attendees and the exchange of ideas, experiences, and insights. This paper will introduce the reader to the activities of the Physical Protection Technical Working Group, to identify the workshops which have been held, and to serve as an introduction to the following three papers of this session

  15. THE FORMATION OF CONSCIENCE AND MANAGEMENT GROUPS IN ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    Neisa Maria, Martins da Cunha

    2010-01-01

    Full Text Available This paper presents theoretical proposals, as the Theory of Human Relations, especially the Theory of Group Dynamics and the Conscience Formation, which promote understanding and support for the conduct of the leaders in team management, aiming at a route suitable for questions, reflections, enabling new perceptions of self-consciousness, as Hegel says. It is worth highlighting that through these considerations, it becomes possible to conduct more realistic impacts triggered in the organizational culture, as from a better management of interpersonal relationships within teams, these teams have a training goal or not.

  16. The group A streptococcal collagen-like protein 1, Scl1, mediates biofilm formation by targeting the EDA-containing variant of cellular fibronectin expressed in wounded tissue

    Science.gov (United States)

    Oliver-Kozup, Heaven; Martin, Karen H.; Schwegler-Berry, Diane; Green, Brett J.; Betts, Courtney; Shinde, Arti V.; Van De Water, Livingston; Lukomski, Slawomir

    2012-01-01

    Summary Wounds are known to serve as portals of entry for group A Streptococcus (GAS). Subsequent tissue colonization is mediated by interactions between GAS surface proteins and host extracellular matrix components. We recently reported that the streptococcal collagen-like protein-1, Scl1, selectively binds the cellular form of fibronectin (cFn) and also contributes to GAS biofilm formation on abiotic surfaces. One structural feature of cFn, which is predominantly expressed in response to tissue injury, is the presence of a spliced variant containing extra domain A (EDA/EIIIA). We now report that GAS biofilm formation is mediated by the Scl1 interaction with EDA-containing cFn. Recombinant Scl1 proteins that bound cFn also bound recombinant EDA within the C-C′ loop region recognized by the α9β1 integrin. The extracellular 2-D matrix derived from human dermal fibroblasts supports GAS adherence and biofilm formation. Altogether, this work identifies and characterizes a novel molecular mechanism by which GAS utilizes Scl1 to specifically target an extracellular matrix component that is predominantly expressed at the site of injury in order to secure host tissue colonization. PMID:23217101

  17. The Theoretical Foundations of Formation of the Essence of Concept of «Ensuring the Economic Security of Enterprise in the Conditions of Raiding»

    Directory of Open Access Journals (Sweden)

    Pysarevskyi Mykola I.

    2017-05-01

    Full Text Available The article is aimed at the scientific substantiation of the theoretical aspects of formation of an effective mechanism for ensuring the economic security of enterprise in the conditions of raiding. The conceptual approaches to determining the main features of individual elements of the conceptual apparatus, namely, the concepts of «economic security of enterprise» and «raiding» were analyzed. The author’s own definition of ensuring the economic security of enterprise in the conditions of raiding has been formed, which provides an opportunity to develop a complex of organizational and economic measures aimed at maintaining the sustainable functioning and development of enterprise in the current and future periods. Prospect for further research in this direction is a critical analysis of the approaches to assessing threats to the economic security of enterprise in the context of raiding, thus broadening the theoretical basis for an effective response mechanism and establishing a qualitative methodical basis for research. Application of new scientific and methodical approaches to the integrated assessment of the level of economic security in the conditions of raiding will ensure the development and implementation of efficient managerial decisions aimed at establishing a system of preventive measures to address threats to the economic security of enterprise.

  18. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  19. Effectiveness of emotional skills training for patients with anorexia nervosa with autistic symptoms in group and individual format.

    Science.gov (United States)

    Adamson, James; Leppanen, Jenni; Murin, Marianna; Tchanturia, Kate

    2018-04-02

    The aim of this study was to examine the effectiveness of CREST interventions in individual and group formats for adult anorexia nervosa. Furthermore, this study also aims to analyse whether patients with high levels of autistic symptoms respond differently. Participants' self-report measures were taken before and after individual and group interventions (N = 66 and N = 62, respectively). Mixed effects analysis was used to analyse overall response to both formats and assess interaction with autism symptoms. Significant improvements were observed for patients' alexithymia in individual format, and motivation increased for participants in both interventions. Significant interactions were observed between alexithymia, social anhedonia, and autism symptoms in individual format and alexithymia in group format. No interactions between autism and time were observed for either format. CREST in both formats offers participants improvements in social-emotional and motivational domains. Patients with high levels of autism symptoms also score high on both social anhedonia and alexithymia measures, but this does not affect their response to treatment. Copyright © 2018 John Wiley & Sons, Ltd and Eating Disorders Association.

  20. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  1. SOME ASPECTS OF FORMATION OF FINANCIAL-INDUSTRIAL GROUPS IN RUSSIA IN 1990S

    Directory of Open Access Journals (Sweden)

    Сергей Александрович Лутошкин

    2015-12-01

    Full Text Available The article examines the main stages of the financial-industrial groups formation in Russia in the 1990s, analyzes the main premises of these forms of association in the industrial and financial sectors, as well as the mechanism of their creation under conditions of the transitional market economy. The study revealed the main forms of financial and industrial groups in Russia and the fact that they had a national specificity. The author concludes that the distinctive feature was the formation of Russian business groups mostly from the former nomenklatura and Komsomol workers on the basis of pre-existing material base, which largely contributed to their rapid transformation into large concerns. The state did not prevent the creation of industrial and financial corporations, because of receiving financial support in the form of replenishment of the state budget through tax revenues and revival of production through investments in illiquid corporate enterprises.

  2. Cyber Security: Big Data Think II Working Group Meeting

    Science.gov (United States)

    Hinke, Thomas; Shaw, Derek

    2015-01-01

    This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.

  3. INSTITUTIONAL SUPPORT OF SECURITY BUDGET OF UKRAINE

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2016-06-01

    Full Text Available The institutional framework from positions of different conceptual approaches was examined in the article. The attention was paid the problems of institutional support budget security in Ukraine. The institutionalization of budgetary relations and especially the formation system of institutional support was investigated. The author's approach to the nature of institutional support budget security was suggested. Institutional and legal, institutional and organizational, and staffing budget security were characterized. It is concluded that the process of institutional development budget security characterized by unacceptable levels of institutional strain.

  4. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  5. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  6. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  7. Dinosaur footprint assemblage from the Lower Cretaceous Khok Kruat Formation, Khorat Group, northeastern Thailand

    Directory of Open Access Journals (Sweden)

    Shohei Kozu

    2017-11-01

    Full Text Available The Khok Kruat Formation is the upper part of the Khorat Group, which consists of upper Lower Cretaceous non-marine sedimentary rocks in northeastern Thailand. Many dinosaur footprints have been known from the upper Lower Cretaceous (Aptian–Albian Khok Kruat Formation at the Huai Dam Chum (Tha Uthen site, northeastern Thailand. Approximately 600 tracks occur in thin mudstone layer of the northern part of the outcrop at the Huai Dam Chum track site. Two types of footprints, small-sized theropod and crocodylomorph are imprinted with mud cracks and ripple marks on the thin mud layer. Most of footprints are referred to cf. Asianopodus, and are imprinted by small-sized theropoda, probably ornithomimosauria. Theropod tracks are mainly separated into two groups, Group A and Group B. From ichnological viewpoints, the small-sized theropod track assemblage indicates the herd behaviour and its idiosyncratic group composition. In particular, the histogram of size-frequency measurements of Group A shows the anomalous bimodal distribution. We consider that there are two hypotheses; the first one is due to the male-female difference, and the second is a result of the different growing stage.

  8. The Economic Security of Bank: Theoretical Basis and Systemic Approach

    Directory of Open Access Journals (Sweden)

    Gavlovska Nataliia I.

    2017-07-01

    Full Text Available The article analyzes the existing approaches to interpreting the category of «economic security of bank». A author’s own definition of the concept of «economic security of bank» has been proposed, which should be understood as condition of protecting the vital interests of bank, achieved by harmonizing relationships with the entities of external influence and optimizing the internal system processes, thus enabling efficient function as well as development by means of an adaptation mechanism. A number of approaches to understanding the substance of the above concept has been allocated and their main characteristics have been provided. The need to study the specifics of interaction of banking institutions with the external environment in the context of interaction between the State agents and market actors has been underlined. Features of formation of the term of «system» have been defined, three main groups of approaches to interpretation of the term have been provided. A author’s own definition of the concept of «economic security system of bank» has been proposed. A concrete definition of principles for building an economic security system of bank has been provided.

  9. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  10. Security in the Asia-Pacific region. Report on working group 5

    International Nuclear Information System (INIS)

    1997-01-01

    Security in the Asia-Pacific region is highly dependent on nuclear weapons-proliferation which can be achieved in two steps: non-introduction of nuclear weapons by nuclear powers, and creation of nuclear-weapon-free zone. The causes and steps towards arms build-up in the region are discussed. On of the indispensable factors in improving the relations between the countries in the zone is creation of confidence building measures and a security forum

  11. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  12. Comparing Web, Group and Telehealth Formats of a Military Parenting Program

    Science.gov (United States)

    2016-06-01

    materials are available upon request: • Online questionnaire for baseline data collection (9 pages) • Online parent survey for time point 1 (69 pages...web-based parenting intervention for military families with school-aged children, we expect to strengthen parenting practices in families and...AWARD NUMBER: W81XWH-14-1-0143 TITLE: Comparing Web, Group and Telehealth Formats of a Military Parenting Program PRINCIPAL INVESTIGATOR

  13. Examining the Center: Positions, Dominance, and Star Formation Rates of Most Massive Group Galaxies at Intermediate Redshift

    Science.gov (United States)

    Connelly, Jennifer L.; Parker, Laura C.; McGee, Sean; Mulchaey, John S.; Finoguenov, Alexis; Balogh, Michael; Wilman, David; Group Environment Evolution Collaboration

    2015-01-01

    The group environment is believed to be the stage for many galaxy transformations, helping evolve blue star-forming galaxies to red passive ones. In local studies of galaxy clusters, the central member is usually a single dominant giant galaxy at the center of the potential with little star formation thought to be the result of galaxy mergers. In nearby groups, a range of morphologies and star formation rates are observed and the formation history is less clear. Further, the position and dominance of the central galaxy cannot be assumed in groups, which are less massive and evolved than clusters. To understand the connections between global group properties and properties of the central group galaxy at intermediate redshift, we examine galaxy groups from the Group Environment and Evolution Collaboration (GEEC) catalog, including both optically- and X-ray-selected groups at redshift z~0.4. The sample is diverse, containing a range in overall mass and evolutionary state. The number of groups is significant, membership is notably complete, and measurements span the IR to the UV allowing the properties of the members to be connected to those of the host groups. Having investigated trends in the global group properties previously, including mass and velocity substructure, we turn our attention now to the galaxy populations, focusing on the central regions of these systems. The most massive and second most massive group galaxies are identified by their stellar mass. The positions of the most massive galaxies (MMGs) are determined with respect to both the luminosity-weighted and X-ray center. Star formation rates are used to explore the fraction of passive/quiescent versus star-forming MMGs and the dominance of the MMGs in our group sample is also tested. Determinations of these characteristics and trends constitute the important first steps toward a detailed understanding of the relationships between the properties of host groups and their most massive galaxies and the

  14. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  15. A Cluster Based Group Signature Mechanism For Secure Vanet Communication

    Directory of Open Access Journals (Sweden)

    Navjot Kaur

    2015-08-01

    Full Text Available Vehicular adhoc network is one of the recent area of research to administer safety to human lives controlling of messages and in disposal of messages to users and passengers. VANETs allows communication of moving vehicular nodes. Movement of nodes leads in changing network size and scenario. Whenever a new node joins the network there is a threat of malicious node attack. So we need an environment that is secure and trust worthy. Therefore a new cluster based secure technique is proposed where cluster head is responsible for providing communication between the vehicular nodes. Performance parameters used in this paper are message drop ratio packet delay ratio and verification time.

  16. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  17. Geochemistry and source of iron-formation from Guanhaes group, Guanhaes district, Minas Gerais, Brazil

    International Nuclear Information System (INIS)

    Sad, J.H.G.; Chiodi Filho, C.; Magalhaes, J.M.M.; Carelos, P.M.

    1990-01-01

    The Guanhaes district is underlain by metavolcano-sedimentary rocks of the Guanhaes Group, emplaced over an older Archean basement and intruded by granitic bodies. The Guanhaes Group is composed of pelitic, mafic and ultramafic schists at the base; silicate and carbonate facies iron-formation, calcarious schists, calcsilicates rocks and quartzites at the median portion and para-gneisses (meta-graywacks) at the top. Geochemistry of iron-formation suggest a hydrothermal affinity comparable to the hydrothermal sediments flanking East Pacific Rise. Paragenetic studies indicates that the rocks were submited to two metamorphic processes: one of regional character (high-amphibolite facies) and one of themal character (pyroxene-hornfels facies). Chemical analysis, as X-ray and optic spectrography, atomic absorption and plasma spectrography are presented. (author)

  18. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    OpenAIRE

    Elena Vladimirovna Batueva

    2014-01-01

    The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is sh...

  19. BackTrack testing wireless network security

    CERN Document Server

    Cardwell, Kevin

    2013-01-01

    Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

  20. Data backup security in cloud storage system

    OpenAIRE

    Атаян, Борис Геннадьевич; Национальный политехнический университет Армении; Багдасарян, Татевик Араевна; Национальный политехнический университет Армении

    2016-01-01

    Cloud backup system is proposed, which provides means for effective creation, secure storage and restore of backups inCloud. For data archiving new efficient SGBP file format is being used in the system, which is based on DEFLATE compressionalgorithm. Proposed format provides means for fast archive creation, which can contain significant amounts of data. Modernapproaches of backup archive protection are described in the paper. Also the SGBP format is compared to heavily used ZIP format(both Z...

  1. Proton NMR study of the influence of heme vinyl groups on the formation of the isomeric forms of sulfmyoglobin

    International Nuclear Information System (INIS)

    Chatfield, M.J.; La Mar, G.N.; Balch, A.L.; Smith, K.M.; Parish, D.W.; LePage, T.J.

    1986-01-01

    The formation of sulfmyoglobin has been investigated for myoglobin reconstituted with hemins having vinyls replaced by hydrogens to determine the participation of the vinyl groups in the reaction processes. Green complexes are produced in all cases, proving that vinyls are not obligatory for the formation of sulfproteins. In the presence of the 4-vinyl group, the 1 H NMR spectra of the met-cyano derivatives indicate the formation of three green species; however, the most stable of these products is not formed in the absence of this group, confirming reaction of the 4-vinyl in this species. Two new red extractable sulfmyoglobin derivatives are formed in the absence of the 4-vinyl group. (Auth.)

  2. Automatic Feature Selection and Weighting for the Formation of Homogeneous Groups for Regional Intensity-Duration-Frequency (IDF) Curve Estimation

    Science.gov (United States)

    Yang, Z.; Burn, D. H.

    2017-12-01

    Extreme rainfall events can have devastating impacts on society. To quantify the associated risk, the IDF curve has been used to provide the essential rainfall-related information for urban planning. However, the recent changes in the rainfall climatology caused by climate change and urbanization have made the estimates provided by the traditional regional IDF approach increasingly inaccurate. This inaccuracy is mainly caused by two problems: 1) The ineffective choice of similarity indicators for the formation of a homogeneous group at different regions; and 2) An inadequate number of stations in the pooling group that does not adequately reflect the optimal balance between group size and group homogeneity or achieve the lowest uncertainty in the rainfall quantiles estimates. For the first issue, to consider the temporal difference among different meteorological and topographic indicators, a three-layer design is proposed based on three stages in the extreme rainfall formation: cloud formation, rainfall generation and change of rainfall intensity above urban surface. During the process, the impacts from climate change and urbanization are considered through the inclusion of potential relevant features at each layer. Then to consider spatial difference of similarity indicators for the homogeneous group formation at various regions, an automatic feature selection and weighting algorithm, specifically the hybrid searching algorithm of Tabu search, Lagrange Multiplier and Fuzzy C-means Clustering, is used to select the optimal combination of features for the potential optimal homogenous groups formation at a specific region. For the second issue, to compare the uncertainty of rainfall quantile estimates among potential groups, the two sample Kolmogorov-Smirnov test-based sample ranking process is used. During the process, linear programming is used to rank these groups based on the confidence intervals of the quantile estimates. The proposed methodology fills the gap

  3. Presence of the dinosaur Scelidosaurus indicates Jurassic age for the Kayenta Formation (Glen Canyon Group, northern Arizona)

    Science.gov (United States)

    Padian, Kevin

    1989-05-01

    The Glen Canyon Group (Moenave, Wingate, Kayenta and Navajo Formations) of northern Arizona represents an extensive outcrop of early Mesozoic age terrestrial sediments. The age of these formations has long been disputed because independent stratigraphic data from marine tie-ins, paleobotanical and palynological evidence, and radiometric calibrations have been scanty or absent. The fauna of the Kayenta Formation in particular has been problematic because it has appeared to contain both typical Late Triassic and Early Jurassic taxa Here I report that the principal evidence for Late Triassic taxa, dermal scutes previously assigned to an aetosaur, in fact belongs to the thyreophoran ornithischian dinosaur Scelidosaurus, previously known only as a washed-in form found in marine sediments in the Early Jurassic of England. The presence of this dinosaur represents the first vertebrate biostratigraphic tie-in of the Glen Canyon Group horizons with reliably dated marine deposits in Europe. Together with revised systematic assessments of other vertebrates and independent evidence from fossil pollen, it supports an Early Jurassic age for the Kayenta Formation and most or all of the Glen Canyon Group.

  4. Undergraduate ALFALFA Team: Analysis of Spatially-Resolved Star-Formation in Nearby Galaxy Groups and Clusters

    Science.gov (United States)

    Finn, Rose; Collova, Natasha; Spicer, Sandy; Whalen, Kelly; Koopmann, Rebecca A.; Durbala, Adriana; Haynes, Martha P.; Undergraduate ALFALFA Team

    2017-01-01

    As part of the Undergraduate ALFALFA Team, we are conducting a survey of the gas and star-formation properties of galaxies in 36 groups and clusters in the local universe. The galaxies in our sample span a large range of galactic environments, from the centers of galaxy groups and clusters to the surrounding infall regions. One goal of the project is to map the spatial distribution of star-formation; the relative extent of the star-forming and stellar disks provides important information about the internal and external processes that deplete gas and thus drive galaxy evolution. We obtained wide-field H-alpha observations with the WIYN 0.9m telescope at Kitt Peak National Observatory for galaxies in the vicinity of the MKW11 and NRGb004 galaxy groups and the Abell 1367 cluster. We present a preliminary analysis of the relative size of the star-forming and stellar disks as a function of galaxy morphology and local galaxy density, and we calculate gas depletion times using star-formation rates and HI gas mass. We will combine these results with those from other UAT members to determine if and how environmentally-driven gas depletion varies with the mass and X-ray properties of the host group or cluster. This work has supported by NSF grants AST-0847430, AST-1211005 and AST-1637339.

  5. Role of protein-bound carbonyl groups in the formation of advanced glycation endproducts.

    Science.gov (United States)

    Liggins, J; Furth, A J

    1997-08-22

    Several mechanisms have been postulated for the formation of advanced glycation endproducts (AGEs) from glycated proteins; they all feature protein-bound carbonyl intermediates. Using 2,4-dinitrophenylhydrazine (DNPH), we have detected these intermediates on bovine serum albumin, lysozyme and beta-lactoglobulin after in vitro glycation by glucose or fructose. Carbonyls were formed in parallel with AGE-fluorophores, via oxidative Maillard reactions. Neither Amadori nor Heyns products contributed to the DNPH reaction. Fluorophore and carbonyl yields were much enhanced in lipid-associated proteins, but both groups could also be detected in lipid-free proteins. When pre-glycated proteins were incubated in the absence of free sugar, carbonyl groups were rapidly lost in a first-order reaction, while fluorescence continued to develop beyond the 21 days of incubation. Another unexpected finding was that not all carbonyl groups were blocked by aminoguanidine, although there was complete inhibition of reactions leading to AGE-fluorescence. It is suggested that carbonyls acting as fluorophore precursors react readily with aminoguanidine, while others are resistant to this hydrazine, possibly because they are involved in ring closure. Factors influencing the relative rates of acyclisation and hydrazone formation are discussed, together with possible implications for antiglycation therapy.

  6. The Ultraviolet and Infrared Star Formation Rates of Compact Group Galaxies: An Expanded Sample

    Science.gov (United States)

    Lenkic, Laura; Tzanavaris, Panayiotis; Gallagher, Sarah C.; Desjardins, Tyler D.; Walker, Lisa May; Johnson, Kelsey E.; Fedotov, Konstantin; Charlton, Jane; Cardiff, Ann H.; Durell, Pat R.

    2016-01-01

    Compact groups of galaxies provide insight into the role of low-mass, dense environments in galaxy evolution because the low velocity dispersions and close proximity of galaxy members result in frequent interactions that take place over extended time-scales. We expand the census of star formation in compact group galaxies by Tzanavaris et al. (2010) and collaborators with Swift UVOT, Spitzer IRAC and MIPS 24 m photometry of a sample of 183 galaxies in 46 compact groups. After correcting luminosities for the contribution from old stellar populations, we estimate the dust-unobscured star formation rate (SFRUV) using the UVOT uvw2 photometry. Similarly, we use the MIPS 24 m photometry to estimate the component of the SFR that is obscured by dust (SFRIR). We find that galaxies which are MIR-active (MIR-red), also have bluer UV colours, higher specific SFRs, and tend to lie in Hi-rich groups, while galaxies that are MIR-inactive (MIR-blue) have redder UV colours, lower specific SFRs, and tend to lie in Hi-poor groups. We find the SFRs to be continuously distributed with a peak at about 1 M yr1, indicating this might be the most common value in compact groups. In contrast, the specific SFR distribution is bimodal, and there is a clear distinction between star-forming and quiescent galaxies. Overall, our results suggest that the specific SFR is the best tracer of gas depletion and galaxy evolution in compact groups.

  7. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  8. Rethinking Cysteine Protective Groups: S-Alkylsulfonyl-l-Cysteines for Chemoselective Disulfide Formation.

    Science.gov (United States)

    Schäfer, Olga; Huesmann, David; Muhl, Christian; Barz, Matthias

    2016-12-12

    The ability to reversibly cross-link proteins and peptides grants the amino acid cysteine its unique role in nature as well as in peptide chemistry. We report a novel class of S-alkylsulfonyl-l-cysteines and N-carboxy anhydrides (NCA) thereof for peptide synthesis. The S-alkylsulfonyl group is stable against amines and thus enables its use under Fmoc chemistry conditions and the controlled polymerization of the corresponding NCAs yielding well-defined homo- as well as block co-polymers. Yet, thiols react immediately with the S-alkylsulfonyl group forming asymmetric disulfides. Therefore, we introduce the first reactive cysteine derivative for efficient and chemoselective disulfide formation in synthetic polypeptides, thus bypassing additional protective group cleavage steps. © 2016 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Interim format and content for a physical security plan for nuclear power plants

    International Nuclear Information System (INIS)

    1977-02-01

    The document serves as interim guidance to assist the licensee or applicant in the preparation of a physical security plan. It is to be used in conjunction with interim acceptance criteria for physical security programs, which will be distributed at a later date

  10. INFORMATION SECURITY IN MOBILE MODULAR MEASURING SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. N. Tkhishev

    2017-01-01

    Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.

  11. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  12. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  14. The time course of perceptual grouping: the role of segregation and shape formation.

    Science.gov (United States)

    Razpurker-Apfeld, Irene; Kimchi, Ruth

    2007-07-01

    The time course of perceptual grouping was examined in two experiments, using a primed matching task. In different conditions, elements were grouped into columns/rows by common lightness, into a shape (triangle/ arrow or square/cross) by common lightness, and into a shape without segregation of elements. The results showed an early and rapid grouping into columns/rows by common lightness and into a shape when no segregation from other elements was involved. Goodness of shape (i.e., triangle/arrow vs. square/cross) had no influence on how early grouping was evident, but the relatively poorer shapes appeared to consolidate with time. In contrast, grouping into a shape that involved segregation and required resolving figure-ground relations between segregated units, as grouping into a shape by common lightness, consumed time, regardless of shape goodness. These results suggest that the time course of grouping varies as a function of the processes involved in it (e.g., segregation and shape formation) and the conditions prevailing for each process.

  15. SYSTEMATIZATION OF INTERNATIONAL EXPERIENCE OF ENSURING ECONOMIC SECURITY OF EXACERBATION OF THE THREATS AND CHALLENGES OF A NEW TYPE FOR NATIONAL AND INTERNATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Tatyana Momot

    2016-11-01

    Full Text Available The aim of the work is to systematize the international experience of economic security both in terms of individual countries and the global economy as a whole. Setting such a goal it is associated with the growth of globalization and integration processes in the world economy, which are the new threat of economic security. Methods. Theoretical and methodological basis of the study were research and findings on issues of economic security at the level of the world economy as a whole and individual national economies in particular. We used such general scientific and special methods, such as analysis and synthesis, comparison, generalization, adaptation. The findings led to the conclusion that the protection of national interests and the formation of an economic security strategy – the most important functions of the state, the implementation of which is impossible without a system of self-regulation mechanisms and regulation. The government should implement a set of measures to promote economic growth, and that will guarantee the economic security of the country. These measures should cover all sectors of the economy. These measures include the implementation an active structural and social policies, enhancing the activity of the state in investment, financial, monetary and foreign economic sphere, the continuation of institutional reforms. The practical significance is to separate the differences used methodological approaches to ensure the economic security of the EU member countries and the CIS. This is explained by the fact that the first group of countries is focused on standards and borrows the experience of the leading EU countries (Germany, France, and the second group, located in the zone of influence of Russia (Moldova, Ukraine, Belarus, Kazakhstan, – on the Russian developments and standards. In turn, Russia in their design focuses more on standards to ensure economic security, which have been made in the period of the Soviet

  16. Molecularly oriented surface relief formation in polymethacrylates comprising N-benzylideneaniline derivative side groups

    Science.gov (United States)

    Kawatsuki, Nobuhiro; Hosoda, Risa; Kondo, Mizuho; Sasaki, Tomoyuki; Ono, Hiroshi

    2014-12-01

    Molecularly oriented surface relief (SR) formation in polymethacrylates with N-benzylideneaniline (NBA) derivative side groups is investigated by holographic exposure using a 325 nm He-Cd laser. Because the NBA moieties show a photoinduced orientation perpendicular to the polarization of light, polarization holography successfully forms a molecularly oriented SR structure in accordance with the polarization distribution that includes p-polarized components. Although intensity holography induces molecular orientation, it does not generate a satisfactory SR structure. In all the holographic modes, the SR depth depends on the direction of the C=N bonds in the NBA moieties and the photoproducts affect the SR formation ability.

  17. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    Science.gov (United States)

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  18. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  19. Security Theories of Third World

    Directory of Open Access Journals (Sweden)

    Alexandra Victorovna Khudaykulova

    2016-12-01

    Full Text Available This article analyzes the security studies in the “Third World”. The evolution of the conceptual apparatus in the field of security studies and in the understanding of the “Third World” is given. The author provides us an analysis of the security issues in the so-called “post-colonial” countries in the years of “cold war” and in the post-bipolar period, defines the domain of security for the developing world and the current agenda. Particular attention is paid to the analysis of the security concepts of the late XX century - the “security of the person”, “securitization”, “humanitarian intervention” - which are of particular concern to countries of the “Third World”. An alternative format of the “Third World” in the categories of postmodern, modern and premodern worlds is given, the term of “non-Westphalian” state is used as well. Basic characteristics of the “Third World” in the socio-economic and political spheres are provided. The author emphasizes that the state of security of the “Third World” is fundamentally different from that of the developed Western countries, since most threats in non-Western countries, does not come from the outside, but from within. Accordingly, the non-Western security theory does not focus exclusively on military issues and explore a wide range of issues of civil nature - economic, political, social, environmental and development challenges, as well as poverty and underdevelopment.

  20. High Charge Mobility of a Perylene Bisimide Dye with Hydrogen-bond Formation Group

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A perylene bisimide dye covalently bonded with a hydrogen-bond formation group of 1,3, 5-triazine-2, 4-diamine has been synthesized. Its casting films show a charge carrier mobility over 10-3 cm2/Vs, which is in the range of the highest values found for other promising charge transport materials suitable for solution processable technique.

  1. Analyzing the security of an existing computer system

    Science.gov (United States)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  2. Interacting star clusters in the Large Magellanic Cloud. Overmerging problem solved by cluster group formation

    Science.gov (United States)

    Leon, Stéphane; Bergond, Gilles; Vallenari, Antonella

    1999-04-01

    We present the tidal tail distributions of a sample of candidate binary clusters located in the bar of the Large Magellanic Cloud (LMC). One isolated cluster, SL 268, is presented in order to study the effect of the LMC tidal field. All the candidate binary clusters show tidal tails, confirming that the pairs are formed by physically linked objects. The stellar mass in the tails covers a large range, from 1.8x 10(3) to 3x 10(4) \\msun. We derive a total mass estimate for SL 268 and SL 356. At large radii, the projected density profiles of SL 268 and SL 356 fall off as r(-gamma ) , with gamma = 2.27 and gamma =3.44, respectively. Out of 4 pairs or multiple systems, 2 are older than the theoretical survival time of binary clusters (going from a few 10(6) years to 10(8) years). A pair shows too large age difference between the components to be consistent with classical theoretical models of binary cluster formation (Fujimoto & Kumai \\cite{fujimoto97}). We refer to this as the ``overmerging'' problem. A different scenario is proposed: the formation proceeds in large molecular complexes giving birth to groups of clusters over a few 10(7) years. In these groups the expected cluster encounter rate is larger, and tidal capture has higher probability. Cluster pairs are not born together through the splitting of the parent cloud, but formed later by tidal capture. For 3 pairs, we tentatively identify the star cluster group (SCG) memberships. The SCG formation, through the recent cluster starburst triggered by the LMC-SMC encounter, in contrast with the quiescent open cluster formation in the Milky Way can be an explanation to the paucity of binary clusters observed in our Galaxy. Based on observations collected at the European Southern Observatory, La Silla, Chile}

  3. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  4. Data Mediation with Enterprise Level Security

    Directory of Open Access Journals (Sweden)

    Kevin E. Foltz

    2017-10-01

    Full Text Available Enterprise Level Security (ELS is an architecture for enabling information sharing with strong security guarantees. It is built upon basic tenets and concepts that shape its component technologies and implementation. One challenge in sharing information is that the source and recipient of the information may use different units, protocols, data formats, or tools to process information. As a result, a transformation of the data is needed before the recipient can use the information. These conversions introduce potential security weaknesses into an ELS system, so an approach for enterprise-wide mediation is required. Methods in common use today, such as a man-in-the-middle (MITM translation and an online mediation service, do not preserve the basic ELS tenets and concepts. This paper examines these existing approaches and compares them with two new approaches designed to preserve ELS security. It looks at the complete picture of security, performance, and ease of implementation, offering a framework for choosing the best mediation approach based on the data sharing context.

  5. Econometric analyses of microfinance credit group formation, contractual risks and welfare impacts in Northern Ethiopia

    NARCIS (Netherlands)

    Berhane Tesfay, G.

    2009-01-01

    Key words
    Microfinance, joint liability, contractual risk, group formation, risk-matching, impact evaluation, Panel data econometrics, dynamic panel probit, trend models, fixed-effects, composite counterfactuals, propensity score matching, farm households, Ethiopia.

    Lack of

  6. System of economics' security management in economic activity of meat processing enterprises formation

    OpenAIRE

    Iryna Sosnovska

    2015-01-01

    This article is devoted to creation of economics' security management system production and economic activity of meat current processing enterprises. The article reflects research results of various scientists scientific works regarding interpretation of economic security system and shows the lack of this concept single interpretation. There are summarized observation of current activities of meat processing plants specifics as a conclusion there are a large number of different programs and c...

  7. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Science.gov (United States)

    2011-08-11

    ... listed on the Nasdaq Capital Market (``NCM'') as Covered Securities for purposes of Section 18(b) of the... posed above, commenters are welcome to offer their views on any other matter raised by the proposed..., competition and capital formation. We have considered, and discuss below, the effects of the proposed...

  8. Depositional History and Sequence Stratigraphy of the Middle Ordovician Yeongheung Formation (Yeongweol Group), Taebaeksan Basin, mid-east Korea

    Science.gov (United States)

    Kwon, Yoo Jin; Kwon, Yi Kyun

    2017-04-01

    The Middle Ordovician Yeongheung Formation consists of numerous meter-scale, shallowing-upward cycles which were deposited on a shallow-marine carbonate platform. Many diagnostic sedimentary textures and structures such as supratidal laminite, tepee structure, and solution-collapsed breccia are observed, which enable to infer the dry climate and high salinity conditions during deposition of the formation. In order to understand its depositional history, this study focuses on vertical and spatial stacking patterns of the second- to third-order sequences through the detailed outcrop description and geologic mapping. A total 19 lithofacies have been recognized, which can be grouped into 5 facies associations (FAs): FA1 (Supratidal flat), FA2 (Supratidal or dolomitization of peritidal facies), FA3 (Intertidal flat), FA4 (Shallow subtidal to peritidal platform), FA5 (Shallow subtidal shoal). Global mega-sequence boundary (Sauk-Tippecanoe) occurs in solution-collapsed breccia zone in the lower part of the formation. Correlation of the shallowing-upward cycle stacking pattern across the study area defines 6 transgressive-regressive depositional sequences. Each depositional sequences comprises a package of vertical and spatial staking of shallow subtidal cycles in the lower part and peritidal cycles in the upper part of the formation. According to sequence stratigraphic interpretation, the reconstructed relative sea-level curve of the Yeongweol platform is very similar to that of the Taebaek platform. Based on the absence of siliciclastic sequence such as the Jigunsan Formation and the lithologic & stratigraphic differences, however, the Yeongweol and Taebaek groups might not belong to a single depositional system within the North China platform. The Yeongweol Group can be divided by the four subunits into their unique lithologic successions and geographic distributions. The Eastern subunit of the Yeongweol Group is composed dominantly of carbonate rocks with a high

  9. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  10. Virtual Focus Groups: New Frontiers in Research

    Directory of Open Access Journals (Sweden)

    Lyn Turney

    2005-06-01

    Full Text Available New information and communication technologies in the form of learning management systems provide unique and inventive opportunities for qualitative researchers. Their intrinsic ability to record discursive data in text format accurately and to provide safe, secure, and anonymous environments for participants makes them amenable for use as advanced research tools. In this article, the authors report on a collaborative project that tested the potential of online discussion boards for use in virtual focus groups. What the researchers found was that not only was the method theoretically sound, it actually enhanced their ability to connect with difficult-to-access populations that were disparately spread.

  11. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  12. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  13. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  14. Perception of attachment security in families with children affected by neurological illness

    Directory of Open Access Journals (Sweden)

    Langher Viviana

    2013-01-01

    Full Text Available This study analyzes inter-family relationships of families with children with neurological problems using Bowlby’s attachment theory as model of reference. The research was conducted in two hospitals in Serbia specialized in neurological diseases: cerebral palsy and epilepsy. It is hypothesized that neurological problems could be associated to a discrepancy of inter-family attachment perceptions. Two groups were selected, a clinical one composed of 25 nuclear families: mother, father and child with a certified diagnosis of either cerebral palsy or epilepsy; and a control group of 25 nuclear families: mother, father and child with no pathology. Kerns, Klepac and Cole’s Security Scale (1996 was used for the investigation, with the addition of two modified version for administration to the parents. Data analysis demonstrated that the clinical group is substantively higher (p=.076 with respect to the discrepancy of attachment perceived by the children and the attribution of meaning that parents give to their child’s attachment perception towards them. Further analyses carried out on parent-child relationships demonstrated a significant difference (p =.017 between the clinical and control groups, with respect to the perception of father-child attachment. We conclude that in the clinical group, there is a discrepancy of attachment perceptions that particularly affects the father-child relationship. It appears that hospitalization and the consequent separation of the nuclear families may influence the formation of secure attachment relationships, in particular between father and child.

  15. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  16. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  17. Theoretical predictions of hydrolysis and complex formation of group-4 elements Zr, Hf and Rf in HF and HCl solutions

    International Nuclear Information System (INIS)

    Pershina, V.; Trubert, D.; Le Naour, C.; Kratz, J.V.

    2002-01-01

    Fully relativistic molecular density-functional calculations of the electronic structures of hydrated, hydrolyzed and fluoride/chloride complexes have been performed for group-4 elements Zr, Hf, and element 104, Rf. Using the electronic density distribution data, relative values of the free energy change for hydrolysis and complex formation reactions were defined. The results show the following trend for the first hydrolysis step of the cationic species: Zr>Hf>Rf in agreement with experiments. For the complex formation in HF solutions, the trend to a decrease from Zr to Hf is continued with Rf, provided no hydrolysis takes place. At pH>0, further fluorination of hydrolyzed species or fluoro-complexes has an inversed trend in the group Rf≥Zr>Hf, with the difference between the elements being very small. For the complex formation in HCl solutions, the trend is continued with Rf, so that Zr>Hf>Rf independently of pH. A decisive energetic factor in hydrolysis or complex formation processes proved to be a predominant electrostatic metal-ligand interaction. Trends in the K d (distribution coefficient) values for the group-4 elements are expected to follow those of the complex formation

  18. Preventive Interventions and Sustained Attachment Security in Maltreated Children

    Science.gov (United States)

    Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante

    2013-01-01

    Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539

  19. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  20. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  1. Collaborative group and teacher formation: (transformation dialogues with a fledging university professor - doi: 10.4025/actascieduc.v35i2.20307

    Directory of Open Access Journals (Sweden)

    Maria Aparecida de Souza Perrelli

    2013-07-01

    Full Text Available Discussions on university teaching, teaching initiation and the necessary teacher support during the initial phase of their career are provided. The above mentioned discussions foregrounded a study by a research-formation collaborative Group. Sharing participants in the Group were involved in reflections on their professional practice to (transform themselves in the process. The text focused on a Group member, a fledging female professional in university teaching, and the support provided by co-trainers during this difficult phase in her career. Support comprised the provision of conditions for dialogues with the teacher, prompting her to understand the reasons that underlay their practice. Different strategies were used, esp the ‘formation letters’. The above contributed towards the production of an autobiographical narrative in which the professor reflected on her formation process as a professor. The reflective narratives on the teacher’s life, produced within the Group’s mediation and shared with its members, constituted important formation themes not merely for the teacher but also for those who interacted with her in the collaborative Group.

  2. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  3. Experience of the pilot implementation of the european information sharing and alerting system in the field of information security

    Directory of Open Access Journals (Sweden)

    Anatoly A. Malyuk

    2018-03-01

    Full Text Available The formation of a global information society poses a particular challenge to the development of an information security culture. In the Doctrine of Information Security of the Russian Federation, adopted in December 2016, one of the main threats is the low awareness of citizens in matters of ensuring personal information security. One of the most important mechanisms for increasing competence and forming an in-formation security culture, in addition to mass training of people, are methods of propaganda and creation of "hot lines". They allow the general public to take the initiative in monitoring and reporting computer incidents. The development of such approaches should be carried out taking into account the international experience accumulated today. To this end, the article examines the European experience of creating a system of information and advisory assistance in the field of preventing threats to the security of public and corporate information systems, primarily information and telecommunications networks, as well as eliminating the consequences of threats in the information sphere. The analysis of the experience of implementing the pilot project of the European Information Sharing and Alert System has revealed the advisability of designing such systems on the basis of a management model with four players that unites network operators, information producers (who are IT product suppliers or IT security specialists; local information intermediaries and consumers of information. As a model of the information flow, a node can be selected that runs a local web portal that provides information to end users, generates new information, adapts information to the constraints of various distribution channels, and to the characteristics of end-user target groups. The methodology of the pilot project can be used in the design and deployment of a notification and information exchange system aimed at end-users of several regions or countries

  4. Stories of People Who Have Attended a Lesbian, Gay, Bisexual and Trans Support Group in a Secure Intellectual Disability Service.

    Science.gov (United States)

    Tallentire, Liz; Smith, Matthew; David, Lee; Roberts, Adam; Bruce; Morrow, Sarah; Withers, Paul; Smith, Ian

    2016-08-31

    This research is about people who have intellectual disabilities and live in a secure hospital. It is about a group of people who meet at a support group. The support group is for people who are lesbian, gay, bisexual or transgender. These people with intellectual disabilities helped with planning, doing, and telling other people about the research. They told their stories about going to the support group. Their stories were joined together into a group story. The story said that the group helped people in lots of different ways. For some people going to the group was difficult at first because it was ?coming out'. This means telling other people you are lesbian, gay, bisexual, or transgender. Then it got easier and people started to feel better about themselves. Then they wanted to help others and this was important in their lives. This group seemed to help people get better. We have given some ideas for setting up other groups and doing more research. © 2016 John Wiley & Sons Ltd.

  5. The Global Trends in the Alternative Energetics and Improvement of the State Policy in the Sphere of Fiscal Security: in Search for Equilibrium and Markets

    Directory of Open Access Journals (Sweden)

    Hnedina Kateryna V.

    2017-12-01

    Full Text Available Alternative energetics is an important component of the competitiveness and security of the national economy. Its rapid development over the past 10 years is caused by both the attempts of individual countries to maintain and strengthen their competitive advantage in the world markets and the efforts of international organizations (UN, IRENA, IEA to consolidate different stakeholders to achieve energy and fiscal security, protection of environment and improvement of climate conditions. The article is aimed at generalizing global trends in alternative energetics in the context of development of the State policy in the sphere of fiscal security. A brief overview of the latest trends in the alternative energetics development, most of which focus on identifying the basic sectoral trends, has been provided. However, the issues of fiscal security in the energy sector remain poorly researched, especially in terms of formation of the State policy, consolidating interests of different groups of stakeholders. It has been determined that in the developed countries a significant growth of alternative energetics is caused by the consistent State policy on creation of conditions for formation of effective branch markets and the solving of so-called energy trilemma.

  6. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  7. Inner Security in Media from the perspective of social science and media studies

    Directory of Open Access Journals (Sweden)

    Oliver Bidlo

    2012-07-01

    Full Text Available Security and entertainment are moving closer together. The term Securitainment expresses in this context, the mediation of security through entertainment formats. This will open a new space for Internal Security, which includes its own actors and patterns of interpretation. This space is portrayed in the media and follows the logic of media for attention but is also part of the process of social control. The mass media are therefore an instance of the design of internal security, social control and an interpretation producer. Mass media become actors of the internal security. They provide a symbolic representation of security.

  8. FORMATION OF THE CONTENT OF THE PROJECT OF ORGANIZATION OF SECURITY SYSTEMS IN HOTEL BUSINESS

    Directory of Open Access Journals (Sweden)

    Антон Іванович РОГОВИЙ

    2015-05-01

    Full Text Available The article identified and analyzed features of the project management in systems of creating security systems for security systems for the enterprise of hotel business. We have identified the main technical means, which should provide maximum protection of people and infrastructure of hotels. In the article revealed the criteria that should guide the manager in the selection of one or other technical means. In summery we highlighted works, which have to be included in the content of the project of organization of complex security system of companies in the hotel business.

  9. The Efficiency of Improvement of the Economic Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Klunko Nataliya S.

    2017-09-01

    Full Text Available An analysis of approaches to the formation of efficiency of ensuring economic security was carried out. The essence of economic security has been defined and its material base has been described. Threats to the economic security of Ukraine have been systematized and their structure analyzed. Both internal and external measures to prevent threats to the economic security of Ukraine have been allocated. Dynamics of the factors on which the economic security of Ukraine depends has been considered. It has been determined that the socio-economic development strategy formulated makes the country’s economic security system efficient. Two approaches to the strategic development of the Ukrainian economy have been allocated: enhancing competitiveness and integration into the international economic associations.

  10. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    Science.gov (United States)

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  11. A METHODOLOGICAL APPROACH TO THE STRATEGIC ANALYSIS OF FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Anastasiia Mostova

    2017-12-01

    Full Text Available The objective of present work is to substantiate the use of tools for strategic analysis in order to develop a strategy for the country’s food security under current conditions and to devise the author’s original technique to perform strategic analysis of food security using a SWOT-analysis. The methodology of the study. The article substantiates the need for strategic planning of food security. The author considers stages in strategic planning and explains the importance of the stage of strategic analysis of the country’s food security. It is proposed to apply a SWOT-analysis when running a strategic analysis of food security. The study is based on the system of indicators and characteristics of the country’s economy, agricultural sector, market trends, material-technical, financial, human resources, which are essential to obtain an objective assessment of the impact of trends and factors on food security, and in order to further develop the procedure for conducting a strategic analysis of the country’s food security. Results of the study. The procedure for strategic analysis of food security is developed based on the tool of a SWOT-analysis, which implies three stages: a strategic analysis of weaknesses and strengths, opportunities and threats; construction of the matrix of weaknesses and strengths, opportunities, and threats (SWOT-analysis matrix; formation of the food security strategy based on the SWOT-analysis matrix. A list of characteristics was compiled in order to conduct a strategic analysis of food security and to categorize them as strengths or weaknesses, threats, and opportunities. The characteristics are systemized into strategic groups: production, market; resources; consumption: this is necessary for the objective establishing of strategic directions, responsible performers, allocation of resources, and effective control, for the purpose of further development and implementation of the strategy. A strategic analysis

  12. Multiscale electrophysiology format: an open-source electrophysiology format using data compression, encryption, and cyclic redundancy check.

    Science.gov (United States)

    Brinkmann, Benjamin H; Bower, Mark R; Stengel, Keith A; Worrell, Gregory A; Stead, Matt

    2009-01-01

    Continuous, long-term (up to 10 days) electrophysiological monitoring using hybrid intracranial electrodes is an emerging tool for presurgical epilepsy evaluation and fundamental investigations of seizure generation. Detection of high-frequency oscillations and microseizures could provide valuable insights into causes and therapies for the treatment of epilepsy, but requires high spatial and temporal resolution. Our group is currently using hybrid arrays composed of up to 320 micro- and clinical macroelectrode arrays sampled at 32 kHz per channel with 18-bits of A/D resolution. Such recordings produce approximately 3 terabytes of data per day. Existing file formats have limited data compression capabilities, and do not offer mechanisms for protecting patient identifying information or detecting data corruption during transmission or storage. We present a novel file format that employs range encoding to provide a high degree of data compression, a three-tiered 128-bit encryption system for patient information and data security, and a 32-bit cyclic redundancy check to verify the integrity of compressed data blocks. Open-source software to read, write, and process these files are provided.

  13. Mechanism of trans-vinylene groups formation in the radiolysis of polyethylene and n-alkanes

    International Nuclear Information System (INIS)

    Borzov, S.M.; Sukhov, F.F.; Slovokhotova, N.A.

    1984-01-01

    Infrared spectra of polyethylene and some n-alkanes were studied after their irradiation at 20 K with 1-MeV electrons and subsequent heating to 160 K. The mechanism of trans-vinylene groups formation is suggested, which takes into account the decay of excited states of molecules in primary processes and the intra-chain recombination of free radicals in post-irradiation reactions. (author)

  14. ON THE FORMATION OF AMIDE POLYMERS VIA CARBONYL–AMINO GROUP LINKAGES IN ENERGETICALLY PROCESSED ICES OF ASTROPHYSICAL RELEVANCE

    Energy Technology Data Exchange (ETDEWEB)

    Förstel, Marko; Maksyutenko, Pavlo; Jones, Brant M.; Kaiser, Ralf I. [Department of Chemistry, University of Hawaii, 2545 McCarthy Mall, 96822 HI (United States); Sun, Bing J.; Lee, Huan C.; Chang, Agnes H. H., E-mail: ralfk@hawaii.edu, E-mail: hhchang@mail.ndhu.edu.tw [Department of Chemistry, National Dong Hwa University, Shoufeng, Hualien 974, Taiwan (China)

    2016-04-01

    We report on the formation of organic amide polymers via carbonyl–amino group linkages in carbon monoxide and ammonia bearing energetically processed ices of astrophysical relevance. The first group comprises molecules with one carboxyl group and an increasing number of amine moieties starting with formamide (45 u), urea (60 u), and hydrazine carboxamide (75 u). The second group consists of species with two carboxyl (58 u) and up to three amine groups (73 u, 88 u, and 103 u). The formation and polymerization of these linkages from simple inorganic molecules via formamide und urea toward amide polymers is discussed in an astrophysical and astrobiological context. Our results show that long chain molecules, which are closely related to polypeptides, easily form by energetically processing simple, inorganic ices at very low temperatures and can be released into the gas phase by sublimation of the ices in star-forming regions. Our experimental results were obtained by employing reflectron time-of-flight mass spectroscopy, coupled with soft, single photon vacuum ultraviolet photoionization; they are complemented by theoretical calculations.

  15. ON THE FORMATION OF AMIDE POLYMERS VIA CARBONYL–AMINO GROUP LINKAGES IN ENERGETICALLY PROCESSED ICES OF ASTROPHYSICAL RELEVANCE

    International Nuclear Information System (INIS)

    Förstel, Marko; Maksyutenko, Pavlo; Jones, Brant M.; Kaiser, Ralf I.; Sun, Bing J.; Lee, Huan C.; Chang, Agnes H. H.

    2016-01-01

    We report on the formation of organic amide polymers via carbonyl–amino group linkages in carbon monoxide and ammonia bearing energetically processed ices of astrophysical relevance. The first group comprises molecules with one carboxyl group and an increasing number of amine moieties starting with formamide (45 u), urea (60 u), and hydrazine carboxamide (75 u). The second group consists of species with two carboxyl (58 u) and up to three amine groups (73 u, 88 u, and 103 u). The formation and polymerization of these linkages from simple inorganic molecules via formamide und urea toward amide polymers is discussed in an astrophysical and astrobiological context. Our results show that long chain molecules, which are closely related to polypeptides, easily form by energetically processing simple, inorganic ices at very low temperatures and can be released into the gas phase by sublimation of the ices in star-forming regions. Our experimental results were obtained by employing reflectron time-of-flight mass spectroscopy, coupled with soft, single photon vacuum ultraviolet photoionization; they are complemented by theoretical calculations

  16. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  17. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  18. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  19. Fourth Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Zielstra, A.

    2010-01-01

    On December 1st, 2009, the fourth Dutch Process Control Security Event took place in Baarn, The Netherlands. The security event with the title ‘Manage IT!’ was organised by the Dutch National Infrastructure against Cybercrime (NICC). Mid of November, a group of over thirty people participated in the

  20. Visitor Safety and Security in Barbados: Stakeholder Perceptions

    Directory of Open Access Journals (Sweden)

    Clifford Griffin

    2010-12-01

    Full Text Available Is information about the nature, location and incidence of crimes against tourists/visitors sufficient to develop meaningful visitor safety and security policy? Are the views of key tourism stakeholder groups useful in informing and enhancing visitor safety and security policy? To answer these questions, this study analyzes 24 years of recorded crime data against visitors to Barbados and survey data of key tourism stakeholder groups and concludes: 1 that information about the nature, location and incidence of crimes against visitors is necessary but not sufficient to inform visitor safety and security policy; and 2 that the views and input of key stakeholders are essential if destinations are to become more effective in enhancing visitor safety and security.

  1. Ensuring energy security in ASEAN countries: Current trends and major challenges

    Science.gov (United States)

    Senderov, Sergey; Vorobev, Sergey

    2018-01-01

    The paper discusses the issues of formation of future challenges to energy security of the ASEAN countries in the period up to 2035. The article gives examples of strategic threats to the energy security of Russia. The opportunities to meet future demand for primary energy for individual countries of ASEAN and the whole region are discussed.

  2. 78 FR 7654 - Extension of Exemptions for Security-Based Swaps

    Science.gov (United States)

    2013-02-04

    ... Section 3D of the Exchange Act [15 U.S.C. 78c-4] and Registration and Regulation of Security-Based Swap... amendments as well as the effect of the amendments on efficiency, competition, and capital formation.\\50\\ \\50... also consider whether the action will promote efficiency, competition, and capital formation. See 15 U...

  3. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance - January 1980

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport special nuclear material (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standards format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical protection plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CRF Part 73

  4. Influence of carboxyl group formation on ammonia adsorption of NiO-templated nanoporous carbon surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Meng, Long-Yue [Department of Chemistry, Inha University, 100 Inharo, Nam-gu, Incheon 402-751 (Korea, Republic of); Park, Soo-Jin, E-mail: sjpark@inha.ac.kr [Department of Chemistry, Inha University, 100 Inharo, Nam-gu, Incheon 402-751 (Korea, Republic of)

    2012-11-15

    The scope of this work was to control the surface functional groups of nanoporous carbons (NPs) by oxidizing agents (nitric acid and hydrogen peroxide) treatments and to investigate the relation between carboxyl group and ammonia removal efficiency. The NPs were directly prepared from a cation exchange resin by the carbonization of a mixture with Ni acetate at 900 Degree-Sign C. N{sub 2}/-196 Degree-Sign C adsorption, Boehm's titrations, and X-ray photoelectron spectroscopy (XPS) analyzes were employed to confirm the physicochemical properties of NPs. The ammonia removal efficiency was confirmed by temperature programmed desorption (TPD) technique. In the result, the oxygen content of NPs increased after various treatments and the highest content of carboxyl group formation appeared at a 2:3 volume ratio of HNO{sub 3}/H{sub 2}O{sub 2}. It was also found that the oxidation treatment led to an increase in ammonia removal efficiency of NPs, mainly due to an increase of acid oxygen functional groups (such as carboxyl) on NPs surfaces. -- Graphical abstract: The nanoporous carbons were prepared from an exchange resin by the carbonization of a mixture with Ni acetate for ammonia adsorption. Highlights: Black-Right-Pointing-Pointer The carbons were prepared from an exchange resin by the carbonization of a mixture with Ni acetate. Black-Right-Pointing-Pointer The carbon surfaces were modified with HNO{sub 3}/H{sub 2}O{sub 2} solution at different volume radio. Black-Right-Pointing-Pointer The highest content of carboxyl group formation appeared at a 2:3 volume ratio of HNO{sub 3}/H{sub 2}O{sub 2}. Black-Right-Pointing-Pointer The acid oxygen functional groups (such as carboxyl) on carbon surfaces led to an increase in ammonia adsorption.

  5. Educational Outcomes of Small-Group Discussion Versus Traditional Lecture Format in Dental Students' Learning and Skills Acquisition.

    Science.gov (United States)

    Arias, Ana; Scott, Raymond; Peters, Ove A; McClain, Elizabeth; Gluskin, Alan H

    2016-04-01

    The aim of this prospective quantitative study was to compare the effect of different instructional formats on dental students' skills and knowledge acquisition for access cavity preparation. All first-year dental students were invited to participate in this study conducted during the four consecutive two-week endodontic rotation courses at the University of the Pacific Arthur A. Dugoni School of Dentistry in spring semester 2015. Four alphabetically distributed intact groups of students were randomly allocated to two groups (n=70 each) that participated in either small-group discussion or a traditional lecture on access preparation. The first outcome measure was skill acquisition, measured by the quality of access cavities prepared in extracted teeth at the conclusion of the session. Two blinded raters scored direct observations on a continuous scale. Knowledge, the second outcome measure, was scored with a multiple-choice and open-ended question test at the end of each two-week session. Data were obtained for 134 of the 140 students, for a 96% response rate. The results showed that students in the small-group discussion groups scored significantly higher than those in the lecture groups when skill performance was tested (p=8.9 × 10(-7)). However, no significant differences were found in the acquisition of knowledge between the two groups on the written test. Active student participation was significantly related to improved manual skill acquisition, but the format of the session does not seem to have had a direct influence on acquired knowledge.

  6. Prediction of Gibbs energies of formation and stability constants of some secondary uranium minerals containing the uranyl group

    International Nuclear Information System (INIS)

    Genderen, A.C.G. van; Weijden, C.H. van der

    1984-01-01

    For a group of minerals containing a common anion there exists a linear relationship between two parameters called ΔO and ΔF.ΔO is defined as the difference between the Gibbs energy of formation of a solid oxide and the Gibbs energy of formation of its aqueous cation, while ΔF is defined as the Gibbs energy of reaction of the formation of a mineral from the constituting oxide(s) and the acid. Using the Gibbs energies of formation of a number of known minerals the corresponding ΔO's and ΔF's were calculated and with the resulting regression equation it is possible to predict values for the Gibbs energies of formation of other minerals containing the same anion. This was done for 29 minerals containing the uranyl-ion together with phosphate, vanadate, arsenate or carbonate. (orig.)

  7. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  8. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  9. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  10. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  11. Cost of Peace Accounting and National Security in Nigeria: Does it Really Matter?

    Directory of Open Access Journals (Sweden)

    Okoro Godsday Edesiri

    2016-12-01

    Full Text Available Purpose of the article: The cost of ensuring national security is very high, but measuring this cost has received little attention. One way of reacording and ascertaining the financial resources expended on national security is via Peace Accounting. Peace Accounting is an innovative idea that is taking a firm root in Nigeria and the world over. Peace accounting deals with ascertaining and reporting the financial resources accompanying domestic violence such as insecurity, political violence, insurgency, militancy, economic predicament, corruption and all other costs associated with national security. Methodology/methods: Secondary data were obtained from the Central Bank of Nigeria Statistical Bulletin and the International Monetary Fund Cross Country Macroeconomic Statistics from 1996–2015. Ordinary Least Square estimation technique was employed in analyzing the data and analysis performed via SPSS. Scientific aim: This paper gauged the costs of peace accounting and its implication for national security in Nigeria. Findings: The study found that expenditure on internal security, cost of peace keeping and gross fixed capital formation are dynamics of peace accounting. Furthermore, cost of peace keeping is statistically significant except that expenditure on internal security and gross fixed capital formation were statistically flawed. Expenditure on internal security has negative impact on GPI. Conclusions: On the basis of the above, we recommend among others that countries like Nigeria faced with security challenges should engage professionals/experts that can help develop peace accounting models aimed at measuring the cost of peace. Also, special attention should be paid to expenditure on internal security since it has negative effect on GPI.

  12. Lithostratigraphy of the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) at Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Moyer, T.C.; Geslin, J.K.

    1995-01-01

    Lithostratigraphic relations within the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) were reconstructed from analysis of core samples and observation of outcrop exposures. The Calico Hills Formation is composed of five nonwelded pyroclastic units (each formed of one or more pyroclastic-flow deposits) that overlie an interval of bedded tuff and a basal volcaniclastic sandstone unit. The Prow Pass Tuff is divided into four pyroclastic units and an underlying interval of bedded tuff. The pyroclastic units of the Prow Pass Tuff are distinguished by the sizes and amounts of their pumice and lithic clasts and their degree of welding. Pyroclastic units of the Prow Pass Tuff are distinguished from those of the Calico Hills Formation by their phenocryst assemblage, chemical composition, and ubiquitous siltstone lithic clasts. Downhole resistivity tends to mirror the content of authigenic minerals, primarily zeolites, in both for-mations and may be useful for recognizing the vitric-zeolite boundary in the study area. Maps of zeolite distribution illustrate that the bedded tuff and basal sandstone units of the Calico Hills Formation are altered over a wider area than the pyroclastic units of both the Calico Hills Formation and the upper Prow Pass Tuff

  13. Lithostratigraphy of the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) at Yucca Mountain, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Moyer, T.C.; Geslin, J.K. [Science Applications International Corp., Las Vegas, NV (United States)

    1995-07-01

    Lithostratigraphic relations within the Calico Hills Formation and Prow Pass Tuff (Crater Flat Group) were reconstructed from analysis of core samples and observation of outcrop exposures. The Calico Hills Formation is composed of five nonwelded pyroclastic units (each formed of one or more pyroclastic-flow deposits) that overlie an interval of bedded tuff and a basal volcaniclastic sandstone unit. The Prow Pass Tuff is divided into four pyroclastic units and an underlying interval of bedded tuff. The pyroclastic units of the Prow Pass Tuff are distinguished by the sizes and amounts of their pumice and lithic clasts and their degree of welding. Pyroclastic units of the Prow Pass Tuff are distinguished from those of the Calico Hills Formation by their phenocryst assemblage, chemical composition, and ubiquitous siltstone lithic clasts. Downhole resistivity tends to mirror the content of authigenic minerals, primarily zeolites, in both for-mations and may be useful for recognizing the vitric-zeolite boundary in the study area. Maps of zeolite distribution illustrate that the bedded tuff and basal sandstone units of the Calico Hills Formation are altered over a wider area than the pyroclastic units of both the Calico Hills Formation and the upper Prow Pass Tuff.

  14. DIRAC distributed secure framework

    International Nuclear Information System (INIS)

    Casajus, A; Graciani, R

    2010-01-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  15. Method for secure electronic voting system: face recognition based approach

    Science.gov (United States)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  16. Internal Security Crisis in Nigeria: Causes, Types, Effects and ...

    African Journals Online (AJOL)

    Since the extinction of security crisis seems impossible, all the society needs is a mechanism for security crisis management and control. Security crisis is inevitable because it can originate in individual and group reactions to situations of scarce recourses, to division of function within society and differentiation of power and ...

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. Managing of transaction costs of agricultural enterprises in the context of raising the level of economic security of the company

    Directory of Open Access Journals (Sweden)

    Odnoshevnaya Olga Aleksandrovna

    2017-03-01

    Full Text Available The purpose of the article deals with the analysis of the concept transaction costs incurred by the agricultural enterprise in the course of their activities. To investigate the effect of transaction costs in the context of improving the economic security of the enterprise. Elements scientific novelty. As element of scientific novelty in the work optimization structure of the formative groups of transaction costs agriculture costs for enterprises is presented . With a view of the effectiveness increase business processes management in the enterprise optimization and provision expenses we consider it necessary to the select transaction costs in separate classification group. As a result of conducted work been detected was the number of research transaction costs agriculture enterprise and recommended conducted work such costs of recommended way. Theoretically was studied classification features of transaction costs for agricultural enterprises, as a condition for the full impact of their recording and that the state of economic security. The practical significance. For the study, the results justified the conclusion that the transaction costs – is a special category of costs, which requires a separate account management for the improvement of its economic security.

  20. Deciding Security for a Fragment of ASLan

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander

    2012-01-01

    situations in security such as the interaction between the workflow of a system with its access control policies. While even the transition relation is undecidable for ASLan in general, we show the security problem is decidable for a large and useful fragment that we call TASLan, as long as we bound......ASLan is the input language of the verification tools of the AVANTSSAR platform, and an extension of the AVISPA Intermediate Format IF. One of ASLan's core features over IF is to integrate a transition system with Horn clauses that are evaluated at every state. This allows for modeling many common...... the number of steps of honest participants. The restriction of TASLan is that all messages and predicates must be in a certain sense unambiguous in their interpretation, excluding “type-confusions” similar to some tagging results for security protocols....

  1. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  2. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  3. Group additivity values for enthalpies of formation (298 K), entropies (298 K), and molar heat capacities (300 K < T < 1500 K) of gaseous fluorocarbons

    International Nuclear Information System (INIS)

    Van Otterloo, Maren K.; Girshick, Steven L.; Roberts, Jeffrey T.

    2007-01-01

    A group additivity method was developed to estimate standard enthalpies of formation and standard entropies at 298 K of linear radical and closed-shell, gaseous fluorocarbon neutrals containing four or more carbon atoms. The method can also be used to estimate constant pressure molar heat capacities of the same compounds over the temperature range 300 K to 1500 K. Seventeen groups and seven fluorine-fluorine interaction terms were defined from 12 fluorocarbon molecules. Interaction term values from Yamada and Bozzelli [T. Yamada, J.W. Bozzelli, J. Phys. Chem. A 103 (1999) 7373-7379] were utilized. The enthalpy of formation group values were derived from G3MP2 calculations by Bauschlicher and Ricca [C.W. Bauschlicher, A. Ricca, J. Phys. Chem. A 104 (2000) 4581-4585]. Standard entropy and molar heat capacity group values were estimated from ab initio geometry optimization and frequency calculations at the Hartree-Fock level using the 6-31G(d) basis set. Enthalpies of formation for larger fluorocarbons estimated from the group additivity method compare well to enthalpies of formation found in the literature

  4. Cooperation during cultural group formation promotes trust towards members of out-groups.

    Science.gov (United States)

    Pan, Xiaofei Sophia; Houser, Daniel

    2013-07-07

    People often cooperate with members of their own group, and discriminate against members of other groups. Previous research establishes that cultural groups can form endogenously, and that these groups demonstrate in-group favouritism. Given the presence of cultural groups, the previous literature argues that cultural evolution selects for groups that exhibit parochial altruism. The source of initial variation in these traits, however, remains uninformed. We show here that a group's economic production environment may substantially influence parochial tendencies, with groups formed around more cooperative production (CP) displaying less parochialism than groups formed around more independent production (IP) processes. Participants randomized into CP and IP production tasks formed cultural groups, and subsequently played hidden-action trust games with in-group and out-group trustees. We found CP to be associated with significantly greater sharing and exchanging behaviours than IP. In trust games, significant parochial altruism (in-group favouritism combined with out-group discrimination) was displayed by members of IP groups. By contrast, members of CP groups did not engage in either in-group favouritism or out-group discrimination. Further, we found the absence of out-group discrimination in CP to persist even following 'betrayal'. Finally, belief data suggest that members of CP are not more intrinsically generous than IP members, but rather more likely to believe that out-group trustees will positively reciprocate. Our results have important implications for anyone interested in building cooperative teams, and shed new light on connections between culture and cooperation.

  5. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  6. Ab initio computational study of –N-C and –O-C bonding formation : functional group modification reaction based chitosan

    Science.gov (United States)

    Siahaan, P.; Salimah, S. N. M.; Sipangkar, M. J.; Hudiyanti, D.; Djunaidi, M. C.; Laksitorini, M. D.

    2018-04-01

    Chitosan application in pharmaceutics and cosmeceutics industries is limited by its solubility issue. Modification of -NH2 and -OH fuctional groups of chitosan by adding carboxyl group has been shown to improve its solubility and application. Attempt to synthesize carboxymethyl chitosan (CMC) from monocloroacetic acid (MCAA) has been done prior this report. However no information is available wether –OH (-O-C bonding formation) or -NH2 (-N-C bonding formation) is the preference for - CH2COOH to attach. In the current study, the reaction mechanism between chitosan and MCAA reactants into carboxymethyl chitosan (CMC) was examined by computational approach. Dimer from of chitosan used as a molecular model in calculation All the molecular structure involved in the reaction mechanism was optimized by ab initio computational on the theory and basis set HF/6-31G(d,p). The results showed that the - N-C bonding formation via SN2 than the -O-C bonding formation via SN2 which have activation energy 469.437 kJ/mol and 533.219 kJ/mol respectively. However, the -O-C bonding formation more spontaneous than the -N-C bonding formation because ΔG the formation of O-CMC-2 reaction is more negative than ΔG of formation N-CMC-2 reaction is -4.353 kJ/mol and -1.095 kJ/mol respectively. The synthesis of N,O-CMC first forms -O-CH2COOH, then continues to form -NH-CH2COOH. This information is valuable to further optimize the reaction codition for CMC synthesis.

  7. Telemedicine with integrated data security in ATM-based networks

    Science.gov (United States)

    Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas

    1997-05-01

    Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.

  8. S-Lagrangian dynamics of many-body systems and behavior of social groups: Dominance and hierarchy formation

    Science.gov (United States)

    Sandler, U.

    2017-11-01

    In this paper, we extend our generalized Lagrangian dynamics (i.e., S-Lagrangian dynamics, which can be applied equally to physical and non-physical systems as per Sandler (2014)) to many-body systems. Unlike common Lagrangian dynamics, this is not a trivial task. For many-body systems with S-dependent Lagrangians, the Lagrangian and the corresponding Hamiltonian or energy become vector functions, conjugated momenta become second-order tensors, and the system inevitably develops a hierarchical structure, even if all bodies initially have similar status and Lagrangians. As an application of our theory, we consider dominance and hierarchy formation, which is present in almost all communities of living species. As a biological basis for this application, we assume that the primary motivation of a groups activity is to attempt to cope with stress arising as pressure from the environment and from intrinsic unmet needs of individuals. It has been shown that the S-Lagrangian approach to a group's evolution naturally leads to formation of linear or despotic dominance hierarchies, depending on differences between individuals in coping with stress. That is, individuals that cope more readily with stress take leadership roles during the evolution. Experimental results in animal groups which support our assumption and findings are considered.

  9. Visitor Safety and Security in Barbados: Stakeholder Perceptions

    OpenAIRE

    Clifford Griffin

    2010-01-01

    Is information about the nature, location and incidence of crimes against tourists/visitors sufficient to develop meaningful visitor safety and security policy? Are the views of key tourism stakeholder groups useful in informing and enhancing visitor safety and security policy? To answer these questions, this study analyzes 24 years of recorded crime data against visitors to Barbados and survey data of key tourism stakeholder groups and concludes: 1) that information about the nature, locatio...

  10. SOCIAL COMPETENCE FORMATION AMONG TEENAGERS FROM HUMANIST TREND MULTIPLE-AGED GROUPS

    Directory of Open Access Journals (Sweden)

    Larisa A. Krapivina

    2015-01-01

    Full Text Available The paper studies the problems of social development of adolescents in multiple-aged groups (MAG.Methods. The methods involve socio-personal approach, consideration of the subject in a certain ideological humanistic orientation, comparative analysis, and comparison of historical facts, the study of social phenomena of different ages, long-term scientific observations, reflections, a retrospective analysis of personal experience.Results. The author describes objective conditions for the uprise of extremist, subcultural youth of multiple-aged groups, and the reasons whence they begin to perform distinctive functions that are specific for teenagers. Options for models of MAG humanistic educational systems formed in Russian and foreign social and pedagogical practice are listed. A complex of pedagogical conditions provided for the formation of social competence of adolescents in multiple-aged associations of humanistic orientation is considered. It has been found that this type of system is characterized by the following features: the principle of voluntary association of people, independence of subjects, rapid adaptation to changing socio-cultural situation, a variety of activities by interests, alternating change of activities, conflict resolution within the team, a high level of team spirit, selfmanagement, the creative nature of educational process, upbringing, socialization and self-realization. A brief description of conditions for development of fundamental human values among adolescents and formation of new specific complicated humanistic human and personal relations in global world is given.Scientific novelty. The author studies the following concepts: educational system of multiple-aged associations, teenager social competence, ambivalent behavior, emotional and moral compass of personality, invisible assets of the team, emergent effect of multiple-aged groups, inter-age communication. It was found that the specificity of MAG educational

  11. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  12. Securing Single Points of Compromise (SPoC)

    Energy Technology Data Exchange (ETDEWEB)

    Belangia, David Warren [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-06-25

    Securing the Single Points of Compromise that provide central services to the institution’s environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services.

  13. On Issue of Algorithm Forming for Assessing Investment Attractiveness of Region Through Its Technospheric Security

    Science.gov (United States)

    Filimonova, L. A.; Skvortsova, N. K.

    2017-11-01

    The article examines the problematic aspects of assessing the investment attractiveness of a region associated with the consideration of methodological issues that require refinement from the point of view of its technospheric security. Such issues include the formation of a sound system of indicators for the assessment of man-made risk which has a particular impact on the level of investment attractiveness of the region. In the context of the instability of the economic situation in Russia, the problem of man-made risks assessing in the context of the regional investment attractiveness based on an integrated approach and taking into account such principles as flexibility, adaptability, innovative orientation has not only lost its relevance but was also transformed into one of the most important conditions for ensuring the effective management of all spheres of the regional activities. The article poses the classical problem of making decisions on the results of the assessment of the investment attractiveness of the region in a matrix format evaluating the utility function. The authors of the article recommended a universal risk assessment model with its subsequent synthesis into technospheric security for the comprehensive assessment of regional investment attractiveness. The principal distinguishing feature of the study results are the schemes for manipulation in the evaluation activity associated with the selection of the optimality criteria groups and models for their study. These iterations make it possible to substantiate the choice of the solution for preserving the technospheric security of the region, a field of compromises or an “ideal” solution to the problem of the regional investment attractiveness loss.

  14. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  15. Adaptive engineering management tools of enterprise economic security

    Directory of Open Access Journals (Sweden)

    G.E. Krokhicheva

    2018-06-01

    Full Text Available This paper discusses the organizational and methodological foundations and methods exploited to forecast, analyze and scale down threats and risks in the sphere of economic security, to solve the adaptation problems, to implement and to evaluate of the potency of protective measures. The object of the conducted research is associated with various economic activities of the commercial enterprises affiliated in Rostov region. A suggested model of the formation and functioning of adaptive engineering tools for managing economic security in the form of derivative balance of the enterprise resources and the sources of their formation will allow the proprietors, executive board and mana-gerial staff to obtain necessary information within the requested context regarding the enterprise vital economic interests. In addition, the paper pays attention to the methodological aspects of accounting description and estimation of the iterative achievements to meet the desired adaptation results, implemented within the framework of the described iterative algorithm aimed at ensuring strategic prediction.

  16. Certified training for nuclear and radioactive source security management

    International Nuclear Information System (INIS)

    Johnson, Daniel

    2017-01-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. (author)

  17. Efficacy of formative evaluation using a focus group for a large classroom setting in an accelerated pharmacy program.

    Science.gov (United States)

    Nolette, Shaun; Nguyen, Alyssa; Kogan, David; Oswald, Catherine; Whittaker, Alana; Chakraborty, Arup

    2017-07-01

    Formative evaluation is a process utilized to improve communication between students and faculty. This evaluation method allows the ability to address pertinent issues in a timely manner; however, implementation of formative evaluation can be a challenge, especially in a large classroom setting. Using mediated formative evaluation, the purpose of this study is to determine if a student based focus group is a viable option to improve efficacy of communication between an instructor and students as well as time management in a large classroom setting. Out of 140 total students, six students were selected to form a focus group - one from each of six total sections of the classroom. Each focus group representative was responsible for collecting all the questions from students of their corresponding sections and submitting them to the instructor two to three times a day. Responses from the instructor were either passed back to pertinent students by the focus group representatives or addressed directly with students by the instructor. This study was conducted using a fifteen-question survey after the focus group model was utilized for one month. A printed copy of the survey was distributed in the class by student investigators. Questions were of varying types, including Likert scale, yes/no, and open-ended response. One hundred forty surveys were administered, and 90 complete responses were collected. Surveys showed that 93.3% of students found that use of the focus group made them more likely to ask questions for understanding. The surveys also showed 95.5% of students found utilizing the focus group for questions allowed for better understanding of difficult concepts. General open-ended answer portions of the survey showed that most students found the focus group allowed them to ask questions more easily since they did not feel intimidated by asking in front of the whole class. No correlation was found between demographic characteristics and survey responses. This may

  18. Securing recruitment and obtaining informed consent in minority ethnic groups in the UK

    Directory of Open Access Journals (Sweden)

    Roy Tapash

    2008-03-01

    Full Text Available Abstract Background Previous health research has often explicitly excluded individuals from minority ethnic backgrounds due to perceived cultural and communication difficulties, including studies where there might be language/literacy problems in obtaining informed consent. This study addressed these difficulties by developing audio-recorded methods of obtaining informed consent and recording data. This report outlines 1 our experiences with securing recruitment to a qualitative study investigating alternative methods of data collection, and 2 the development of a standardised process for obtaining informed consent from individuals from minority ethnic backgrounds whose main language does not have an agreed written form. Methods Two researchers from South Asian backgrounds recruited adults with Type 2 diabetes whose main language was spoken and not written, to attend a series of focus groups. A screening tool was used at recruitment in order to assess literacy skills in potential participants. Informed consent was obtained using audio-recordings of the patient information and recording patients' verbal consent. Participants' perceptions of this method of obtaining consent were recorded. Results Recruitment rates were improved by using telephone compared to face-to-face methods. The screening tool was found to be acceptable by all potential participants. Audio-recorded methods of obtaining informed consent were easy to implement and accepted by all participants. Attrition rates differed according to ethnic group. Snowballing techniques only partly improved participation rates. Conclusion Audio-recorded methods of obtaining informed consent are an acceptable alternative to written consent in study populations where literacy skills are variable. Further exploration of issues relating to attrition is required, and a range of methods may be necessary in order to maximise response and participation rates.

  19. Use of formative research and social network theory to develop a group walking intervention: Sumter County on the Move!

    Science.gov (United States)

    Forthofer, Melinda; Burroughs-Girardi, Ericka; Stoisor-Olsson, Liliana; Wilcox, Sara; Sharpe, Patricia A; Pekuri, Linda M

    2016-10-01

    Although social support is a frequently cited enabler of physical activity, few studies have examined how to harness social support in interventions. This paper describes community-based formative research to design a walking program for mobilizing naturally occurring social networks to support increases in walking behavior. Focus group methods were used to engage community members in discussions about desired walking program features. The research was conducted with underserved communities in Sumter County, South Carolina. The majority of focus group participants were women (76%) and African American (92%). Several important themes emerged from the focus group results regarding attitudes toward walking, facilitators of and barriers to walking, ideal walking program characteristics, and strategies for encouraging community members to walk. Most noteably, the role of existing social networks as a supportive influence on physical activity was a recurring theme in our formative research and a gap in the existing evidence base. The resulting walking program focused on strategies for mobilizing, supporting and reinforcing existing social networks as mechanisms for increasing walking. Our approach to linking theory, empirical evidence and community-based formative research for the development of a walking intervention offers an example for practitioners developing intervention strategies for a wide range of behaviors. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. The effect of oxytocin on group formation and strategic thinking in men.

    Science.gov (United States)

    Aydogan, Gökhan; Jobst, Andrea; Loy, Fabian; Dehning, Sandra; Zill, Peter; Müller, Norbert; Kocher, Martin

    2018-04-01

    Decision-making in groups is a remarkable and decisive element of human societies. Humans are able to organize themselves in groups, engage in collaborative decision-making processes and arrive at a binding agreement, even in the absence of unanimous consent. However, the transfer of decision-making autonomy requires a willingness to deliberately expose oneself to the decisions of others. A lack of trust in the abilities of others or of the underlying decision-making process, i.e. public trust, can lead to a breakdown of organizations in political or economic domains. Recent studies indicate that the biological basis of trust on an individual level is related to Oxytocin, an endogenous neuropeptide and hormone, which is also associated with pro-social behavior and positive conflict resolution. However, little is known about the effects of Oxytocin on the inclination of individuals to form or join groups and to deliberately engage in collaborative decision-making processes. Here, we show that intranasal administration of Oxytocin (n = 60) compared to placebo (n = 60) in males causes an adverse effect on the choice for forming groups in the presence of a competitive environment. In particular, Oxytocin negatively affects the willingness to work collaboratively in a p-Beauty contest game, whereas the effect is most pronounced for participants with relatively high strategic sophistication. Since our data provide initial evidence that Oxytocin has a positive effect on strategic thinking and performance in the p-Beauty contest game, we argue that the adverse effect on group formation might be rooted in an enhanced strategic sophistication of participants treated with Oxytocin. Copyright © 2018 Elsevier Inc. All rights reserved.

  1. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  2. The Limits of Epistemic Communities: EU Security Agencies

    Directory of Open Access Journals (Sweden)

    Mai'a K. Davis Cross

    2015-03-01

    Full Text Available This article examines the cases of the European Defence Agency (EDA and EU Intelligence Analysis Centre (IntCen to argue that although they are comprised of high-level security experts, they do not constitute epistemic communities. Research on other groups of security experts based in Brussels has shown that epistemic communities of diplomats, military experts, security researchers, and civilian crisis management experts, among others, have been able to influence the trajectory of security integration by virtue of their shared knowledge. Importantly, these security epistemic communities have been shown to significantly impact outcomes of EU security policy beyond what would be expected by looking only at member-states’ initial preferences. In exploring two examples of “non-cases” that are at the same time very similar to the other examples, the author seeks to shed light on why some expert groups do not form epistemic communities, and how this changes the nature of their influence. In so doing, the goal is to sharpen the parameters of what constitutes epistemic communities, and to add to our understanding of why they emerge. The argument advanced in this article is that institutional context and the nature of the profession matter as preconditions for epistemic community emergence.

  3. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  4. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  5. HOMELAND SECURITY: Intergovernmental Coordination and Partnership Will Be Critical to Success

    National Research Council Canada - National Science Library

    2002-01-01

    .... Moreover, formation of a department should not be considered a replacement for the timely issuance of a national homeland security strategy, which is needed to guide implementation of the complex...

  6. Cybernetic Security and Business Intelligence in the System of Diagnostics of Economic Security of the Enterprise

    Directory of Open Access Journals (Sweden)

    Ruslan Skrynkovskyy

    2017-10-01

    Full Text Available The purpose of the article is to determine the place, the role and features of cybernetic security and improve the business intelligence scheme in the system of diagnosing economic security of the enterprise. It had been found out that: 1 the term “cybernetic security of an enterprise” should be understood as the state of the protection of the cybernetic space of the whole enterprise or individual objects of its information infrastructure (computer system, computer data, etc. from the risk of external cybernetic influence, which ensures their sustainable development and the formation of prospects, as well as timely detection, prevention and neutralization of real and potential cybernetic interruptions and threats to the interests of the enterprise; 2 the main components of cybernetic security in the system of diagnostics of economic security of the enterprise are: investigation of information and telecommunication systems and cryptosystems of the opposing sides; cybernetic effects; protection of information sphere. It was established that the main task of business intelligence in the system of diagnosing economic security of the enterprise is the verification of the reliability of business information, the provision of cybernetic protection of information resources, information and communication technologies and systems and the elimination of the possibility of misinformation of senior management by the managers of the middle level, suppliers, marketing intermediaries, clientele, competitors or contact audiences of the enterprise. The prospect of further research in this direction is the development of a system of goals of the polycriterial diagnostics of the activity (economic diagnostics of the enterprise (on the basis of the isolation and systematization of its diagnostic purposes, taking into account the presented results of the study.

  7. One-year results of a prospective randomized, evaluator-blinded, multicenter study comparing TVT and TVT Secur.

    Science.gov (United States)

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan

    2013-02-01

    The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.

  8. Social security in developing countries : some theoretical considerations

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1991-01-01

    This paper discusses the concept of social security and criticizes the ILO definition of the concept as too limited to analyse non-Western social security systems. It develops an alternative definition which includes, firstly, the protection by society of individuals or social groups against a fall

  9. Safeguards Culture: Analogies from Safety Culture and Security Culture

    International Nuclear Information System (INIS)

    Naito, K.

    2013-01-01

    The terminology of 'safeguards culture' has been used loosely by safeguards experts as an essential element for establishing an organizational environment of stakeholders for the effective and efficient implementation of international safeguards. However, unlike the other two triplet brothers/ sisters of 3S's (Safety, Security, Safeguards), there is no formally established definition of safeguards culture. In the case of safety culture, INSAG (the International Nuclear Safety Advisory Group) has extensively dealt with its concept, elaborating its definition and key characteristics, and published its report, INSAG-4, as the IAEA Safety Series 75. On the other hand, security culture has also been defined by AdSec (the Advisory Group on Nuclear Security). In this paper, a provisional definition of safeguards culture is made on the analogies of safety culture and security culture, and an effort is made to describe essential elements of safeguards culture. It is proposed for SAGSI (the Standing Advisory Group on Safeguards Implementation) to formally consider the definition of safeguards culture and its characteristics. The paper is followed by the slides of the presentation. (author)

  10. Designing Fuzzy Rule Based Expert System for Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    The state of cyber security has begun to attract more attention and interest outside the community of computer security experts. Cyber security is not a single problem, but rather a group of highly different problems involving different sets of threats. Fuzzy Rule based system for cyber security is a system consists of a rule depository and a mechanism for accessing and running the rules. The depository is usually constructed with a collection of related rule sets. The aim of this study is to...

  11. ALARA issues arising for safety and security of radiation sources and security screening devices - Summary and recommendations of the 12. European ALARA network workshop

    International Nuclear Information System (INIS)

    Shaw, P.; Crouail, P.; Drouet, F.

    2010-01-01

    The 12. European ALARA Network (EAN) workshop on 'ALARA issues arising for safety and security of radiation sources and security screening devices' took place in Vienna (Austria) in October 2009. The aim of that workshop was to consider how the implementation of ALARA3, in terms of planned and emergency situations, involving worker and public doses, is affected by the introduction of security-related measures. In the case of new equipment and procedures, there was also the question of whether exposures arising from security screening devices can be justified and optimised. This workshop consisted of invited oral presentations, which highlighted the main issues, and half of the programme was devoted to discussions within working groups on specific topics. During their discussions, the working groups identified recommendations dealing with the following topics: the implementation of the Code of Conduct and HASS4 - ensuring ALARA; balancing security and safety - how to achieve an optimum solution; the management of an emergency exposure situation from an ALARA perspective; the justification and optimisation of the use of security devices. The objective of this paper is to present the main conclusions and recommendations produced during the workshop. Individual presentations (papers and slides) as well as the reports from the working groups are available to download on the EAN web site (http://www.eu-alara.net). (authors)

  12. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  13. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  14. Unbelievable security : Matching AES using public key systems

    NARCIS (Netherlands)

    Lenstra, A.K.; Boyd, C.

    2001-01-01

    The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite

  15. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  16. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  17. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  18. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  19. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  20. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  1. Shaping China's energy security: The impact of domestic reforms

    International Nuclear Information System (INIS)

    Yao, Lixia; Chang, Youngho

    2015-01-01

    This paper is a subsequent study of China's energy security situation which concludes that China's energy security has not improved over 30 years of economic reform. The objective of the study is to explore qualitatively why the energy security situation has not improved. To answer the ‘why’ question, the study opens up a new perspective by analyzing the relationship between energy security and energy policies from the macroeconomic reform perspective. This study discusses major reforms that took place over 30 years. It is found that China's macroeconomic reform has restricted the formation of China's energy policies and determined its energy security situation. In essence, China's energy policies are only a reaction to the macroeconomic measures. In other words, China's energy policies are not originally intended to improve energy security, but passive reactions to China's macroeconomic reform. This explains why China did not improve its energy security situation despite 30 years of reform. - Highlights: • This study identifies relationship between China's reform and energy policy. • This study identifies the key variable that has affected China's energy security. • Policy implication of the identification is drawn. • A new perspective to analyze energy security is provided

  2. Certified Training for Nuclear and Radioactive Source Security Management.

    Science.gov (United States)

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Support for Multi-Level Security Policies in DRM Architectures

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.

    2004-01-01

    Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  6. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    Energy Technology Data Exchange (ETDEWEB)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  7. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    International Nuclear Information System (INIS)

    Herron, Kerry G.; Jenkins-Smith, Hank C.; Hughes, Scott D.

    2000-01-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community

  8. The formation of heterodimers by vancomycin group antibiotics

    DEFF Research Database (Denmark)

    Staroske, T; O'Brien, DP; Jørgensen, Thomas J. D.

    2000-01-01

    The formation of heterodimers in mixtures of glycopeptide antibiotics has been detected by electrospray ionization mass spectrometry (ESI-MS), and dimerization constants have been determined. By using NMR spectroscopy, it has been shown that these heterodimers indeed exist in aqueous solution...

  9. Conducting an information security audit

    Directory of Open Access Journals (Sweden)

    Prof. Ph.D . Gheorghe Popescu

    2008-05-01

    Full Text Available The rapid and dramatic advances in information technology (IT in recent years have withoutquestion generated tremendous benefits. At the same time, information technology has created significant,nunprecedented risks to government and to entities operations. So, computer security has become muchmore important as all levels of government and entities utilize information systems security measures toavoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitiveinformation. Obviously, uses of computer security become essential in minimizing the risk of malicious attacksfrom individuals and groups, considering that there are many current computer systems with onlylimited security precautions in place.As we already know financial audits are the most common examinations that a business manager en-counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical securityaudits. However, they are unlikely to be acquainted with information security audits; that is an audit ofhow the confidentiality, availability and integrity of an organization’s information are assured. Any way,if not, they should be, especially that an information security audit is one of the best ways to determine thesecurity of an organization’s information without incurring the cost and other associated damages of a securityincident.

  10. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  11. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  12. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  13. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  14. The challenges of multi-layered security governance in Ituri

    DEFF Research Database (Denmark)

    Hoffmann, Kasper; Vlassenroot, Koen

    governance is that the inclusion of local non-state actors in security governance will improve security provision to people because they have more legitimacy. But in reality ‘multi-layered’ security governance is often marked by conflict and competition as much as by collaboration and common solutions......There has been a slow, but growing awareness among external actors that some local non-state security actors should be involved in security governance in conflict-affected situations. Already in 2006, the OECD published a report that called for a ‘multi-layered’ approach to reforming actors...... and institutions that provide security and justice services (Scheye and McLean, 2006). Often these actors consist of local authorities, such as customary chiefs, village elders, or business people working in collaboration with different kinds of self-defense groups. The idea behind ‘multi-layered’ security...

  15. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  16. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available The information society is increasingly more dependent on Information Security Management Systems (ISMSs, and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMSs that have been adapted to their special features, and which are optimized as regards the resources needed to deploy and maintain them. This article shows how important the security culture within ISMSs is for SMEs, and how the concept of security culture has been introduced into a security management methodology (MARISMA is a Methodology for “Information Security Management System in SMEs” developed by the Sicaman Nuevas Tecnologías Company, Research Group GSyA and Alarcos of the University of Castilla-La Mancha. for SMEs. This model is currently being directly applied to real cases, thus allowing a steady improvement to be made to its implementation.

  17. ULTRAVIOLET+INFRARED STAR FORMATION RATES: HICKSON COMPACT GROUPS WITH SWIFT AND SPITZER

    International Nuclear Information System (INIS)

    Tzanavaris, P.; Hornschemeier, A. E.; Immler, S.; Gallagher, S. C.; Johnson, K. E.; Reines, A. E.; Gronwall, C.; Hoversten, E.; Charlton, J. C.

    2010-01-01

    We present Swift UVOT ultraviolet (UV; 1600-3000 A) data with complete three-band UV photometry for a sample of 41 galaxies in 11 nearby ( -1 ) Hickson Compact Groups (HCGs) of galaxies. We use UVOT uvw2-band (2000 A) photometry to estimate the dust-unobscured component, SFR UV , of the total star formation rate, SFR TOTAL . We use Spitzer MIPS 24 μm photometry to estimate SFR IR , the component of SFR TOTAL that suffers dust extinction in the UV and is re-emitted in the IR. By combining the two components, we obtain SFR TOTAL estimates for all HCG galaxies. We obtain total stellar mass, M * , estimates by means of Two Micron All Sky Survey K s -band luminosities, and use them to calculate specific star formation rates, SSFR ≡ SFR TOTAL /M * . SSFR values show a clear and significant bimodality, with a gap between low (∼ -11 yr -1 ) and high-SSFR (∼>1.2 x 10 -10 yr -1 ) systems. We compare this bimodality to the previously discovered bimodality in α IRAC , the MIR activity index from a power-law fit to the Spitzer IRAC 4.5-8 μm data for these galaxies. We find that all galaxies with α IRAC ≤ 0 ( >0) are in the high- (low-) SSFR locus, as expected if high levels of star-forming activity power MIR emission from polycyclic aromatic hydrocarbon molecules and a hot dust continuum. Consistent with this finding, all elliptical/S0 galaxies are in the low-SSFR locus, while 22 out of 24 spirals/irregulars are in the high-SSFR locus, with two borderline cases. We further divide our sample into three subsamples (I, II, and III) according to decreasing H I richness of the parent galaxy group to which a galaxy belongs. Consistent with the SSFR and α IRAC bimodality, 12 out of 15 type I (11 out of 12 type III) galaxies are in the high- (low-) SSFR locus, while type II galaxies span almost the full range of SSFR values. We use the Spitzer Infrared Nearby Galaxy Survey (SINGS) to construct a comparison subsample of galaxies that (1) match HCG galaxies in J-band total

  18. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  19. Effect of estradiol on planktonic growth, coaggregation, and biofilm formation of the Prevotella intermedia group bacteria.

    Science.gov (United States)

    Fteita, Dareen; Könönen, Eija; Söderling, Eva; Gürsoy, Ulvi Kahraman

    2014-06-01

    Alterations in the quantity and quality of biofilms at gingival margin are considered to play a role in the initiation and development of pregnancy-related gingivitis. Prevotella intermedia sensu lato is able to consume estradiol, the major sex hormone secreted during pregnancy, in the absence of vitamin K. The aim of the study was to examine the effect of estradiol on the planktonic growth, coaggregation, polysaccharide production, and biofilm formation of the P. intermedia group bacteria, namely P. intermedia, Prevotella nigrescens, and Prevotella pallens. In all experiments, the type strain (ATCC) and a clinical strain (AHN) of P. intermedia, P. nigrescens, and P. pallens were incubated with the concentrations of 0, 30, 90, and 120 nmol/L of estradiol. Planktonic growth was assessed by means of the colony forming unit method, while coaggregation and biofilm formation were assessed by spectrophotometric methods. In the determination of protein and polysaccharide levels, the Bradford and phenol-sulfuric acid methods were used, respectively. P. pallens AHN 9283 and P. nigrescens ATCC 33563 increased their numbers at planktonic stage with increasing estradiol concentrations. In 48-h biofilm tests, elevated protein levels were found for both strains of P. intermedia, and the strains P. nigrescens ATCC 33563 and P. pallens AHN 9283 in the presence of estradiol. The P. intermedia strains also increased the levels of polysaccharide formation in the biofilm. Coaggregation of the P. intermedia group organisms with Fusobacterium nucleatum was enhanced only in P. intermedia AHN 8290. In conclusion, our in vitro experiments indicate that estradiol regulates planktonic growth, coaggregation, polysaccharide production, and biofilm formation characteristics of P. intermedia, P. nigrescens, and P. pallens differently. These results may, at least partly, explain the differences seen in their contribution to the pathogenesis of pregnancy-related gingivitis

  20. Gibbs Free Energy of Formation for Selected Platinum Group Minerals (PGM

    Directory of Open Access Journals (Sweden)

    Spiros Olivotos

    2016-01-01

    Full Text Available Thermodynamic data for platinum group (Os, Ir, Ru, Rh, Pd and Pt minerals are very limited. The present study is focused on the calculation of the Gibbs free energy of formation (ΔfG° for selected PGM occurring in layered intrusions and ophiolite complexes worldwide, applying available experimental data on their constituent elements at their standard state (ΔG = G(species − ΔG(elements, using the computer program HSC Chemistry software 6.0. The evaluation of the accuracy of the calculation method was made by the calculation of (ΔGf of rhodium sulfide phases. The calculated values were found to be ingood agreement with those measured in the binary system (Rh + S as a function of temperature by previous authors (Jacob and Gupta (2014. The calculated Gibbs free energy (ΔfG° followed the order RuS2 < (Ir,OsS2 < (Pt, PdS < (Pd, PtTe2, increasing from compatible to incompatible noble metals and from sulfides to tellurides.

  1. Methods of Organizational Information Security

    Science.gov (United States)

    Martins, José; Dos Santos, Henrique

    The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.

  2. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    Science.gov (United States)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  3. Novel Approaches to Enhance Mobile WiMAX Security

    Directory of Open Access Journals (Sweden)

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  4. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    Science.gov (United States)

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  5. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  6. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Faust, Sebastian

    2012-01-01

    We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic in the size...... on the knowledge of exponent in an RSA group, and build succinct zero-knowledge arguments in the CRS model....

  7. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  8. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  9. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  10. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  11. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  12. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    Science.gov (United States)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  13. Short-term results of a prospective randomized evaluator blinded multicenter study comparing TVT and TVT-Secur.

    Science.gov (United States)

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Etén-Bergqvist, Christina; Persson, Jan

    2011-07-01

    The aim of this prospective randomized multicenter study was to compare TVT (tension-free vaginal tape) with TVT-Secur in terms of efficacy and safety. We set out to enrol 280 stress incontinent women with a half time interim analysis of short-term cure and a continuous registration of adverse events. Of 133 randomized women, 126 were operated and 123 (TVT n = 62, TVT-Secur n = 61) available for 2 months follow-up. No significant differences were found between groups regarding demographics or grade of incontinence. At 2 months follow-up, subjective cure rate following TVT-Secur was significantly lower than for TVT (72% and 92%, respectively, p = 0.01). Three major complications occurred in the TVT-Secur group: tape erosion into the urethra, a tape inadvertently placed inside the bladder, and an immediate postoperative bleeding from the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding perioperative bleeding, hospital stay, urge symptoms, or postoperative urinary tract infections. Median time for surgery was 13 and 22 min for TVT-Secur and TVT, respectively (p TVT-Secur procedure had a significantly lower subjective cure rate than the retropubic TVT procedure. Due to this, in addition to three serious complications in the TVT-Secur group, we decided to stop further enrolment after the interim analysis. We discourage from further use of the TVT-Secur.

  14. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  15. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  16. Inherent secure communications using lattice based waveform design

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, Matthew Owen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  17. Some Like it Hot: Linking Diffuse X-Ray Luminosity, Baryonic Mass, and Star Formation Rate in Compact Groups of Galaxies

    Science.gov (United States)

    Desjardins, Tyler D.; Gallagher, Sarah C.; Hornschemeier, Ann E.; Mulchaey, John S.; Walker, Lisa May; Brandt, Willian N.; Charlton, Jane C.; Johnson, Kelsey E.; Tzanavaris, Panayiotis

    2014-01-01

    We present an analysis of the diffuse X-ray emission in 19 compact groups (CGs) of galaxies observed with Chandra. The hottest, most X-ray luminous CGs agree well with the galaxy cluster X-ray scaling relations in L(x-T) and (L(x-sigma), even in CGs where the hot gas is associated with only the brightest galaxy. Using Spitzer photometry, we compute stellar masses and classify Hickson CGs 19, 22, 40, and 42, and RSCGs 32, 44, and 86 as fossil groups using a new definition for fossil systems that includes a broader range of masses. We find that CGs with total stellar and Hi masses are great than or equal to 10(sup (11.3) solar mass are often X-ray luminous, while lower-mass CGs only sometimes exhibit faint, localized X-ray emission. Additionally, we compare the diffuse X-ray luminosity against both the total UV and 24 micron star formation rates of each CG and optical colors of the most massive galaxy in each of the CGs. The most X-ray luminous CGs have the lowest star formation rates, likely because there is no cold gas available for star formation, either because the majority of the baryons in these CGs are in stars or the X-ray halo, or due togas stripping from the galaxies in CGs with hot halos. Finally, the optical colors that trace recent star formation histories of the most massive group galaxies do not correlate with the X-ray luminosities of the CGs, indicating that perhaps the current state of the X-ray halos is independent of the recent history of stellar mass assembly in the most massive galaxies.

  18. Rapid detection of rRNA group I pseudomonads in contaminated metalworking fluids and biofilm formation by fluorescent in situ hybridization.

    Science.gov (United States)

    Saha, Ratul; Donofrio, Robert S; Goeres, Darla M; Bagley, Susan T

    2012-05-01

    Metalworking fluids (MWFs), used in different machining operations, are highly prone to microbial degradation. Microbial communities present in MWFs lead to biofilm formation in the MWF systems, which act as a continuous source of contamination. Species of rRNA group I Pseudomonas dominate in contaminated MWFs. However, their actual distribution is typically underestimated when using standard culturing techniques as most fail to grow on the commonly used Pseudomonas Isolation Agar. To overcome this, fluorescent in situ hybridization (FISH) was used to study their abundance along with biofilm formation by two species recovered from MWFs, Pseudomonas fluorescens MWF-1 and the newly described Pseudomonas oleovorans subsp. lubricantis. Based on 16S rRNA sequences, a unique fluorescent molecular probe (Pseudo120) was designed targeting a conserved signature sequence common to all rRNA group I Pseudomonas. The specificity of the probe was evaluated using hybridization experiments with whole cells of different Pseudomonas species. The probe's sensitivity was determined to be 10(3) cells/ml. It successfully detected and enumerated the abundance and distribution of Pseudomonas indicating levels between 3.2 (± 1.1) × 10(6) and 5.0 (± 2.3) × 10(6) cells/ml in four different industrial MWF samples collected from three different locations. Biofilm formation was visualized under stagnant conditions using high and low concentrations of cells for both P. fluorescens MWF-1 and P. oleovorans subsp. lubricantis stained with methylene blue and Pseudo120. On the basis of these observations, this molecular probe can be successfully be used in the management of MWF systems to monitor the levels and biofilm formation of rRNA group I pseudomonads.

  19. Comparative analysis of the calcretization process in the Marilia formations (Bauru group - Brasil) and Mercedes ( Paysandu group - Uruguay), Upper Cretaceous of the Parana basin

    International Nuclear Information System (INIS)

    Veroslavsky, G.; Etchebehere, M.; Sad, A.; Fulfaro, J.

    1998-01-01

    Pedogenic and non-pedogenic calcrete facies are very common feature of Marilia (Brazil) and Mercedes (Uruguay) formations in the Parana Basin. The non-pedogenic ones constitute massive limestone facies that have been recently interpreted as groundwater calcretes. These limestones are exploited in both countries to supply raw materials to Portland cement and soil conditioner in origin and age of calcretization phenomena. In Uruguay, the calcretization process seens to be band formation. Field relationships and fossil assemblage point to a Paleocene (or later) age for the calcretization. In Brazilian territory, the groundwater calcretes aresupposed to be of Upper Cretaceous age due to the presence of dinosaurs scattered through the Bauru Group, including siliciclastic beds below and above the calcretes. The authors assume that calcretization processes are similar in both countries (host rocks, intensity, size, textures, geometries and economic potential). The main difference is in age of the calcretization. (author)

  20. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  1. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  2. A scoping review of traditional food security in Alaska.

    Science.gov (United States)

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  3. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  4. Star formation suppression in compact group galaxies

    DEFF Research Database (Denmark)

    Alatalo, K.; Appleton, P. N.; Lisenfeld, U.

    2015-01-01

    , bars, rings, tidal tails, and possibly nuclear outflows, though the molecular gas morphologies are more consistent with spirals and earlytype galaxies than mergers and interacting systems. Our CO-imaged HCG galaxies, when plotted on the Kennicutt-Schmidt relation, shows star formation (SF) suppression...... color space. This supports the idea that at least some galaxies in HCGs are transitioning objects, where a disruption of the existing molecular gas in the system suppresses SF by inhibiting the molecular gas from collapsing and forming stars efficiently. These observations, combined with recent work...

  5. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  6. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  7. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  8. Formation of maintenance economic safety enterprise system

    Directory of Open Access Journals (Sweden)

    N. A. Serebryakova

    2016-01-01

    Full Text Available The article examines the issues of economic security. The operation of enterprises is being implemented in a volatile market environment, which requires a comprehensive assessment of not only the individual factors affecting the operation of the enterprise, but also encourages the need to develop a comprehensive system for the enterprise to ensure economic security. The purpose of this study is to examine the theoretical and methodological approaches to assessing and ensuring the economic security of the enterprise, the development of a mechanism to ensure the economic security of the enterprise. Measures to ensure the safety of personnel suggest preventive work with the personnel, training personnel of the security services division, formation of personnel reserve of security personnel, the organization of work with new employees, reducing staff turnover. Preventive measures to minimize include activities not directly related to the activities of security units, but to minimize losses of commercial enterprise in the course of maintenance operations: control of inventories; control document; scheduled and unscheduled inspections during the reception of the goods; selection and organization of the movement control risk goods. Development of guidelines and regulations involves the planning of a clear legal regulation of all processes for the operation of commercial facility, potentially dangerous from the point of view of any commercial activity or threats to the security risks. The success of the activities is largely determined by the speed and accuracy of enterprise responses to emerging threats, where a key determinant of the effectiveness of business, is to create a system to ensure the economic security of the enterprise.

  9. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  10. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  11. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    International Nuclear Information System (INIS)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-01-01

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model

  12. The Pan-STARRS1 Medium-deep Survey: Star Formation Quenching in Group and Cluster Environments

    Energy Technology Data Exchange (ETDEWEB)

    Jian, Hung-Yu; Lin, Lihwai; Lin, Kai-Yang; Chen, Chin-Wei [Institute of Astronomy and Astrophysics, Academia Sinica, 106, Taipei, Taiwan, R.O.C. (China); Foucaud, Sebastien [Department of Earth Sciences, National Taiwan Normal University, N.88, Tingzhou Road, Sec. 4, Taipei 11677, Taiwan, R.O.C. (China); Chiueh, Tzihong [Department of Physics, National Taiwan University, 106, Taipei, Taiwan, R.O.C. (China); Bower, R. G.; Cole, Shaun; Draper, P. W.; Metcalfe, N. [Institute for Computational Cosmology, Department of Physics, Durham University, South Road, Durham DH1 3LE (United Kingdom); Chen, Wen-Ping [Graduate Institute of Astronomy, National Central University, Chung-Li 32054, Taiwan, R.O.C. (China); Burgett, W. S.; Flewelling, H.; Huber, M. E.; Kaiser, N.; Kudritzki, R.-P.; Magnier, E. A.; Wainscoat, R. J.; Waters, C., E-mail: hyjian@asiaa.sinica.edu.tw [Institute for Astronomy, University of Hawaii at Manoa, Honolulu, HI 96822 (United States)

    2017-08-10

    We make use of a catalog of 1600 Pan-STARRS1 groups produced by the probability friends-of-friends algorithm to explore how the galaxy properties, i.e., the specific star formation rate (SSFR) and quiescent fraction, depend on stellar mass and group-centric radius. The work is the extension of Lin et al. In this work, powered by a stacking technique plus a background subtraction for contamination removal, a finer correction and more precise results are obtained than in our previous work. We find that while the quiescent fraction increases with decreasing group-centric radius, the median SSFRs of star-forming galaxies in groups at fixed stellar mass drop slightly from the field toward the group center. This suggests that the main quenching process in groups is likely a fast mechanism. On the other hand, a reduction in SSFRs by ∼0.2 dex is seen inside clusters as opposed to the field galaxies. If the reduction is attributed to the slow quenching effect, the slow quenching process acts dominantly in clusters. In addition, we also examine the density–color relation, where the density is defined by using a sixth-nearest-neighbor approach. Comparing the quiescent fractions contributed from the density and radial effect, we find that the density effect dominates the massive group or cluster galaxies, and the radial effect becomes more effective in less massive galaxies. The results support mergers and/or starvation as the main quenching mechanisms in the group environment, while harassment and/or starvation dominate in clusters.

  13. Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses

    OpenAIRE

    Raina , Sagar; Taylor , Blair; Kaza , Siddharth

    2015-01-01

    Part 2: Software Security Education; International audience; Learning interventions based on modules are common in computer science education. Traditional learning modules that present a large amount of content in a linear format can lead to students skimming and skipping content resulting in lower student engagement and effectiveness. In this paper, we present theoretical support for increasing engagement and effectiveness of learning modules, describe a system that implements these principl...

  14. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  15. 'Acting like chameleons’: on the McDonaldization of private security

    NARCIS (Netherlands)

    van Steden, R.; de Waard, J.

    2013-01-01

    Private security is a fragmented industry with tens of thousands of small- and medium-sized suppliers worldwide. However, with the arrival in the market of multinational brands such as Group 4 Securicor and Securitas, we are witnessing a McDonaldization of security commodities. This development

  16. A Formal Security Analysis of an OSA/Parlay Authentication Interface

    NARCIS (Netherlands)

    Corin, R.J.; Di Caprio, G.; Etalle, Sandro; Gnesi, S.; Lenzini, Gabriele; Moiso, C.

    2005-01-01

    We report on an experience in analyzing the security of the Trust and Security Management (TSM) protocol, an authentication procedure within the OSA/Parlay Application Program Interfaces (APIs) of the Open Service Access and Parlay Group. The experience has been conducted jointly by research

  17. Four groups of new aromatic halogenated disinfection byproducts: effect of bromide concentration on their formation and speciation in chlorinated drinking water.

    Science.gov (United States)

    Pan, Yang; Zhang, Xiangru

    2013-02-05

    Bromide is naturally present in source waters worldwide. Chlorination of drinking water can generate a variety of chlorinated and brominated disinfection byproducts (DBPs). Although substantial efforts have been made to examine the effect of bromide concentration on the formation and speciation of halogenated DBPs, almost all previous studies have focused on trihalomethanes and haloacetic acids. Given that about 50% of total organic halogen formed in chlorination remains unknown, it is still unclear how bromide concentration affects the formation and speciation of the new/unknown halogenated DBPs. In this study, chlorinated drinking water samples with different bromide concentrations were prepared, and a novel approach-precursor ion scan using ultra performance liquid chromatography/electrospray ionization-triple quadrupole mass spectrometry-was adopted for the detection and identification of polar halogenated DBPs in these water samples. With this approach, 11 new putative aromatic halogenated DBPs were identified, and they were classified into four groups: dihalo-4-hydroxybenzaldehydes, dihalo-4-hydroxybenzoic acids, dihalo-salicylic acids, and trihalo-phenols. A mechanism for the formation of the four groups of new aromatic halogenated DBPs was proposed. It was found that increasing the bromide concentration shifted the entire polar halogenated DBPs as well as the four groups of new DBPs from being less brominated to being more brominated; these new aromatic halogenated DBPs might be important intermediate DBPs formed in drinking water chlorination. Moreover, the speciation of the four groups of new DBPs was modeled: the speciation patterns of the four groups of new DBPs well matched those determined from the model equations, and the reactivity differences between HOBr and HOCl in reactions forming the four groups of new DBPs were larger than those in reactions forming trihalomethanes and haloacetic acids.

  18. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  19. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  20. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  1. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  2. Private Security Companies (PSCs) as a Piracy Countermeasure

    DEFF Research Database (Denmark)

    Struwe, Lars Bangert

    2012-01-01

    Private Security Companies (PSC) are a part of the Best Management Practice in the shipping industry. The ship owners are using PSCs to protect their vessels against pirates, but protection of the vessels is just a part of the services that PSCs can provide. The services can be divided in four main...... groups: (1) security intelligence, risk assessment and consulting; (2) security services; (3) crisis response; and (4) intervention. While the use of PSCs may offer some deterrent value, the potential costs of hiring these firms would appear to outweigh the benefits. The argument in this article...

  3. Characterization of Coal Quality Based On Ash Content From M2 Coal-Seam Group, Muara Enim Formation, South Sumatra Basin

    Directory of Open Access Journals (Sweden)

    Frillia Putri Nasution

    2017-09-01

    Full Text Available Muara Enim Formation is well known as coal-bearing formation in South Sumatra Basin. As coal-bearing formation, this formation was subjects of many integrated study. Muara Enim Formation can be divided into four coal-seam group, M1, M2, M3, and M4. The M2 group comprising of Petai (C, Suban (B, Lower Mangus (A2, and Upper Mangus (A1. Depositional environments of Group M2 is transitional lower delta plain with sub-depositional are crevasse splay and distributary channel. The differentiation of both sub-depositional environments can be caused the quality of coal deposit. One of quality aspects is ash content. This research conducted hopefully can give better understanding of relationship between depositional environments to ash content. Group M2 on research area were found only Seam C, Seam B, and Seam A2, that has distribution from north to central so long as 1400 m. Coal-seam thickness C ranged between 3.25-9.25 m, Seam B range 7.54-13.43 m, and Seam C range 1.53-8.37 m, where all of coal-seams thickening on the central part and thinning-splitting to northern part and southern part. The ash content is formed from burning coal residue material. Ash contents on coal seam caused by organic and inorganic compound which resulted from mixing modified material on surrounded when transportation, sedimentation, and coalification process. There are 27 sample, consists of 9 sample from Seam C, 8 sample from Seam B, and 10 sample from Seam A2. Space grid of sampling is 100-150 m. Ash content influenced by many factors, but in research area, main factor is existence of inorganic parting. Average ash content of Seam C is 6,04%, Seam B is 5,05%, and Seam A2 is 3,8%. Low ash content influenced by settle environment with minor detrital material. High ash content caused by oxidation and erosional process when coalification process. Ash content on coal in research area originated from detritus material carried by channel system into brackish area or originated

  4. LHCb: DIRAC Secure Distributed Platform

    CERN Multimedia

    Casajus, A

    2009-01-01

    DIRAC, the LHCb community grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by us...

  5. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  6. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  7. Managing the security of nursing data in the electronic health record.

    Science.gov (United States)

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing

  8. Instant Spring security starter

    CERN Document Server

    Jagielski, Piotr

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to-follow format following the Starter guide approach.This book is for people who have not used Spring Security before and want to learn how to use it effectively in a short amount of time. It is assumed that readers know both Java and HTTP protocol at the level of basic web programming. The reader should also be familiar with Inversion-of-Control/Dependency Injection, preferably with the Spring framework itsel

  9. The Innovative Activity of Enterprises in the Context of Providing Information Security

    Directory of Open Access Journals (Sweden)

    Sazonets Olga M.

    2015-03-01

    Full Text Available The aim of the article is to study the peculiarities of the innovative activity in the context of providing the enterprise information security. By analyzing, systematizing and summarizing the scientific works of many scientists the essence of the concept of «information security» has been considered and components of the innovation development process from the standpoint of providing information security have been identified. The article discusses issues of providing information security on the basis of introducing innovations, which will allow achieving a state in which there would be realized a sustainable, protected from threats, development of the enterprise. It has been proved that the formation of the innovative enterprise policy should include measures to ensure information security. As a result of the study the types of threats to the enterprise information security have been identified. It has been determined that the innovation process in the field of information security is provided by means of research, administrative, industrial, technological and commercial activities leading to the emergence and commercialization of innovations. The prospect for further research in this area is determining a system of indicators for forecasting the integral innovation indicator of economic information security. The system of indicators for diagnostics of the enterprise information security level enables monitoring the indicators of the state of the enterprise innovation and information activity in order to prevent the emergence of threats.

  10. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  11. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  12. Information Security System and Development of a Modern Organization

    OpenAIRE

    Wawak, Slawomir

    2009-01-01

    Information security management systems are increasingly applied in a number of sectors of the new, global, interconnected economy. They are used by production and service companies, businesses that provide information technology and telecom services, state administration authorities and local governments. Specifically, they are used in case of crime groups or as a means of securing illegal transactions.

  13. E-groups training

    CERN Multimedia

    HR Department

    2012-01-01

    There will be an e-groups training course on 16 March 2012 which will cover the main e-groups functionalities i.e.: creating and managing e-groups, difference between static and dynamic e-groups, configuring posting restrictions and archives, examples of where e-groups can be used in daily work. Even if you have already worked with e-groups, this may be a good opportunity to learn about the best practices and security related recommendations when using e-groups. You can find more details as well as enrolment form for the training (it’s free) here. The number of places is limited, so enrolling early is recommended.   Technical Training Tel. 72844

  14. NS [Nuclear Safety] update. Current safety and security activities and developments taking place in the Department of Nuclear Safety and Security, Issue no. 12, September 2009

    International Nuclear Information System (INIS)

    2009-09-01

    The current issue presents information about the following topics: Nuclear Security Report 2009; G8 Nuclear Safety and Security Group (NSSG); Uranium Production Site Appraisal Team (UPSAT); New Entrant Nuclear Power Programmes Safety Guide on the Establishment of the Safety Infrastructure (DS424)

  15. Perioperative complications and early follow-up with 100 TVT-SECUR procedures.

    Science.gov (United States)

    Neuman, Menahem

    2008-01-01

    Our objective was to evaluate the complications and early follow-up of the tension-free vaginal tape (TVT)-SECUR, a new minimally invasive anti-incontinence operative procedure. A prospective, observational, and consecutive patient series was conducted. Perioperative and 12-month postoperative data were prospectively collected for the first 50 patients against the next consecutive 50 patients, among which TVT-SECUR specific surgical measurements were adopted (Canadian Task Force classification 2). In private hospital operative theatres, the TVT-SECUR operation was performed. Patients with urodynamically proved stress urinary incontinence were enrolled in this study after detailed informed consent was given. The TVT-SECUR, in the hammock shape to mimic the TVT-obturator placement, yet with no skin incisions, required neither bladder catheterization nor intraoperative diagnostic cystoscopy. The clinical and surgical data of 100 consecutive patients with TVT-SECUR were collected prospectively. Two patients had urinary obstructions and needed surgical tape-tension relief. One patient had a 50 mL paravesical self-remitting hematoma. At the first-month postoperative follow-up appointment, the objective therapeutic failure rate for the TVT-SECUR procedure among the 50 patients was 20.0% (10 patients). But when the tape was placed close to the urethra with no space allowed in between, the failure rate in the second patient group went down to 8.0% (4 patients); yet no further postoperative bladder outlet obstruction was diagnosed. Four (8.0%) patients in the first group had vaginal wall penetration with the inserters, requiring withdrawal, reinsertion, and vaginal wall repair. This was avoided with the second patient group by facilitating the inserters' introduction by widening the submucosal tunnel to 12 mm. Six (12.0%) other patients in the first group needed postoperative trimming of a vaginally extruded tape segment, performed in the office with satisfactory results

  16. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  17. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  18. Expert group formation using facility location analysis

    NARCIS (Netherlands)

    Neshati, M.; Beigy, H.; Hiemstra, Djoerd

    In this paper, we propose an optimization framework to retrieve an optimal group of experts to perform a multi-aspect task. While a diverse set of skills are needed to perform a multi-aspect task, the group of assigned experts should be able to collectively cover all these required skills. We

  19. Expert group formation using facility location analysis

    NARCIS (Netherlands)

    Neshati, Mahmood; Beigy, Hamid; Hiemstra, Djoerd

    2014-01-01

    In this paper, we propose an optimization framework to retrieve an optimal group of experts to perform a multi-aspect task. While a diverse set of skills are needed to perform a multi-aspect task, the group of assigned experts should be able to collectively cover all these required skills. We

  20. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  1. Drivers of forests and tree-based systems for food security and nutrition

    DEFF Research Database (Denmark)

    Kleinschmit, Daniela; Sijapati Basnett, Bimbika; Martin, Adrian

    2015-01-01

    In the context of this chapter, drivers are considered to be natural or anthropogenic developments affecting forests and tree-based systems for food security and nutrition. They can improve and contribute to food security and nutrition, but they can also lead to food insecurity and malnutrition. ...... consumption, income and livelihood; or through both. These drivers are interrelated and can have different consequences depending on the social structure; for example, they can support food security for elite groups but can increase the vulnerability of other groups.......In the context of this chapter, drivers are considered to be natural or anthropogenic developments affecting forests and tree-based systems for food security and nutrition. They can improve and contribute to food security and nutrition, but they can also lead to food insecurity and malnutrition......, commercialisation of agriculture, industrialisation of forest resources, gender imbalances, conflicts, formalisation of tenure rights, rising food prices and increasing per capita income) were identified within these four categories. They affect food security and nutrition through land use and management; through...

  2. Identifying priorities to improve maternal and child nutrition among the Khmu ethnic group, Laos: a formative study.

    Science.gov (United States)

    de Sa, Joia; Bouttasing, Namthipkesone; Sampson, Louise; Perks, Carol; Osrin, David; Prost, Audrey

    2013-10-01

    Chronic malnutrition in children remains highly prevalent in Laos, particularly among ethnic minority groups. There is limited knowledge of specific nutrition practices among these groups. We explored nutritional status, cultural beliefs and practices of Laos' Khmu ethnic group to inform interventions for undernutrition as part of a Primary Health Care (PHC) project. Mixed methods were used. For background, we disaggregated anthropometric and behavioural indicators from Laos' Multiple Indicator Cluster Survey. We then conducted eight focus group discussions and 33 semi-structured interviews with Khmu villagers and health care workers, exploring beliefs and practices related to nutrition. The setting was two rural districts in Luang Prabang province, in one of which the PHC project had been established for 3 years. There was a higher prevalence of stunting in the Khmu than in other groups. Disaggregation showed nutrition behaviours were associated with ethnicity, including exclusive breastfeeding. Villagers described strong adherence to post-partum food restrictions for women, while little change was described in intake during pregnancy. Most children were breastfed, although early introduction of pre-lacteal foods was noted in the non-PHC district. There was widespread variation in introduction and diversity of complementary foods. Guidance came predominantly from the community, with some input from health care workers. Interventions to address undernutrition in Khmu communities should deliver clear, consistent messages on optimum nutrition behaviours. Emphasis should be placed on dietary diversity for pregnant and post-partum mothers, encouraging exclusive breastfeeding and timely, appropriate complementary feeding. The impact of wider governmental policies on food security needs to be further assessed. © 2012 John Wiley & Sons Ltd.

  3. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  4. Strengthening nuclear security

    International Nuclear Information System (INIS)

    Kurihara, Hiroyoshi

    2003-01-01

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  5. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  6. Healthy Body Image Intervention Delivered to Young Women via Facebook Groups: Formative Study of Engagement and Acceptability.

    Science.gov (United States)

    Stapleton, Jerod L; Manne, Sharon L; Day, Ashley K; Levonyan-Radloff, Kristine; Pagoto, Sherry L

    2018-02-20

    There is increasing interest in using social media sites such as Facebook to deliver health interventions so as to expose people to content while they are engaging in their usual social media habit. This formative intervention development study is novel in describing a preliminary test of using the secret group feature of Facebook to deliver a behavioral intervention targeting users of indoor tanning beds to reduce their risk of skin cancer. Intervention content was designed to challenge body image-related constructs associated with indoor tanning through the use of dissonance-inducing content. To evaluate engagement with and acceptability of using a secret Facebook group to deliver a healthy body image intervention to young women engaged in indoor tanning. Seventeen young women completed a baseline survey and joined a secret Facebook group with intervention content delivered via daily posts for 4 weeks. Engagement data was extracted and acceptability was measured via a follow-up survey. The study had a high retention rate (94%, [16/17]). On average, posts were viewed by 91% of participants, liked by 35%, and commented on by 26%. The average comment rate was highest (65%) for posts that elicited comments by directly posing questions or discussion topics to the group. Average intervention acceptability ratings were highly positive and participants reported feeling connected to the group and its topic. Average rates of past 1-month indoor tanning reported following the intervention were lower than the baseline rate (P=.08, Cohen d=0.47). This study is novel in demonstrating participant engagement with and acceptability of using Facebook secret groups to deliver a dissonance-inducing intervention approach that utilizes group-based discussions related to body image. The study is also unique within the field of skin cancer prevention by demonstrating the potential value of delivering an indoor tanning intervention within an interactive social media format. The findings

  7. Healthy Body Image Intervention Delivered to Young Women via Facebook Groups: Formative Study of Engagement and Acceptability

    Science.gov (United States)

    Manne, Sharon L; Day, Ashley K; Levonyan-Radloff, Kristine; Pagoto, Sherry L

    2018-01-01

    Background There is increasing interest in using social media sites such as Facebook to deliver health interventions so as to expose people to content while they are engaging in their usual social media habit. This formative intervention development study is novel in describing a preliminary test of using the secret group feature of Facebook to deliver a behavioral intervention targeting users of indoor tanning beds to reduce their risk of skin cancer. Intervention content was designed to challenge body image-related constructs associated with indoor tanning through the use of dissonance-inducing content. Objective To evaluate engagement with and acceptability of using a secret Facebook group to deliver a healthy body image intervention to young women engaged in indoor tanning. Methods Seventeen young women completed a baseline survey and joined a secret Facebook group with intervention content delivered via daily posts for 4 weeks. Engagement data was extracted and acceptability was measured via a follow-up survey. Results The study had a high retention rate (94%, [16/17]). On average, posts were viewed by 91% of participants, liked by 35%, and commented on by 26%. The average comment rate was highest (65%) for posts that elicited comments by directly posing questions or discussion topics to the group. Average intervention acceptability ratings were highly positive and participants reported feeling connected to the group and its topic. Average rates of past 1-month indoor tanning reported following the intervention were lower than the baseline rate (P=.08, Cohen d=0.47). Conclusions This study is novel in demonstrating participant engagement with and acceptability of using Facebook secret groups to deliver a dissonance-inducing intervention approach that utilizes group-based discussions related to body image. The study is also unique within the field of skin cancer prevention by demonstrating the potential value of delivering an indoor tanning intervention within

  8. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  9. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  10. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  11. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  12. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  13. Identification of Factors of Influence upon the Cost of Fixed Coupon Securities

    Directory of Open Access Journals (Sweden)

    Hlotov Yevhen O.

    2014-01-01

    Full Text Available The article studies fixed coupon securities (bonds. It provides a calculation of the cash flow, generated by fixed coupon securities, with enclosed discounted face value of securities. It analyses time indicator – average weighted duration of payments, which characterises sensitivity of the price of securities to changes of interest rates in the market. It proves availability of two groups of interconnections between the cost of a bond, coupon rate, market rate (rate of return and term of its payment. The first group of interconnections reflects interconnections between the cost of a bond, coupon rate and market rate (rate of return. The second group characterises connection between the bond cost and term of its payment. The authors study the average weighted duration of payments. It plays an important role in analysis of long-term securities with fixed income. To simplify calculations it was accepted that the coupon payment is done once a year. The article offers a formula for identifying inaccuracy of the bond price depending on the expected change of profitability on payment. Analysing duration properties the article identifies shortcomings inherent in this indicator. Taking into account the average weighted duration of payments the article recommends a formula, as more efficient, for identification of the future bond price depending on change of profitability. The conducted studies are a theoretical ground for development of models of management of fixed income securities portfolios. The obtained scientific results could be used in the educational process both in colleges and specialised trainings of securities specialists. The scientific results could be used for developing information technologies when identifying cost of securities (fixed coupon bonds.

  14. Three Modes of Thinking and Policy Orientation of Cultural Security

    Institute of Scientific and Technical Information of China (English)

    LIU Yuejin; Wang Xuege

    2016-01-01

    Three types of relations are entangled nowadays in dealing with issues conceming national cultural security on both the theoretical and practical levels:(1) the relation between one's own culture and that of other ethnic groups;(2) the relation between advanced and underdeveloped parts of culture;(3) the relation between one's ethnic culture and so-called foreign advanced culture as related to the previous two.Accordingly,three modes of thinking are likely adopted in handling issues concerning national cultural security:to antagonize one's own culture with that of other ethnic groups,that is,taking the "me or you" attitude;to dualize cultures as the "advanced" and the "underdeveloped",that is,believing things to be good if not bad,or vice versa;and to assert that the ethnic are the advanced,that is,taking the "only-megood" stance.It is a very demanding job to maintain national culture and to pursue cultural development at the same time.Only when cultures are grouped into those without distinction between the advanced and the underdeveloped and those with such distinction can the relation between the ethnic and the advanced be properly handled.With the former,it is essential to maintain the ethnicity of one's own culture before the cultural security is safeguarded.With the latter,however,the pursuit of advanced cultures and the advocacy of the advanced part of a particular culture is a key to ensuring and safeguarding the national cultural security.Hence,it is important to enhance the public awareness of cultural security,and more essentially for the government to offer scientifically appropriate orientation towards cultural security and to frame related policies.

  15. The star formation histories of local group dwarf galaxies. II. Searching for signatures of reionization

    Energy Technology Data Exchange (ETDEWEB)

    Weisz, Daniel R. [Department of Astronomy, University of California at Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Dolphin, Andrew E. [Raytheon Company, 1151 East Hermans Road, Tucson, AZ 85756 (United States); Skillman, Evan D. [Minnesota Institute for Astrophysics, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States); Holtzman, Jon [Department of Astronomy, New Mexico State University, Box 30001, 1320 Frenger Street, Las Cruces, NM 88003 (United States); Gilbert, Karoline M.; Dalcanton, Julianne J.; Williams, Benjamin F., E-mail: drw@ucsc.edu [Department of Astronomy, University of Washington, Box 351580, Seattle, WA 98195 (United States)

    2014-07-10

    We search for signatures of reionization in the star formation histories (SFHs) of 38 Local Group dwarf galaxies (10{sup 4} < M{sub *} < 10{sup 9} M{sub ☉}). The SFHs are derived from color-magnitude diagrams using archival Hubble Space Telescope/Wide Field Planetary Camera 2 imaging. Only five quenched galaxies (And V, And VI, And XIII, Leo IV, and Hercules) are consistent with forming the bulk of their stars before reionization, when full uncertainties are considered. Observations of 13 of the predicted 'true fossils' identified by Bovill and Ricotti show that only two (Hercules and Leo IV) indicate star formation quenched by reionization. However, both are within the virial radius of the Milky Way and evidence of tidal disturbance complicates this interpretation. We argue that the late-time gas capture scenario posited by Ricotti for the low mass, gas-rich, and star-forming fossil candidate Leo T is observationally indistinguishable from simple gas retention. Given the ambiguity between environmental effects and reionization, the best reionization fossil candidates are quenched low mass field galaxies (e.g., KKR 25).

  16. Corporate identity as a factor of corporate security

    OpenAIRE

    Perelygina, Elena

    2011-01-01

    Forming-up of the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  17. (Congressional Interest) Network Information and Space Security Center

    Science.gov (United States)

    2011-09-30

    Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of

  18. APPROACHES TO THE SECURITY SYSTEM AT THE MS SHAREPOINT

    Directory of Open Access Journals (Sweden)

    Iryna V. Zolotarenko

    2010-10-01

    Full Text Available Relevance of the material contained in the article is conditioned by pressing needs of society in creating secure information systems, facilitating the introduction of advanced information technologies in the education department. Security is important for the reliability and efficiency of such systems. One way of solving the security problem is the distribution of categories of users and granting their rights at different levels. The paper analyzes general approaches to organize groups and permission levels of users in information systems developed based on MS SharePoint. The main design decisions on security in information system planning research at the National Academy of Pedagogical Sciences of Ukraine based on the Internet use the conceptual results of this article.

  19. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  20. Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Sunday S. AKPAN

    2015-10-01

    Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.

  1. Security Data Warehouse Application

    Science.gov (United States)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  2. Report of the Public Cryptography Study Group.

    Science.gov (United States)

    American Council on Education, Washington, DC.

    Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…

  3. Risk behaviour and group formation in microcredit groups in Eritrea

    NARCIS (Netherlands)

    Lensink, Robert; Mehrteab, Habteab T.

    2003-01-01

    We conducted a survey in 2001 among members and group leaders of borrowers who accessed loans from two microcredit programs in Eritrea. Using the results from this survey, this paper aims to provide new insights into the empirical relevance of the homogeneous matching hypothesis for microcredit

  4. Risk Behaviour and Group Formation in Microcredit Groups in Eritrea

    NARCIS (Netherlands)

    Lensink, B.W.; Mehrteab, H.T.

    2006-01-01

    We conducted a survey in 2001 among members and group leaders of borrowers who accessed loans from two microcredit programs in Eritrea. Using the results from this survey, this paper aims to provide new insights into the empirical relevance of the homogeneous matching hypothesis for microcredit

  5. Information security of children and adolescents in the modern world: psychological aspects of the problem

    Directory of Open Access Journals (Sweden)

    Budykin S.V.

    2017-04-01

    Full Text Available The authors focus on identifying the psychological aspects of the problem of information security of children and adolescents in the modern world. It is noted that new technologies are penetrating deeper into our lives, become cultural means of socialization and human development, contribute to the formation of new social practices in everyday life, require a certain style of life. Draws attention to the fact that the impact of these technologies varies in age groups, the most vulnerable are children and adolescents. After Western researchers of problems of information security of children and adolescents, identifies the category of risk associated with Internet communication: 1 risk associated with the content of the materials provided on the Internet; 2 the risk due to contacts with others; 3 the risk arising in connection with the illegal downloading of materials. 4 risks resulting from the use of personal data, children and adolescents often provide personal information. Demonstrates the necessity of analyzing how users of new technologies to diagnose risk associated with the use of technology such as the Internet, and what behavioral strategies they adapt. Stresses the importance and the need to examine how the immediate environment of children and adolescents interpreterpath information security and suggests how to counter the threat, coupled with the use of the Internet.

  6. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  7. Aperiodic dynamics in a deterministic adaptive network model of attitude formation in social groups

    Science.gov (United States)

    Ward, Jonathan A.; Grindrod, Peter

    2014-07-01

    Adaptive network models, in which node states and network topology coevolve, arise naturally in models of social dynamics that incorporate homophily and social influence. Homophily relates the similarity between pairs of nodes' states to their network coupling strength, whilst social influence causes coupled nodes' states to convergence. In this paper we propose a deterministic adaptive network model of attitude formation in social groups that includes these effects, and in which the attitudinal dynamics are represented by an activato-inhibitor process. We illustrate that consensus, corresponding to all nodes adopting the same attitudinal state and being fully connected, may destabilise via Turing instability, giving rise to aperiodic dynamics with sensitive dependence on initial conditions. These aperiodic dynamics correspond to the formation and dissolution of sub-groups that adopt contrasting attitudes. We discuss our findings in the context of cultural polarisation phenomena. Social influence. This reflects the fact that people tend to modify their behaviour and attitudes in response to the opinions of others [22-26]. We model social influence via diffusion: agents adjust their state according to a weighted sum (dictated by the evolving network) of the differences between their state and the states of their neighbours. Homophily. This relates the similarity of individuals' states to their frequency and strength of interaction [27]. Thus in our model, homophily drives the evolution of the weighted ‘social' network. A precise formulation of our model is given in Section 2. Social influence and homophily underpin models of social dynamics [21], which cover a wide range of sociological phenomena, including the diffusion of innovations [28-32], complex contagions [33-36], collective action [37-39], opinion dynamics [19,20,40,10,11,13,15,41,16], the emergence of social norms [42-44], group stability [45], social differentiation [46] and, of particular relevance

  8. Chemoselective Methylation of Phenolic Hydroxyl Group Prevents Quinone Methide Formation and Repolymerization During Lignin Depolymerization

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kwang Ho; Dutta, Tanmoy; Walter, Eric D.; Isern, Nancy G.; Cort, John R.; Simmons, Blake A.; Singh, Seema

    2017-03-30

    Chemoselective blocking of the phenolic hydroxyl (Ar-OH) group by methylation was found to suppress secondary repolymerization and charring during lignin depolymerization. Methylation of Ar-OH prevents formation of reactive quinone methide intermediates, which are partly responsible for undesirable secondary repolymerization reactions. Instead, this structurally modified lignin produces more relatively low molecular weight products from lignin depolymerization compared to unmodified lignin. This result demonstrates that structural modification of lignin is desirable for production of low molecular weight phenolic products. This approach could be directed toward alteration of natural lignification processes to produce biomass more amenable to chemical depolymerization.

  9. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  10. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  11. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  12. Ownership Networks Effects on Secured Borrowing

    NARCIS (Netherlands)

    Martinez, Constanza; Cizek, Pavel; Leon Rincon, Carlos

    2018-01-01

    The secured borrowing based on sell/buy-backs agreements is studied, specifically considering both: quantity and price. The empirical evidence presented in this paper suggests that, after controlling for specific individual characteristics, group-specific effects (defined by belonging or not to a

  13. Utilising a multi-item questionnaire to assess household food security in Australia.

    Science.gov (United States)

    Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda

    2018-03-15

    Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.

  14. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  15. Professional identity formation in the transition from medical school to working life: a qualitative study of group-coaching courses for junior doctors.

    Science.gov (United States)

    de Lasson, Lydia; Just, Eva; Stegeager, Nikolaj; Malling, Bente

    2016-06-24

    The transition from student to medical doctor is challenging and stressful to many junior doctors. To practice with confidence and professionalism the junior doctors have to develop a strong professional identity. Various suggestions on how to facilitate formation of professional identity have been offered including the possible positive effect of group-coaching courses. The purpose of this study was to explore how group-coaching might facilitate professional identity formation among junior doctors in the transition period. Group-coaching courses comprising three whole-day sessions and five 2 h sessions during a period of 4 months were offered to junior doctors in the first years after graduation. The purpose was to support the participants' professional development, ability to relate to patients, relatives and staff and career development. The coaches in this study had a background as health professionals combined with coaching educations. Data was obtained through observations, open-ended questionnaires and interviews. A generic thematic analysis was applied. Forty-five doctors participated in six coaching groups. The three main themes emerging in the sessions were: Adoption to medical culture, career planning, and work/life-balance. The junior doctors found the coaching intervention highly useful in order to cope with these challenges. Furthermore, the group was a forum where the junior doctors could share thoughts and feelings with colleagues without being afraid that this would endanger their professional career. Many found new ways to respond to everyday challenges mainly through a new awareness of patterns of thinking and feeling. The participants found that the group-coaching course supported their professional identity formation (thinking, feeling and acting as a doctor), adoption to medical culture, career planning and managing a healthy work/life-balance. Further studies in different contexts are recommended as well as studies using other methods to

  16. Corporate Identity as a Factor of Corporate Security

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available Forming-upof the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  17. Review of Social Networking Sites' Security and Privacy

    OpenAIRE

    YANG, SHUN

    2015-01-01

    Nowadays social media networking has dramatically increased. Social networking sites like Facebook make users create huge amount of profiles and share personal information within networking of different users. Social networking exposes personal information far beyond the group of friends. And that information or data on social media networking could be potential threat to people's information security and privacy. In this review, we are going to view the privacy risks and security problem...

  18. Formation Energies of Native Point Defects in Strained-Layer Superlattices (Postprint)

    Science.gov (United States)

    2017-06-05

    potential; bulk materials; total energy calculations; entropy; strained- layer superlattice (SLS) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...AFRL-RX-WP-JA-2017-0217 FORMATION ENERGIES OF NATIVE POINT DEFECTS IN STRAINED- LAYER SUPERLATTICES (POSTPRINT) Zhi-Gang Yu...2016 Interim 11 September 2013 – 5 November 2016 4. TITLE AND SUBTITLE FORMATION ENERGIES OF NATIVE POINT DEFECTS IN STRAINED- LAYER SUPERLATTICES

  19. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  20. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  1. The changing face of Hanford security 1990--1994

    International Nuclear Information System (INIS)

    Thielman, J.

    1995-01-01

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE's Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here

  2. Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

    Directory of Open Access Journals (Sweden)

    Michael J. Pelosi

    2018-04-01

    Full Text Available In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp. Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs. In this extended reprint, we introduce additional application and discussion regarding cold storage of crypto-currency account and password information, as well as applications for secure transfer in hostile or insecure network circumstances.

  3. 77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading

    Science.gov (United States)

    2012-08-20

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...

  4. Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.

    Science.gov (United States)

    Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles

    2018-05-01

    Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  5. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    Science.gov (United States)

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    field of PP and most of them have been revised at least once. They have been produced by the French Operators, assessed by the IPSN and approved by the French Competent Authority. They are mandatory as far as PP is concerned for NM held in category I facilities. To go ahead preliminary security studies in the field of MC and A have been performed by operators of two different types of facilities, the results of which are very encouraging. In the field of PP, security studies are based on an analysis consisting in grouping together all the possible paths leading to NM in compliance with a set of threats. Diagrams could be used to show which actions have to be taken to successfully carry out the theft of NM. This may involve crossing zones or outwitting detection devices and overcoming obstacles. By following the diagrams mentioned above, the probability of undetected persons or nuclear materials as they progress in the facility is evaluated. The relevant criteria to assume that the theft has been detected is determined. Then the time elapsing between positive detection of the action and the removal of the NM from the facility is estimated. This estimate is based on documented data and/or the results of tests carried out in the facility or elsewhere. Critical paths are taken as being those along which nuclear materials can be removed from the facility in the shortest time after detection. Special care is taken when analyzing these paths. In the field of MC and A, when unauthorized removal or dysfunction occurs, a discrepancy appears between the physical reality of NM and the way in which it is represented in the MC and A systems. In the case of these studies, an assumption is made that such a discrepancy exists in compliance with a set of threats. Then, the purpose of the security study is to analyse the way in which the discrepancy is revealed in connection with a discovery threshold amount, if any. It should be noted that possible detection of the discrepancy by the

  8. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  9. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  10. Chemical Evolution and Star Formation History of the Disks of Spirals in Local Group

    Science.gov (United States)

    Yin, J.

    2011-05-01

    Milky Way (MW), M31 and M33 are the only three spiral galaxies in our Local group. MW and M31 have similar mass, luminosity and morphology, while M33 is only about one tenth of MW in terms of its baryonic mass. Detailed theoretical researches on these three spirals will help us to understand the formation and evolution history of both spiral galaxies and Local group. Referring to the phenomenological chemical evolution model adopted in MW disk, a similar model is established to investigate the star formation and chemical enrichment history of these three local spirals. Firstly, the properties of M31 disk are studied by building a similar chemical evolution model which is able to successfully describe the MW disk. It is expected that a simple unified phenomenological chemical evolution model could successfully describe the radial and global properties of both disks. Comparing with the former work, we adopt an extensive data set as model constraints, including the star formation profile of M31 disk derived from the recent UV data of GALEX. The comparison among the observed properties of these two disks displays very interesting similarities in their radial profiles when the distance from the galactic center is expressed in terms of the corresponding scale length. This implies some common processes in their formation and evolution history. Based on the observed data of the gas mass surface density and SFR surface density, the SFR radial profile of MW can be well described by Kennicutt-Schmidt star formation law (K-S law) or modified K-S law (SFR is inversely proportional to the distance from the galactic center), but this is not applicable to the M31 disk. Detailed calculations show that our unified model describes fairly well all the main properties of the MW disk and most properties of M31 disk, provided that the star formation efficiency of M31 disk is adjusted to be twice as large as that of MW disk (as anticipated from the lower gas fraction of M31). However, the

  11. A Framework for Semantic Group Formation in Education

    Science.gov (United States)

    Ounnas, Asma; Davis, Hugh C.; Millard, David E.

    2009-01-01

    Collaboration has long been considered an effective approach to learning. However, forming optimal groups can be a time consuming and complex task. Different approaches have been developed to assist teachers allocate students to groups based on a set of constraints. However, existing tools often fail to assign some students to groups creating a…

  12. Security Modeling on the Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  14. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  15. You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners - Reduced Performance Level in Aviation Security with No Gender Effect.

    Science.gov (United States)

    Krüger, Jenny K; Suchan, Boris

    2016-01-01

    Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  16. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  17. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  18. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  19. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  20. Social factors shaping the formation of a multi-stakeholder trails network group for the Monongahela National Forest, West Virginia

    Science.gov (United States)

    Karen Robinson; Steven Selin; Chad Pierskalla

    2009-01-01

    This paper reports the results and management implications of a longitudinal research study examining the social factors affecting the formation of a trails network advisory group for the Monongahela National Forest (MNF) in West Virginia. A collaborative process of creating an MNF trails network with input from local users and stakeholders has been largely...

  1. Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols

    OpenAIRE

    R. Kabila

    2008-01-01

    IPsec has now become a standard information security technology throughout the Internet society. It provides a well-defined architecture that takes into account confidentiality, authentication, integrity, secure key exchange and protection mechanism against replay attack also. For the connectionless security services on packet basis, IETF IPsec Working Group has standardized two extension headers (AH&ESP), key exchange and authentication protocols. It is also working on l...

  2. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  3. Security of supply on the electricity market. Report of a working group

    International Nuclear Information System (INIS)

    2000-06-01

    The shift from a regulated electricity market to open competitive electricity markets has been fast in Finland. Finland together with Sweden, Norway and partly also Denmark form a common market area where the internal trade in electricity has markedly increased. Partly as a result of this, the share of net import in our electricity consumption has increased. The low price level on the Nordic market has contributed to an increased import of electricity to Finland. The generally clearly increased production of hydroelectric power together with the functioning principles of the Nordic electricity exchange have lead to a situation where the competitive position of indigenous electricity, especially that from condensing power, has become more difficult. In Finland, several condensing power plants have, accordingly, been closed and the trend seems to continue. Similar development has taken place also in Sweden and Denmark. In the current market situation, the decisions upon investment in the construction of new power plants have further been postponed until later. Because the economic interest of the market players in maintaining slow reserve capacity has been reduced in the current market situation, there is concern whether the market is able to guarantee the security of electricity supply in all circumstances with varying demand taking also account of possible long-term malfunction of power plants or disturbances in the import of electricity or gas. Sweden and Norway are besides Finland net importers of electricity in normal hydrological years. Of the Nordic countries, only Denmark is able to balance the Nordic demand for electricity in case of a poor hydrological year. The price level on the electricity market is expected to remain low still for years. Building new capacity during the coming few years seems unlikely in all Nordic countries. The increased consumption of electricity as a result of economic growth and the reduction in capacity will however lead to a

  4. Ambiência e formação de grupo em programas de caminhada Ambiance and group formation in walking programs

    Directory of Open Access Journals (Sweden)

    Marcos Warschauer

    2009-06-01

    Full Text Available O presente relato discute os conceitos de ambiência e formação de grupo por intermédio de duas experiências com grupos de caminhada desenvolvidos na Atenção Básica: o programa "Caminhando para a Saúde", em Santo André (SP, e o grupo da Unidade de Saúde Jardim Seckler, em São Paulo (SP. Ambas as experiências trabalham com a concepção de prática corporal, que amplia o conceito de atividade física ao colocar o sujeito no centro das ações, e têm como principal enfoque a promoção da saúde. A análise do processo de implementação desses programas destaca a ambiência e a formação de grupo como fatores fundamentais para a adesão à prática. O conceito de ambiência é composto de três eixos: a confortabilidade, o espaço como forma de produção de subjetividade e como instrumento facilitador de mudanças no processo de trabalho. Os dispositivos grupais promovem ações de cidadania, priorizando a solidariedade, a comunicação e os relacionamentos pessoais. Esses dois conceitos podem estar correlacionados e viabilizar outras maneiras para a implementação e o desenvolvimento de grupos de caminhada.The present report discusses the concepts of ambiance and group formation by means of two experiences with walking groups developed in Primary Care: the program "Walking for Health", in the city of Santo André, state of São Paulo, and the group of the Jardim Seckler Health Unit, in the city of São Paulo, state of São Paulo. Both experiences were developed using the body practice concept, which goes beyond the concept of physical activity, placing the person at the center of his/her own actions. The experiences' main focus is health promotion. Ambiance and group formation are fundamental factors to adhere to the walking practice. The ambiance concept is formed by three axes: comfortability, space as a way to produce subjectivity and as an instrument that facilitates change in the work process. Group activities promote

  5. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  6. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  7. FOOD SECURITY PROBLEMS OF THE RUSSIAN FEDERATION

    Directory of Open Access Journals (Sweden)

    Natalia Polyanskaya

    2015-09-01

    Full Text Available The article describes the concepts and factors of food security and food sovereignty of the Russian Federation. The composition of the consumer basket, the most significant of its components, and based on threshold values of self-sufficiency is calculated in the dynamics of the prevalence of food independence. The groups of products, which are in the country to be at a level below the thresholds, regulated by the food security doctrine of the Russian Federation. Identified the possible General trend of development of agricultural production in the country.

  8. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  9. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  10. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  11. Guidelines for computer security in general practice.

    Science.gov (United States)

    Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan

    2007-01-01

    As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making

  12. Work-related violence against security guards--who is most at risk?

    Science.gov (United States)

    Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna

    2011-01-01

    Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.

  13. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  14. Infant nutrition in Saskatoon: barriers to infant food security.

    Science.gov (United States)

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  15. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  16. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  17. Digitizing and Securing Archived Laboratory Notebooks

    Science.gov (United States)

    Caporizzo, Marilyn

    2008-01-01

    The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…

  18. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  19. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  20. Politics and Business Group Formation in China

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik

    2012-01-01

    As a result of economic reform and administrative restructuring in China, a number of powerful state-owned business groups (“national champions”) have emerged within sectors of strategic importance. They are headed by a new corporate elite which enjoys unprecedentedly high levels of remuneration...... makes it possible to transfer/rotate business leaders to take up positions in state and Party agencies. In order to conceptualize the coexistence of the contradicting forces for further enterprise autonomy and continued central control that characterizes the evolving relationship between business groups...

  1. Effectiveness of Group Supervision versus Combined Group and Individual Supervision.

    Science.gov (United States)

    Ray, Dee; Altekruse, Michael

    2000-01-01

    Investigates the effectiveness of different types of supervision (large group, small group, combined group, individual supervision) with counseling students (N=64). Analyses revealed that all supervision formats resulted in similar progress in counselor effectiveness and counselor development. Participants voiced a preference for individual…

  2. Study Groups in Denmark

    DEFF Research Database (Denmark)

    Hjorth, Poul G.

    2007-01-01

    Since 1998 European Study Groups have been held in Denmark, and Danish companies from LEGO and NOVO to very small high-tech firms have participated. I briefly describe the history, the organisation and the format of the Danish Study Groups, and highlight a few problem solutions.......Since 1998 European Study Groups have been held in Denmark, and Danish companies from LEGO and NOVO to very small high-tech firms have participated. I briefly describe the history, the organisation and the format of the Danish Study Groups, and highlight a few problem solutions....

  3. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  4. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  5. But you should be the specialist! Weak Mental Rotation Performance in Aviation Security Screeners.Reduced performance level in aviation security with no gender effect.

    Directory of Open Access Journals (Sweden)

    Jenny Kathinka Krüger

    2016-03-01

    Full Text Available Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  6. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  7. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  8. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  9. Formation of a vesicovaginal fistula in a pig model

    DEFF Research Database (Denmark)

    Lindberg, Jennifer; Rickardsson, Emilie; Andersen, Margrethe

    2015-01-01

    the bladder and the vagina was made, and the mucosa between them was sutured together with absorbable sutures. A durometer ureteral stent was introduced into the fistula, secured with sutures to the bladder wall, allowing for the formation of a persistent fistula tract. Six weeks postoperatively cysto...

  10. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  11. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  12. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  13. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  14. The program of group constants creation (SMOK) on basis libraries of evaluated nuclear data in ENDE/B format for physical module FORTUN-88

    International Nuclear Information System (INIS)

    Borisov, A.A.

    1991-01-01

    The SMOK program for creation of group microconstants in the FORTUN-88 physical module format providing for calculations of neutron transport by the Monte Carlo method is described. The program processes files of evaluated neutron nuclear data in the ENDF-4 format. The constant structure gives an apportunity to simulate the process of neutron collisions with matter in details. The program service capabilities provide for graphical constant comparison. 11 refs

  15. Definition of the “economic security of strategic changes at an enterprise” notion

    Directory of Open Access Journals (Sweden)

    Otenko Iryna Pavlivna

    2014-01-01

    Full Text Available Availability of a multitude of approaches to management of economic security of an enterprise and systemisation of their provisions allow development of a conceptual framework by means of identification of the essence of the “enterprise economic security” notion in the context of development processes management. The article shows that essence and composition of the “economic security of strategic changes of an enterprise” notion should not only take into account the set of views and methods of understanding and their interpretation in various aspects, but also form the basic idea and tasks of ensuring economic security of strategic changes of an enterprise, which is reflected in results of its activity through prevention and assessment of threats and formation of the state of protection and qualitative changes. The presented provision that the economic security management system should be integrated into the processes of strategic changes of an enterprise allows forming methodical provision of management of economic security of strategic changes of an enterprise and instruments of management, directions of forming of which correspond with the enterprise strategic goals.

  16. Towards a platform to visualize the state of South Africa's information security

    CSIR Research Space (South Africa)

    Swart, I

    2014-08-01

    Full Text Available by province Various groups in business requires differentiated views and this remains true on a national level. Figure 4 is a graph view representing all internet facing devices grouped by their detected province. While not strictly related to security...Anonymous 2012, . [13] J. Webb, S. Maynard, A. Ahmad and G. Shanks. Towards an intelligence-driven information security risk management process for organisations. Presented at 24th Australasian Conference on Information Systems Proceedings. 2013, . [14...

  17. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  18. Stratigraphy and correlation of the Manitou Falls formation, the Athabasca Group

    International Nuclear Information System (INIS)

    Iida, Yoshimasa; Ikeda, Koki; Tsuruta, Tadahiko; Yamada, Yasuo; Ito, Hiroaki; Goto, Junichi

    1996-01-01

    Manitou Falls formation is the thick strata of Proterozoic era that spread widely in the uranium deposit zone in Northern Saskatchewan, Canada (Athabasca basin). In order to study in detail underground geological structure by trial boring, it is necessary to distinguish and compare strata by dividing them into the units as small as possible. The Manitou Falls formation is composed of only sandstone and conglomerate, and it does not have simply identified, continuous strata like tuff and coal layers. In the Christie Lake B district located in Eastern Athabasca basin, the division of strata was carried out by utilizing the data of the changes in the volume ratio of conglomerate layer and maximum pebble size and natural radioactivity logging and based on the careful comparison among trial bores. As the result, this formation was divided into the units of 9 strata. As one of the methods of identifying each unit, the comparison of the power spectra of natural radioactivity logging data was attempted. By this means, it was found that the features in the periodicity of stratum accumulation are useful for identifying strata. The outline of the Manitou Falls formation, the location of the investigated district, the basic data for stratigraphy division, the stratigraphy division in Christie Lake B district and the results are reported. (K.I.)

  19. A DRM Security Architecture for Home Networks

    NARCIS (Netherlands)

    Popescu, B.C.; Crispo, B.; Kamperman, F.L.A.J.; Tanenbaum, A.S.; Kiayias, A.; Yung, M.

    2004-01-01

    This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called "Authorized Domains", where legally acquired copyrighted content can seamlessly move from

  20. Organizational information assets classification model and security architecture methodology

    Directory of Open Access Journals (Sweden)

    Mostafa Tamtaji

    2015-12-01

    Full Text Available Today's, Organizations are exposed with huge and diversity of information and information assets that are produced in different systems shuch as KMS, financial and accounting systems, official and industrial automation sysytems and so on and protection of these information is necessary. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released.several benefits of this model cuses that organization has a great trend to implementing Cloud computing. Maintaining and management of information security is the main challenges in developing and accepting of this model. In this paper, at first, according to "design science research methodology" and compatible with "design process at information systems research", a complete categorization of organizational assets, including 355 different types of information assets in 7 groups and 3 level, is presented to managers be able to plan corresponding security controls according to importance of each groups. Then, for directing of organization to architect it’s information security in cloud computing environment, appropriate methodology is presented. Presented cloud computing security architecture , resulted proposed methodology, and presented classification model according to Delphi method and expers comments discussed and verified.

  1. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  2. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  3. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  4. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  5. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  6. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  7. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.

  8. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-01-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process

  9. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  10. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  11. Recent advances in systems safety and security

    CERN Document Server

    Stamatescu, Grigore

    2016-01-01

    This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security – IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.

  12. Addressing the Pilot security problem with gLExec

    International Nuclear Information System (INIS)

    Sfiligoi, I.; Koeroo, O.; Venekamp, G.; Yocum, D.; Groep, D.; Petravick, D.

    2007-01-01

    The Grid security mechanisms were designed under the assumption that users would submit their jobs directly to the Grid gatekeepers. Many groups are however starting to use pilot-based infrastructures, where users submit jobs to a centralized queue and are successively transferred to the Grid resources by the pilot infrastructure. While this approach greatly improves the user experience, it does introduce several security and policy issues, the more serious being the lack of system level protection between the users and the inability for Grid sites to apply fine grained authorization policies. One possible solution to the problem is provided by gLExec, a X.509 aware suexec derivative. By using gLExec, the pilot workflow becomes as secure as any traditional one

  13. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  14. Unified compression and encryption algorithm for fast and secure network communications

    International Nuclear Information System (INIS)

    Rizvi, S.M.J.; Hussain, M.; Qaiser, N.

    2005-01-01

    Compression and encryption of data are two vital requirements for the fast and secure transmission of data in the network based communications. In this paper an algorithm is presented based on adaptive Huffman encoding for unified compression and encryption of Unicode encoded textual data. The Huffman encoding weakness that same tree is needed for decoding is utilized in the algorithm presented as an extra layer of security, which is updated whenever the frequency change is above the specified threshold level. The results show that we get compression comparable to popular zip format and in addition to that data has got an additional layer of encryption that makes it more secure. Thus unified algorithm presented here can be used for network communications between different branches of banks, e- Government programs and national database and registration centers where data transmission requires both compression and encryption. (author)

  15. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  16. Developing measures of food and nutrition security within an Australian context.

    Science.gov (United States)

    Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca

    2017-10-01

    To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.

  17. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  18. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  19. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  20. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  1. Physical security in multinational nuclear-fuel-cycle operations

    International Nuclear Information System (INIS)

    Willrich, M.

    1977-01-01

    Whether or not multinationalization will reduce or increase risks of theft or sabotage will depend on the form and location of the enterprise, the precise nature of the physical security arrangements applied to the enterprise, and the future course of crime and terrorism in the nuclear age. If nuclear operations are multinationalized, the host government is likely to insist on physical security measures that are at least as stringent as those for a national or private enterprise subject to its jurisdiction. At the same time, the other participants will want to be sure the host government, as well as criminal groups, do not steal nuclear material from the facility. If designed to be reasonably effective, the physical security arrangements at a multinational nuclear enterprise seem likely to reduce the risk that any participating government will seek to divert material from the facility for use in a nuclear weapons program. Hence, multinationalization and physical security will both contribute to reducing the risks of nuclear weapons proliferation to additional governments. If economic considerations dominate the timing, scale and location of fuel-cycle facilities, the worldwide nuclear power industry is likely to develop along lines where the problems of physical security will be manageable. If, however, nuclear nationalism prevails, and numerous small-scale facilities become widely dispersed, the problem of security against theft and sabotage may prove to be unmanageable. It is ironic, although true, that in attempting to strengthen its security by pursuing self-sufficiency in nuclear power, a nation may be reducing its internal security against criminal terrorists

  2. Geological factors of deposit formation

    International Nuclear Information System (INIS)

    Grushevoj, G.V.

    1980-01-01

    Geologic factors of hydrogenic uranium deposit formation are considered. Structural, formation and lithological-facies factors of deposit formation, connected with zones of stratal oxidation, are characterized. Peculiarities of deposit localization, connected with orogenic structures of Mesozoic and lenozoic age, are described. It is noted that deposits of anagenous group are widely spread in Paleozoic formations, infiltration uranium deposits are localized mainly in Cenozoic sediments, while uranium mineralization both anagenous and infiltration groups are widely developed in Mesozoic sediments. Anagenous deposits were formed in non-oxygen situation, their age varies from 200 to 55 mln years. Infiltration deposit formation is determined by asymmetric oxidation zonation, their age varies from 10 - 40 mln years to dozens of thousand years [ru

  3. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  4. Supporting the Construction of Workflows for Biodiversity Problem-Solving Accessing Secure, Distributed Resources

    Directory of Open Access Journals (Sweden)

    J.S. Pahwa

    2006-01-01

    Full Text Available In the Biodiversity World (BDW project we have created a flexible and extensible Web Services-based Grid environment for biodiversity researchers to solve problems in biodiversity and analyse biodiversity patterns. In this environment, heterogeneous and globally distributed biodiversity-related resources such as data sets and analytical tools are made available to be accessed and assembled by users into workflows to perform complex scientific experiments. One such experiment is bioclimatic modelling of the geographical distribution of individual species using climate variables in order to explain past and future climate-related changes in species distribution. Data sources and analytical tools required for such analysis of species distribution are widely dispersed, available on heterogeneous platforms, present data in different formats and lack inherent interoperability. The present BDW system brings all these disparate units together so that the user can combine tools with little thought as to their original availability, data formats and interoperability. The new prototype BDW system architecture not only brings together heterogeneous resources but also enables utilisation of computational resources and provides a secure access to BDW resources via a federated security model. We describe features of the new BDW system and its security model which enable user authentication from a workflow application as part of workflow execution.

  5. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  6. [Infants' attachment security in a vulnerable French sample].

    Science.gov (United States)

    Tereno, S; Guedeney, N; Dugravier, R; Greacen, T; Saïas, T; Tubach, F; Ulgen, S; Matos, I; Guédeney, A

    2017-04-01

    Attachment is a long lasting emotional link established between infants and their caregivers. The quality of early relationships allows infants to safely explore their environment and contribute to the establishment of a broad range of social skills. Several intervention programs targeting infant attachment have been implemented in different contexts, showing diverse degrees of efficacy. The present paper describes, for the first time, children's attachment quality distributions in a French multi-risk population, with a preventive intervention, usual or reinforced. In the CAPEDP study (Parenting and Attachment in Early Childhood: reducing mental health disorder risks and promoting resilience), a sub-sample of 117 women was recruited to assess the effects of this home-visiting program on children's attachment security. With that intent, the Strange Situation Paradigm was used when infants were between 12 and 16 months of age. In the intervention group, 63% (n=41) of the infants were coded as secure, while 15% (n=10) of them were coded as insecure-avoidant and 22% (n=14) as insecure-ambivalent/resistant. 56% (n=29) of control group infants (usual care) were coded as secure, while 27% (n=14) were coded as insecure-avoidant and 17% (n=9) as insecure-ambivalent/resistant. Even if the percentage of children with a secure attachment in the reinforced intervention group was higher than that of the control group, this difference did not reach the threshold of significance [Chi 2 (2)=2.40, P=0.30]. Intervention group distributions were closer to normative samples, and these distributions show the clinical impact of our program. In general, preventive interventions focused on attachment quality have moderate effects but, in our case, several factors might have contributed to lower the statistical impact of the program. Firstly, the control group cannot be considered has having received zero intervention for two reasons: (a) the French usual perinatal health system (Maternal

  7. The Methodical Approach to Formation of the Economic-Social Provision of the Financial Security Management of Commercial Bank

    Directory of Open Access Journals (Sweden)

    Baryliuk Mariia-Mariana R.

    2017-06-01

    Full Text Available The article defines that the impact of threats on a commercial bank as an open socio-economic system results in losses that can be classified as financial, personnel, informational, and reputational. In terms of temporal horizons, losses are defined as tactical and strategic. Possible losses from external and internal threat implications have been determined, which have resulted in the development of a four-level structure of total losses from threat implications for the financial security of commercial bank. The proposed sequence of calculations for integrated assessment of threats impact provides an information basis for the development and introducing a set of interrelated organizational-economic measures to implement changes in the subsystem of financial security of commercial bank. The level of threats identified, the nature and extent of financial, personnel, information, and reputational losses are the basis for more efficient use of available resources and for improving the financial security management of commercial bank.

  8. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  9. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  10. Homeland Security and Emergency Management Education: An Investigation into Workforce Needs

    Science.gov (United States)

    Carlson, Cameron D.

    2017-01-01

    The U.S. Department of Homeland Security (DHS) was created in the wake of the September 11th 2001 terrorist events. DHS's formation, the largest reorganization of a governmental agency in over 50 years, brought a new emphasis on the protection of the nation, its citizens and its infrastructure to government emergency management policy. Previously,…

  11. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  12. Job security and work performance in Chinese employees: The mediating role of organisational identification.

    Science.gov (United States)

    Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun

    2016-04-01

    This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.

  13. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  14. Information Security in the Countries of Central Asia: the Case of Kazakhstan

    Directory of Open Access Journals (Sweden)

    Zarifa Allahveran Asadova

    2016-01-01

    Full Text Available The article discusses the history of the creation and development of the overall concept of information security, the current state of the information security, as well as the appropriate legal and regulatory framework in the countries of Central Asia on the example of the Republic of Kazakhstan. Introductory part of the article analyzes and provides a brief overview of the development of information and communication technologies. Particular attention is given to information security concepts in the framework of international valuation standards. The author investigates and lists the main sources of global information security threats, as well as explaining the history of the creation of a geopolitical term - Central Asia. In the main part of the article on the example of Kazakhstan one of the leading Central Asian countries, highlights issues of formation and development of the concept of information security, provides a brief overview of the history of development of information and communication technologies in the country. In this part the author conducts a detailed analysis of the legislation and the concept of the state with respect to the issue of information security, in the investigation highlights the major key issues of information security in the Republic of Kazakhstan. It also analyzes the development strategy of the Republic of Kazakhstan till 2030 (the "Kazakhstan-2030" Strategy, provides a brief overview of the state of laws and programs in the field of information security in the Republic of Kazakhstan. In conclusion, the author comes to the conclusion that today Kazakhstan is just beginning to form their own information security protection mechanisms and leads appropriate recommendations to achieve the objectives of the state.

  15. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  16. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  17. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Science.gov (United States)

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  18. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  19. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  20. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  1. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  2. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  3. Еcological security of environment in Zhytomyr region

    Directory of Open Access Journals (Sweden)

    I.М. Kovalevska

    2016-03-01

    environmental conditions, ecological state of the environment. The initial primary information for the assessment of ecological security of environment is represented by the system of four groups of factors: climatic, technogenic and ecological, social, economic and efficient.

  4. Job security or employment security : What's in a name?

    NARCIS (Netherlands)

    Zekic, Nuna

    2016-01-01

    The main aim of the article is to survey and conceptualize the place of employment security in labour law, and to explore a number of important legal questions relating to this concept. After scrutinizing the notion of employment security, the author endorses the view that job security that exists

  5. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  6. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  7. A METHOD OF SECURITY SCANNING OF CARRY-ON ITEMS, AND A CARRY-ON ITEMS SECURITY SCANNING SYSTEM

    DEFF Research Database (Denmark)

    2017-01-01

    A security scanning system (1) comprises a first stage module (3) having at least one X-ray source (6) and at least three first detectors (7) that are line-shaped and arranged in mutually different orientations and have at least dual energy resolution. A group of carry-on items (4) on a carrier...

  8. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  9. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  10. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  11. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  12. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  13. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  14. Security of Radioactive Sources. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    There are concerns that terrorist or criminal groups could gain access to high activity radioactive sources and use these sources maliciously. The IAEA is working with Member States to increase control, accounting and security of radioactive sources to prevent their malicious use and the associated potential consequences. Based on extensive input from technical and legal experts, this implementation guide sets forth guidance on the security of sources and will serve as a useful tool for legislators and regulators, physical protection specialists and facility and transport operators, as well as for law enforcement officers.

  15. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  16. Culture of socio-economic security of Ukraine: Challenges in XXIst Century

    Directory of Open Access Journals (Sweden)

    Olesya Ihorivna Datsko

    2015-12-01

    Full Text Available It is argued, that the culture of social- economic security has impact on the socio-economic development of state. It is formed at several levels of human interaction: with oneself, other people, work, environment, community groups, state, world, God. It is proved that low level of culture of socio-economic security of Ukraine's population, especially state leaders has a destructive effect on the economic development, labour potential, and increasing level of corruption. The necessity to develop a culture of social- economic security in the state economic policy is proved.

  17. Archean Age Fossils from Northwestern Australia (Approximately 3.3 to 3.5 GA, Warrawoona Group, Towers Formation)

    Science.gov (United States)

    Smith, Penny A. Morris

    1999-01-01

    Archean aged rocks from the Pilbara Block area of western Australia (Warrawoona Group, Towers Formation, -3.3-3.5 Ga) contain microfossils that are composed of various sizes of spheres and filaments. The first descriptions of these microfossils were published in the late 1970's (Dunlop, 1978; Dunlop, et. al., 1978). The authenticity of the microfossils is well established. The small size of the microfossils prevents isotope dating, at least with the present technology. Microbiologists, however, have established guidelines to determine the authenticity of the Archean aged organic remains (Schopf, Walter, 1992).

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  19. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  20. Assessing Security of Supply: Three Methods Used in Finland

    Science.gov (United States)

    Sivonen, Hannu

    Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.

  1. Conceptualising energy security and making explicit its polysemic nature

    International Nuclear Information System (INIS)

    Chester, Lynne

    2010-01-01

    Twenty-first century access to energy sources depends on a complex system of global markets, vast cross-border infrastructure networks, a small group of primary energy suppliers, and interdependencies with financial markets and technology. This is the context in which energy security has risen high on the policy agenda of governments around the world and the term 'energy security' has quietly slipped into the energy lexicon. The limited discourse about the nature of the term or its underlying assumptions has been totally eclipsed by an almost overwhelming focus on securing supplies of primary energy sources and geopolitics. An examination of explicit and inferred definitions finds that the concept of energy security is inherently slippery because it is polysemic in nature, capable of holding multiple dimensions and taking on different specificities depending on the country (or continent), timeframe or energy source to which it is applied. This 'slipperiness' poses analytical, prediction and policy difficulties but if explicitly recognised through definitional clarity, new levels of understanding will enrich the policy debate to deal with obstacles impacting on the constantly evolving nature of energy security.

  2. Multi-Aspect Group Formation using Facility Location Analysis

    NARCIS (Netherlands)

    Neshati, Mahmood; Beigy, Hamid; Hiemstra, Djoerd

    2012-01-01

    In this paper, we propose an optimization framework to retrieve an optimal group of experts to perform a given multi-aspect task/project. Each task needs a diverse set of skills and the group of assigned experts should be able to collectively cover all required aspects of the task. We consider three

  3. Group X

    Energy Technology Data Exchange (ETDEWEB)

    Fields, Susannah

    2007-08-16

    This project is currently under contract for research through the Department of Homeland Security until 2011. The group I was responsible for studying has to remain confidential so as not to affect the current project. All dates, reference links and authors, and other distinguishing characteristics of the original group have been removed from this report. All references to the name of this group or the individual splinter groups has been changed to 'Group X'. I have been collecting texts from a variety of sources intended for the use of recruiting and radicalizing members for Group X splinter groups for the purpose of researching the motivation and intent of leaders of those groups and their influence over the likelihood of group radicalization. This work included visiting many Group X websites to find information on splinter group leaders and finding their statements to new and old members. This proved difficult because the splinter groups of Group X are united in beliefs, but differ in public opinion. They are eager to tear each other down, prove their superiority, and yet remain anonymous. After a few weeks of intense searching, a list of eight recruiting texts and eight radicalizing texts from a variety of Group X leaders were compiled.

  4. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  5. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  6. The Star Formation History of the Local Group Dwarf Galaxy Leo I

    Science.gov (United States)

    Gallart, Carme; Freedman, Wendy L.; Aparicio, Antonio; Bertelli, Giampaolo; Chiosi, Cesare

    1999-11-01

    We present a quantitative analysis of the star formation history (SFH) of the Local Group dSph galaxy Leo I, from the information in its Hubble Space Telescope [(V-I),I] color-magnitude diagram (CMD). It reaches the level of the oldest main-sequence turnoffs, and this allows us to retrieve the SFH in considerable detail. The method we use is based on comparing, via synthetic CMDs, the expected distribution of stars in the CMD for different evolutionary scenarios with the observed distribution. We consider the SFH to be composed by the SFR(t), the chemical enrichment law Z(t), the initial mass function (IMF), and a function β(f,q) controlling the fraction f and mass ratio distribution q of binary stars. We analyze a set of ~=50 combinations of four Z(t), three IMFs, and more than four β(f,q). For each of them, the best SFR(t) is searched for among ~=6x107 models. The comparison between the observed CMD and the model CMDs is done through χ2ν minimization of the differences in the number of stars in a set of regions of the CMD, chosen to sample stars of different ages or in specific stellar evolutionary phases. We empirically determine the range of χ2ν values that indicate acceptable models for our set of data using tests with models with known SFHs. Our solution for the SFH of Leo I defines a minimum of χ2ν in a well-defined position of the parameter space, and the derived SFR(t) is robust, in the sense that its main characteristics are unchanged for different combinations of the remaining parameters. However, only a narrow range of assumptions for Z(t), IMF, and β(f,q) result in a good agreement between the data and the models, namely, Z=0.0004, a IMF Kroupa et al. or slightly steeper, and a relatively large fraction of binary stars, with f=0.3-0.6, q>0.6, and an approximately flat IMF for the secondaries, or particular combinations of these parameters that would produce a like fraction of similar mass binaries. Most star formation activity (70% to 80

  7. Fission-track ages of the Tokai Group and associate formations in the east coast areas of Ise Bay and their significance in geohistory

    International Nuclear Information System (INIS)

    Makinouchi, Takeshi; Danhara, Toru; Isoda, Kunitoshi.

    1983-01-01

    Fission-track ages of volcanic ash layers within the Tokai Group and associate formations in the east coast areas of Ise Bay are obtained by grain-by-grain method with which individual ages for the respective zircon grains are measured. They are as follows; 1) a volcanic ash layer in the Karayama Formation (tentative age: 1.9 +- 0.4 Ma). Among the zircon grains in this layer, essential ones occupy only 1 per cent, and the others are accidental. 2) Ohtani volcanic ash layer (4.3 +- 0.6 Ma). 3) Kosugaya volcanic ash layer (4.0 +- 0.5 Ma). 4) Kaminoma volcanic ash layer (5.3 +- 0.4 Ma). 5) A volcanic ash layer in the Toyoura Formation seems to be older than 10 Ma. 6) Zircon grains in the Kofu volcanic ash layer (Tokai Group) include two types of spontaneous namely track, clear and vague ones. The latter vague tracks are shorter and thiner, and seem to suffer thermal annealing. The ages obtained have clarified the following Points; a) The tentative age, 1.9 Ma, of the ''Karayama'' volcanic ash layer suggests the existence of unknown Plio-Pleistocene sediment in the Nagoya area. b) The sedimentary basin of Lake Tokai was formed in the latest Miocene, about 6.5 Ma. Generation of the basin coincides approximately with the stage of synchronous and abrupt change in sedimentation rate in sedimentary basins on the Pacific side of central and southern Japan. c) The Tokai Group in Chita (Tokoname Group) intercalates the Gilbert/Epoch 5 boundary in the paleomagnetic chronology in the middle horizon of the group. d) Average rate of sedimentation is about 1 m/10 4 yrs in the marginal areas of the basin, and 3-5 m/10 4 yrs in the central areas. (author)

  8. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  9. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  10. Group play

    DEFF Research Database (Denmark)

    Tychsen, Anders; Hitchens, Michael; Brolund, Thea

    2008-01-01

    Role-playing games (RPGs) are a well-known game form, existing in a number of formats, including tabletop, live action, and various digital forms. Despite their popularity, empirical studies of these games are relatively rare. In particular there have been few examinations of the effects of the v......Role-playing games (RPGs) are a well-known game form, existing in a number of formats, including tabletop, live action, and various digital forms. Despite their popularity, empirical studies of these games are relatively rare. In particular there have been few examinations of the effects...... of the various formats used by RPGs on the gaming experience. This article presents the results of an empirical study, examining how multi-player tabletop RPGs are affected as they are ported to the digital medium. Issues examined include the use of disposition assessments to predict play experience, the effect...... of group dynamics, the influence of the fictional game characters and the comparative play experience between the two formats. The results indicate that group dynamics and the relationship between the players and their digital characters, are integral to the quality of the gaming experience in multiplayer...

  11. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  12. 17 CFR 404.5 - Securities counts by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered government securities brokers and dealers. 404.5 Section 404.5 Commodity and Securities Exchanges... AND PRESERVATION OF RECORDS § 404.5 Securities counts by registered government securities brokers and dealers. (a) Securities counts. Every registered government securities broker or dealer shall comply with...

  13. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  14. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  15. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  16. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  17. Predictors of attachment security in preschool children from intact and divorced families.

    Science.gov (United States)

    Nair, Hira; Murray, Ann D

    2005-09-01

    The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of education compared with their intact counterparts. Divorced mothers also reported significantly higher levels of stress, depression, need for social support, and conflict with their spouses. Mothers from intact families were more likely to use positive (authoritative) parenting styles compared with divorced mothers. Children in the divorced group had lower security scores on the Attachment Q-Set instrument (E. Waters, 1995). Regression analyses indicated that parenting style made a direct (independent) contribution to attachment security. In addition, temperament was related to attachment security, but temperament did not diminish the association of parenting style with attachment security. Furthermore, regression analyses indicated that the relationship of divorce to attachment security was mediated by parenting style.

  18. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  19. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  20. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.