WorldWideScience

Sample records for security assurance index

  1. Nuclear power: energy security and supply assurances

    International Nuclear Information System (INIS)

    Rogner, H.H.; McDonald, A.

    2008-01-01

    Expectations are high for nuclear power. This paper first summarizes recent global and regional projections for the medium-term, including the 2007 updates of IAEA projections plus International Energy Agency and World Energy Technology Outlook projections to 2030 and 2050. One driving force for nuclear power is concern about energy supply security. Two potential obstacles are concerns about increased nuclear weapon proliferation risks, and concerns by some countries about potential politically motivated nuclear fuel supply interruptions. Concerning supply security, the paper reviews different definitions, strategies and costs. Supply security is not free; nor does nuclear power categorically increase energy supply security in all situations. Concerning proliferation and nuclear fuel cut-off risks, the IAEA and others are exploring possible 'assurance of supply' mechanisms with 2 motivations. First, the possibility of a political fuel supply interruption is a non-market disincentive discouraging investment in nuclear power. Fuel supply assurance mechanisms could reduce this disincentive. Second, the risk of interruption creates an incentive for a country to insure against that risk by developing a national enrichment capability. Assurance mechanisms could reduce this incentive, thereby reducing the possible spread of new national enrichment capabilities and any associated weapon proliferation risks. (orig.)

  2. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  3. Incorporating Global Information Security and Assurance in I.S. Education

    Science.gov (United States)

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  4. An analysis of Indonesia’s information security index: a case study in a public university

    Science.gov (United States)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  5. Security assurances and regional stability

    International Nuclear Information System (INIS)

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  6. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  7. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  8. 17 CFR 41.15 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Science.gov (United States)

    2010-04-01

    ..., that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer included in the index is an equity security, as defined in section 3(a)(11) of the Securities Exchange Act... of 1934; (B) The issuer of the security has a worldwide market value of its outstanding common equity...

  9. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  10. Creating energy security indexes with decision matrices and quantitative criteria

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Larry; Shupe, Darren

    2010-09-15

    Energy security is becoming an important policy issue in a growing number of jurisdictions because of volatile energy markets and production challenges faced by many producers. As a result, policymakers and politicians are looking for tools or methods that can create an energy security index with results that are justifiable, understandable, and reproducible. This paper describes a method which employs a decision matrix to produce an energy security index using quantitative criteria and metrics. The method allows a range of indexes to be produced, thereby offering further insight into the state of a jurisdiction's energy security.

  11. Permission-based Index Clustering for Secure Multi-User Search

    OpenAIRE

    Eirini C. Micheli; Giorgos Margaritis; Stergios V. Anastasiadis

    2015-01-01

    Secure keyword search in shared infrastructures prevents stored documents from leaking sensitive information to unauthorized users. A shared index provides confidentiality if it is exclusively used by users authorized to search all the indexed documents. We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search. The Lethe workflow clusters together documents with similar sets of authorized users, and creates shared indices for configurable docume...

  12. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  13. A SES (sustainable energy security) index for developing countries

    International Nuclear Information System (INIS)

    Narula, Kapil; Reddy, B. Sudhakara

    2016-01-01

    Measuring the performance of the energy system of a country is a prerequisite for framing good energy polices. However, the existing indices which claim to measure energy security have limited applicability for developing countries. Energy sustainability is also increasingly gaining importance and countries are keen to measure it to tailor their energy policies. Therefore, the concept of SES (sustainable energy security) has been proposed as the goal for a developing country. This paper presents an analytical framework for the assessment of SES of an energy system and the methodology for constructing an SES index. A hierarchical structure has been proposed and the energy system has been divided into 'supply', 'conversion & distribution' and 'demand' sub-systems. Each subsystem is further divided into its components which are evaluated for four dimensions of SES, Availability, Affordability, Efficiency and (Environmental) Acceptability using quantitative metrics. Energy indices are constructed using 'scores' (objective values), and 'weights' (subjective values representing tradeoffs) which are then aggregated, bottom-up, to obtain an overall SES Index for a country. The proposed SES Index is multidimensional, quantitative, modular, systemic and flexible. Such a SES Index can be used to design policy interventions for transitioning to a sustainable and a secure energy future. - Highlights: • A SES (sustainable energy security) index is proposed for developing countries. • A hierarchical structure includes the entire energy system from supply to end use. • The performance of all energy sources, energy carriers and sectors is assessed. • Availability, affordability, efficiency and acceptability dimensions are evaluated. • The SES index is multidimensional, quantitative, modular, systemic and flexible.

  14. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  15. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Science.gov (United States)

    2010-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer included in the index is an equity security, as defined in section... its outstanding common equity held by non-affiliates of $71 million or more; (C) The issuer of the...

  16. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  17. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  18. Overview of the Hanford Site Performance Assurance Program

    International Nuclear Information System (INIS)

    Duncan, M.R.; Billings, M.P.; Delvin, W.L.; Scott, D.D.; Weatherby, J.W.

    1991-01-01

    This paper reports on a safeguards and security performance assurance program which encompasses the routine and special activities carried out to assure that safeguards and security subsystems and components are operating in a effective and reliable manner. At the Hanford Site, performance assurance involves widely varied activities, e.g., force-on-force exercises, functional testing of security components, and limited scope performance testing of material control and accountability subsystems. These activities belong to one of four categories: performance testing, functional testing, inspection, and preventive maintenance. Using categories has aided in identifying and assessing the relevant contribution each activity makes to the performance assurance program. Efforts have progressed toward incorporating performance assurance activities into the assessment of protection effectiveness required for Master Safeguards and Security Agreement development and its associated verification and validation process

  19. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  20. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  1. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  2. Information Assurance in Saudi Organizations - An Empirical Study

    Science.gov (United States)

    Nabi, Syed Irfan; Mirza, Abdulrahman A.; Alghathbar, Khaled

    This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom.

  3. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  4. Use of Diplomatic Assurances in Terrorism-related Cases: In search of a Balance between Security Concerns and Human Rights

    Directory of Open Access Journals (Sweden)

    Bibi van Ginkel

    2010-03-01

    Full Text Available In this paper, Research Fellow Dr. Bibi van Ginkel and intern Federico Rojas analyse the different policies on diplomatic assurances in a number of countries that are representative of a certain trend and attempt to clarify the criteria that have to be fulfilled before assurance may be used. Key in the whole discussion surrounding the use of diplomatic assurances is finding the right balance between national security concerns and human rights obligations. The outcomes of the Expert Meeting on this topic, that took place on 22 March 2011, have been incorporated in this paper.

  5. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  6. Quality assurance: using the exposure index and the deviation index to monitor radiation exposure for portable chest radiographs in neonates

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, Mervyn D. [Indiana University School of Medicine, Department of Radiology, Riley Children' s Hospital, Indianapolis, IN (United States); Riley Hospital for Children, Department of Radiology, Indianapolis, IN (United States); Cooper, Matt L.; Piersall, Kelly [Indiana University School of Medicine, Department of Radiology, Riley Children' s Hospital, Indianapolis, IN (United States); Apgar, Bruce K. [Agfa HealthCare Corporation, Greenville, SC (United States)

    2011-05-15

    Many methods are used to track patient exposure during acquisition of plain film radiographs. A uniform international standard would aid this process. To evaluate and describe a new, simple quality-assurance method for monitoring patient exposure. This method uses the ''exposure index'' and the ''deviation index,'' recently developed by the International Electrotechnical Commission (IEC) and American Association of Physicists in Medicine (AAPM). The deviation index measures variation from an ideal target exposure index value. Our objective was to determine whether the exposure index and the deviation index can be used to monitor and control exposure drift over time. Our Agfa workstation automatically keeps a record of the exposure index for every patient. The exposure index and deviation index were calculated on 1,884 consecutive neonatal chest images. Exposure of a neonatal chest phantom was performed as a control. Acquisition of the exposure index and calculation of the deviation index was easily achieved. The weekly mean exposure index of the phantom and the patients was stable and showed <10% change during the study, indicating no exposure drift during the study period. The exposure index is an excellent tool to monitor the consistency of patient exposures. It does not indicate the exposure value used, but is an index to track compliance with a pre-determined target exposure. (orig.)

  7. Quality assurance: using the exposure index and the deviation index to monitor radiation exposure for portable chest radiographs in neonates

    International Nuclear Information System (INIS)

    Cohen, Mervyn D.; Cooper, Matt L.; Piersall, Kelly; Apgar, Bruce K.

    2011-01-01

    Many methods are used to track patient exposure during acquisition of plain film radiographs. A uniform international standard would aid this process. To evaluate and describe a new, simple quality-assurance method for monitoring patient exposure. This method uses the ''exposure index'' and the ''deviation index,'' recently developed by the International Electrotechnical Commission (IEC) and American Association of Physicists in Medicine (AAPM). The deviation index measures variation from an ideal target exposure index value. Our objective was to determine whether the exposure index and the deviation index can be used to monitor and control exposure drift over time. Our Agfa workstation automatically keeps a record of the exposure index for every patient. The exposure index and deviation index were calculated on 1,884 consecutive neonatal chest images. Exposure of a neonatal chest phantom was performed as a control. Acquisition of the exposure index and calculation of the deviation index was easily achieved. The weekly mean exposure index of the phantom and the patients was stable and showed <10% change during the study, indicating no exposure drift during the study period. The exposure index is an excellent tool to monitor the consistency of patient exposures. It does not indicate the exposure value used, but is an index to track compliance with a pre-determined target exposure. (orig.)

  8. Future of Assurance: Ensuring that a System is Trustworthy

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire

    Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.

  9. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  10. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  11. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  12. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  13. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    Monitoring ISO /IEC 12207 2008(E) IEEE 1062 1998 PMBOK 3.0 Initiating Closing 3. Monitoring & Controlling 1. Planning 2. Executing Follow-on...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic...they are met. This may also include a plan for testing that SwA requirements are met. The [NDIA] and [ ISO /IEC 15026] provide details on structure and

  14. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  15. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  16. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    Science.gov (United States)

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  17. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    Science.gov (United States)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  18. Benchmarking Software Assurance Implementation

    Science.gov (United States)

    2011-05-18

    product The chicken#. (a.k.a. Process Focused Assessment ) – Management Systems ( ISO 9001, ISO 27001 , ISO 2000) – Capability Maturity Models (CMMI...Assurance PRM, RMM, Assurance for CMMI)) – Lifecycle Processes ( ISO /IEEE 15288, ISO /IEEE 12207) – COBIT, ITIL, MS SDL, OSAMM, BSIMM 5 The egg...a.k.a Product Focused Assessments) – SCAP - NIST-SCAP – ISO /OMG W3C – KDM, BPMN, RIF, XMI, RDF – OWASP Top 10 – SANS TOP 25 – Secure Code Check Lists

  19. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  20. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  1. Social Security cost-of-living adjustments and the Consumer Price Index.

    Science.gov (United States)

    Burdick, Clark; Fisher, Lynn

    2007-01-01

    OASDI benefits are indexed for inflation to protect beneficiaries from the loss of purchasing power implied by inflation. In the absence of such indexing, the purchasing power of Social Security benefits would be eroded as rising prices raise the cost of living. By statute, cost-of-living adjustments (COLAs) for Social Security benefits are calculated using the Bureau of Labor Statistics (BLS) Consumer Price Index for Urban Wage Earners and Clerical Workers (CPI-W). Some argue that this index does not accurately reflect the inflation experienced by the elderly population and should be changed to an elderly-specific price index such as the Experimental Consumer Price Index for Americans 62 Years of Age and Older, often referred to as the Consumer Price Index for the Elderly (CPI-E). Others argue that the measure of inflation underlying the COLA is technically biased, causing it to overestimate changes in the cost of living. This argument implies that current COLAs tend to increase, rather than merely maintain, the purchasing power of benefits over time. Potential bias in the CPI as a cost-of-living index arises from a number of sources, including incomplete accounting for the ability of consumers to substitute goods or change purchasing outlets in response to relative price changes. The BLS has constructed a new index called the Chained Consumer Price Index for All Urban Consumers (C-CPI-U) that better accounts for those consumer adjustments. Price indexes are not true cost-of-living indexes, but approximations of cost-of-living indexes (COLI). The Bureau of Labor Statistics (2006a) explains the difference between the two: As it pertains to the CPI, the COLI for the current month is based on the answer to the following question: "What is the cost, at this month ' market prices, of achieving the standard of living actually attained in the base period?" This cost is a hypothetical expenditure-the lowest expenditure level necessary at this month's prices to achieve the

  2. HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Artur Sosin

    2018-04-01

    Full Text Available The competitive world we live in today is characterized by an environment where the advancement of technology has increased the number of complex vulnerabilities and sophisticated attacks. Organizations around the globe are facing now the same challenges of implementing data protection and securing information assurance. The purpose of this paper is to prove that Information Assurance has become one of the most important tools in creating and maintaining a competitive advantage in today’s competitive and global marketplace. This paper also presents the relationship between information assurance and cybersecurity, and their connection with confidentiality, integrity, availability (CIA triad. Furthermore, assuring information and providing security is a life cycle process which needs a comprehensive understanding, skills, and experience in order to protect today’s risk management challenges. The author concludes the paper with the importance of information assurance policies which are the fundamental guidelines for protecting information assets and fulfilling information assurance objectives of an organization.

  3. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  4. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. HARD - The High Assurance Remote Authentication Device Project

    OpenAIRE

    2006-01-01

    The HARD project will build and evaluate a high assurance network access device. The purpose of this device is to provide an unforgeable trusted path with which network clients can securely interact with security-enabled remote servers.

  7. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  8. Reflection on Quality Assurance System of Higher Vocational Education under Big Data Era

    Directory of Open Access Journals (Sweden)

    Jiang Xinlan

    2015-01-01

    Full Text Available Big data has the features like Volume, Variety, Value and Velocity. Here come the new opportunities and challenges for construction of Chinese quality assurance system of higher vocational education under big data era. There are problems in current quality assurance system of higher vocational education, such as imperfect main body, non-formation of internally and externally incorporated quality assurance system, non-scientific security standard and insufficiency in security investment. The construction of higher vocational education under big data era requires a change in the idea of quality assurance system construction to realize the multiple main bodies and multiple layers development trend for educational quality assurance system, and strengthen the construction of information platform for quality assurance system.

  9. Quality assurance programs from laboratories offering radiological protection services

    International Nuclear Information System (INIS)

    Marrero Garcia, M.; Prendes Alonso, M.; Jova Sed, L.; Morales Monzon, J.A.

    1998-01-01

    The implementation of an adequate program for quality assurance in institutions servicing radiological protection programs will become an additional tool to achieve security targets included in that program. All scientific and technical services offered by CPHR employ quality assurance systems

  10. Cyber-assurance for the Internet of Things

    CERN Document Server

    2017-01-01

    This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, rotect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication...

  11. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  12. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  13. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  14. Interpretation of Gamma Index for Quality Assurance of Simultaneously Integrated Boost (SIB) IMRT Plans for Head and Neck Carcinoma

    Science.gov (United States)

    Atiq, Maria; Atiq, Atia; Iqbal, Khalid; Shamsi, Quratul ain; Andleeb, Farah; Buzdar, Saeed Ahmad

    2017-12-01

    Objective: The Gamma Index is prerequisite to estimate point-by-point difference between measured and calculated dose distribution in terms of both Distance to Agreement (DTA) and Dose Difference (DD). This study aims to inquire what percentage of pixels passing a certain criteria assure a good quality plan and suggest gamma index as efficient mechanism for dose verification of Simultaneous Integrated Boost Intensity Modulated Radiotherapy plans. Method: In this study, dose was calculated for 14 head and neck patients and IMRT Quality Assurance was performed with portal dosimetry using the Eclipse treatment planning system. Eclipse software has a Gamma analysis function to compare measured and calculated dose distribution. Plans of this study were deemed acceptable when passing rate was 95% using tolerance for Distance to agreement (DTA) as 3mm and Dose Difference (DD) as 5%. Result and Conclusion: Thirteen cases pass tolerance criteria of 95% set by our institution. Confidence Limit for DD is 9.3% and for gamma criteria our local CL came out to be 2.0% (i.e., 98.0% passing). Lack of correlation was found between DD and γ passing rate with R2 of 0.0509. Our findings underline the importance of gamma analysis method to predict the quality of dose calculation. Passing rate of 95% is achieved in 93% of cases which is adequate level of accuracy for analyzed plans thus assuring the robustness of SIB IMRT treatment technique. This study can be extended to investigate gamma criteria of 5%/3mm for different tumor localities and to explore confidence limit on target volumes of small extent and simple geometry.

  15. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  16. Audit Characteristics for Information System Security

    OpenAIRE

    Marius POPA; Mihai DOINEA

    2007-01-01

    The paper presents the main aspects regarding the development of the information security and assurance of their security. The information systems, standards and audit processes definitions are offered. There are presented the most important security standards used in information system security assessment

  17. Quality assurance systems at SKODA JS

    International Nuclear Information System (INIS)

    Janecek, P.

    2000-01-01

    In addition to technical requirements put upon the design, manufacture, installation and commissioning of equipment for nuclear power plants, emphasis is laid upon quality assurance of such activities so as to secure nuclear safety of installations over the world. As the technical level of nuclear safety assurance is being enhanced continuously, the requirements are becoming more and more stringent, which is mirrored by the relevant standards and legislation. SKODA JS has always been pursuing the quality goal and has been contributing to this aspect markedly. The quality assurance system at SKODA JS helps the company to satisfy all the appropriate requirements of its customers as well as the applicable standards and regulations. (author)

  18. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  19. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  20. Review of the National Information Assurance Partnership (NIAP)

    National Research Council Canada - National Science Library

    Larsen, Gregory N; Burton, J. K; Cohen, Patricia A; Harvey, Rick A; Meeson, Reginald N; Nash, Michael S; Nash, Sarah H; Schneider, Edward A; Simpson, William R; Stytz, Martin R; Wheeler, David A

    2006-01-01

    This study was mandated by the National Strategy to Secure Cyberspace which requires the federal government to conduct a comprehensive review of the National Information Assurance Partnership (NIAP...

  1. 10 CFR 780.8 - Security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  2. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  3. Quality assurance in nuclear fuel element component supply

    International Nuclear Information System (INIS)

    Jenkins, B.P.

    1987-01-01

    The paper describes the application of Quality Assurance to nuclear fuel element component supply. The Quality Assurance programme includes integrated procurement, purchasing, surveillance and receipt inspection functions. Purchasing policy is based on a consistent preference for competitive tendering. Multiple sourcing is used to encourage competitive pricing and increase security of supply. A receipt inspection facility is maintained to ensure the high product quality levels demanded by the nuclear industry. (U.K.)

  4. Assurance Evaluation for OSS Adoption in a Telco Context

    Science.gov (United States)

    Ardagna, Claudio A.; Banzi, Massimo; Damiani, Ernesto; El Ioini, Nabil; Frati, Fulvio

    Software Assurance (SwA) is a complex concept that involves different stages of a software development process and may be defined differently depending on its focus, as for instance software quality, security, or dependability. In Computer Science, the term assurance is referred to all activities necessary to provide enough confidence that a software product will satisfy its users’ functional and non-functional requirements.

  5. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  6. 76 FR 35245 - Country Investors Life Assurance Company, et al.

    Science.gov (United States)

    2011-06-16

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29691; File No. 812-13865] Country Investors Life Assurance Company, et al. June 9, 2011. AGENCY: Securities and Exchange Commission (the ``Commission''). ACTION: Notice of application for an order pursuant to Section 26(c) of the Investment Company...

  7. Assuring Software Reliability

    Science.gov (United States)

    2014-08-01

    technologies and processes to achieve a required level of confidence that software systems and services function in the intended manner. 1.3 Security Example...that took three high-voltage lines out of service and a software fail- ure (a race condition3) that disabled the computing service that notified the... service had failed. Instead of analyzing the details of the alarm server failure, the reviewers asked why the following software assurance claim had

  8. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  9. Global Food Security Index Studies and Satellite Information

    Science.gov (United States)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  10. Assurance in Agent-Based Systems

    Energy Technology Data Exchange (ETDEWEB)

    Gilliom, Laura R.; Goldsmith, Steven Y.

    1999-05-10

    Our vision of the future of information systems is one that includes engineered collectives of software agents which are situated in an environment over years and which increasingly improve the performance of the overall system of which they are a part. At a minimum, the movement of agent and multi-agent technology into National Security applications, including their use in information assurance, is apparent today. The use of deliberative, autonomous agents in high-consequence/high-security applications will require a commensurate level of protection and confidence in the predictability of system-level behavior. At Sandia National Laboratories, we have defined and are addressing a research agenda that integrates the surety (safety, security, and reliability) into agent-based systems at a deep level. Surety is addressed at multiple levels: The integrity of individual agents must be protected by addressing potential failure modes and vulnerabilities to malevolent threats. Providing for the surety of the collective requires attention to communications surety issues and mechanisms for identifying and working with trusted collaborators. At the highest level, using agent-based collectives within a large-scale distributed system requires the development of principled design methods to deliver the desired emergent performance or surety characteristics. This position paper will outline the research directions underway at Sandia, will discuss relevant work being performed elsewhere, and will report progress to date toward assurance in agent-based systems.

  11. Assurance in Agent-Based Systems

    International Nuclear Information System (INIS)

    Gilliom, Laura R.; Goldsmith, Steven Y.

    1999-01-01

    Our vision of the future of information systems is one that includes engineered collectives of software agents which are situated in an environment over years and which increasingly improve the performance of the overall system of which they are a part. At a minimum, the movement of agent and multi-agent technology into National Security applications, including their use in information assurance, is apparent today. The use of deliberative, autonomous agents in high-consequence/high-security applications will require a commensurate level of protection and confidence in the predictability of system-level behavior. At Sandia National Laboratories, we have defined and are addressing a research agenda that integrates the surety (safety, security, and reliability) into agent-based systems at a deep level. Surety is addressed at multiple levels: The integrity of individual agents must be protected by addressing potential failure modes and vulnerabilities to malevolent threats. Providing for the surety of the collective requires attention to communications surety issues and mechanisms for identifying and working with trusted collaborators. At the highest level, using agent-based collectives within a large-scale distributed system requires the development of principled design methods to deliver the desired emergent performance or surety characteristics. This position paper will outline the research directions underway at Sandia, will discuss relevant work being performed elsewhere, and will report progress to date toward assurance in agent-based systems

  12. Achieving Security Assurance with Assertion-based Application Construction

    Directory of Open Access Journals (Sweden)

    Carlos E. Rubio-Medrano

    2015-12-01

    Full Text Available Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs, which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may consequently occur. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.

  13. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  14. Quality assurance in the design

    International Nuclear Information System (INIS)

    Edelmann, J.

    1980-01-01

    System- and product-related quality assurance measures are completing one another. Certainly it is possible to detect a lot of defects in the single technical document by well controlled product related quality inspections and to avoid the consequences of these defects; but also a not unimportant part of defects and deviations has its origin in system linked deficiencies. The latter can be detected more easily and more securely by means of system related reviews (System audit, Product audit). But also the sole implementation of system related quality assurance measures keeps the danger to get stuck only in formality and to loose all references to the specific characteristics of the product. (orig./RW)

  15. Use of Evaluation Criteria in Security Education

    National Research Council Canada - National Science Library

    Nguyen, Thuy D; Irvine, Cynthia E

    2008-01-01

    .... A cornerstone of this success will be the ability of Information Assurance professionals to develop sound security requirements and determine the suitability of evaluated security products for mission-specific systems...

  16. Kali Linux assuring security by penetration testing

    CERN Document Server

    Ali, Shakeel; Allen, Lee

    2014-01-01

    Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.

  17. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  18. Effective information management and assurance for a modern organisation during a crisis.

    Science.gov (United States)

    MacLeod, Andrew

    2015-01-01

    During a crisis, organisations face a major unpredictable event with potentially negative consequences. Effective information management and assurance can assist the organisation in making sure that they have the correct information in a secure format to make decisions to recover their operations. The main elements of effective information management and assurance are confidentiality, integrity and availability, combined with non-repudiation. Should an element of effective information management or assurance be removed it can have a detrimental effect on the other elements and render the information management and assurance practices of the organisation ineffectual.

  19. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  20. Norwegian Security Determinants: Deterrence and Reassurance.

    Science.gov (United States)

    1984-03-01

    September 1979, pp. 20-25; Rear Admiral 104 |eve Roy Breivik , R.N.N., Inspector General, "Assuring the Security of Reinforcements to Norway," NATO’s Fift...2-15; a:zc $ Patrick Wall, "The Third Battle of the Atlantic," i Power, July 1981, pp. 52-57. 11 Richard K. Betts, "Surprise Attack: NATO’s...Force," NATO’s Fifteen Nations, December 1977-January 1978, pp. 81-89. 186 Breivik , Pear Admiral Roy, R.N.N., "Assuring the Security: of Reinforcements

  1. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  2. 222-S Laboratory Quality Assurance Plan. Revision 1

    International Nuclear Information System (INIS)

    Meznarich, H.K.

    1995-01-01

    This Quality Assurance Plan provides,quality assurance (QA) guidance, regulatory QA requirements (e.g., 10 CFR 830.120), and quality control (QC) specifications for analytical service. This document follows the U.S Department of Energy (DOE) issued Hanford Analytical Services Quality Assurance Plan (HASQAP). In addition, this document meets the objectives of the Quality Assurance Program provided in the WHC-CM-4-2, Section 2.1. Quality assurance elements required in the Guidelines and Specifications for Preparing Quality Assurance Program Plans (QAMS-004) and Interim Guidelines and Specifications for Preparing Quality Assurance Project Plans (QAMS-005) from the US Environmental Protection Agency (EPA) are covered throughout this document. A quality assurance index is provided in the Appendix A. This document also provides and/or identifies the procedural information that governs laboratory operations. The personnel of the 222-S Laboratory and the Standards Laboratory including managers, analysts, QA/QC staff, auditors, and support staff shall use this document as guidance and instructions for their operational and quality assurance activities. Other organizations that conduct activities described in this document for the 222-S Laboratory shall follow this QA/QC document

  3. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    OpenAIRE

    Errol A. Blake

    2007-01-01

    Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions ...

  4. Nuclear fuel assurance: origins, trends, and policy issues

    International Nuclear Information System (INIS)

    Neff, T.L.; Jacoby, H.D.

    1979-02-01

    The economic, technical and political issues which bear on the security of nuclear fuel supply internationally are addressed. The structure of international markets for nuclear fuel is delineated; this includes an analysis of the political constraints on fuel availability, especially the connection to supplier nonproliferation policies. The historical development of nuclear fuel assurance problems is explored and an assessment is made of future trends in supply and demand and in the political context in which fuel trade will take place in the future. Finally, key events and policies which will affect future assurance are identified

  5. Afghanistan Index

    DEFF Research Database (Denmark)

    Linnet, Poul Martin

    2007-01-01

    basis. The data are divided into different indicators such as security, polls, drug, social, economic, refugees etc. This represents a practical division and does not indicate that a picture as to for instance security can be obtained by solely looking at the data under security. In order to obtain...... a more valid picture on security this must incorporate an integrated look on all data meaning that for instance the economic data provides an element as to the whole picture of security.......The Afghanistan index is a compilation of quantitative and qualitative data on the reconstruction and security effort in Afghanistan. The index aims at providing data for benchmarking of the international performance and thus provides the reader with a quick possibility to retrieve valid...

  6. Software Security Assurance: A State-of-Art Report (SAR)

    Science.gov (United States)

    2007-07-31

    analysis of security management processes: includes organizational assessment, asset valuation , threat identification, vulnerability assessment...Available from: http://www.cigital.com/papers/download/bsi2-misuse.pdf 200 Meledath Damodaran , “Secure Software Development Using Use Cases and Misuse

  7. Towards Agile Security Risk Management in RE and Beyond

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Bakalova, Z.; Tun, Thein Tan; Daneva, Maia

    Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security

  8. The role of quality assurance in the nuclear industry

    International Nuclear Information System (INIS)

    1985-01-01

    The paper reports on the proceedings of a one day conference on ''the role of quality assurance in the nuclear industry'', presented by the British Nuclear Forum Working Group on Quality Assurance, 1985. The conference reviews the application and effectiveness of the British Standards in the light of experience with the AGR programme, and considers the lessons learned that will benefit future projects. Seven papers are presented at the conference, of which five deal with the AGR experience with respect to quality assurance in design and manufacture. The remaining two papers examine quality assurance in computing software and building on the AGR experience. All seven papers are selected for INIS and indexed separately. (U.K.)

  9. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  10. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  11. Data Leakage Prevention for Secure Cross-Domain Information Exchange

    OpenAIRE

    Nordbotten, Nils Agne; Engelstad, Paal E.; Kongsgård, Kyrre Wahl; Haakseth, Raymond; Mancini, Federico

    2017-01-01

    Cross-domain information exchange is an increasingly important capability for conducting efficient and secure operations, both within coalitions and within single nations. A data guard is a common cross-domain sharing solution that inspects the security labels of exported data objects and validates that they are such that they can be released according to policy. While we see that guard solutions can be implemented with high assurance, we find that obtaining an equivalent level of assurance i...

  12. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  13. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  14. Organic flow assurance, pour point depressant development through experimental design

    OpenAIRE

    Norland, Anne Kristine

    2012-01-01

    Master's thesis in Environmental technology Flow assurance is of great importance in the oil and gas industry, where the main objective is to provide and secure the transport of the well stream fluid from the reservoir to the process facilities. The main challenges in flow assurance are solid depositions in the pipelines, which can lead to reduction in the production, or in worst case completely block the pipelines. Wax deposition is a common problem in the oil industry, especially with...

  15. 40 CFR 792.35 - Quality assurance unit.

    Science.gov (United States)

    2010-07-01

    ... monitoring each study to assure management that the facilities, equipment, personnel, methods, practices... schedule sheet of all studies conducted at the testing facility indexed by test substance and containing... management immediately. (4) Periodically submit to management and the study director written status reports...

  16. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 644 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... Ethics review n international health research: quality assurance or bureaucratic nightmare? Details ... Audit of Management of Open Fractures, Details PDF.

  18. SEED: A Suite of Instructional Laboratories for Computer Security Education

    Science.gov (United States)

    Du, Wenliang; Wang, Ronghua

    2008-01-01

    The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…

  19. Information security management handbook, v.7

    CERN Document Server

    O'Hanley, Richard

    2013-01-01

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2(R) CISSP Common Body of Knowledge (CBK(R)), this volume features 27 new chapters on topics

  20. Information Assurance in Networked Enterprises: MICSS Class Experiments and Industry Survey Analysis

    National Research Council Canada - National Science Library

    Ray, Parbati

    2001-01-01

    .... The surveys give an insight into how inter-networked companies use their ERP systems, whet their current policies maybe with respect to information management, and what their security and assurance problems maybe...

  1. Information Assurance within the United States Air Force

    Science.gov (United States)

    Cherry, John D.

    2010-01-01

    According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…

  2. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  3. Computer-Aided Sensor Development Focused on Security Issues.

    Science.gov (United States)

    Bialas, Andrzej

    2016-05-26

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  4. Authentication Assurance Level Application to the Inventory Sampling Measurement System

    International Nuclear Information System (INIS)

    Devaney, Mike M.; Kouzes, Richard T.; Hansen, Randy R.; Geelhood, Bruce D.

    2001-01-01

    This document concentrates on the identification of a standardized assessment approach for the verification of security functionality in specific equipment, the Inspection Sampling Measurement System (ISMS) being developed for MAYAK. Specifically, an Authentication Assurance Level 3 is proposed to be reached in authenticating the ISMS

  5. Information Security for Business: the Necessity of Reputational Risk Management

    Directory of Open Access Journals (Sweden)

    Vitaly Eduardovich Dorokhov

    2015-06-01

    Full Text Available The article presents the analysis of actual information security problems in commercial segment. The main directions in regulations of the Russian Federation connected with information security assurance are defined. The results indicate the insufficiency of legal regulation in prevention of reputational losses due to information security incidents

  6. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    Science.gov (United States)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  7. Internet of Things: Current Challenges in the Quality Assurance and Testing Methods

    OpenAIRE

    Bures, Miroslav; Cerny, Tomas; Ahmed, Bestoun S.

    2018-01-01

    Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user's privacy, the reliability of the service, interoperability, and integration are discussed. All these create a demand for specific Quality Assurance methodology for the IoT solutions. In the paper, we present the state of the art of this domain and we discuss particular areas of system testing discipline, which is not covered...

  8. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Science.gov (United States)

    2010-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Information assurance...

  9. Secure computing on reconfigurable systems

    OpenAIRE

    Fernandes Chaves, R.J.

    2007-01-01

    This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performa...

  10. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1732 ... Journal Home > Advanced Search > Browse Title Index ... Vol 10, No 3 (2007), An Audit Of Perioperative Cardiac Arrest At ... Vol 11, No 4 (2008), An Audit Of Rejected Repeated X-ray Films As A Quality Assurance ...

  12. Practical aspects of quality assurance in nuclear power plants in Japan

    International Nuclear Information System (INIS)

    Inoue, Kunio

    1980-01-01

    Based on the occurrence of accidents caused by inappropriateness in quality assurance in nuclear power plants, the nuclear power plant quality assurance investigation committee was organized in January, 1980, to examine comprehensively what the quality assurance should be from designing through operating stages of the equipments and systems of nuclear power stations, in order to prevent the recurrence of such accidents, to secure the safety and to improve the reliability. The committee established three subcommittees: the first is in charge of the investigation of quality assurance system based on the analyses of accidents, failures or abnormal events, the second in charge of the investigation of quality assurance system in nuclear industries, and the third in charge of the investigation by comparing domestic legal control and the organization for implementing inspection with those of foreign countries. In nuclear power plants in Japan, approximately 20 accidents or failures have occurred every year in the last 3 or 4 years. Many of them seem to be caused by quality assurance problems such as the misuse of materials or the inadequacy in machining. In addition, to this paper the tables showing the general quality assurance activity in, and the present status of permission, approval and inspection for Japanese nuclear power plants are attached. (Wakatsuki, Y.)

  13. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  14. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  15. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  16. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  17. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures.

    Science.gov (United States)

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-11

    , EHR knowledge, and the concern for privacy and the security of medical records (P secure than EHRs and those who believed otherwise. The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated. The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for "cradle to the grave" treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system.

  18. Quality assurance records system

    International Nuclear Information System (INIS)

    1979-01-01

    This Safety Guide was prepared as part of the Agency's programme, referred to as the NUSS programme, for establishing Codes of Practice and Safety Guides relating to nuclear power plants. It supplements the IAEA Code of Practice on Quality Assurance for Safety in Nuclear Power Plants (IAEA Safety Series No.50-C-QA), which requires that for each nuclear power plant a system for the generation, identification, collection, indexing, filing, storing, maintenance and disposition of quality assurance records shall be established and executed in accordance with written procedures and instructions. The purpose of this Safety Guide is to provide assistance in the establishment and operation of such a system. An orderly established and maintained records system is considered to be part of the means of providing a basis for an appropriate level of confidence that the activities which affect the quality of a nuclear power plant have been performed in accordance with the specific requirements and that the required quality has been achieved and is maintained

  19. Computer-Aided Sensor Development Focused on Security Issues

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2016-05-01

    Full Text Available The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  20. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  1. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  2. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  3. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  4. Application of refractometry to quality assurance monitoring of parenteral nutrition solutions.

    Science.gov (United States)

    Chang, Wei-Kuo; Chao, You-Chen; Yeh, Ming-Kung

    2008-01-01

    Parenteral nutrition (PN) solution contains various concentrations of dextrose, amino acids, lipids, vitamins, electrolytes, and trace elements. Incorrect preparation of PN solution could lead to patient death. In this study we used the refractive index as a quality assurance tool to monitor the preparation of PN solution. Refractive indices of single nutrient components and PN solutions consisting of various concentrations of dextrose, amino acids, electrolytes, and lipids were measured. A mathematical equation and its linear plot were generated then used to predict the refractive index of the PN solution. The best-fit refractive index for PN solution (i.e., the predicted refractive index)=0.9798x(% dextrose)+1.2889x(% amino acids)+1.1017x(% lipids)+0.9440x(% sum of the electrolytes)+0.5367 (r2=0.99). This equation was validated by comparing the measured refractive indices of 500 clinical PN solutions to their predicted refractive indices. We found that 2 of the 500 prepared samples (0.4%) had less than the predicted refractive index (<95%). Refractive index can be used as a reliable quality assurance tool for monitoring PN preparation. Such information can be obtained at the bedside and used to confirm the accuracy of the PN solution composition.

  5. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  6. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    Directory of Open Access Journals (Sweden)

    Errol A. Blake

    2007-12-01

    Full Text Available Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.

  7. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  8. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  9. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  10. Quality Assurance Program Plan for the Waste Sampling and Characterization Facility

    International Nuclear Information System (INIS)

    Grabbe, R.R.

    1995-01-01

    The objective of this Quality Assurance Plan is to provide quality assurance (QA) guidance, implementation of regulatory QA requirements, and quality control (QC) specifications for analytical service. This document follows the Department of Energy (DOE)-issued Hanford Analytical Services Quality Assurance Plan (HASQAP) and additional federal [10 US Code of Federal Regulations (CFR) 830.120] QA requirements that HASQAP does not cover. This document describes how the laboratory implements QA requirements to meet the federal or state requirements, provides what are the default QC specifications, and/or identifies the procedural information that governs how the laboratory operates. In addition, this document meets the objectives of the Quality Assurance Program provided in the WHC-CM-4-2, Section 2.1. This document also covers QA elements that are required in the Guidelines and Specifications for Preparing Quality Assurance Program Plans (QAPPs), (QAMS-004), and Interim Guidelines and Specifications for Preparing Quality Assurance Product Plans (QAMS-005) from the Environmental Protection Agency (EPA). A QA Index is provided in the Appendix A

  11. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    Science.gov (United States)

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. Conclusions The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated.The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for “cradle to the grave” treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system. PMID:17435617

  12. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  13. Impact of proposed financial assurance requirements on nuclear materials licensees

    International Nuclear Information System (INIS)

    Hendrickson, P.L.; Scott, M.J.; Mullen, M.F.; Nicholls, A.K.; Smith, S.A.

    1987-09-01

    The NRC is considering a possible rulemaking that would require certain nuclear materials licensees to demonstrate financial ability to clean up accidental releases of radioactive materials. The rulemaking would potentially affect approximately 16,350 NRC and Agreement State licensees. This report was prepared for NRC by the Pacific Northwest Laboratory to provide background information and analysis for the potential rulemaking. Specific topics examined in the report include: (1) characteristics of potentially affected licensees, (2) the availability and cost of various financial assurance mechanisms, (3) the financial impacts for licensees (including licensees classified as small businesses) of providing $2M of assurance per licensee and a sliding amount of assurance tied to risk, (4) the cost of administering a financial assurance rule, and (5) overall benefits and costs. Tabular information on past material licensee accidents and cleanup efforts is also included. The financial occurrence mechanism that appears to be most suitable for providing the desired financial assurance is one or more newly formed captive insurance companies. Potential benefits of the rulemaking include reduced need for taxpayer-funded cleanup of accidental releases, reduces administrative time to secure such funds, and the possibility of more cleanup with correspondingly reduced occupational and public exposure to radioactive materials

  14. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The framework......’s flexibility allows for the addition of constructs that model new security properties as well as new plugins that implement the security properties. In order to provide higher security assurances, the system specification can be verified by formal methods tools such as the Beliefs and Knowledge (BAK) tool...

  15. DOE assessment guide for safeguards and security

    International Nuclear Information System (INIS)

    Bennett, C.A.; Christorpherson, W.E.; Clark, R.J.; Martin, F.; Hodges, Jr.

    1978-04-01

    DOE operations are periodically assessed to assure that special nuclear material, restricted data, and other classified information and DOE facilities are executed toward continuing the effectiveness of the International Atomic Energy Agency safeguards. A guide to describe the philosophy and mechanisms through which these assessments are conducted is presented. The assessment program is concerned with all contractor, field office, and Headquarters activities which are designed to assure that safeguards and security objectives are reached by contractors at DOE facilities and operations. The guide takes into account the interlocking relationship between many of the elements of an effective safeguards and security program. Personnel clearance programs are a part of protecting classified information as well as nuclear materials. Barriers that prevent or limit access may contribute to preventing theft of government property as well as protecting against sabotage. Procedures for control and surveillance need to be integrated with both information systems and procedures for mass balance accounting. Wherever possible, assessment procedures have been designed to perform integrated inspection, evaluation, and follow-up for the safeguards and security program

  16. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  17. THE CREATION OF THE FOOD SECURITY SYSTEM OF THE REPUBLIC OF MOLDOVA

    Directory of Open Access Journals (Sweden)

    Elena CONDREA

    2013-01-01

    Full Text Available Food security has a complex determination which is dependent both on the agricultural sector policies and on the general macroeconomic framework, the revenue sharing policies, fiscal policies, social, commercial policies, etc.The concept of food security determines the main directions of the policy that favors the population’ welfare,poverty overcoming, changing of the consumption structure, demographic development, human health protection and improvement. In order to assure the foodstuffs of plant origin it was necessary to sow 741808, 85 hectares in 2012 year. The livestock of hens needed to assure the production of eggs for internal consumption, incubation and quantity of meat for 2012 year is 14, 5 million capita. The livestock of pigs needed to assure pork for consumption and the livestock for reproduction and export is 440076, 45 capita.

  18. About Security in Contemporary World

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2015-06-01

    Full Text Available The task to ensure security in contemporary world is a complicated political, scientific-technological and socio-economic problem. As the security itself is complicated, multifactor and hierarchized phenomen also its investigation has to be of an interdisciplinary character. The character of security environment, the character of security risks and threats and also the character of tools for their elimination are essentially changing. The basis to security of social subject consisted in arrangement of the conditions for their existence, to surviving in the present time and advancement into the future. Assurance of this condition means it provided ability to the social subjects to eliminated threats that are defined. In situations of asymmetrical security, the threats are not always clearly defined. They often consist of their own structure systems, in relationships and status the subjects of internationals relations. Asymmetrical of security, by our opinion, presents a discrepancy, unbalance, non-parity between subjects of the international security environment. The unbalance, discrepancy, non-parity has political, military, economic, law, social and societal dimensions.

  19. The quality assurance liaison: Combined technical and quality assurance support

    International Nuclear Information System (INIS)

    Bolivar, S.L.; Day, J.L.

    1993-01-01

    This paper describes the role of the quality assurance liaison, the responsibilities of this position, and the evolutionary changes in duties over the last six years. The role of the quality assurance liaison has had a very positive impact on the Los Alamos Yucca Mountain Site Characterization (YW) quality assurance program. Having both technical and quality assurance expertise, the quality assurance liaisons are able to facilitate communications with scientists on quality assurance issues and requirements, thereby generating greater productivity in scientific investigations. The quality assurance liaisons help ensure that the scientific community knows and implements existing requirements, is aware of new or changing regulations, and is able to conduct scientific work within Project requirements. The influence of the role of the quality assurance liaison can be measured by an overall improvement in attitude of the staff regarding quality assurance requirements and improved job performance, as well as a decrease in deficiencies identified during both internal and external audits and surveillances. This has resulted in a more effective implementation of quality assurance requirements

  20. Use of quality assurance criteria in the work of the regulating body: Cuban experience

    International Nuclear Information System (INIS)

    Sarabia Molina, I.

    1998-01-01

    This paper shows experiences obtained by CNSN, a competent organization in charge of radiological nuclear security and accounting and control of nuclear materials in the Republic of Cuba. It analyses quality assurance criteria while carrying out functions and responsibilities entrusted to it by the regulation in force. This paper also shows main advantages and disadvantages derived from the use of quality assurance methods in the regulation and control as well as on its evolution in time and also in the near future

  1. Landscape ecological security assessment based on projection pursuit in Pearl River Delta.

    Science.gov (United States)

    Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli

    2012-04-01

    Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced

  2. Methods of Software Quality Assurance under a Nuclear Quality Assurance Program

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Young Jun; Cha, Kyung Ho; Cheon, Se Woo; Lee, Jang Soo; Kwon, Kee Choon

    2005-01-01

    This paper addresses a substantial implementation of a software quality assurance under a nuclear quality assurance program. The relationship of the responsibility between a top-level nuclear quality assurance program such as ASME/NQA-1 and its lower level software quality assurance is described. Software quality assurance activities and software quality assurance procedures during the software development life cycle are also described

  3. 7 CFR 1980.333 - Promissory notes and security instruments.

    Science.gov (United States)

    2010-01-01

    ... promissory notes, real estate mortgages, including deeds of trust and similar instruments, and security... Interest Assistance Agreement, assure that the closing agent properly records a junior mortgage or deed of...

  4. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  5. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    Science.gov (United States)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto

  6. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with hi......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network.......In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with high...... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load...

  7. Organizing safety: conditions for successful information assurance programs.

    Science.gov (United States)

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  8. Learning Outcomes--A Useful Tool in Quality Assurance? Views from Academic Staff

    Science.gov (United States)

    Aamodt, Per Olaf; Frølich, Nicoline; Stensaker, Bjørn

    2018-01-01

    While the establishment of quality assurance has been seen for decades as the most significant instrument to secure and enhance the quality of teaching and learning in higher education, the concept of developing more specific learning outcomes has in recent years attracted much interest, not least due to the creation of national qualification…

  9. Engineering secure Internet of Things systems

    CERN Document Server

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  10. Energy security of supply under EU climate policies

    International Nuclear Information System (INIS)

    Groenenberg, H.; Wetzelaer, B.J.H.W.

    2006-12-01

    The implications of various climate policies for the security of supply in the EU-25 were investigated. The security of supply was quantified using the Supply/Demand (S/D) Index. This index aggregates quantitative information on a country's energy system into one single figure. It takes a value between 0 and 100, with higher values indicating a more secure energy system. The S/D Index was calculated for the year 2020 based on the information in a series of policy scenarios, including a baseline (S/D Index 50.7), an energy efficiency scenario (53.8), two renewable energy scenarios (52.6 and 53.3) and two scenarios with combined policies (55.9 and 55.6).The S/D Index proved a useful indicator for assessing the implications of climate policies for the security of supply. As climate policies become more stringent, CO2 index fall, and the S/D index increases. The magnitude of the changes in the two indices is not always similar however. Major falls in CO2 indices in the order of 20% for two scenarios with combined energy efficiency and renewable energy polices lead to less noteworthy improvements in the associated S/D indices. Nevertheless, this combination of policies leads to the greatest improvements in the security of supply

  11. 75 FR 64642 - Indexed Annuities

    Science.gov (United States)

    2010-10-20

    ... 3235-AK16 Indexed Annuities AGENCY: Securities and Exchange Commission. ACTION: Final rule; withdrawal... under the Securities Act of 1933, which defines the terms ``annuity contract'' and ``optional annuity... under the Securities Act of 1933.\\1\\ Rule 151A defines the terms ``annuity contract'' and ``optional...

  12. Stable operation of a Secure QKD system in the real-world setting

    Science.gov (United States)

    Tomita, Akihisa

    2007-06-01

    Quantum Key Distribution (QKD) now steps forward from the proof of principle to the validation of the practical feasibility. Nevertheless, the QKD technology should respond to the challenges from the real-world such as stable operation against the fluctuating environment, and security proof under the practical setting. We report our recent progress on stable operation of a QKD system, and key generation with security assurance. A QKD system should robust to temperature fluctuation in a common office environment. We developed a loop-mirror, a substitution of a Faraday mirror, to allow easy compensation for the temperature dependence of the device. Phase locking technique was also employed to synchronize the system clock to the quantum signals. This technique is indispensable for the transmission system based on the installed fiber cables, which stretch and shrink due to the temperature change. The security proof of QKD, however, has assumed the ideal conditions, such as the use of a genuine single photon source and/or unlimited computational resources. It has been highly desirable to give an assurance of security for practical systems, where the ideal conditions are no longer satisfied. We have constructed a theory to estimate the leakage information on the transmitted key under the practically attainable conditions, and have developed a QKD system equipped with software for secure key distillation. The QKD system generates the final key at the rate of 2000 bps after 20 km fiber transmission. Eavesdropper's information on the final key is guaranteed to be less than 2-7 per bit. This is the first successful generation of the secure key with quantitative assurance of the upper bound of the leakage information. It will put forth the realization of highly secure metropolitan optical communication network against any types of eavesdropping.

  13. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  14. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  15. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Franusich, Michael D. [SpiralGen, Inc., Pittsburgh, PA (United States)

    2016-03-18

    SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as a Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.

  16. Cloud Security Audit for Migration and Continuous Monitoring

    OpenAIRE

    Ismail, Umar Mukhtar; Islam, Shareeful; Mouratidis, Haralambos

    2015-01-01

    Security assurance in cloud computing is one of the main barriers for wider cloud adoption. Potential cloud computing consumers like to know whether the controls in cloud environments can adequately protect critical assets migrated into the cloud. We present a cloud security audit approach to enable users' evaluate cloud service provider offerings before migration, as well as monitoring of events after migration. Our approach entails a set of concepts such as actor, goals, monitoring, conditi...

  17. Quality Assurance - Construction

    DEFF Research Database (Denmark)

    Gaarslev, Axel

    1996-01-01

    Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies......Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies...

  18. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    , on the one hand, to advance internationalisation of quality assurance of higher education, and on the other hand, allow for the differences in the national approaches to quality assurance. The paper will focus on two issues: first, the strength and weaknesses of the method employed and of the use of the ENQA......The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the need...

  19. Security Risks: Management and Mitigation in the Software Life Cycle

    Science.gov (United States)

    Gilliam, David P.

    2004-01-01

    A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.

  20. Measuring the security of energy exports demand in OPEC economies

    International Nuclear Information System (INIS)

    Dike, Jude Chukwudi

    2013-01-01

    One of the objectives of OPEC is the security of demand for the crude oil exports of its members. Achieving this objective is imperative with the projected decline in OECD countries' crude oil demand among other crude oil demand shocks. This paper focuses on determining the external crude oil demand security risks of OPEC member states. In assessing these risks, this study introduces two indexes. The first index, Risky Energy Exports Demand (REED), indicates the level of energy export demand security risks for OPEC members. It combines measures of export dependence, economic dependence, monopsony risk and transportation risk. The second index, Contribution to OPEC Risk Exposure (CORE), indicates the individual contribution of the OPEC members to OPEC's risk exposure. This study utilises the disaggregated index approach in measuring energy demand security risks for crude oil and natural gas and involves a country level analysis. With the disaggregated approach, the study shows that OPEC's energy export demand security risks differ across countries and energy types. - Highlights: • REED and CORE indexes are suitable measures for energy exports demand security risk. • The indexes show that energy demand security risk is different for each OPEC country. • The countries contribution to OPEC's energy demand security risk is also different. • The outcome is necessary for OPEC's common energy and climate change policies. • The outcome makes a case for oil demand security as a topical issue in the literature

  1. Quality assurance

    International Nuclear Information System (INIS)

    1996-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (NRA SR) was focused on support of quality assurance programmes development at responsible organizations Bohunice V-1 and V-v and Mochovce NPPs and their inspection. Development of the level two documentation of a partial quality assurance programme for NPP operation continued at Mochovce NPP. Most of documentation has been submitted to NRA SR for comments and approval. NRA SR invited a mission of French experts to Mochovce NPP to review preparation and performance of internal audits that would be beneficial for improvement in this kind activities at the NPP. Bohunice NPP continued in development of a partial quality assurance programme for operation. The Quality Assurance Programme submitted to NRA SR for approval. Based on a request of Bohunice NPPs, NRA SR consulted the draft quality assurance programme developed by Siemens for stage of the 'Basic Design' of V-1 NPP upgrading. The programme had not been submitted for approval to NRA SR prior to completion of works by Siemens. Based on an internal audit that had been performed, corrective measures were proposed to meet requirements on review and approval of suppliers quality assurance programmes. Requirements related to the quality assurance at nuclear installations were prepared to be incorporated into principles of a act on peaceful use of nuclear power in Slovak Republic

  2. Quality assurance program plan for SNF characterization support project

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides information on how the Quality Assurance Program is implemented for the Spent Nuclear Fuel Characterization Support Project. This QAPP has been developed specifically for the Spent Nuclear Fuel Characterization Support Project, per Letter of Instruction (LOI) from Duke Engineering and Services Company, letter No. DESH-9655870, dated Nov. 22, 1996. It applies to those items and tasks which affect the completion of activities identified in the work breakdown structure of the Project Management Plan (PMP) and LOI. These activities include installation of sectioning equipment and furnace, surface and subsurface examinations, sectioning for metallography, and element drying and conditioning testing, as well as project related operations within the 327 facility as it relates to the specific activities of this project. General facility activities are covered in other appropriate QA-PPS. In addition, this QAPP supports the related quality assurance activities addressed in CM-2-14, Hazardous Material Packaging and Shipping,1261 and HSRCM-1, Hanford Site Radiological Control Manual. The 327 Building is currently transitioning from being a Pacific Northwest National Laboratory (PNNL) managed facility to a Babcock and Wilcox Hanford Company (BVMC) managed facility. During this transition process existing procedures and documents will be utilized until replaced by BVMC procedures and documents. These documents conform to the requirements found in PNL-MA-70, Quality Assurance Manual and PNL-MA-8 1, Hazardous Materials Shipping Manual. The Quality Assurance Program Index (QAPI) contained in Table 1 provides a matrix which shows how project activities relate to IO CFR 830.120 and 5700.6C criteria. Quality Assurance program requirements will be addressed separate from the requirements specified in this document. Other Hanford Site organizations/companies may be utilized in support of this project and the subject organizations are

  3. High assurance SPIRAL

    Science.gov (United States)

    Franchetti, Franz; Sandryhaila, Aliaksei; Johnson, Jeremy R.

    2014-06-01

    In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and future embedded and high performance embedded system processors. High Assurance SPIRAL is a scalable methodology to translate a high level specification of a high assurance controller into a highly resource-efficient, platform-adapted, verified control software implementation for a given platform in a language like C or C++. High Assurance SPIRAL proves that the implementation is equivalent to the specification written in the control engineer's domain language. Our approach scales to problems involving floating-point calculations and provides highly optimized synthesized code. It is possible to estimate the available headroom to enable assurance/performance trade-offs under real-time constraints, and enables the synthesis of multiple implementation variants to make attacks harder. At the core of High Assurance SPIRAL is the Hybrid Control Operator Language (HCOL) that leverages advanced mathematical constructs expressing the controller specification to provide high quality translation capabilities. Combined with a verified/certified compiler, High Assurance SPIRAL provides a comprehensive complete solution to the efficient synthesis of verifiable high assurance controllers. We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned ground vehicle and on a Synthetic Car in a real-time simulator.

  4. Preparing Information Systems (IS) Graduates to Meet the Challenges of Global IT Security: Some Suggestions

    Science.gov (United States)

    Sauls, Jeff; Gudigantala, Naveen

    2013-01-01

    Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…

  5. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  6. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the nee...

  7. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  8. SU-E-T-212: Influence of the Modulation Index On Daily Quality Assurance in Rapid Arc Treatments

    International Nuclear Information System (INIS)

    Wessels, C; Dumas, J-L; Francois, P; Mazal, A

    2014-01-01

    Purpose: At our Institute some measured parameters for daily quality assurance (DQA) of dynamic arc therapy plans showed an unexpected behavior, therefore an investigation of the influence of the magnitude of modulation was conducted. Methods: In our clinical practice all DQAs of dynamic arc therapy plans are measured and analyzed prior to treatments using commercial software. For this study these plans were additionally exported to our in-house software written in MATLAB.The developed software extracted the leaf position, gantry angle, cumulative meterset weight of each control point (CP) and the total number of Monitor Units (MU) of each arc. Based on this information we calculated the leaf travel distance, irradiated segment area, number of MUs and dose rate for each CP. These data allowed us to calculate the modulation indexes (MI) of the plans, applying five different definitions of MI. The results were then correlated to the results of our DQA measurements.To validate the software, additional plans of known MIs were created and analyzed. For confirmation, the calculated parameters were compared to the segmented treatment table (STT) coming from the treatment planning system. Results: All calculated CP-parameters matched the STT by 99% or better. For linac 1, the comparison of the MI evaluation and the DQA results showed a slight tendency: 91.3% failed DQA plans had a MI lower than the average value. For this definition we consider that the lower the MI the higher the modulation. The results of the linac 2 present no significant relevance due to the low sample sizes for each DQA software. Conclusion: Available data and given definitions of the modulation index do not bring conclusive results; one cannot find a clear and distinct correlation with the failure of the DQA. The ongoing analysis with an increased sample size might lead to another conclusion

  9. Firm-level Resource Allocation to Information Security in the Presence of Financial Distress

    OpenAIRE

    Bin Srinidhi; Jia Yan; Giri Kumar Tayi

    2008-01-01

    In this paper, we adopt an organizational perspective to the management of information security and analyze in a multi-period context how an organization should allocate its internal cash flows and available external funds to revenuegenerating (productive) and security assuring (protective) processes in the presence of security breach, borrowing and financial distress costs. We show analytically and illustrate numerically that the capital stock accumulation is lower and allocations to securit...

  10. Intelligent cloud computing security using genetic algorithm as a computational tools

    Science.gov (United States)

    Razuky AL-Shaikhly, Mazin H.

    2018-05-01

    An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.

  11. Development and oversight of ethical health promotion quality assurance and evaluation activities involving human participants.

    Science.gov (United States)

    Sainsbury, Peter

    2015-12-01

    This paper considers the role of ethics and ethics review processes in the development of health promotion quality assurance and evaluation activities involving human participants. The Australian National Health and Medical Research Council (NHMRC) National Statement on Ethical Conduct in Human Research and associated documents provide the framework for the ethical conduct and independent review of research (including quality assurance and evaluation) involving humans in Australia. Identifying the level of risk to which participants may be exposed by participation in quality assurance and evaluation activities is essential for health promotion workers undertaking such activities. Organisations can establish processes other than review by a Human Research Ethics Committee for negligible and low risk research activities. Health promotion quality assurance and evaluation activities often involve negligible and low risk to participants. Seven triggers that indicate the need for ethics review of quality assurance and evaluation activities and a procedural checklist for developing ethical quality assurance and evaluation activities are provided. Health promotion workers should be familiar with the NHMRC's National Statement on Ethical Conduct in Human Research. When ethical considerations underpin the planning and conduct of all quality assurance and evaluation from the very beginning, the activity is the better for it, independent 'ethics approval' can mostly be secured without much trouble and workers' frustration levels are reduced. So what? Health promotion quality assurance and evaluation activities must be ethically justified. Health promotion workers should be familiar with the NHMRC's National Statement on Ethical Conduct in Human Research and should use it when developing health promotion quality assurance and evaluation activities.

  12. A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

    Directory of Open Access Journals (Sweden)

    Silvia TRIF

    2011-01-01

    Full Text Available This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.

  13. Revitalizing quality assurance

    International Nuclear Information System (INIS)

    Hawkins, F.C.

    1998-01-01

    The image of someone inspecting or auditing often comes to mind when people hear the term quality assurance. Although partially correct, this image is not the complete picture. The person doing the inspecting or auditing is probably part of a traditional quality assurance organization, but that organization is only one aspect of a properly conceived and effectively implemented quality assurance system whose goal is improved facility safety and reliability. This paper introduces the underlying philosophies and basic concepts of the International Atomic Energy Agency's new quality assurance initiative that began in 1991 as part of a broad Agency-wide program to enhance nuclear safety. The first product of that initiative was publication in 1996 of a new Quality Assurance Code 50-C/SG-Q and fourteen related Safety Guides. This new suite of documents provide the technical and philosophical foundation upon which Member States can base their quality assurance programs. (author)

  14. Nuclear regulatory policy concept on safety, security, safeguards and emergency preparedness (3S+EP)

    International Nuclear Information System (INIS)

    Ilyas, Zurias

    2009-01-01

    Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. By undertaking proper regulatory oversight on Safety, Security and Emergency Preparedness (3S+EP) as an integrated and comprehensive system, safe and secure use of nuclear energy can be assured. Licence requirements and conditions should fulfil regulatory requirements pertaining to 3S+EP for nuclear installation as an integrated system. An effective emergency capacity that can be immediately mobilized is important. The capacity in protecting the personnel before, during and after the disaster should also be planned. Thus, proper emergency preparedness should be supported by adequate resources. The interface between safety, security, safeguards and emergency preparedness has to be set forth in nuclear regulations, such as regulatory requirements; 3S+EP; components, systems and structures of nuclear installations and human resources. Licensing regulations should stipulate, among others, DIQ, installations security system, safety analysis report, emergency preparedness requirements and necessary human resources that meet the 3S+EP requirements.

  15. Development of the system based code. v. 5. Method of margin exchange. pt. 2. Determination of quality assurance index based on a 'Vector Method'

    International Nuclear Information System (INIS)

    Asayama, Tai

    2003-03-01

    For the commercialization of fast breeder reactors, 'System Based Code', a completely new scheme of a code on structural integrity, is being developed. One of the distinguished features of the System Based Code is that it is able to determine a reasonable total margin on a structural of system, by allowing the exchanges of margins between various technical items. Detailed estimation of failure probability of a given combination of technical items and its comparison with a target value is one way to achieve this. However, simpler and easier methods that allow margin exchange without detailed calculation of failure probability are desirable in design. The authors have developed a simplified method such as a 'design factor method' from this viewpoint. This report describes a 'Vector Method', which was been newly developed. Following points are reported: 1) The Vector Method allows margin exchange evaluation on an 'equi-quality assurance plane' using vector calculation. Evaluation is easy and sufficient accuracy is achieved. The equi-quality assurance plane is obtained by a projection of an 'equi-failure probability surface in a n-dimensional space, which is calculated beforehand for typical combinations of design variables. 2) The Vector Method is considered to give the 'Quality Assurance Index Method' a probabilistic interpretation. 3) An algebraic method was proposed for the calculation of failure probabilities, which is necessary to obtain a equi-failure probability surface. This method calculates failure probabilities without using numerical methods such as Monte Carlo simulation or numerical integration. Under limited conditions, this method is quite effective compared to numerical methods. 4) An illustration of the procedure of margin exchange evaluation is given. It may be possible to use this method to optimize ISI plans; even it is not fully implemented in the System Based Code. (author)

  16. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  17. Introduction to quality assurance

    International Nuclear Information System (INIS)

    Kaden, W.

    1980-01-01

    In today's interpretation 'quality assurance' means 'good management'. Quality assurance has to cover all phases of a work, but all quality assurance measures must be adapted to the relevance and complexity of the actual task. Examples are given for the preparation of quality classes, the organization of quality assurance during design and manufacturing and for auditing. Finally, efficiency and limits of quality assurance systems are described. (orig.)

  18. Quality assurance

    International Nuclear Information System (INIS)

    Kunich, M.P.; Vieth, D.L.

    1989-01-01

    This paper provides a point/counterpoint view of a quality assurance director and a project manager. It presents numerous aspects of quality assurance requirements along with analyses as to the value of each

  19. A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust

    Science.gov (United States)

    Peikari, Hamid Reza

    Despite the wide attention of previous studies to explore the influence of different security-related factors on customers' online trust, the interrelations between such factors and their direct and indirect influences on customers' trust have been neglected. This study investigates the direct and indirect interrelations between the factors authentication, encryption, technical protection and externally provided assurances including third party security and privacy seals with customers' trust in the business-to-customer (B2C) environment. The data was collected from 238 respondents and after the test of reliability and validity of the scale, the hypotheses were tested using structural equation modeling. The results showed that customers' perception of encryption and authentication mechanisms implemented by a Website have a positive significant influence on their perceived technical protection while technical protection was found to significantly influence customers' trust to the Website. However, the analysis did not find any relation between the third party assurance and customers' trust, indicating that despite the high expenses companies involve to obtain such assurances from reputed third parties, such mechanisms and assurances do not have any direct or indirect significant influence on customers' trust; which raises questions on the value of such mechanisms .finally, after discussing the findings and implication of this study for both academic and business worlds, suggestions for future studies were made to have a better understanding of the dimensions of the interrelations between the security-related factors.

  20. Multinational Quality Assurance

    Science.gov (United States)

    Kinser, Kevin

    2011-01-01

    Multinational colleges and universities pose numerous challenges to the traditional models of quality assurance that are designed to validate domestic higher education. When institutions cross international borders, at least two quality assurance protocols are involved. To guard against fraud and abuse, quality assurance in the host country is…

  1. DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

    Directory of Open Access Journals (Sweden)

    Hussam Alddin Shihab Ahmed

    2016-02-01

    Full Text Available Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

  2. Quality assurance of nuclear energy

    International Nuclear Information System (INIS)

    1994-12-01

    It consists of 14 chapters, which are outline of quality assurance of nuclear energy, standard of quality assurance, business quality assurance, design quality assurance, purchase quality assurance, production quality assurance, a test warranty operation warranty, maintenance warranty, manufacture of nuclear power fuel warranty, computer software warranty, research and development warranty and quality audit.

  3. Index of cyber integrity

    Science.gov (United States)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  4. Teaching Hands-On Linux Host Computer Security

    Science.gov (United States)

    Shumba, Rose

    2006-01-01

    In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…

  5. The application of quality assurance

    International Nuclear Information System (INIS)

    Lovatt, G.B.

    1988-01-01

    The paper concerns the application of quality assurance to structures, systems and components for the design, construction and operation of nuclear power plant and fuel reprocessing plant. A description is given of:- the requirements for quality assurance, the establishment of quality assurance arrangements, quality assurance documents structure, and quality assurance manuals and programmes. Quality assurance procedures and auditing are also discussed. (U.K.)

  6. Assuring the energy security; Para garantizar la seguridad energetica

    Energy Technology Data Exchange (ETDEWEB)

    Yergin, Daniel [Cambridge Energy Research Associates (CERA) (United States)

    2006-04-15

    Both the institutions and the policies adopted after the 1973 Arab oil embargo aren't able to satisfy both the energy consumers' and producers' necessities. It is necessary to extend the definition of energy security in order to stand up to the challenges of a globalized world. [Spanish] Las instituciones y politicas adoptadas despues del embargo petrolero arabe de 1973 ya no pueden satisfacer las necesidades de los consumidores y productores de energia. Se requiere expandir la definicion de seguridad energetica para hacer frente a los desafios de un mundo globalizado.

  7. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  8. Energy Assurance Technical Training and Awareness Program/Energy Infrastructure Training and Analysis Center

    Energy Technology Data Exchange (ETDEWEB)

    Barbara McCabe

    2005-11-15

    This report covers the work completed during Year One (Year One has a 16 month project period) of a five- year Cooperative Agreement (DE-FC26-03NT41895) between the International Union of Operating Engineers (IUOE) National Hazmat Program (OENHP) and the U. S. Department of Energy (DOE) National Energy Technology Laboratory (NETL). This final technical report is being submitted, as required by the Cooperative Agreement, within 90 (calendar) days after the project period ends (December 31, 2004). The resources allocated to Year One of the Cooperative Agreement were adequate for the completion of the required deliverables. All deliverables have been completed and sent to AAD Document Control as directed in the cooperative agreement. The allocation for Year One required 20-25 trainers to be trained in each of five Train-the-Trainer courses and a total of 6,000 workers trained throughout the country. Through cost savings employed for the scheduling and conduct of Train-the-Trainer, instructor refreshers, and direct training classes, 3171 workers have been trained to date. This total incorporates 159 trainers and members from management, local, county, state and federal organizations identified in the Strategic Plan. The largest percentage of personnel trained is heavy equipment operators, and building engineers, which is the largest targeted population identified under this cooperative agreement. The OENHP, using existing curriculum as appropriate, has modified and developed new training modules that have been used to establish four different levels of training courses. The four courses are: (1) EA 500 Energy Assurance Train-the-Trainer, (2) EA 400 Energy Assurance Instructor Refresher, (3) EA 300 Energy Assurance, and (4) EA 100 Energy Assurance Awareness. Training modules cover topics, such as, but not limited to, facility vulnerability and vulnerability assessment, physical security- heating, ventilation, air conditioning, terrorism awareness, weapons of mass

  9. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  10. Financial assurances

    International Nuclear Information System (INIS)

    Paton, R.F.

    1990-01-01

    US Ecology is a full service waste management company. The company operates two of the nation's three existing low-level radioactive waste (LLRW) disposal facilities and has prepared and submitted license applications for two new LLRW disposal facilities in California and Nebraska. The issue of financial assurances is an important aspect of site development and operation. Proper financial assurances help to insure that uninterrupted operation, closure and monitoring of a facility will be maintained throughout the project's life. Unfortunately, this aspect of licensing is not like others where you can gauge acceptance by examining approved computer codes, site performance standards or applying specific technical formulas. There is not a standard financial assurance plan. Each site should develop its requirements based upon the conditions of the site, type of design, existing state or federal controls, and realistic assessments of future financial needs. Financial assurances at U.S. Ecology's existing sites in Richland, Washington, and Beatty, Nevada, have been in place for several years and are accomplished in a variety of ways by the use of corporate guarantees, corporate capital funds, third party liability insurance, and post closure/long-term care funds. In addressing financial assurances, one can divide the issue into three areas: Site development/operations, third party damages, and long-term care/cleanup

  11. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  12. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  13. A quality assurance index for brachytherapy treatment plan verification

    International Nuclear Information System (INIS)

    Simpson, J.B.; Clarke, J.P.

    2000-01-01

    A method is described which provides an independent verification of a brachytherapy treatment plan. The method is applicable to any common geometric configuration and utilises a simple equation derived from a common form of nonlinear regression. The basis for the index value is the relationship between the treatment time, prescribed dose, source strength and plan geometry. This relationship may be described mathematically as: Total Treatment Time ∝ Prescribed Dose/Source Strength x (a geometric term) with the geometric term incorporating three geometric components, namely the distance from source positions to points of dose normalisation (d), the total length of the dwell positions (L), and the number of source trains or catheters (N). A general equation of the form GF = k (d) -α (L) -β (N) -y is used to describe the plan geometry, where GF is what we have termed the geometric factor, k is a constant of proportionality and the exponents are derived from the non-linear regression process. The resulting index is simple to calculate prior to patient treatment and sensitive enough to identify significant error whilst being robust enough to allow for a normal degree of geometric distortion

  14. Food security and productivity among urban farmers in Kaduna ...

    African Journals Online (AJOL)

    This study to investigated food security and productivity among urban farmers' in Kaduna State Two-stage sampling procedure was used to select 213 respondents for the study. Interview schedule was used to collect data. Data were analysed using descriptive statistics (food security index, food insecurity/ surplus gap index ...

  15. Nova laser assurance-management system

    International Nuclear Information System (INIS)

    Levy, A.J.

    1983-01-01

    In a well managed project, Quality Assurance is an integral part of the management activities performed on a daily basis. Management assures successful performance within budget and on schedule by using all the good business, scientific, engineering, quality assurance, and safety practices available. Quality assurance and safety practices employed on Nova are put in perspective by integrating them into the overall function of good project management. The Nova assurance management system was developed using the quality assurance (QA) approach first implemented at LLNL in early 1978. The LLNL QA program is described as an introduction to the Nova assurance management system. The Nova system is described pictorially through the Nova configuration, subsystems and major components, interjecting the QA techniques which are being pragmatically used to assure the successful completion of the project

  16. Laboratory quality assurance

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1977-01-01

    The elements (principles) of quality assurance can be applied to the operation of the analytical chemistry laboratory to provide an effective tool for indicating the competence of the laboratory and for helping to upgrade competence if necessary. When used, those elements establish the planned and systematic actions necessary to provide adequate confidence in each analytical result reported by the laboratory (the definition of laboratory quality assurance). The elements, as used at the Hanford Engineering Development Laboratory (HEDL), are discussed and they are qualification of analysts, written methods, sample receiving and storage, quality control, audit, and documentation. To establish a laboratory quality assurance program, a laboratory QA program plan is prepared to specify how the elements are to be implemented into laboratory operation. Benefits that can be obtained from using laboratory quality assurance are given. Experience at HEDL has shown that laboratory quality assurance is not a burden, but it is a useful and valuable tool for the analytical chemistry laboratory

  17. Quality assurance program plan for 324 Building B-Cell safety cleanout project (BCCP)

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides information on how the Quality Assurance Program is implemented for the 324 Building B-Cell Safety Cleanout Project (BCCP). This QAPP is responsive to the Westinghouse Hanford Company Quality Assurance Program and Implementation Plan, WHC-SP-1131, for 10 CFR 830.120, Nuclear Safety Management, Quality Assurance Requirements; and DOE Order 5700.6C, Quality Assurance. This QAPP supersedes PNNL PNL-MA-70 QAP Quality Assurance Plan No. WTC-050 Rev. 2, issue date May 3, 1996. This QAPP has been developed specifically for the BCCP. It applies to those items and tasks which affect the completion of activities identified in the work breakdown structure of the Project Management Plan (PMP). These activities include all aspects of decontaminating B-Cell and project related operations within the 324 Building as it relates to the specific activities of this project. General facility activities (i.e. 324 Building Operations) are covered in the Building 324 QAPP. In addition, this QAPP supports the related quality assurance activities addressed in CM-2-14, Hazardous Material Packaging and Shipping, and HSRCM-1, Hanford Site Radiological Control Manual, The 324 Building is currently transitioning from being a Pacific Northwest National Laboratory (PNNL) managed facility to a B and W Hanford Company (BWHC) managed facility. During this transition process existing, PNNL procedures and documents will be utilized until replaced by BWHC procedures and documents. These documents conform to the requirements found in PNL-MA-70, Quality Assurance Manual and PNL-MA-8 1, Hazardous Materials Shipping Manual. The Quality Assurance Program Index (QAPI) contained in Table 1 provides a matrix which shows how project activities relate to 10 CFR 83 0.120 and 5700.6C criteria. Quality Assurance program requirements will be addressed separate from the requirements specified in this document. Other Hanford Site organizations/companies may be

  18. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  19. The Importance of Information Security Management in Crisis Prevention in the Company

    OpenAIRE

    Wawak, Slawomir

    2010-01-01

    Management information system can be compared to the nervous system of a company. Its malfunction may cause adverse effects in many different areas of the company. Information Security Management is understood as tool of the information confidentiality, availability and integrity assurance. An effective information security management system reduces the risk of crisis in the company. It also allows to reduce the effects of the crisis occurring outside the company.

  20. 3D Digital Legos for Teaching Security Protocols

    Science.gov (United States)

    Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao

    2011-01-01

    We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…

  1. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  2. Measuring the energy security implications of fossil fuel resource concentration

    International Nuclear Information System (INIS)

    Lefevre, Nicolas

    2010-01-01

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies-France and the United Kingdom-looking at the evolution of both indexes to 2030.

  3. Measuring the energy security implications of fossil fuel resource concentration

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, Nicolas [Woodrow Wilson School of Public and International Affairs, Princeton University, New Jersey (United States)

    2010-04-15

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies - France and the United Kingdom - looking at the evolution of both indexes to 2030. (author)

  4. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  5. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activities and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities wihtin the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  6. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activitie and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities within the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  7. Conducting an information security audit

    Directory of Open Access Journals (Sweden)

    Prof. Ph.D . Gheorghe Popescu

    2008-05-01

    Full Text Available The rapid and dramatic advances in information technology (IT in recent years have withoutquestion generated tremendous benefits. At the same time, information technology has created significant,nunprecedented risks to government and to entities operations. So, computer security has become muchmore important as all levels of government and entities utilize information systems security measures toavoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitiveinformation. Obviously, uses of computer security become essential in minimizing the risk of malicious attacksfrom individuals and groups, considering that there are many current computer systems with onlylimited security precautions in place.As we already know financial audits are the most common examinations that a business manager en-counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical securityaudits. However, they are unlikely to be acquainted with information security audits; that is an audit ofhow the confidentiality, availability and integrity of an organization’s information are assured. Any way,if not, they should be, especially that an information security audit is one of the best ways to determine thesecurity of an organization’s information without incurring the cost and other associated damages of a securityincident.

  8. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  9. Quality assurance handbook for measurement laboratories

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1984-10-01

    This handbook provides guidance in the application of quality assurance to measurement activities. It is intended to help those persons making measurements in applying quality assurance to their work activities by showing how laboratory practices and quality assurance requirements are integrated to provide control within those activities. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across all types of measurement laboratories. This handbook also can assist quality assurance personnel in understanding the relationships between laboratory practices and quality assurance requirements. The handbook is composed of three chapters and several appendices. Basic guidance is provided by the three chapters. In Chapter 1, the role of quality assurance in obtaining quality data and the importance of such data are discussed. Chapter 2 presents the elements of laboratory quality assurance in terms of practices that can be used in controlling work activities to assure the acquisition of quality data. Chapter 3 discusses the implementation of laboratory quality assurance. The appendices provide supplemental information to give the users a better understanding of the following: what is quality assurance; why quality assurance is required; where quality assurance requirements come from; how those requirements are interpreted for application to laboratory operations; how the elements of laboratory quality assurance relate to various laboratory activities; and how a quality assurance program can be developed

  10. Quality assurance of metabolomics.

    Science.gov (United States)

    Bouhifd, Mounir; Beger, Richard; Flynn, Thomas; Guo, Lining; Harris, Georgina; Hogberg, Helena; Kaddurah-Daouk, Rima; Kamp, Hennicke; Kleensang, Andre; Maertens, Alexandra; Odwin-DaCosta, Shelly; Pamies, David; Robertson, Donald; Smirnova, Lena; Sun, Jinchun; Zhao, Liang; Hartung, Thomas

    2015-01-01

    Metabolomics promises a holistic phenotypic characterization of biological responses to toxicants. This technology is based on advanced chemical analytical tools with reasonable throughput, including mass-spectroscopy and NMR. Quality assurance, however - from experimental design, sample preparation, metabolite identification, to bioinformatics data-mining - is urgently needed to assure both quality of metabolomics data and reproducibility of biological models. In contrast to microarray-based transcriptomics, where consensus on quality assurance and reporting standards has been fostered over the last two decades, quality assurance of metabolomics is only now emerging. Regulatory use in safety sciences, and even proper scientific use of these technologies, demand quality assurance. In an effort to promote this discussion, an expert workshop discussed the quality assurance needs of metabolomics. The goals for this workshop were 1) to consider the challenges associated with metabolomics as an emerging science, with an emphasis on its application in toxicology and 2) to identify the key issues to be addressed in order to establish and implement quality assurance procedures in metabolomics-based toxicology. Consensus has still to be achieved regarding best practices to make sure sound, useful, and relevant information is derived from these new tools.

  11. Quality assurance

    International Nuclear Information System (INIS)

    Cante; Feger; Genevray; Hennion; Moneyron; Monneyron; Normand; Rastoin; Silberstein; Vaujour.

    1976-01-01

    The general principles of quality assurance and their applications within the French industrial and commercial regulations are presented. The conditions for the practical application of quality assurance to the different stages of the life of a nuclear power station (design, development, operation) are considered and a special mention is made of nuclear fuels and liquid sodium cooled reactors [fr

  12. The case of sustainability assurance: constructing a new assurance service

    NARCIS (Netherlands)

    O'Dwyer, B.

    2011-01-01

    This paper presents an in-depth longitudinal case study examining the processes through which practitioners in two Big 4 professional services firms have attempted to construct sustainability assurance (independent assurance on sustainability reports). Power’s (1996, 1997, 1999, 2003) theorization

  13. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs.

  14. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    International Nuclear Information System (INIS)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong

    2016-01-01

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs

  15. THE COSTS OF ENERGY SUPPLY SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Rogner, H.H.; Langlois, L.M.; McDonald, A.; Weisser, D.; Howells, M.

    2007-07-01

    In general, increasing a country's energy supply security does not come for free. It costs money to build up a strategic reserve, to increase supply diversity or even to accelerate energy efficiency improvements. Nor are all investments in increasing energy supply security cost effective, even if the shocks they are designed to insure against can be predicted with 100% accuracy. The first half of the paper surveys different definitions and strategies associated with the concept of energy supply security, and compares current initiatives to establish an 'assured supply of nuclear fuel' to the International Energy Agency's (IEA's) system of strategic national oil reserves. The second half of the paper presents results from several case studies of the costs and effectiveness of selected energy supply security policies. One case study examines alternative strategies for Lithuania following the scheduled closure of the Ignalina-2 nuclear reactor in 2009. The second case study examines, for countries with different energy resources and demand structures, the effectiveness of a policy to increase supply diversity by expanding renewable energy supplies. (auth)

  16. Mining known attack patterns from security-related events

    Directory of Open Access Journals (Sweden)

    Nicandro Scarabeo

    2015-10-01

    Full Text Available Managed Security Services (MSS have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS, malware propagation, and anomalies. A proliferation of attacks has determined the need for installing more network probes and collecting more security-related events in order to assure the best coverage, necessary for generating incident responses. The increase in volume of data to analyse has created a demand for specific tools that automatically correlate events and gather them in pre-defined scenarios of attacks. Motivated by Above Security, a specialized company in the sector, and by National Research Council Canada (NRC, we propose a new data mining system that employs text mining techniques to dynamically relate security-related events in order to reduce analysis time, increase the quality of the reports, and automatically build correlated scenarios.

  17. A CAREM reactor's design evaluation from the nuclear security point of view

    International Nuclear Information System (INIS)

    Kay, J.M.; Felizia, E.R.; Navarro, N.R.; Caruso, G.J.

    1990-01-01

    The main objective of this work is to define the adequate rules for CAREM reactor security systems design and processes which aim to assure verification of the CALIN regulations 'Radiological Criteria' in relation to accidents concerning CAREM reactor design. (Author) [es

  18. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  19. Recent advances in systems safety and security

    CERN Document Server

    Stamatescu, Grigore

    2016-01-01

    This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security – IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.

  20. 77 FR 49839 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-08-17

    ... Advisors LLC and IndexIQ Active ETF Trust; Notice of Application August 13, 2012. AGENCY: Securities and... IndexIQ Active ETF Trust (the ``Trust''). SUMMARY OF APPLICATION: Applicants request an order that... series, IQ Global Equity Active ETF (``Global Equity ETF''), IQ Global Fixed Income Active ETF (``Global...

  1. 18 CFR 3a.91 - Data index system.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Data index system. 3a..., DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Data Index System § 3a.91 Data index system. A data index system shall be established for Top Secret, Secret, and Confidential information in...

  2. Draft secure medical database standard.

    Science.gov (United States)

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  3. Proposals to Restructure Social Security

    OpenAIRE

    Peter A. Diamond

    1996-01-01

    This paper discusses five proposed changes in Social Security: indexing the normal retirement age to life expectancy (as Sweden is doing); investing part of the trust funds in private securities; partial privatization (as has been proposed by Senators Kerrey and Simpson, Sweden is doing and Mexico has done); replacing Social Security by individually mandated savings (as was done in Chile in 1981); and mandating employer provided retirement savings (as recently legislated in Australia and is e...

  4. Risk-Significant Adverse Condition Awareness Strengthens Assurance of Fault Management Systems

    Science.gov (United States)

    Fitz, Rhonda

    2017-01-01

    database for adaptive, risk-informed FM assurance that critical software systems will safely and securely protect against faults and respond to ACs in order to achieve successful missions.

  5. Computer software quality assurance

    International Nuclear Information System (INIS)

    Ives, K.A.

    1986-06-01

    The author defines some criteria for the evaluation of software quality assurance elements for applicability to the regulation of the nuclear industry. The author then analyses a number of software quality assurance (SQA) standards. The major extracted SQA elements are then discussed, and finally specific software quality assurance recommendations are made for the nuclear industry

  6. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  7. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  8. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  9. 76 FR 29817 - Further Definition of “Swap,” “Security-Based Swap,” and “Security-Based Swap Agreement”; Mixed...

    Science.gov (United States)

    2011-05-23

    ... Securities Exchanges H. Method of Settlement of Index CDS I. Security-Based Swaps as Securities Under the.... 20, 2010 (``SFAA Letter''); Letter from J. Stephen Zielezienski, Senior Vice President & General... Stephen E. Roth, James M. Cain, and W. Thomas Conner, Sutherland Asbill & Brennan LLP, for the Committee...

  10. Work Done For the Safety and Assurance Directorate

    Science.gov (United States)

    Struhar, Paul T., Jr.

    2004-01-01

    The Safety and Assurance Directorate (SAAD) has a vision. The vision is to be an essential part of NASA Glenn's journey to excellence. SAAD is in charge of leading safety, security, and quality and is important to our customers. When it comes to programmatic and technical decision making and implementation, SAAD provides clear safety, reliability, maintainable, quality assurance and security. I worked on a couple different things during my internship with Sandra Hardy. I did a lot of logistics for meeting and trips. I helped run the budget for the SAAD directorate. I also worked with Rich Miller for one week and we took water samples and ran tests. We also calibrated the different equipment. There is a lot more to meetings than people see. I did one for a retirement party. I had to get work orders and set up the facilities where the event is going to take place. I also set up a trip to Plum Brook Station. I had to order vans and talk with the people up there to see when a good time was. I also had to make invitations and coordinate everything. I also help Sandy run the numbers in the budget. We use excel to do this, which makes it a lot easier. things. He is in the environmental safety office. I learned how to collaborate the equipment using alpha and beta sources. I went out with him and we took water samples and tested them for conductivity and chlorine. I have learned a lot in the short time I've been here. It has been a great experience and I have has the pleasure of meeting and working with great people.

  11. Software Quality Assurance Audits Guidebooks

    Science.gov (United States)

    1990-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes that are used in software development. The Software Assurance Guidebook, NASA-GB-A201, issued in September, 1989, provides an overall picture of the NASA concepts and practices in software assurance. Second level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the second level Software Quality Assurance Audits Guidebook that describes software quality assurance audits in a way that is compatible with practices at NASA Centers.

  12. Technical Reference Suite Addressing Challenges of Providing Assurance for Fault Management Architectural Design

    Science.gov (United States)

    Fitz, Rhonda; Whitman, Gerek

    2016-01-01

    Research into complexities of software systems Fault Management (FM) and how architectural design decisions affect safety, preservation of assets, and maintenance of desired system functionality has coalesced into a technical reference (TR) suite that advances the provision of safety and mission assurance. The NASA Independent Verification and Validation (IV&V) Program, with Software Assurance Research Program support, extracted FM architectures across the IV&V portfolio to evaluate robustness, assess visibility for validation and test, and define software assurance methods applied to the architectures and designs. This investigation spanned IV&V projects with seven different primary developers, a wide range of sizes and complexities, and encompassed Deep Space Robotic, Human Spaceflight, and Earth Orbiter mission FM architectures. The initiative continues with an expansion of the TR suite to include Launch Vehicles, adding the benefit of investigating differences intrinsic to model-based FM architectures and insight into complexities of FM within an Agile software development environment, in order to improve awareness of how nontraditional processes affect FM architectural design and system health management. The identification of particular FM architectures, visibility, and associated IV&V techniques provides a TR suite that enables greater assurance that critical software systems will adequately protect against faults and respond to adverse conditions. Additionally, the role FM has with regard to strengthened security requirements, with potential to advance overall asset protection of flight software systems, is being addressed with the development of an adverse conditions database encompassing flight software vulnerabilities. Capitalizing on the established framework, this TR suite provides assurance capability for a variety of FM architectures and varied development approaches. Research results are being disseminated across NASA, other agencies, and the

  13. Data Quality Assurance Governance

    OpenAIRE

    Montserrat Gonzalez; Stephanie Suhr

    2016-01-01

    This deliverable describes the ELIXIR-EXCELERATE Quality Management Strategy, addressing EXCELERATE Ethics requirement no. 5 on Data Quality Assurance Governance. The strategy describes the essential procedures and practices within ELIXIR-EXCELERATE concerning planning of quality management, performing quality assurance and controlling quality. It also depicts the overall organisation of ELIXIR with emphasis on authority and specific responsibilities related to quality assurance.

  14. Quality assurance program

    International Nuclear Information System (INIS)

    Brooks, G.L.

    The concept of levels of quality assurance as applied to CANDU-type nuclear power plant components, i.e. maintaining an appropriate cost/benefit ratio, is introduced. The design process itself has quality assurance features by virtue of multi-level review. (E.C.B.)

  15. Energy security issues at household level in India

    International Nuclear Information System (INIS)

    Jain, Garima

    2010-01-01

    Energy security at the household level implies ensuring assured and regular supply of clean energy fuels at an affordable price for various household activities. Threat to physical availability of clean energy fuels for cooking and lighting is determined through various indicators such as dependence on traditional fuels and limited access to clean fuels. Energy insecurity translates into various adverse social impacts. Financial threat to energy security is indicated by expenses incurred on energy fuels and affordability of clean fuels. Households spend a major portion of their income on acquiring energy fuels; however, due to high price of clean fuels, they continue to depend on traditional and inefficient fuels. There is an urgent need to address factors that pose a threat to energy security at the household level. In this regard, measures taken by the government agencies and other institutions are also reviewed. The paper also suggests the regulatory and policy interventions required to address the energy security issues at the household level.

  16. Implementation of an assurance system guarantee quality in the hospital radiotherapy department of Lenin Holguin, Cuba

    International Nuclear Information System (INIS)

    Gonzalez Lopez, Nadia; Perez Velasquez, Reytel; Sol Zamora

    2009-01-01

    By the need to develop a simple and effective method of reducing radiation accidents in the present work has as objective the implementation through a manual system assurance quality assurance department of radiotherapy based on ISO 9000 and 14000 , besides the IAEA TECDOC-1151. The Quality Manual is divided into four sessions: general, procedures for the realization of security testing, mechanical and dosimetric the Co-60 machine, procedures for the planning of treatments in gynecology locations, SNC, rectum and breast cancer and those relating to the search and / or simulation of the first patient treatment, all discussed and approved by the Quality Assurance Committee. We conclude that this document is essential in obtaining an increasing quality in conventional radiation treatments, plus must be a reference material in the training of technologists, doctors and medical physicist and the documentary basis for the conformation of the warranty program quality of radiation therapy 3D-CRT. (author)

  17. Quality assurance in NDT

    International Nuclear Information System (INIS)

    Krishnamoorthy, K.

    2010-01-01

    The importance of Nondestructive Testing (NDT) as a Quality Control/Quality Assurance tool in the industrial domain cannot be over-emphasized. With the rapid advancement in research and technology, the NDT field is becoming larger and more sophisticated day by day. Innovative research in materials science and digital technology is paving the way for more and more new methods in NDT technology. Although the NDT technology has improved over the years, the basic 'human factor' underlying the success of the NDT field remains the same. There are two major factors that influence the 'Quality Assurance in NDT'. First, knowledgeable and skilled NDT Operators are the most important factor in assuring the reliable test results. Second, the Management oversight of the NDT operations plays a major role in assuring the overall quality of NDT. Management responsibilities include the implementation of a Quality Management System (QMS) that focuses on the NDT operations and apply all the elements of Quality Assurance relevant to NDT. Whether the NDT operations are performed in-house or by a contractor, periodic Management Self-assessments should include the following question: How can the Management assess and improve the 'Quality Assurance in NDT'? This paper attempts to answer the above question. Some practical examples are provided to illustrate the potential quality incidents that could lead to costly failures, and the role of NDT Operator and the Management in preventing such quality incidents. Also, some guidelines are provided on how the Management can apply the elements of Quality Assurance to NDT in order to assess and improve the 'Quality Assurance in NDT'. (author)

  18. The Association Between NIMH Funding and h-index in Psychiatry.

    Science.gov (United States)

    Saraykar, Smita; Saleh, Ayman; Selek, Salih

    2017-08-01

    Academic productivity is measured under many domains: number of high impact publications, objective bibliometrics, securing extra-mural funding, etc. Citation impact is measured by an objective bibliometric called h-index. Securing funding from the National Institute of Mental Health (NIMH) is considered prestigious in the field of psychiatry. It is unknown if NIMH takes into consideration the author's h-index during the grant review process. The goal of this study was to determine the correlation between a principal investigator's (PI's) h-index and the NIMH funding. Correlational analysis was conducted on publicly available 2012 NIMH funding data to assess the relationship between NIMH funding and a PI's h-index. A simple linear regression was calculated to predict the h-index based on the amount of funding offered to the PI. A total of 139 PIs and their corresponding h-index and NIMH funding (direct, indirect, and total cost) were included. A strong correlation was found between h-index and NIMH funding: direct cost (r = 0.632, p h-index, β = 0.821, t (2.599), p h-index, R 2  = 0.410, F (3, 119) = 27.59, p h-index and securing NIMH funding. Thus, h-index stands out as a reliable measure for assessing the impact of scholarly contributions in academic psychiatry and can be used as an adjunct for performance evaluations, appointment, and promotions in academia.

  19. 77 FR 19408 - Reinstate Index to Chapter III in 20 CFR

    Science.gov (United States)

    2012-03-30

    ... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . Correction In the... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0018] Reinstate Index to Chapter III in 20 CFR AGENCY: Social Security Administration. ACTION: Notice; correction. SUMMARY: The Social Security...

  20. 17 CFR 41.21 - Requirements for underlying securities.

    Science.gov (United States)

    2010-04-01

    ... underlying security is: (i) Common stock, (ii) Such other equity security as the Commission and the SEC jointly deem appropriate, or (iii) A note, bond, debenture, or evidence of indebtedness; and (3) The... Exchange Act of 1934; (3) The securities in the index are: (i) Common stock, (ii) Such other equity...

  1. Potential of insects as food and feed in assuring food security.

    Science.gov (United States)

    van Huis, Arnold

    2013-01-01

    With a growing world population and increasingly demanding consumers, the production of sufficient protein from livestock, poultry, and fish represents a serious challenge for the future. Approximately 1,900 insect species are eaten worldwide, mainly in developing countries. They constitute quality food and feed, have high feed conversion ratios, and emit low levels of greenhouse gases. Some insect species can be grown on organic side streams, reducing environmental contamination and transforming waste into high-protein feed that can replace increasingly more expensive compound feed ingredients, such as fish meal. This requires the development of cost-effective, automated mass-rearing facilities that provide a reliable, stable, and safe product. In the tropics, sustainable harvesting needs to be assured and rearing practices promoted, and in general, the food resource needs to be revalorized. In the Western world, consumer acceptability will relate to pricing, perceived environmental benefits, and the development of tasty insect-derived protein products.

  2. Development of a quality assurance safety assessment database for near surface radioactive waste disposal

    International Nuclear Information System (INIS)

    Park, J. W.; Kim, C. L.; Park, J. B.; Lee, E. Y.; Lee, Y. M.; Kang, C. H.; Zhou, W.; Kozak, M. W.

    2003-01-01

    A quality assurance safety assessment database, called QUARK (QUality Assurance program for Radioactive waste management in Korea), has been developed to manage both analysis information and parameter database for safety assessment of Low- and Intermediate-Level radioactive Waste (LILW) disposal facility in Korea. QUARK is such a tool that serves QA purposes for managing safety assessment information properly and securely. In QUARK, the information is organized and linked to maximize the integrity of information and traceability. QUARK provides guidance to conduct safety assessment analysis, from scenario generation to result analysis, and provides a window to inspect and trace previous safety assessment analysis and parameter values. QUARK also provides default database for safety assessment staff who construct input data files using SAGE(Safety Assessment Groundwater Evaluation), a safety assessment computer code

  3. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  4. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  5. Quality assurance

    OpenAIRE

    Cauchi, Maurice A.M.

    1993-01-01

    The concept of quality assurance refers more specifically to the process of objectifying and clearly enunciating goals, and providing means of assessing the outcomes. In this article the author mentions four fundamental elements of quality assurance which should be applied in the medical profession in Malta. These elements should relate to professional performance, resource utilisation, risk management and patient satisfaction. The aim of the medical professionals in Malta is to provide the b...

  6. DOE financial assurance presentation

    International Nuclear Information System (INIS)

    Huck, R.

    1990-01-01

    The presentation topic is California's approach to license application review in meeting financial assurances for the proposed Ward Valley site. The purpose of the presentation is to provide information on specific financial assurance provisions contained in 10 CFR Part 61 and how California intends to satisfy those requirements. Also, as rate setter, California intends to demonstrate how it will assure allowable costs to the rate base though a financial prudency review. The key provisions of financial assurance are: 10 CFR Section 61.61 - This provision requires an applicant to demonstrate its ability to finance licensed activities; 10 CFR Section 61.62 - This provision requires an applicant to provide assurance that sufficient funds will be available for site closure and stabilization; and 10 CFR Section 61.63 - This provision requires an applicant to provide 'a copy of a binding arrangement, such as a lease, between the applicant and the disposal site owner, so that sufficient funds will be available to cover the costs of the institutional control period.' To assist California in its determination of financial assurance compliance to be demonstrated by the applicant for Part 61 requirements, is NUREG guidance document 1199 'Standard Format and Content of a License Application for a Low-Level Radioactive Waste (LLRW) Disposal Facility.' The detailed financial assurance provisions of NUREG 1199 are then embodied in NUREG 1200, 'Standard Review Plant for the Review of a License Application for a LLRW Disposal Facility.'

  7. Specified assurance level sampling procedure

    International Nuclear Information System (INIS)

    Willner, O.

    1980-11-01

    In the nuclear industry design specifications for certain quality characteristics require that the final product be inspected by a sampling plan which can demonstrate product conformance to stated assurance levels. The Specified Assurance Level (SAL) Sampling Procedure has been developed to permit the direct selection of attribute sampling plans which can meet commonly used assurance levels. The SAL procedure contains sampling plans which yield the minimum sample size at stated assurance levels. The SAL procedure also provides sampling plans with acceptance numbers ranging from 0 to 10, thus, making available to the user a wide choice of plans all designed to comply with a stated assurance level

  8. A Common Criteria-Based Team Project for High Assurance Secure Systems

    Science.gov (United States)

    2005-01-01

    experience in the FHM, full system documentation, and plenty of time. The students had little experience and little time. The MINIX operating... MINIX is a very appropriate target for student enhancements. Since the principle objective of Secure Systems is to teach the concepts of...to construct a system when one of the developmental threats is subversion. Because students were studying MINIX in a prerequisite operating systems

  9. Secure steganography designed for mobile platforms

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  10. The Chronicle Index of For-Profit Higher Education

    Science.gov (United States)

    Blumenstyk, Goldie

    2007-01-01

    This Index tracks the performance of eight publicly traded higher-education companies. The index was developed for The Chronicle by the Center for Research in Security Prices at the University of Chicago's Graduate School of Business.

  11. Cyber Security Scenarios and Control for Small and Medium Enterprises

    Directory of Open Access Journals (Sweden)

    Nilaykumar Kiran SANGANI

    2012-01-01

    Full Text Available As the world advances towards the computing era, security threats keeps on increasing in the form of malware, viruses, internet attack, theft of IS assets / technology and a lot more. This is a major concern for any form of business. Loss in company’s status / liability / reputation is a huge downfall for a running business. We have witnessed the attacks getting carried out; large firm’s data getting breached / government bodies’ sites getting phished / attacked. These huge entities have technology expertise to safeguard their company’s interest against such attacks through investing huge amounts of capital in manpower and secure tools. But what about SMEs? SMEs enrich a huge part of the country’s economy. Big organizations have their own security measures policy which ideally is not applied when it comes to a SME. The aim of this paper is to come out with an Information Security Assurance Cyber Control for SMEs (ISACC against common cyber security threats implemented at a cost effective measure.

  12. A Novel Index for Online Voltage Stability Assessment Based on Correlation Characteristic of Voltage Profiles

    Directory of Open Access Journals (Sweden)

    M. R. Aghamohammadi

    2011-06-01

    Full Text Available Abstract: Voltage instability is a major threat for security of power systems. Preserving voltage security margin at a certain limit is a vital requirement for today’s power systems. Assessment of voltage security margin is a challenging task demanding sophisticated indices. In this paper, for the purpose of on line voltage security assessment a new index based on the correlation characteristic of network voltage profile is proposed. Voltage profile comprising all bus voltages contains the effect of network structure, load-generation patterns and reactive power compensation on the system behaviour and voltage security margin. Therefore, the proposed index is capable to clearly reveal the effect of system characteristics and events on the voltage security margin. The most attractive feature for this index is its fast and easy calculation from synchronously measured voltage profile without any need to system modelling and simulation and without any dependency on network size. At any instant of system operation by merely measuring network voltage profile and no further simulation calculation this index could be evaluated with respect to a specific reference profile. The results show that the behaviour of this index with respect to the change in system security is independent of the selected reference profile. The simplicity and easy calculation make this index very suitable for on line application. The proposed approach has been demonstrated on IEEE 39 bus test system with promising results showing its effectiveness and applicability.

  13. 10 CFR 71.37 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance. 71.37 Section 71.37 Energy NUCLEAR... Package Approval § 71.37 Quality assurance. (a) The applicant shall describe the quality assurance program... quality assurance program that are applicable to the particular package design under consideration...

  14. Quality-Assurance Program Plan

    International Nuclear Information System (INIS)

    Kettell, R.A.

    1981-05-01

    This Quality Assurance Program Plan (QAPP) is provided to describe the Quality Assurance Program which is applied to the waste management activities conducted by AESD-Nevada Operations at the E-MAD Facility located in Area 25 of the Nevada Test Site. The AESD-Nevada Operations QAPP provides the necessary systematic and administrative controls to assure activities that affect quality, safety, reliability, and maintainability during design, procurement, fabrication, inspection, shipments, tests, and storage are conducted in accordance with established requirements

  15. Nuclear security standard: Argentina approach

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Rodriguez, Carlos E.; Menossi, Sergio A.; Serdeiro, Nelida H.

    2007-01-01

    Argentina has a comprehensive regulatory system designed to assure the security and safety of radioactive sources, which has been in place for more than fifty years. In 1989 the Radiation Protection and Nuclear Safety branch of the National Atomic Energy Commission created the 'Council of Physical Protection of Nuclear Materials and Installations' (CAPFMIN). This Council published in 1992 a Physical Protection Standard based on a deep and careful analysis of INFCIRC 225/Rev.2 including topics like 'sabotage scenario'. Since then, the world's scenario has changed, and some concepts like 'design basis threat', 'detection, delay and response', 'performance approach and prescriptive approach', have been applied to the design of physical protection systems in facilities other than nuclear installations. In Argentina, radioactive sources are widely used in medical and industrial applications with more than 1,600 facilities controlled by the Nuclear Regulatory Authority (in spanish ARN). During 2005, measures like 'access control', 'timely detection of intruder', 'background checks', and 'security plan', were required by ARN for implementation in facilities with radioactive sources. To 'close the cycle' the next step is to produce a regulatory standard based on the operational experience acquired during 2005. ARN has developed a set of criteria for including them in a new standard on security of radioactive materials. Besides, a specific Regulatory Guide is being prepared to help licensees of facilities in design a security system and to fulfill the 'Design of Security System Questionnaire'. The present paper describes the proposed Standard on Security of Radioactive Sources and the draft of the Nuclear Security Regulatory Guidance, based on our regulatory experience and the latest international recommendations. (author)

  16. Security Issues for Information Quality on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Dana Ramona ANDRISESCU

    2010-01-01

    Full Text Available Mobile devices are used everywhere, from making acall to store huge volume of information. But together withdevices shrinking and rise of storage space on a single device webring to mind the problem of trusting the stored information.Trusting the information and assuring its quality meansknowing the security threats these devices face and measuresthat should be taken. Many questions rise from here like “Whathappens when a mobile device is used by several persons andespecially employees?”, “Is that information reliable andoriginal?”, “Who is responsible for a device and its security?”.We are going to see in this paper that information quality can beassured even on portable devices by using the adequate securitymeasures.

  17. Safeguards and security design guidelines for conceptual monitored retrievable storage (MRS) facilities

    International Nuclear Information System (INIS)

    Byers, K.R.; Clark, R.G.; Harms, N.L.; Roberts, F.P.

    1984-07-01

    Existing safeguards/security regulations and licensing requirements that may be applicable to an MRS facility are not currently well-defined. Protection requirements consistent with the NRC-graded safeguards approach are identified, as a baseline safeguards system with a comparison of the impacts on safeguards and security of salient features of the different storage concepts. In addition, MRS facility design features and operational considerations are proposed that would enhance facility protection and provide additional assurance that protection systems and procedures would be effectively implemented. 3 figures

  18. Training, Quality Assurance Factors, and Tools Investigation: a Work Report and Suggestions on Software Quality Assurance

    Science.gov (United States)

    Lee, Pen-Nan

    1991-01-01

    Previously, several research tasks have been conducted, some observations were obtained, and several possible suggestions have been contemplated involving software quality assurance engineering at NASA Johnson. These research tasks are briefly described. Also, a brief discussion is given on the role of software quality assurance in software engineering along with some observations and suggestions. A brief discussion on a training program for software quality assurance engineers is provided. A list of assurance factors as well as quality factors are also included. Finally, a process model which can be used for searching and collecting software quality assurance tools is presented.

  19. Quality assurance during site construction

    International Nuclear Information System (INIS)

    Dommke, J.; Jurgutat, H.

    1980-01-01

    During the time of planing and construction of a nuclear power plant, the following proceeding is approved: - the deliverer of a nuclear power plant provides the reports fixing the quality assurance program, it means that he is responsible to write the safety analysis report, the specifications for the erection of the components, the working manuals and specifications for testing (eg nondestr. testing) - the manufacturing of components or systems will be controlled by an own independent quality assurance group, provided that this group was checked by the quality assurance group of the applicant - the TUeV with its independent assessors will fix the requirements relating to quality assurance in its assessment. On this basis the examination of the applicants specifications, working manuals, testing specifications will be done. The efficiency of quality assurance at the manufacturer and at the applicant will be checked by the TUeV specialists by considering specifications of modifications, repairs or tolerances. A mean point of the quality assurance in Germany is the dynamic adjustment, of an action on the latest state of engineering or science. If there exists a change of rules or guidelines, the quality assurance requirements have to be fit on this state in so far as it is feasible from the technical point of view. (orig./RW)

  20. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  1. Security of supply in Ireland 2006

    International Nuclear Information System (INIS)

    Bazilian, Morgan; O'Leary, Fergal; O Gallachoir, Brian; Howley, Martin

    2006-12-01

    This is the second annual report on the title theme from SEI. Since SEI's initial security of supply publication there has been considerable attention paid to the security of supply aspects of energy policy worldwide. This reports updates and refines the metrics used to consider security of supply in Ireland. It also presents new analysis in three areas; the development of a supply/demand index, use of mean variance portfolio analysis for the electricity sector and a high oil price energy forecast scenario

  2. Financial security of the state in terms of globalization processes escalation

    Directory of Open Access Journals (Sweden)

    Svitlana Tkalenko

    2013-02-01

    Full Text Available The article provides review of the globalization and global integration processes impact on the financial sector formation characterized by an increase in financial flows with the lead role played by transnational corporations and transnational banks. The globalization study has been already reflected by numerous scientific publications and various issues of reputable international academic journals describing the process as irreversible and objective along with demonstrating globalization merits and demerits, etc. In the 21st century, globalization is an issue discussed by everyone: ranging from presidents, prime ministers and members of parliament supposed to solve problems of any scale taking into consideration the global development phenomenon, to ordinary citizens. Today, globalization has obviously become a major trend of the modern world development, which is why issues implying sound development assurance become pressing for each country. The article dwells upon the main component of economic security — the financial one (Ukraine case study. Thus, we are engaged in studying the global development trend in terms of assuring security of the state under conditions of financial flows globalization and existence of global integration processes.

  3. NASA Blue Team: Determining Operational Security Posture of Critical Systems and Networks

    Science.gov (United States)

    Alley, Adam David

    2016-01-01

    Emergence of Cybersecurity has increased the focus on security risks to Information Technology (IT) assets going beyond traditional Information Assurance (IA) concerns: More sophisticated threats have emerged from increasing sources as advanced hacker tools and techniques have emerged and proliferated to broaden the attack surface available across globally interconnected networks.

  4. Implementation of External Quality Assurance Trials for Immunohistochemically Determined Breast Cancer Biomarkers in Germany

    OpenAIRE

    von Wasielewski, Reinhard; Krusche, Claudia A.; Rüschoff, Joseph; Fisseler-Eckhoff, Anette; Kreipe, Hans

    2008-01-01

    Besides typing and grading of breast cancer, Pathologists are involved in the determination of biomarkers, such as steroid hormone receptors and HER2, which are of utmost importance in adjuvant therapy. There have been concerns with regard to security and reproducibility of the biomarker assays done on tissue sections applying either immunohistochemistry or in-situ hybridisation. In order to assure the quality of these biomarker assays, a number of measures are required, among them external p...

  5. An investigative analysis of information assurance issues associated with the GIG's P&P architecture

    Science.gov (United States)

    Farroha, B. S.; Cole, R. G.; Farroha, D. L.; DeSimone, A.

    2007-04-01

    The Global Information Grid (GIG) is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the Internet. The GIG is expected to facilitate DoD's transformation by allowing warfighters, policy makers and support personnel to engage in rapid decision making. The roadmap is designed to take advantage of converged services of voice, data, video, and imagery over common data links. The vision is to have commanders identify threats more effectively, make informed decisions, and respond with greater precision and lethality. The information advantage gained through the GIG and network-centric warfare (NCW) allows a warfighting force to achieve dramatically improved information positions, in the form of common operational pictures that provide the basis for shared situational awareness and knowledge, and a resulting increase in combat power. The GIG Precedence and Preemption (P&P) requirements stem from the need to utilize scarce resources at critical times in the most effective way in support of national security, the intelligence community and the war-fighter. Information Assurance (IA) enables all information and data to be available end-to-end to support any mission without delay in accordance to the sensitivity of the task. Together, P&P and IA ensure data availability integrity, authentication, confidentiality, and non-repudiation. This study addresses and analyzes the QoS and P & P requirements and architecture for the GIG. Threat scenarios are presented and used to evaluate the reference architectures. The goal of the study is to assess the Information Assurance concerns associated with implementing Precedence and Preemption within the GIG and to guarantee an acceptable minimum level of security and protection for DoD networks.

  6. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  7. Metrology's role in quality assurance

    International Nuclear Information System (INIS)

    Zeederberg, L.B.

    1982-01-01

    Metrology, the science of measurement, is playing an increasing role in modern industry as part of an on-going quality assurance programme. At Escom, quality assurance was critical during the construction of the Koeberg nuclear facility, and also a function in controlling services provided by Escom. This article deals with the role metrology plays in quality assurance

  8. Quality assurance of fuel elements

    International Nuclear Information System (INIS)

    Hoerber, J.

    1980-01-01

    The quality assurance activities for reactor fuel elements are based on a quality assurance system which implies the requirements resulting from the specifications, regulations of the authorities, national standards and international rules and regulations. The quality assurance related to production of reactor fuel will be shown for PWR fuel elements in all typical fabrication steps as conversion into UO 2 -powder, pelletizing, rodmanufacture and assembling. A wide range of destructive and nondestructive techniques is applied. Quality assurance is not only verified by testing techniques but also by process monitoring by means of parameter control in production and testing procedures. (RW)

  9. Software quality assurance handbook

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  10. 30 CFR 250.1200 - Question index table.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Question index table. 250.1200 Section 250.1200 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR OFFSHORE OIL AND GAS AND SULPHUR... Security § 250.1200 Question index table. The table in this section lists questions concerning Oil and Gas...

  11. The evolving story of information assurance at the DoD.

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2007-01-01

    This document is a review of five documents on information assurance from the Department of Defense (DoD), namely 5200.40, 8510.1-M, 8500.1, 8500.2, and an ''interim'' document on DIACAP [9]. The five documents divide into three sets: (1) 5200.40 & 8510.1-M, (2) 8500.1 & 8500.2, and (3) the interim DIACAP document. The first two sets describe the certification and accreditation process known as ''DITSCAP''; the last two sets describe the certification and accreditation process known as ''DIACAP'' (the second set applies to both processes). Each set of documents describes (1) a process, (2) a systems classification, and (3) a measurement standard. Appendices in this report (a) list the Phases, Activities, and Tasks of DITSCAP, (b) note the discrepancies between 5200.40 and 8510.1-M concerning DITSCAP Tasks and the System Security Authorization Agreement (SSAA), (c) analyze the DIACAP constraints on role fusion and on reporting, (d) map terms shared across the documents, and (e) review three additional documents on information assurance, namely DCID 6/3, NIST 800-37, and COBIT{reg_sign}.

  12. Execution of a self-directed risk assessment methodology to address HIPAA data security requirements

    Science.gov (United States)

    Coleman, Johnathan

    2003-05-01

    This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.

  13. The myth of secure computing.

    Science.gov (United States)

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  14. Workshop on measurement quality assurance for ionizing radiation: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Heath, J.A.; Swinth, K.L. [comps.

    1993-12-31

    This workshop was held to review the status of secondary level calibration accreditation programs, review related measurement accreditation programs, document lessons learned, and to present changes in programs due to new national priorities involving radioactivity measurements. Contents include: fundamentals of measurement quality assurance (MQA), standards for MQA programs; perspectives and policies; complete MQA programs; future MQA programs; QA/QC programs--radioactivity; QA/QC programs--dosimetry; laboratory procedures for QA/QC; in-house control of reference dosimetry laboratories; in-house controls of radioactivity laboratories; and poster session. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  15. Workshop on measurement quality assurance for ionizing radiation: Proceedings

    International Nuclear Information System (INIS)

    Heath, J.A.; Swinth, K.L.

    1993-01-01

    This workshop was held to review the status of secondary level calibration accreditation programs, review related measurement accreditation programs, document lessons learned, and to present changes in programs due to new national priorities involving radioactivity measurements. Contents include: fundamentals of measurement quality assurance (MQA), standards for MQA programs; perspectives and policies; complete MQA programs; future MQA programs; QA/QC programs--radioactivity; QA/QC programs--dosimetry; laboratory procedures for QA/QC; in-house control of reference dosimetry laboratories; in-house controls of radioactivity laboratories; and poster session. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database

  16. 77 FR 18290 - Reinstate Index to Chapter III in 20 CFR

    Science.gov (United States)

    2012-03-27

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0018] Reinstate Index to Chapter III in 20 CFR AGENCY: Social Security Administration. ACTION: Notice. SUMMARY: At the request of the Office of the...

  17. Seeking legitimacy for new assurance forms: The case of assurance on sustainability reporting

    NARCIS (Netherlands)

    O'Dwyer, B.; Owen, D.; Unerman, J.

    2011-01-01

    Based on the development of a more refined conception of legitimacy than has been used in prior audit/assurance and sustainability accounting research, this paper analyses how the legitimation processes adopted by sustainability assurance practitioners in a large professional services firm have

  18. An Analysis of Security Incidents on the Internet 1989-1995

    Science.gov (United States)

    1997-04-07

    intervene. 14.4.2. Government Information Policies and the Computer Security Market - During the history of the Internet , the government has maintained a...the government is already taking to improve the operation of the Internet market by supplying information . The following analysis determined whether the... Information Assurance Technology Analysis Center (IATAC) 3190 Fairview Park Drive Falls Church VA 22042 Performing Organization Number(s) Sponsoring

  19. From control system security indices to attack identifiability

    NARCIS (Netherlands)

    Herdeiro Teixeira, A.M.; Sandberg, H

    2016-01-01

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources

  20. New secure communication-layer standard for medical image management (ISCL)

    Science.gov (United States)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  1. 42 CFR 422.210 - Assurances to CMS.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Assurances to CMS. 422.210 Section 422.210 Public...) MEDICARE PROGRAM MEDICARE ADVANTAGE PROGRAM Relationships With Providers § 422.210 Assurances to CMS. (a) Assurances to CMS. Each organization will provide assurance satisfactory to the Secretary that the...

  2. 40 CFR 31.45 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Quality assurance. 31.45 Section 31.45... Requirements Reports, Records, Retention, and Enforcement § 31.45 Quality assurance. If the grantee's project... quality assurance practices consisting of policies, procedures, specifications, standards, and...

  3. The successful Chief Executive Officer understands quality assurance

    International Nuclear Information System (INIS)

    Hedges, D.

    1984-01-01

    The successful Chief Executive Officer (CEO) will have recognized the benefits of, and have implemented, a total quality assurance program. The quality assurance program will be adequately defined in policies and procedures such that managers and supervisors of each organizational element understand their primary and supporting roles in carrying out an effective quality assurance program. The traditional practice of having all quality assurance activities reside in a quality assurance organization will have been cast aside. Instead, the quality assurance activities necessary to achieve and assure the quality of the desired end product will have been defined and assigned to responsible organization elements. The quality assurance organization's primary role will be to define the total quality assurance program, insure that the achieving and assuring functions are assigned in policies and procedures, conduct training necessary to have management and supervisors understand the total quality assurance program, measure the effectiveness of the program and feedback measurement data for improvements in the program. The successful CEO will have implemented a quality assurance program that provides for a graded approach for application of the program based upon the importance of the intended use of the product or service. The successful CEO will rely heavily on the scheduled progress reports and assessments to measure the pulse of his organization's successes and improvement needs. This paper will describe suggested approaches for the Quality Assurance Manager to implement a quality assurance program which results in his corporation's CEO being a supporter of and a driving force in the implementation of the quality assurance program

  4. 40 CFR 160.35 - Quality assurance unit.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Quality assurance unit. 160.35 Section... LABORATORY PRACTICE STANDARDS Organization and Personnel § 160.35 Quality assurance unit. (a) A testing facility shall have a quality assurance unit which shall be responsible for monitoring each study to assure...

  5. 10 CFR 63.142 - Quality assurance criteria.

    Science.gov (United States)

    2010-01-01

    ... planned and periodic audits to verify compliance with all aspects of the quality assurance program and to... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance criteria. 63.142 Section 63.142 Energy... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Quality Assurance § 63.142 Quality assurance criteria. (a) Introduction...

  6. Nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    1976-01-01

    Full text: Quality assurance is used extensively in the design, construction and operation of nuclear power plants. This methodology is applied to all activities affecting the quality of a nuclear power plant in order to obtain confidence that an item or a facility will perform satisfactorily in service. Although the achievement of quality is the responsibility of all parties participating in a nuclear power project, establishment and implementation of the quality assurance programme for the whole plant is a main responsibility of the plant owner. For the plant owner, the main concern is to achieve control over the quality of purchased products or services through contractual arrangements with the vendors. In the case of purchase of nuclear fuel, the application of quality assurance might be faced with several difficulties because of the lack of standardization in nuclear fuel and the proprietary information of the fuel manufacturers on fuel design specifications and fuel manufacturing procedures. The problems of quality assurance for purchase of nuclear fuel were discussed in detail during the seminar. Due to the lack of generally acceptable standards, the successful application of the quality assurance concept to the procurement of fuel depends on how much information can be provided by the fuel manufacturer to the utility which is purchasing fuel, and in what form and how early this information can be provided. The extent of information transfer is basically set out in the individual vendor-utility contracts, with some indirect influence from the requirements of regulatory bodies. Any conflict that exists appears to come from utilities which desire more extensive control over the product they are buying. There is a reluctance on the part of vendors to permit close insight of the purchasers into their design and manufacturing procedures, but there nevertheless seems to be an increasing trend towards release of more information to the purchasers. It appears that

  7. Ukraine stalls on START I vote; presses US on aid, security issues

    International Nuclear Information System (INIS)

    Lockwood, D.

    1993-01-01

    In early January, a Ukrainian delegation came to Washington to discuss issues related to Ukrainian ratification of START I and accession to the nuclear Non-Proliferation Treaty (NPT). The issues discussed at the meeting (US security assurances and economic aid), which were not resolved, have serious implications for START I, the NPT, and the flow-on START II agreement

  8. 7 CFR 652.7 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Quality assurance. 652.7 Section 652.7 Agriculture... assurance. (a) NRCS will review, in consultation with the Farm Service Agency, as appropriate, the quality... information obtained through its quality assurance process, documentation submitted by the technical service...

  9. 10 CFR 76.93 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance. 76.93 Section 76.93 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safety § 76.93 Quality assurance. The Corporation shall establish, maintain, and execute a quality assurance program satisfying each of...

  10. Extending Security-by-Contract with Quantitative Trust on Mobile Devices

    DEFF Research Database (Denmark)

    Costa, Gabriele; Dragoni, Nicola; Lazouski, Aliaksandr

    2010-01-01

    program our architecture updates the trust level associated with the contract provider. We also present a possible application of our framework in the scenario of a mobile application marketplace, e.g., Apple AppStore, Cydia, Android Market, that, nowadays, are considered as one of the most attractive e......Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present the an extension of S×C, called Security-by-Contract-with-Trust (S×C×T). Indeed, we enrich the S×C architecture by integrating a trust model and adding new modules......-commerce activity for both mobile application developers and industries of mobile devices. Since the number of applications increases, Mobile Applications Marketplace (MAMp) sets up recommendation systems that rank and highlight mobile applications by category, social activity, etc. The S×C×T framework we propose...

  11. A Methodology to Implement an Information Security Management System

    Directory of Open Access Journals (Sweden)

    Alaíde Barbosa Martins

    2005-08-01

    Full Text Available Information security has actually been a major challenge to most organizations. Indeed, information security is an ongoing risk management process that covers all of the information that needs to be protected. ISO 17799 offers what companies need in order to better manage information security. The best way to implement this standard is to ease the security management process using a methodology that will define will define guidelines, procedures and tools that will be needed along the way. Hence, this paper proposes a methodology to assist companies in assessing their compliance with BS 7799/ ISO 17799 as well as planning and implementing the actions necessary to become compliant or certified to the standard. The concepts and ideas presented here had been applied in a case study involving the Cetrel S/A - Company of Environmental Protection. For this company, responsible for treatment of industrial residues generated by the Camaçari Petrochemical Complex and adjacent areas, to assure confidentiality and integrity of customers' data is a basic requirement.

  12. Quality assurance in radiodiagnosis

    International Nuclear Information System (INIS)

    Ghilardi Netto, T.; Sao Paulo Univ., Ribeirao Preto

    1983-01-01

    The following topics are dealt with: 1) the importance of the application of a quality assurance program in radiodiagnosis, with its main consequences : improvement of imaging quality, reduction of the patient expossure rate, cost reduction and 2) how to introduce the quality assurance control in the radiodiagnostic area. (M.A.) [pt

  13. Implementation of External Quality Assurance Trials for Immunohistochemically Determined Breast Cancer Biomarkers in Germany.

    Science.gov (United States)

    von Wasielewski, Reinhard; Krusche, Claudia A; Rüschoff, Joseph; Fisseler-Eckhoff, Anette; Kreipe, Hans

    2008-01-01

    Besides typing and grading of breast cancer, Pathologists are involved in the determination of biomarkers, such as steroid hormone receptors and HER2, which are of utmost importance in adjuvant therapy. There have been concerns with regard to security and reproducibility of the biomarker assays done on tissue sections applying either immunohistochemistry or in-situ hybridisation. In order to assure the quality of these biomarker assays, a number of measures are required, among them external proficiency testing. Therefore, external quality assurance trials have been implemented in Germany. In the period of 2002-2007, 5 consecutive trials were conducted with up to 180 participating laboratories. Tissue microarrays with 20-24 different breast cancer samples including cell lines enabled that a huge number of pathologists were challenged with identical samples which provides the prerequisite for comparability. Because there is no legal duress to undergo external proficiency testing in histopathology, all laboratories that took part volunteered to do so. These innovative quality assurance trials (Qualitätsinitiative Pathologie, QuIP) will be continued in the future on an annual or bi-annual basis. Participation is recommended for pathology departments involved in the service for breast units. The organisational frame work of the trials is described here.

  14. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  15. International Security in the World Economic Relations

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P

    2016-05-01

    Full Text Available The article discusses the urgent topic of the evolution of international relations, the issue of establishing international security, and the development of international economic cooperation based on the principles of security. In order to analyze the current status of international security in the world and to identify key factors that hinder the way of establishing a positive global community, researches by the international analytical centers together with the institutes for international security and cooperation have been generalized. To this end, both the status of and changes in the Global Peace Index in the recent years has been disclosed, the position of Ukraine in the world according to this index has been examined. It has been proven that the main international security problems are related to the armed conflicts, civil wars, political violence, terrorism impacting the development of humanity as a whole, the status of international relations, the evolution of the world economy as well as national economies. Further researches should be focused on how the status of peace in the countries impacts their economic status and the status of international cooperation in other areas of economic cooperation, excluding the military. It should be answered particularly, how the above indicated status affects strengthening the Ukraine's position in the world.

  16. 30 CFR 74.9 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 74.9 Section 74.9 Mineral... DUST SAMPLING DEVICES Requirements for Continuous Personal Dust Monitors § 74.9 Quality assurance. (a) General requirements. The applicant shall establish and maintain a quality control system that assures...

  17. 40 CFR 30.54 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Quality assurance. 30.54 Section 30.54... NON-PROFIT ORGANIZATIONS Post-Award Requirements Reports and Records § 30.54 Quality assurance. If the... data generation, the grantee shall develop and implement quality assurance practices consisting of...

  18. 33 CFR 52.81 - Reading room and index.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Reading room and index. 52.81 Section 52.81 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PERSONNEL BOARD... and index. After deleting only so much personal information as is necessary to prevent an unwarranted...

  19. Quality assurance in nuclear medicine

    International Nuclear Information System (INIS)

    Kaul, A.

    1986-01-01

    'Quality Assurance in Nuclear Medicine' is the title of the English language original that has been translated into German. The manual very extensively deals with quality control of nuclear medical equipment. Tests are explained for checking radioactivity measuring devices, manual and automatic in-vitro sample measuring systems, in-vivo measuring systems with single or multiple detectors, rectlinear scanners, and gamma cameras, including the phantoms required for the methods. Other chapters discuss the quality control of radiopharmaceuticals, or the quality assurance in data recording and evaluation of results. Helpful comments on the organisation of quality assurance programms are given. The book is intended as a practical guide for introducing quality assurance principles in nuclear medicine in the Federal Republic of Germany. With 13 figs., 22 tabs [de

  20. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  1. BYU Food Quality Assurance Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Quality Assurance Lab is located in the Eyring Science Center in the department of Nutrition, Dietetics, and Food Science. The Quality Assurance Lab has about 10...

  2. [Quality assurance in human genetic testing].

    Science.gov (United States)

    Stuhrmann-Spangenberg, Manfred

    2015-02-01

    Advances in technical developments of genetic diagnostics for more than 50 years, as well as the fact that human genetic testing is usually performed only once in a lifetime, with additional impact for blood relatives, are determining the extraordinary importance of quality assurance in human genetic testing. Abidance of laws, directives, and guidelines plays a major role. This article aims to present the major laws, directives, and guidelines with respect to quality assurance of human genetic testing, paying careful attention to internal and external quality assurance. The information on quality assurance of human genetic testing was obtained through a web-based search of the web pages that are referred to in this article. Further information was retrieved from publications in the German Society of Human Genetics and through a PubMed-search using term quality + assurance + genetic + diagnostics. The most important laws, directives, and guidelines for quality assurance of human genetic testing are the gene diagnostics law (GenDG), the directive of the Federal Medical Council for quality control of clinical laboratory analysis (RiliBÄK), and the S2K guideline for human genetic diagnostics and counselling. In addition, voluntary accreditation under DIN EN ISO 15189:2013 offers a most recommended contribution towards quality assurance of human genetic testing. Legal restraints on quality assurance of human genetic testing as mentioned in § 5 GenDG are fulfilled once RiliBÄK requirements are followed.

  3. Thoughts on Internal and External Quality Assurance

    Science.gov (United States)

    Zhang, Jianxin

    2012-01-01

    Quality assurance of higher education is made up of two parts: internal quality assurance (IQA) and external quality assurance (EQA). Both belong to a union of the coexistence and balance of yin and yang. But in reality there exists a paradox of "confusion of quality assurance (QA) subject consciousness, singularity of social QA and lack of QA…

  4. Concepts of nuclear quality assurance

    International Nuclear Information System (INIS)

    Randers, G.; Morris, P.A.; Pomeroy, D.

    1976-01-01

    While the safety record of the nuclear industry continues to be excellent, the forced outage rates for recent years continue to be 15% or more. Quality assurance, therefore, needs to be applied not only to nuclear safety matters, but to the goals of increased productivity and reduced construction and operating costs. Broadening the application of the general concept of quality assurance in this way leads to the introduction of reliability technology. The total activity might better be called reliability assurance. That effective quality assurance systems do pay off is described by examples from the utility industry, from a manufacturer of instruments and systems and from the experience of Westinghouse Electric Company's manufacturing divisions. The special situation of applying quality assurance to nuclear fuel is discussed. Problems include the lack of a fully developed regulatory policy in this area, incomplete understanding of the mechanism for pellet-clad interaction failures, incomplete access to manufacturers design and process information, inability to make desirable changes on a timely basis and inadequate feedback of irradiation experience. (author)

  5. Food security for community-living elderly people in Beijing, China.

    Science.gov (United States)

    Cheng, Yang; Rosenberg, Mark; Yu, Jie; Zhang, Hua

    2016-11-01

    Food security has been identified as an important issue for elderly people's quality of life and ageing in place. A food security index composed of three indicators (food intake, food quality and food affordability) was developed to measure the food security status of community-living elderly people. Food security was then examined among community-living elderly in the central urban districts of Beijing, China. Data were collected by a questionnaire survey in the summer of 2013 and the response rate was 78.5%. Descriptive statistics and binary logistic regression were applied to analyse food security and the associations between food security and demographic and socioeconomic factors. The results showed that 54.2% of the surveyed elderly experienced food security. Participants with better education (OR = 1.68) and better health (OR = 1.47) were more likely to experience food security. The young-old were less likely to experience food security than the older old (OR = 0.94). Elderly people who lived with their children were less likely to experience food security than those who lived alone (OR = 0.43). The results of impact factors on food security highlight both similarities with studies from more developed countries and the unique challenges faced in a rapidly changing China with its unique social, cultural and political systems. The food security index we developed in this study is a simple and effective measure of food security status, which can be used in surveys for evaluating the food security status of elderly people in the future. © 2015 John Wiley & Sons Ltd.

  6. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  7. Research on a Valuation Standard and the Actual Condition About Security Management in PACS

    International Nuclear Information System (INIS)

    Jeong, Jae Ho; Son, Gi Gyeong; Kang, Hee Doo; Dong, Kyung Rae; Kweon, Dae Cheol; Kim, Hyun Soo

    2008-01-01

    This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  8. Quality assurance in plant engineering

    International Nuclear Information System (INIS)

    Ohsumi, Morimichi

    1977-01-01

    Quality assurance is defined as the intentional and systematic activity carried out to obtain such reliability that the functions of nuclear power generating plants are demonstrated during the plant operation, and the section in charge has the role to organize, adjust and communicate so that the related sections can work smoothly. There are many documents concerning the quality assurance, such as quality assurance basic program, quality assurance manual, quality control plan and its manual and many specifications, etc. The content of the quality assurance is different for every step of plant planning such as at inquiry and order receiving, and prior to manufacturing, for example, inspection specification being decided for the material and the welded parts of classified pipings at the step of order receiving. Document management, engineering schedule and the custody of quality records are also quality assurance activities. Design management is controlled step by step; plant planning including safety analysis, overall layout plan, conceptual design of buildings, aseismatic design guide, heat balance and so on, system design mainly with system description, piping design including piping specification, standard dimensions of edge preparation, piping and valve lists, inspection manual, etc., detailed design, standardization of piping and design review, etc. are explained. The management of the intermediate between soft and hard parts consists of the quality check for material manufacturers and shipment inspection, etc. (Nakai, Y.)

  9. Microgrid cyber security reference architecture.

    Energy Technology Data Exchange (ETDEWEB)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  10. Security of water treatment facilities

    Energy Technology Data Exchange (ETDEWEB)

    Forsha, C.A. [Univ. of Pittsburgh at Johnstown, Johnstowne, PA (United States)

    2002-06-15

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  11. Security of water treatment facilities

    International Nuclear Information System (INIS)

    Forsha, C.A.

    2002-01-01

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  12. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    Science.gov (United States)

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  13. Corrupt practices negatively influenced food security and live expectancy in developing countries

    Science.gov (United States)

    Uchendu, Florence Ngozi; Abolarin, Thaddeus Olatunbosun

    2015-01-01

    Malnutrition is a global public health problem more prevalent in developing countries than in developed countries. Indicators of malnutrition include household food security and life expectancy. Corruption might be one of socio-political problems fuelling malnutrition in developing countries. The aim of this paper is to compare influence of corruption on food security, live expectancy (LE) and population in developed and developing countries. Thirty two least corrupt countries (LCC) and most corrupt countries (MCC) representing developed and developing countries were systematically selected using Corruption Perceptions Index (CPI). Countries’ data on population, food security index (FSI) and LE scores were obtained from Global food security index (GFSI) and Population reference bureau. T-test, Multivariate (Wilks’ Lambda), Pearson product moment analysis were performed to determine relationship between CPI, FSI, LE, and population in LCC and MCC at pcorrupt practices and promoting good governance should be embraced to eradicate malnutrition in developing countries. PMID:26090058

  14. Quality assurance management policies and requirements

    International Nuclear Information System (INIS)

    1985-10-01

    The purpose of this document is to: set forth overall, integrated quality assurance management policies and requirements for the entire Civilian Radioactive Waste Management Program; define management responsibilities for assuring quality; and provide a general framework for the development of more detailed quality assurance management policies and requirements by program, project, and contractor organizations

  15. Quality assurance in the nuclear industry

    International Nuclear Information System (INIS)

    Knoedler, D.

    1978-01-01

    Quality assurance is the sum of all activities systematically planned, practiced, and controlled with the aim to assure the quality of deliveries and performances. This assurance today covers all phases of activities, from the planning (including a determination of the required and necessary quality characteristics) to the start-up of a plant. (orig./RW) [de

  16. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  17. Chapter 8: Quality assurance

    International Nuclear Information System (INIS)

    2001-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (UJD) have been focused on inspection of quality assurance programmes of Slovak Power Stations, plc. and its daughter companies at Bohunice and Mochovce. Two quality assurance inspections in the area of periodical in service inspections (V-2 units) and tests of selected equipment (NPP V-2 units) and operation control (V-1 units) has been performed at NPPs Bohunice. One violation of decree on quality assurance of selected equipment has been found in the area of documentation archiving. The inspection concerning the implementation of quality assurance programme for operation of NPP Mochovce in the area of operation control has been performed focused on safety aspects of operation, operational procedures, control of operational events and feedback from operational experience. The results of this inspection were positive. Inspection of implementation of quality assurance programme for operation of radioactive waste repository (RU RAW) at the Mochovce location has been performed focused on receiving of containers, with radioactive wastes, containers handling, radiation monitoring, activities of documentation control and radiation protection at the repository site. No serious deficiencies have been found out. Also one inspection of experimental nuclear installations of VUJE Trnava at Jaslovske Bohunice site has been performed focused on procurement control, quality audits, documentation and quality records control when performing activities at experimental nuclear installations. The activity on development of internal quality assurance system continued. The implementation of this system will assure quality and effective fulfilment enlarged tasks of UJD with limited resources for its activity. The analyses of possible use of existing internal administrative control documentation as a basis for future quality system procedures was performed in co-operation with an external specialised organisation. The

  18. Invisible Security Printing on Photoresist Polymer Readable by Terahertz Spectroscopy

    Directory of Open Access Journals (Sweden)

    Hee Jun Shin

    2017-12-01

    Full Text Available We experimentally modulate the refractive index and the absorption coefficient of an SU-8 dry film in the terahertz region by UV light (362 nm exposure with time dependency. Consequently, the refractive index of SU-8 film is increased by approximately 6% after UV light exposure. Moreover, the absorption coefficient also changes significantly. Using the reflective terahertz imaging technique, in addition, we can read security information printed by UV treatment on an SU-8 film that is transparent in the visible spectrum. From these results, we successfully demonstrate security printing and reading by using photoresist materials and the terahertz technique. This investigation would provide a new insight into anti-counterfeiting applications in fields that need security.

  19. Basic Study of Establishment of Quality Assurance Processes to Develop an Integrated Quality Assurance System for Nuclear Power Plant Construction

    International Nuclear Information System (INIS)

    Lim, Byungki; Moon, Byeongsuk; Lee, Jae Kyoung

    2014-01-01

    An integrated quality assurance system has necessitated carrying out quality assurance programs in a systematic manner because the opportunities to expand business in overseas markets have increased since the export of a nuclear power plant to UAE in 2009. In this study, we use PDCA method to systematically analyze the quality assurance procedures that were used in previous projects for constructing nuclear power plants. We reached a classification system of quality assurance processes at each phase of nuclear power plant construction by integrating similar work related to quality such as planning, design, equipment manufacturing, construction and start-up. We also established a hierarchy of quality assurance processes to develop an integrated quality assurance system as a technology goal to be developed later. To obtain most updated quality assurance activities, a quality assurance process is structured by integrating similar works analyzed from quality assurance procedures through PDCA cycle method. At the implementation phase of Hierarchy of quality processes and sequence of processes for constructing nuclear power plant are established in this study. Integrated quality assurance system is to be developed by connecting organizations as well as stakeholders such as owners, Architect engineering, suppliers, contractors, and sub-contractors to carry out assigned work efficiently

  20. Basic Study of Establishment of Quality Assurance Processes to Develop an Integrated Quality Assurance System for Nuclear Power Plant Construction

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Byungki; Moon, Byeongsuk; Lee, Jae Kyoung [Korea Hydro and Nuclear Power Co. Ltd., Daejeon (Korea, Republic of)

    2014-05-15

    An integrated quality assurance system has necessitated carrying out quality assurance programs in a systematic manner because the opportunities to expand business in overseas markets have increased since the export of a nuclear power plant to UAE in 2009. In this study, we use PDCA method to systematically analyze the quality assurance procedures that were used in previous projects for constructing nuclear power plants. We reached a classification system of quality assurance processes at each phase of nuclear power plant construction by integrating similar work related to quality such as planning, design, equipment manufacturing, construction and start-up. We also established a hierarchy of quality assurance processes to develop an integrated quality assurance system as a technology goal to be developed later. To obtain most updated quality assurance activities, a quality assurance process is structured by integrating similar works analyzed from quality assurance procedures through PDCA cycle method. At the implementation phase of Hierarchy of quality processes and sequence of processes for constructing nuclear power plant are established in this study. Integrated quality assurance system is to be developed by connecting organizations as well as stakeholders such as owners, Architect engineering, suppliers, contractors, and sub-contractors to carry out assigned work efficiently.

  1. Construction of Index System Based on Advanced Persistent Threat

    Directory of Open Access Journals (Sweden)

    Lin Jia

    2017-01-01

    Full Text Available With the proliferation of advanced persistent threat (APT, APT attack effect evaluation is playing an increasingly important role in cyberspace. As one of the hot issues of network security, the evaluation to its attack effect can quantify the harm caused by APT. Then according to the evaluation results, we can derive specific measures to the network attack. At present, a lot of work has done in the network attack effect evaluation index system. However, a significant barrier to the development of APT attack effect evaluation is that the existing index system is either from the point of view of the network security situation, or for a single attack weapons to customize. In this paper, an evaluation index system is proposed through analysing the features of APT. Through this index system, we can not only quantify APT attack effect, but also visually observe the APT ability from various angles. Then, we use the analytic hierarchy process (AHP to model the evaluation process and calculate the weight of each indicator. Finally, the Ukrainian Power Outages is taken as an example to validate the proposed index system. The experimental results verify the effectiveness of the index system.

  2. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  3. Tool Use Within NASA Software Quality Assurance

    Science.gov (United States)

    Shigeta, Denise; Port, Dan; Nikora, Allen P.; Wilf, Joel

    2013-01-01

    As space mission software systems become larger and more complex, it is increasingly important for the software assurance effort to have the ability to effectively assess both the artifacts produced during software system development and the development process itself. Conceptually, assurance is a straightforward idea - it is the result of activities carried out by an organization independent of the software developers to better inform project management of potential technical and programmatic risks, and thus increase management's confidence in the decisions they ultimately make. In practice, effective assurance for large, complex systems often entails assessing large, complex software artifacts (e.g., requirements specifications, architectural descriptions) as well as substantial amounts of unstructured information (e.g., anomaly reports resulting from testing activities during development). In such an environment, assurance engineers can benefit greatly from appropriate tool support. In order to do so, an assurance organization will need accurate and timely information on the tool support available for various types of assurance activities. In this paper, we investigate the current use of tool support for assurance organizations within NASA, and describe on-going work at JPL for providing assurance organizations with the information about tools they need to use them effectively.

  4. Software quality assurance - seven years experience

    International Nuclear Information System (INIS)

    Malsbury, J.A.

    1987-01-01

    This paper describes seven years experience with software quality assurance at PPPL. It covers the early attempts of 1980 and 1981 to establish software quality assurance; the first attempt of 1982 to develop a complete software quality assurance plan; the significant modifications of this plan in 1985; and the future. In addition, the paper describes the role of the Quality Assurance organization within each plan. The scope of this paper is limited to discussions of the software development procedures used in the seven year period. Other software quality topics, such as configuration control or problem identification and resolution, are not discussed

  5. Evaluation of the central libraries information security management at governmental universities located in Tehran, according to the international standard ISO/IEC 27002

    Directory of Open Access Journals (Sweden)

    Milad Malekolkalami

    2014-02-01

    Full Text Available This study assessed the evaluation of information security management status in central Libraries of governmental universities located in Tehran, according to ISO / I.E.C. 27002. Research method applied for the study is descriptive Survey and a questionnaire was used for collecting information. The questionnaire was distributed between the 74 central library managers of governmental universities in Tehran according to the recent list on the website of Ministry of Science, Research and Technology, that includes 39 components based on 11 indicators of the standard ISO/ I.E.C. 27002. Analysis of data has been done by using both descriptive and inferential statistics by Microsoft Excel 2007and SPSS statistical softwares. The results of research showed that the mean for libraries in 11 indexes are as follows: The mean for the first index, Security policy, is 3.91 , in the second index, organization of information security, is 4.23, in the third index, asset security management, is 4.38, in the fourth index, Human Resources Security management, is 4, in the fifth index, physical and environment Security management, is 4.07, in the sixth index, operations management and communications, is 4.15, in the Seventh index, access controls management, is 4.38, in the eighth index, information system acquisition, development and maintenance, is 3.92, in the ninth index, information security incident management, is 3.84, in the tenth index, business continuity management, is 3.46, in the eleventh index, compliance, is 3.69 that match with the standard ISO / IEC. 27002. The results of Research shown that totally mean for standard ISO/I.E.C. 27002 in the field of information security management in the central libraries, is 4 being in a good condition and there is no significant differences between the performance of the Central libraries of the governmental Universities in Tehran, since It is not observed significant difference between them in the field of

  6. Software quality assurance

    CERN Document Server

    Laporte, Claude Y

    2018-01-01

    This book introduces Software Quality Assurance (SQA) and provides an overview of standards used to implement SQA. It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace. * Includes supplementary website with an instructor's guide and solutions * Applies IEEE software standards as well as the Capability Maturity Model Integration for Development (CMMI) * Illustrates the application of software quality assurance practices through the use of practical examples, quotes from experts, and tips from the authors

  7. 77 FR 18283 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2012-03-27

    ...-dealer must establish that the uncertificated securities are lodged in what are generally referred to as...) \\19\\ will be making continual and ongoing representations and assurances to the controlling AIP... Manufacturer or its designee in the name of the controlling AIP Distributor on behalf of its customer; 5. In...

  8. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  9. Disarmament and security in Africa

    International Nuclear Information System (INIS)

    1991-01-01

    This publication contains 11 selected papers presented at the seminars on African Disarmament and Security, which were held in Cairo, Egypt, from 20 to 23 march 1989 and from 6 to 10 May 1990. Seven of these papers were indexed separately for INIS

  10. An approach to total quality assurance

    International Nuclear Information System (INIS)

    Archer, L.G.

    1976-01-01

    Total Quality Assurance must be based on amalgamating three quality functions: effective quality control, competent inspection, and regularly audited Quality Assurance programmes. In applying these functions the fuel supplier must regard each of his sub-contractors as part of his own works and ensure a common policy of motivated Quality Assurance throughout his own works and those of his suppliers. (author)

  11. KWOC [Key-Word-Out-of-Context] Index of US Nuclear Regulatory Commission Regulatory Guide Series

    International Nuclear Information System (INIS)

    Jennings, S.D.

    1990-04-01

    To meet the objectives of the program funded by the Department of Energy (DOE)-Nuclear Energy (NE) Technology Support Programs, the Performance Assurance Project Office (PAPO) administers a Performance Assurance Information Program that collects, compiles, and distributes program-related information, reports, and publications for the benefit of the DOE-NE program participants. THE ''KWOC Index of US Nuclear Regulatory Commission Regulatory Guide Series'' is prepared as an aid in searching for specific topics in the US Nuclear Regulatory Commission, Regulatory Guide Series

  12. Quality assurance of polymer concrete

    International Nuclear Information System (INIS)

    Schulz, H.

    1984-01-01

    With polymer concrete, a whole range of organisational and functional measures have to be met in order to assure the required quality with an economic expenditure. Quality assurance begins in the design and does not end in the production, rather includes all fields of the enterprise. The following deals with a particular range of the total complex, the inspection methods for assuring the quality of machine components of polymer concrete, particularly machine tool bases, this being through the control of the raw material, the production and the finished product. (orig.) [de

  13. Managerial attitude toward quality assurance

    International Nuclear Information System (INIS)

    Kirschenmann, H.J.

    1983-01-01

    This paper will present what relationships exist between the attitude toward quality assurance and the variables of training and experience on the part of managers within the nuclear power industry. Managerial attitude toward quality assurance was measured via questionnaires submitted to managers within architect-engineering, nuclear steam supplier, and constructor firms throughout the United States. The data from the completed questionnaires were statistically analyzed using the chi-square test and conclusions were drawn. Additional study results related to major factors for positive and negative attitudes toward quality assurance will be presented

  14. [Integrated quality assurance].

    Science.gov (United States)

    Bögel, K; Stöhr, K

    1994-07-01

    The definition of terms and connotation of "Quality", "Quality Assurance" and "Integration" lead to an analysis and understanding of inhibiting and fostering factors of the "Health Triad" of people, animals and environment. Although "Quality" is largely or ultimately determined by the consumer, there are considerable differences as this term is applied by (a) the individual consumer, (b) the dynamic producer defending or gaining markets, (c) those engaged in traditional product manufacturing, or (d) governments setting (minimum) requirements for the sake of free trade. "Quality Assurance" offers cooperation of partners all along the food chain from "pasture to table". The managerial process turned into a continuum of responsibility and agreement on processes and product characteristics. This overcomes the disadvantages of strategies stressing distinct defense barriers. In practice this philosophy of a predominant role of defence barriers proved largely partnership destructive, in that it permitted to shift responsibilities for failures and to claim administrative competence according to momentary situations and interests. "Integrated Quality Assurance" means mutual agreement of two or more partners along the food chain (e. g. feed producers, farmers, animal health industry, veterinarians and food processors) on product characteristics and production methods. It involves essential system elements including facilities, materials, manpower, information, transport, management etc. Different principles and procedures of quality assurance have been introduced in practice, including agriculture and food processing. These different approaches are not mutually exclusive but largely of complementary nature.(ABSTRACT TRUNCATED AT 250 WORDS)

  15. Quality assurance considerations in nuclear waste management

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1982-01-01

    Proper use of quality assurance will provide the basis for an effective management control system for nuclear waste management programs. Control is essential for achieving successful programs free from costly losses and failures and for assuring the public and regulators that the environment and health and safety are being protected. The essence of quality assurance is the conscientious use of planned and systematic actions, based on selecting and applying appropriate requirements from an established quality assurance standard. Developing a quality assurance program consists of using knowledge of the technical and managerial aspects of a project to identify and evaluate risks of loss and failure and then to select appropriate quality assurance requirements that will minimize the risks. Those requirements are integrated into the project planning documents and are carried out as specific actions during the life of the project

  16. 2. Product quality control and assurance system

    International Nuclear Information System (INIS)

    1990-01-01

    Product quality control and assurance are dealt with in relation to reliability in nuclear power engineering. The topics treated include product quality control in nuclear power engineering, product quality assurance of nuclear power plant equipment, quality assurance programs, classification of selected nuclear power equipment, and standards relating to quality control and assurance and to nuclear power engineering. Particular attention is paid to Czechoslovak and CMEA standards. (P.A.). 2 figs., 1 tab., 12 refs

  17. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  18. GSFC Safety and Mission Assurance Organization

    Science.gov (United States)

    Kelly, Michael P.

    2010-01-01

    This viewgraph presentation reviews NASA Goddard Space Flight Center's approach to safety and mission assurance. The contents include: 1) NASA GSFC Background; 2) Safety and Mission Assurance Directorate; 3) The Role of SMA-D and the Technical Authority; 4) GSFC Mission assurance Requirements; 5) GSFC Systems Review Office (SRO); 6) GSFC Supply Chain Management Program; and 7) GSFC ISO9001/AS9100 Status Brief.

  19. Improving patient safety through quality assurance.

    Science.gov (United States)

    Raab, Stephen S

    2006-05-01

    Anatomic pathology laboratories use several quality assurance tools to detect errors and to improve patient safety. To review some of the anatomic pathology laboratory patient safety quality assurance practices. Different standards and measures in anatomic pathology quality assurance and patient safety were reviewed. Frequency of anatomic pathology laboratory error, variability in the use of specific quality assurance practices, and use of data for error reduction initiatives. Anatomic pathology error frequencies vary according to the detection method used. Based on secondary review, a College of American Pathologists Q-Probes study showed that the mean laboratory error frequency was 6.7%. A College of American Pathologists Q-Tracks study measuring frozen section discrepancy found that laboratories improved the longer they monitored and shared data. There is a lack of standardization across laboratories even for governmentally mandated quality assurance practices, such as cytologic-histologic correlation. The National Institutes of Health funded a consortium of laboratories to benchmark laboratory error frequencies, perform root cause analysis, and design error reduction initiatives, using quality assurance data. Based on the cytologic-histologic correlation process, these laboratories found an aggregate nongynecologic error frequency of 10.8%. Based on gynecologic error data, the laboratory at my institution used Toyota production system processes to lower gynecologic error frequencies and to improve Papanicolaou test metrics. Laboratory quality assurance practices have been used to track error rates, and laboratories are starting to use these data for error reduction initiatives.

  20. One in a Million Given the Accident: Assuring Nuclear Weapon Safety

    Energy Technology Data Exchange (ETDEWEB)

    Weaver, Jason [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-08-25

    Since the introduction of nuclear weapons, there has not been a single instance of accidental or unauthorized nuclear detonation, but there have been numerous accidents and “close calls.” As the understanding of these environments has increased, the need for a robust nuclear weapon safety philosophy has grown. This paper describes some of the methods used by the Nuclear Weapon Complex today to assure nuclear weapon safety, including testing, modeling, analysis, and design features. Lastly, it also reviews safety’s continued role in the future and examines how nuclear safety’s present maturity can play a role in strengthening security and other areas and how increased coordination can improve safety and reduce long-term cost.

  1. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    Science.gov (United States)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  2. Waste Management Quality Assurance Plan

    International Nuclear Information System (INIS)

    2006-01-01

    The WMG QAP is an integral part of a management system designed to ensure that WMG activities are planned, performed, documented, and verified in a manner that assures a quality product. A quality product is one that meets all waste acceptance criteria, conforms to all permit and regulatory requirements, and is accepted at the offsite treatment, storage, and disposal facility. In addition to internal processes, this QA Plan identifies WMG processes providing oversight and assurance to line management that waste is managed according to all federal, state, and local requirements for waste generator areas. A variety of quality assurance activities are integral to managing waste. These QA functions have been identified in the relevant procedures and in subsequent sections of this plan. The WMG QAP defines the requirements of the WMG quality assurance program. These requirements are derived from Department of Energy (DOE) Order 414.1C, Quality Assurance, Contractor Requirements Document, the LBNL Operating and Assurance Program Plan (OAP), and other applicable environmental compliance documents. The QAP and all associated WMG policies and procedures are periodically reviewed and revised, as necessary, to implement corrective actions, and to reflect changes that have occurred in regulations, requirements, or practices as a result of feedback on work performed or lessons learned from other organizations. The provisions of this QAP and its implementing documents apply to quality-affecting activities performed by the WMG; WMG personnel, contractors, and vendors; and personnel from other associated LBNL organizations, except where such contractors, vendors, or organizations are governed by their own WMG-approved QA programs

  3. R D software quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Hood, F.C.

    1991-10-01

    Research software quality assurance (QA) requirements must be adequate to strengthen development or modification objectives, but flexible enough not to restrict creativity. Application guidelines are needed for the different kinds of research and development (R D) software activities to assure project objectives are achieved.

  4. Project Specific Quality Assurance Plan

    International Nuclear Information System (INIS)

    Pedersen, K.S.

    1995-01-01

    This Quality Assurance Project Plan (QAPP) identifies the Westinghouse Hanford Co. (WHC) Quality Assurance (QA) program requirements for all contractors involved in the planning and execution of the design, construction, testing and inspection of the 200 Area Effluent BAT/AKART Implementation, Project W-291

  5. 48 CFR 12.208 - Contract quality assurance.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contract quality assurance... Items 12.208 Contract quality assurance. Contracts for commercial items shall rely on contractors' existing quality assurance systems as a substitute for Government inspection and testing before tender for...

  6. National Computer Security Conference (13th) Held in Washington, DC on 1-4 October, 1990. Procedings. Volume 1: Information Systems Security: Standards - The Key to the Future

    Science.gov (United States)

    1990-10-04

    Parker II, The MITRE Corporation 307 Trusted MINIX : A Worked Example Albert Donaldson, ESCOM Corporation John Taylor Jr., General Electric M&DSO...Corporation 306 Trusted MINIX : A Worked Example Albert L. Donaldson John W. Taylor, Jr. David M. Chizmadia ESCOM Corporation General Electric M&DSO...G. Meade, MD 20755 ABSTRACT The Trusted MINIX system is being developed to provide a worked example of C2 security mechanisms and assurances based

  7. Radioactive Sources in Medicine: Impact of Additional Security Measures

    International Nuclear Information System (INIS)

    Classic, K. L.; Vetter, R. J.; Nelson, K. L.

    2004-01-01

    For many years, medical centers and hospitals have utilized appropriate security measures to prevent theft or unauthorized use of radioactive materials. Recent anxiety about orphan sources and terrorism has heightened concern about diversion of radioactive sources for purposes of constructing a radiological dispersion device. Some medical centers and hospitals may have responded by conducting threat assessments and incorporating additional measures into their security plans, but uniform recommendations or regulations have not been promulgated by regulatory agencies. The International Atomic Energy Agency drafted interim guidance for the purpose of assisting member states in deciding what security measures should be taken for various radioactive sources. The recommendations are aimed at regulators, but suppliers and users also may find the recommendations to be helpful. The purpose of this paper is to describe threat assessments and additional security actions that were taken by one large and one medium-sized medical center and the impact these measures had on operations. Both medical centers possess blood bank irradiators, low-dose-rate therapy sources, and Mo-99/Tc-99m generators that are common to many health care organizations. Other medical devices that were evaluated include high-dose-rate after loaders, intravascular brachytherapy sources, a Co-60 stereotactic surgery unit, and self-shielded irradiators used in biomedical research. This paper will discuss the impact additional security has had on practices that utilize these sources, cost of various security alternatives, and the importance of a security culture in assuring the integrity of security measures without negatively impacting beneficial use of these sources. (Author) 10 refs

  8. Integrating quality assurance and research and development

    International Nuclear Information System (INIS)

    Dronkers, J.J.

    1985-01-01

    Quality assurance programs cannot be transferred from one organization to another without attention to existing cultures and traditions. Introduction of quality assurance programs constitutes a significant change and represents a significant impact on the organizational structure and operational mode. Quality assurance professionals are change agents, but do not know how to be effective ones. Quality assurance as a body of knowledge and experience can only become accepted when its practitioners become familiar with their role as change agents. 8 references

  9. Quality assurance within regulatory bodies

    International Nuclear Information System (INIS)

    1999-06-01

    The IAEA directed extensive efforts during the years 1991 to 1995 to the integral revision of all NUSS quality assurance publications, which were approved and issued as Safety Series No.50-C/SG-Q, Quality Assurance for Safety in Nuclear Power Plants and other Nuclear Installations (1996). When these quality assurance publications were developed, their prime focus was on requirements against which work performed by the licensees could be measured and assessed by the regulatory bodies. In this way, they only helped to facilitate the functions of regulators. No requirements or recommendations were provided on how the regulators should ensure the effective implementation of their own activities. The present publication is a first attempt to collect, integrate and offer available experience to directly support performance of regulatory activities. It presents a comprehensive compilation on the application of quality assurance principles and methods by regulatory bodies to their activities. The aim is consistent good performance of regulatory activities through a systematic approach

  10. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Site Performance Assessment Program

    International Nuclear Information System (INIS)

    Gregory J. Shott, Vefa Yucel

    2007-01-01

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N and C)

  11. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Sites Performance Assessment Program

    Energy Technology Data Exchange (ETDEWEB)

    Gregory J. Shott, Vefa Yucel

    2007-01-03

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N&C).

  12. Quality assurance techniques for activation analysis

    International Nuclear Information System (INIS)

    Becker, D.A.

    1984-01-01

    The principles and techniques of quality assurance are applied to the measurement method of activation analysis. Quality assurance is defined to include quality control and quality assessment. Plans for quality assurance include consideration of: personnel; facilities; analytical design; sampling and sample preparation; the measurement process; standards; and documentation. Activation analysis concerns include: irradiation; chemical separation; counting/detection; data collection, and analysis; and calibration. Types of standards discussed include calibration materials and quality assessment materials

  13. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  14. Reinforcing Quality Assurance in Romanian Higher Education

    Directory of Open Access Journals (Sweden)

    Ana-Maria Dima

    2010-07-01

    Full Text Available Since 1993, the quality assurance system in Romania has gained considerable experience. This experience was recently recognized in 2008 by the ENQA: European Association for Quality Assurance in Higher Education through the admission of ARACIS as a full member of EQAR: the European Quality Assurance Register. The Board of ENQA agreed to grant ARACIS’s full membership of ENQA for five years from 2 June 2009. This article explores the benefits of membership for the Romanian Agency for Quality Assurance in Higher Education – ARACIS, comparing to other regional and global quality assurance agencies networks. The common features and differences between ARACIS and other European agencies are questioned through the frameworks of ENQA and INQAAHE as a case study.

  15. Quality index in medical radiology; Indice de qualidade em radiologia medica

    Energy Technology Data Exchange (ETDEWEB)

    Travassos, Paulo Cesar B.; Magalhaes, Luis Alexandre Goncalves; Drexler, Gunter G.; Almeida, Carlos E. de, E-mail: luisalexandregm@hotmail.com [Universidade do Estado do Rio de Janeiro (IBRAG/UERJ), RJ (Brazil). Instituto de Biologia. Laboratorio de Ciencias Radiologicas; Navarro, Marcus V. [Instituto Federal de Educacao, Ciencia e Tecnologia da Bahia (IFBA), Salvador, BA (Brazil)

    2012-08-15

    In the literature there are articles with methods for the calculation of potential risk in medical radiodiagnostics institutions: Evaluation Model for Potential Risk (MARP). These articles present results based on documental evaluation of the institutions, but they suggest that quantitative data from the equipment's quality assurance can be included. This article proposes an evaluation of medical radiology institutions with a variation of the Potential Risk model, which considers, besides the administrative factors, quantitative results from equipment's quality assurance: the quality index. Results of the application of this proposition in 42 institutions are presented, with 52 evaluated conventional X-Ray equipment, located in the state of Rio de Janeiro, Brazil. (author)

  16. Printed Circuit Board Quality Assurance

    Science.gov (United States)

    Sood, Bhanu

    2016-01-01

    PCB Assurance Summary: PCB assurance actives are informed by risk in context of the Project. Lessons are being applied across Projects for continuous improvements. Newer component technologies, smaller/high pitch devices: tighter and more demanding PCB designs: Identifying new research areas. New materials, designs, structures and test methods.

  17. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  18. A revision of the revaluation index of Spanish pensions

    OpenAIRE

    Roch, Oriol; Bosch Príncep, Manuela; Morillo, Isabel; Vilalta de Miguel, Daniel

    2017-01-01

    This article reviews the methodological aspects of the revaluation index of Spanish pensions developed following Law 23/2013 which regulates the sustainability factor and revaluation index of the Social Security pension system. From a gradual breakdown of the elements that make up the revaluation index, an exposition is given of the formal and implementation problems it involves. Finally, an alternative model based on dynamic optimization techniques is proposed and its use is illustrated with...

  19. A coverage and slicing dependencies analysis for seeking software security defects.

    Science.gov (United States)

    He, Hui; Zhang, Dongyan; Liu, Min; Zhang, Weizhe; Gao, Dongmin

    2014-01-01

    Software security defects have a serious impact on the software quality and reliability. It is a major hidden danger for the operation of a system that a software system has some security flaws. When the scale of the software increases, its vulnerability has becoming much more difficult to find out. Once these vulnerabilities are exploited, it may lead to great loss. In this situation, the concept of Software Assurance is carried out by some experts. And the automated fault localization technique is a part of the research of Software Assurance. Currently, automated fault localization method includes coverage based fault localization (CBFL) and program slicing. Both of the methods have their own location advantages and defects. In this paper, we have put forward a new method, named Reverse Data Dependence Analysis Model, which integrates the two methods by analyzing the program structure. On this basis, we finally proposed a new automated fault localization method. This method not only is automation lossless but also changes the basic location unit into single sentence, which makes the location effect more accurate. Through several experiments, we proved that our method is more effective. Furthermore, we analyzed the effectiveness among these existing methods and different faults.

  20. 21 CFR 58.35 - Quality assurance unit.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Quality assurance unit. 58.35 Section 58.35 Food... LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Organization and Personnel § 58.35 Quality assurance unit. (a) A testing facility shall have a quality assurance unit which shall be responsible for...

  1. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    Groth, S.; Meghzifene, A.; Tatsuzaki, H.; Levin, V.; Izewska, J.

    2001-01-01

    Quality assurance in the management of a patient receiving radiation therapy and the role of the radiation oncologist and medical physicist in this process is described. The constraints on available personnel are recognised and the need for further education resources and IAEA activities in education for both groups described. IAEA activities in the clinical and dosimetric aspects and the resultant publications and education have contributed to a culture of quality assurance. (author)

  2. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    International Nuclear Information System (INIS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-01-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  3. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    Energy Technology Data Exchange (ETDEWEB)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede, E-mail: gwibawa@chem-eng.its.ac.id [Department of Chemical Engineering, Faculty of Industrial Technology, Sepuluh Nopember Institute of Technology (ITS), Kampus ITS Sukolilo, Surabaya 60111 (Indonesia)

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  4. PENGARUH MODEL PEMBELAJARAN ASSURANCE, RELEVANCE, INTEREST, ASSESSMENT, SATISFACTION DENGAN STRATEGI ACTIVE LEARNING TIPE INDEX CARD MATCH TERHADAP KEMAMPUAN PEMECAHAN MASALAH MATEMATIK SISWA SMA

    Directory of Open Access Journals (Sweden)

    Frasticha Frasticha

    2016-08-01

    Full Text Available Pemecahan masalah merupakan kegiatan matematika yang sulit baik dalam mempelajari maupun mengajarkannya, sehingga diperlukan adanya suatu model pembelajaran yang dapat memberikan pengaruh positif terhadap kemampuan pemecahan masalah siswa. Salah satu model pembelajaran yang dapat digunakan yaitu model pembelajaran ARIAS dengan strategi active learning tipe ICM. Penelitian ini bertujuan untuk mengetahui: (1 model pembelajaran ARIAS dengan strategi active learning tipe ICM berpengaruh terhadap kemampuan pemecahan masalah matematik siswa SMA; (2 Sikap siswa terhadap pembelajaran matematika menggunakan model pembelajaran ARIAS dengan strategi active learning tipe ICM. Subjek penelitian ini adalah siswa kelas XI IPA 1 dengan jumlah 38 siswa sebagai kelas kontrol dan XI IPA 2 dengan jumlah 39 siswa sebagai kelas eksperimen di SMAN 19 Kabupaten Tangerang pada tahun ajaran 2015-2016. Metode penelitian yang digunakan adalah metode penelitian eksperimen dengan adalah desain kuasi eksperimen dengan bentuk Nonequivalent Control Group serta Cluster Sampling sebagai teknik pengambilan sampel. Analisis data dalam penelitian ini menggunakan SPSS Statistics Version 22. Hasil penelitian :(1 model pembelajaran ARIAS dengan strategi active learning tipe ICM berpengaruh terhadap kemampuan pemecahan masalah matematik siswa SMA dan memberikan pengaruh yang positif; (2 sikap siswa positif terhadap model pembelajaran ARIAS dengan strategi active learning tipe ICM. Kata Kunci: Assurance Relevance Interest Assessment Satisfaction, Index Card Match, Kemampuan Pemecahan Masalah

  5. Attachment security and obesity in US preschool-aged children.

    Science.gov (United States)

    Anderson, Sarah E; Whitaker, Robert C

    2011-03-01

    To estimate the association between attachment security in children aged 24 months and their risk for obesity at 4½ years of age. Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to development of obesity. Cohort study. National sample of US children born in 2001. Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76.0% of children assessed in both waves). Attachment security at 24 months was assessed by trained interviewers during observation in the child's home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort-45 Item. Obesity at 4½ years of age (sex-specific body mass index ≥95th percentile for age). The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds of obesity were 1.30 (95% confidence interval, 1.05-1.62) times higher than for children with secure attachment after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Insecure attachment in early childhood may be a risk factor for obesity. Interventions to increase children's attachment security should examine the effects on children's weight.

  6. Qualtity assurance in nuclear technology

    International Nuclear Information System (INIS)

    Roesler, U.

    1977-01-01

    The demand for safety in nuclear power plants is rooted in the Atomic Energy Act of the Federal Republic of Germany, under which 'preplanned safety' is a licensing condition. Moreover, the safety of nuclear power plants is outlined in more precise terms in the guidelines of the German Advisory Committee for Reactor Safeguards (Reaktorsicherheitskommission). The usual approach taken in this country, i.e., to establish quality assurance for each specific product, with supplementary quality assurance measures geared to systems requirements being implemented by industry, has proved to work satisfactorily. Product-based quality assurance mainly stems from the classical quality control concept, whereas systems-based quality assurance primarily is to ensure that both manufacturers and systems suppliers take all measures in advance which are needed for the satisfactory processing of an order and to achieve the quality level required. The special features and the advantages of the joint action of manufacturers, systems suppliers and experts, which are characteristic of the German approach, very clearly emerge from a comparison with practices in the United States. In the further refinement of the quality assurance concept as practised in Germany, qhich will have a particularly great impact on costs and schedules because of the manpower requirement involved, it should be carefully weighed where there are exaggerations and unnecessary complications which can no longer be justified by the demand for more safety. (orig.) [de

  7. The lead-lag relationship between stock index and stock index futures: A thermal optimal path method

    Science.gov (United States)

    Gong, Chen-Chen; Ji, Shen-Dan; Su, Li-Ling; Li, Sai-Ping; Ren, Fei

    2016-02-01

    The study of lead-lag relationship between stock index and stock index futures is of great importance for its wide application in hedging and portfolio investments. Previous works mainly use conventional methods like Granger causality test, GARCH model and error correction model, and focus on the causality relation between the index and futures in a certain period. By using a non-parametric approach-thermal optimal path (TOP) method, we study the lead-lag relationship between China Securities Index 300 (CSI 300), Hang Seng Index (HSI), Standard and Poor 500 (S&P 500) Index and their associated futures to reveal the variance of their relationship over time. Our finding shows evidence of pronounced futures leadership for well established index futures, namely HSI and S&P 500 index futures, while index of developing market like CSI 300 has pronounced leadership. We offer an explanation based on the measure of an indicator which quantifies the differences between spot and futures prices for the surge of lead-lag function. Our results provide new perspectives for the understanding of the dynamical evolution of lead-lag relationship between stock index and stock index futures, which is valuable for the study of market efficiency and its applications.

  8. Quality assurance program plan for Building 324

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides an overview of the quality assurance program for Building 324. This plan supersedes the PNNL Nuclear Facilities Quality Management System Description, PNL-NF-QMSD, Revision 2, dated March 1996. The program applies to the facility safety structures, systems, and components and to activities that could affect safety structures, systems, and components. Adherence to the quality assurance program ensures the following: US Department of Energy missions and objectives are effectively accomplished; Products and services are safe, reliable, and meet or exceed the requirements and expectations of the user; Hazards to the public, to Hanford Site and facility workers, and to the environment are minimized. The format of this Quality Assurance Program Plan is structured to parallel that of 10 CFR 83 0.120, Quality Assurance Requirements

  9. Quality assurance labels as drivers of loyalty in the case of traditional food products

    DEFF Research Database (Denmark)

    Chrysochou, Polymeros; Krystallis Krontalis, Athanasios; Giraud, Georges

    2012-01-01

    This paper examines the role of quality assurance labels as drivers of customer loyalty in the case of traditional food products. More specifically, it investigates whether quality assurance labels, such as the Designation of Origin Labels (DOLs), perform as better drivers of loyalty in comparison...... to other brand-related attributes, such as price and brand type, and if brands carrying a DOL exhibit higher loyalty levels in comparison to brands that do not carry any DOL label. Scanner data were collected from a panel of 789 French customers recording purchases over a year within a traditional food...... product category. The olarisation index (phi) was used as a measure of loyalty. The findings show that in comparison with other extrinsic product attributes, DOLs constitute less important drivers of loyalty. However, brands carrying a DOL in comparison to brands that do not carry any DOL label exhibit...

  10. Language Can: Ensuring National Security through Effective Use of ...

    African Journals Online (AJOL)

    First Lady

    2012-10-27

    Oct 27, 2012 ... Indexed African Journals Online: www.ajol.info. An International ... Key words: Language, Language Can, Security, National Security, and. Language Use .... message and transmit it to a second party, who then decodes it in order to. Vol. ..... would be seen as a game rather than ―a do or die affair‖. It is the ...

  11. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  12. Three blind men and elephant: The Case of energy indices to measure energy security and sustainability

    OpenAIRE

    Kapil Narula; B. Sudhakara Reddy

    2014-01-01

    An 'Energy Index', which is aggregated from energy indicators is a rich source of information and is helpful in providing an assessment of a country's performance. This has, however, resulted in mushrooming of a plethora of indices, which claim to quantify the performance of a country in attaining the goal of energy security and energy sustainability. The paper attempts to compare three different indices, viz., 'Energy Sustainability Index', 'International Index of Energy Security Risk', 'Ene...

  13. Measurement quality assurance

    International Nuclear Information System (INIS)

    Eisenhower, E.H.

    1988-01-01

    The quality of a radiation protection program can be no better than the quality of the measurements made to support it. In many cases, that quality is unknown and is merely implied on the basis of a calibration of a measuring instrument. If that calibration is inappropriate or is performed improperly, the measurement result will be inaccurate and misleading. Assurance of measurement quality can be achieved if appropriate procedures are followed, including periodic quality control actions that demonstrate adequate performance. Several national measurement quality assurance (MQA) programs are operational or under development in specific areas. They employ secondary standards laboratories that provide a high-quality link between the National Bureau of Standards and measurements made at the field use level. The procedures followed by these secondary laboratories to achieve MQA will be described, as well as plans for similar future programs. A growing general national interest in quality assurance, combined with strong specific motivations for MQA in the area of ionizing radiation, will provide continued demand for appropriate national programs. Such programs must, however, employ procedures that are cost effective and must be developed with participation by all affected parties

  14. RAVEN Quality Assurance Activities

    Energy Technology Data Exchange (ETDEWEB)

    Cogliati, Joshua Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    This report discusses the quality assurance activities needed to raise the Quality Level of Risk Analysis in a Virtual Environment (RAVEN) from Quality Level 3 to Quality Level 2. This report also describes the general RAVEN quality assurance activities. For improving the quality, reviews of code changes have been instituted, more parts of testing have been automated, and improved packaging has been created. For upgrading the quality level, requirements have been created and the workflow has been improved.

  15. Has quality assurance outlived its usefulness

    International Nuclear Information System (INIS)

    Goldenberg, N.

    1989-01-01

    This paper explores the impact that better management and increased productivity will have on the need for, and role of, quality assurance in the future. The author discusses criticisms of existing quality assurance programs

  16. Challenges of Carboy Security For Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kwangjo [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2012-03-15

    Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing efficient and non-interrupted electricity in a country using radioactive elements due to global warming and shortage of fossil resources. To provide the higher reliability and better performance with additional diagnostic capabilities in operating NPPs, digital Instrumentation and Control (I and C) systems have been introduced to replace the analog I and C system. However, the digitalized I and C systems bring us new vulnerabilities and threats over the cyber space. In this paper, we discus that the trends of cyber security for legacy IT system and its countermeasure have been developed for last three decades from the security point of view. We found that the nuclear industry has an inherently conservative approach to safety and substantial effort is required to provide the necessary evidence and analysis to assure that digital I and C systems can be used in safety-critical and safety-related applications. NPP I and C systems are generally isolated from external communication systems. This cannot provide 100% cyber attack-free operation for NPP lessoned from an attack using stuxnet. Experience gained from cyber security in other sensitive fields, such as the military, national security, banking, and air-traffic control, etc. is valuable both for improving cyber security at NPPs with digital I and C systems and for demonstrating that cyber defenses can consistently stay ahead of cyber attacks. But as with safety and other areas of security, cyber security is an area where no-one can rest on his laurels. Continued success requires continuous vigilance and continuous improvement.

  17. Challenges of Carboy Security For Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Kwangjo

    2012-01-01

    Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing efficient and non-interrupted electricity in a country using radioactive elements due to global warming and shortage of fossil resources. To provide the higher reliability and better performance with additional diagnostic capabilities in operating NPPs, digital Instrumentation and Control (I and C) systems have been introduced to replace the analog I and C system. However, the digitalized I and C systems bring us new vulnerabilities and threats over the cyber space. In this paper, we discus that the trends of cyber security for legacy IT system and its countermeasure have been developed for last three decades from the security point of view. We found that the nuclear industry has an inherently conservative approach to safety and substantial effort is required to provide the necessary evidence and analysis to assure that digital I and C systems can be used in safety-critical and safety-related applications. NPP I and C systems are generally isolated from external communication systems. This cannot provide 100% cyber attack-free operation for NPP lessoned from an attack using stuxnet. Experience gained from cyber security in other sensitive fields, such as the military, national security, banking, and air-traffic control, etc. is valuable both for improving cyber security at NPPs with digital I and C systems and for demonstrating that cyber defenses can consistently stay ahead of cyber attacks. But as with safety and other areas of security, cyber security is an area where no-one can rest on his laurels. Continued success requires continuous vigilance and continuous improvement

  18. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    Science.gov (United States)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations

  19. Recent Trends in Quality Assurance

    Science.gov (United States)

    Amaral, Alberto; Rosa, Maria Joao

    2010-01-01

    In this paper we present a brief description of the evolution of quality assurance in Europe, paying particular attention to its relationship to the rising loss of trust in higher education institutions. We finalise by analysing the role of the European Commission in the setting up of new quality assurance mechanisms that tend to promote…

  20. Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

    Directory of Open Access Journals (Sweden)

    Jun Hong

    2017-01-01

    Full Text Available As cloud computing has been popularized massively and rapidly, individuals and enterprises prefer outsourcing their databases to the cloud service provider (CSP to save the expenditure for managing and maintaining the data. The outsourced databases are hosted, and query services are offered to clients by the CSP, whereas the CSP is not fully trusted. Consequently, the security shall be violated by multiple factors. Data privacy and query integrity are perceived as two major factors obstructing enterprises from outsourcing their databases. A novel scheme is proposed in this paper to effectuate k-nearest neighbors (kNN query and kNN query authentication on an encrypted outsourced spatial database. An asymmetric scalar-product-preserving encryption scheme is elucidated, in which data points and query points are encrypted with diverse encryption keys, and the CSP can determine the distance relation between encrypted data points and query points. Furthermore, the similarity search tree is extended to build a novel verifiable SS-tree that supports efficient kNN query and kNN query verification. It is indicated from the security analysis and experiment results that our scheme not only maintains the confidentiality of outsourced confidential data and query points but also has a lower kNN query processing and verification overhead than the MR-tree.

  1. Redefining and expanding quality assurance.

    Science.gov (United States)

    Robins, J L

    1992-12-01

    To meet the current standards of excellence necessary for blood establishments, we have learned from industry that a movement toward organization-wide quality assurance/total quality management must be made. Everyone in the organization must accept responsibility for participating in providing the highest quality products and services. Quality must be built into processes and design systems to support these quality processes. Quality assurance has been redefined to include a quality planning function described as the most effective way of designing quality into processes. A formalized quality planning process must be part of quality assurance. Continuous quality improvement has been identified as the strategy every blood establishment must support while striving for error-free processing as the long-term objective. The auditing process has been realigned to support and facilitate this same objective. Implementing organization-wide quality assurance/total quality management is one proven plan for guaranteeing the quality of the 20 million products that are transfused into 4 million patients each year and for moving toward the new order.

  2. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  3. Upgrading security at nuclear power plants: effect on utility operations and costs

    International Nuclear Information System (INIS)

    Salvesen, R.S.

    1977-01-01

    The impact of the new security regulation on Salem Unit No. 1 is discussed. The upgrading of security requirements in 10CFR 73.55 did not alter the basic elements of a security plan established in ANSI 18.17, but rather upgraded the level of the threat to which a security plan must respond. Its basic thrust is first to require a hardening of physical barriers and/or increase the security organization response capability to better neutralize a threat from the outside. Secondly, to implement more extensive search requirements to reduce the threat from inside by preventing the entry of unauthorized material that might be used for sabotage. Thirdly, it requires a reevaluation of security organization responsibilities and preplanning for contingencies to assure effective coordination of all involved parties. The new regulations impact most significantly on two of the five elements of a basic security plan--Physical Barriers and the Security Force and to some extent on administrative controls. At this time, I cannot accurately estimate the cost increase but would guess it will be double or triple our initial costs. There will be reduced productivity to some extent in stores and material handling activities and some impediment to all employees who must pass access control points, however, its overall affect on operating a its overall affect on operating activities should not be significant

  4. Regulatory viewpoint on nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    Tripp, L.E.

    1976-01-01

    Considerations of the importance of fuel quality and performance to nuclear safety, ''as low reasonably achievable'' release of radioactive materials in reactor effluents, and past fuel performance problems demonstrate the need for strong regulatory input, review and inspection of nuclear fuel quality assurance programs at all levels. Such a regulatory program is being applied in the United States of America by the US Nuclear Regulatory Commission. Quality assurance requirements are contained within government regulations. Guidance on acceptable methods of implementing portions of the quality assurance program is contained within Regulatory Guides and other NRC documents. Fuel supplier quality assurance program descriptions are reviewed as a part of the reactor licensing process. Inspections of reactor licensee control of their fuel vendors as well as direct inspections of fuel vendor quality assurance programs are conducted on a regularly scheduled basis. (author)

  5. Control and Assurance in E-Commerce: Privacy, Integrity and Security at eBay

    OpenAIRE

    Rong-Ruey Duh; Karim Jamal; Shyam NMI Sunder

    2001-01-01

    Growth of online auctions and other forms of e-commerce has been hampered by concerns about the privacy, integrity, and security of online transactions. To earn the trust of their participants, new e-commerce organizations, like traditional organizations, have to reach the state of expectations equilibrium or control - a state where the actual behavior of participants corresponds to what others expect them to do. Since e-commerce companies provide electronic platforms where buyers and sellers...

  6. Quality assurance of operating instructions

    International Nuclear Information System (INIS)

    Asmuss, G.

    1992-01-01

    It is pointed out that the quality assurance at nuclear power stations must be supported by national and international regulations. Quality assurance is explained using the example of the design of a pressurised water reactor. The operating and emergency manuals are discussed and examples for their structure put forward. The significance of updating is emphasised. 15 figs., 19 refs

  7. QAM: PROPOSED MODEL FOR QUALITY ASSURANCE IN CBSS

    Directory of Open Access Journals (Sweden)

    Latika Kharb

    2015-08-01

    Full Text Available Component-based software engineering (CBSE / Component-Based Development (CBD lays emphasis on decomposition of the engineered systems into functional or logical components with well-defined interfaces used for communication across the components. Component-based software development approach is based on the idea to develop software systems by selecting appropriate off-the-shelf components and then to assemble them with a well-defined software architecture. Because the new software development paradigm is much different from the traditional approach, quality assurance for component-based software development is a new topic in the software engineering research community. Because component-based software systems are developed on an underlying process different from that of the traditional software, their quality assurance model should address both the process of components and the process of the overall system. Quality assurance for component-based software systems during the life cycle is used to analyze the components for achievement of high quality component-based software systems. Although some Quality assurance techniques and component based approach to software engineering have been studied, there is still no clear and well-defined standard or guidelines for component-based software systems. Therefore, identification of the quality assurance characteristics, quality assurance models, quality assurance tools and quality assurance metrics, are under urgent need. As a major contribution in this paper, I have proposed QAM: Quality Assurance Model for component-based software development, which covers component requirement analysis, component development, component certification, component architecture design, integration, testing, and maintenance.

  8. Opinion of gastroenterologists towards quality assurance in endoscopy.

    Science.gov (United States)

    de Jonge, Vincent; Kuipers, Ernst J; van Leerdam, Monique E

    2011-03-01

    Quality assurance has become an important issue. Many societies are adopting quality assurance programs in order to monitor and improve quality of care. To assess the opinion of gastroenterologists towards quality assurance on the endoscopy department. A survey was sent to all gastroenterologists (n=319) in the Netherlands. It assessed their opinion on a quality assurance program for endoscopy units, including its design, logistics, and content. 200 gastroenterologists (63%) completed the questionnaire. 95% had a positive opinion towards quality assurance and 67% supposed an increase in quality. 28% assumed a negative impact on the time available for patient contact by introducing a quality assurance program and 35% that the capacity would decrease. A negative attitude towards disclosure of results to insurance companies (23%) and media (53%) was reported. Female gastroenterologists were less positive to share the results with other stakeholders (pquality measurements were assessment of complications (97%), standardised reporting (96%), and adequate patient information (95%). Gastroenterologists have a positive attitude towards quality assurance. However, concerns do exist about time investment and disclosure of results to others. Information provision and procedure characteristics were considered the most important aspects of quality assurance. Copyright © 2010 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  9. The Faroe Islands’ Security Policy in a Process of Devolution

    Directory of Open Access Journals (Sweden)

    Beinta í Jákobsstovu

    2012-12-01

    Full Text Available Since the late 1990s there has been a remarkable change in the institutional context of safety and security policies for the Faroes. The end of the Cold War led to a reduction in the strategic importance of, and military presence in, the islands. However, today Faroese sea and air space is increasingly exposed to heavy civilian traffic due to expected oil production as well as new sailing routes from the High North. The Faroese government is in a process, nearly completed, of taking over the full responsibility for societal security policy, a field it used to share with the Danish state authorities. In April 2002, the Faroese authorities took over the responsibility for SAR in Faroese sea territory and established a MRCC Center in Tórshavn. A new civic security law was passed by Løgtingið (the parliament in May 2012. This article discusses micro-states’ options in the international arena; provides a brief overview of the history of Faroese security policy; and discusses the present and future challenges involved in assuring protection and rescue services for the Faroese region of the North Atlantic.

  10. Quality assurance in the manufacture of pressure components

    International Nuclear Information System (INIS)

    Knoedler, D.

    1979-01-01

    New regulations for nuclear power plants emphasize more quality assurance than it was the case in the past. Quality assurance is a management tool. During erection the quality assurance measures of the manufacturer, the main contractor and the required quality and the reliability of the proof of quality. The qualification of processes, equipment and personnel is a significant measure of quality assurance. The proof for quality assurance to be effective needs not only system-oriented audits, but also product audits aimed at quality characteristics of the product itself. The existing problems of examination techniques not optimized according to latest experience and of the large volume of documetation will persist in case the existing regulations are not adjusted according to the results of relevant studies. Furthermore the effectiveness of quality assurance is too often hampered by vague definitions of the safety objectives. (orig.) [de

  11. Securing XML Documents

    Directory of Open Access Journals (Sweden)

    Charles Shoniregun

    2004-11-01

    Full Text Available XML (extensible markup language is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their specific applications. As a result, the number of documents incorporating this standard is continuously increasing over the Web. The processing of XML documents may require a traversal of all document structure and therefore, the cost could be very high. A strong demand for a means of efficient and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides an efficient method to speed up XML data processing. Furthermore, the paper explores the classification of existing methods impact of query processing, and indexing.

  12. The Food Security of Ukraine: Status, Threats, Prospects

    Directory of Open Access Journals (Sweden)

    Rudnichenko Yevhenii M.

    2017-08-01

    Full Text Available The article analyzes the existing approaches to the normative treatment of the category of «food security». An author’s own definition of the concept of «food security» has been proposed, which must be understood as the status of provision to society foods of adequate quality and sufficient quantity. An author’s own approach as to the feasibility of applying qualitative parameters for food security assessment and a critical attitude to quantitative indicators has been formulated. The Food security index and the Ukrainian rating for 2012-2016 with emphasizing the negative tendencies and developments have been provided. The article also provides a detailed characterization of the main indicators of Ukraine’s food security in 2016 by the three directions, which are: financial accessibility of foods; physical accessibility of foods; food quality and safety. Strengths and weaknesses of Ukraine’s food security and the main threats to food security were determined, the main prospects were allocated.

  13. Material quality assurance risk assessment : [summary].

    Science.gov (United States)

    2013-01-01

    With the shift from quality control (QC) of materials and placement techniques : to quality assurance (QA) and acceptance over the years, the role of the Office : of Materials Technology (OMT) has been shifting towards assurance of : material quality...

  14. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  15. The Security of Energy Supply and the Contribution of Nuclear Energy

    International Nuclear Information System (INIS)

    2011-01-01

    What contribution can nuclear energy make to improve the security of energy supply? This study, which examines a selection of OECD member countries, qualitatively and quantitatively validates the often intuitive assumption that, as a largely domestic source of electricity with stable costs and no greenhouse gas emissions during production, nuclear energy can make a positive contribution. Following an analysis of the meaning and context of security of supply, the study uses transparent and policy-relevant indicators to show that, together with improvements in energy efficiency, nuclear energy has indeed contributed significantly to enhanced energy supply security in OECD countries over the past 40 years. Content: Foreword; Executive Summary; 1. The Security of Energy Supply and the Contribution of Nuclear Energy - Concepts and Issues: - Energy supply security: An introduction, - Why security of energy supply remains a policy issue in OECD countries, - The external dimension: import dependence, resource exhaustion and carbon policy, - The internal dimension: economic, financial and technical considerations for energy supply security - Orientations for government policies to enhance the security of energy supply, - Conclusions; 2. Indicators and Models for Measuring Security of Energy Supply Risks: - Introduction, - Different approaches towards designing the Supply/Demand Index, - A detailed review of selected security of supply indicators, - Comprehensive models for assessing the security of energy supply, - The Supply/Demand Index, - Concluding observations; 3. Evolution of the Security of Energy Supply in OECD Countries: - Time-dependent quantification of the security of energy supply, - Changes in security of supply in selected OECD countries, - Electricity generation and the security of energy supply, - The contribution of nuclear energy and energy intensity to the security of energy supply, - The geographical distribution of SSDI values, - Conclusions; 4. Public

  16. Quality assurance program for nuclear power plants

    International Nuclear Information System (INIS)

    Gamon, T.H.

    1976-02-01

    The Topical Report presented establishes and provides the basis for the Brown and Root Quality Assurance Program for Nuclear Power Plants from which the Brown and Root Quality Assurance Manual is prepared and implemented. The Quality Assurance Program is implemented by the Brown and Root Power Division during the design, procurement, and construction phases of nuclear power plants. The Brown and Root Quality Assurance Program conforms to the requirements of Nuclear Regulatory Commission Regulation 10 CFR 50, Appendix B; to approved industry standards such as ANSI N45.2 and ''Daughter Standards''; or to equivalent alternatives as indicated in the appropriate sections of the report

  17. Quality assurance program for nuclear power plants

    International Nuclear Information System (INIS)

    Gamon, T.H.

    1976-06-01

    This topical report establishes and provides the basis for the Brown and Root Quality Assurance Program for Nuclear Power Plants from which the Brown and Root Quality Assurance Manual is prepared and implemented. The Quality Assurance Program is implemented by the Brown and Root Power Division during the design, procurement, and construction phases of nuclear power plants. The Brown and Root Quality Assurance Program conforms to the requirements of Nuclear Regulatory Commission Regulation 10 CFR 50, Appendix B; to approved industry standards such as ANSI N45.2 and ''Daughter Standards''; or to equivalent alternatives as indicated in the appropriate sections of this report

  18. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  19. 48 CFR 2453.246 - Quality Assurance.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Quality Assurance. 2453.246 Section 2453.246 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT CLAUSES AND FORMS FORMS Prescription of Forms 2453.246 Quality Assurance. ...

  20. Quality assurance manual: Volume 2, Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department. (LSP)

  1. Quality assurance manual: Volume 2, Appendices

    International Nuclear Information System (INIS)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department

  2. Risk Information Management Resource (RIMR): modeling an approach to defending against military medical information assurance brain drain

    Science.gov (United States)

    Wright, Willie E.

    2003-05-01

    As Military Medical Information Assurance organizations face off with modern pressures to downsize and outsource, they battle with losing knowledgeable people who leave and take with them what they know. This knowledge is increasingly being recognized as an important resource and organizations are now taking steps to manage it. In addition, as the pressures for globalization (Castells, 1998) increase, collaboration and cooperation are becoming more distributed and international. Knowledge sharing in a distributed international environment is becoming an essential part of Knowledge Management. This is a major shortfall in the current approach to capturing and sharing knowledge in Military Medical Information Assurance. This paper addresses this challenge by exploring Risk Information Management Resource (RIMR) as a tool for sharing knowledge using the concept of Communities of Practice. RIMR is based no the framework of sharing and using knowledge. This concept is done through three major components - people, process and technology. The people aspect enables remote collaboration, support communities of practice, reward and recognize knowledge sharing while encouraging storytelling. The process aspect enhances knowledge capture and manages information. While the technology aspect enhance system integration and data mining, it also utilizes intelligent agents and exploits expert systems. These coupled with supporting activities of education and training, technology infrastructure and information security enables effective information assurance collaboration.

  3. Quality assurance in nuclear medicine

    International Nuclear Information System (INIS)

    Paras, P.

    1978-01-01

    Quality assurance practices must be followed throughout the entire nuclear medicine process, from the initial decision to perform a particular procedure, through the interpretation and reporting of the results. The various parameters that can be defined and measured in each area must be monitored by quality control tests to assure the excellence of the total nuclear medicine process. The presentation will discuss each of the major areas of nuclear medicine quality control and their interaction as a part of the entire system. Quality control testing results and recommendations for measurements of radioactivity distribution will be described with emphasis on imaging equipment and dose calibrating instrumentation. The role of the health physicist in a quality assurance program will be stressed. (author)

  4. Application of Quality Assurance Mechanisms for Effective Library ...

    African Journals Online (AJOL)

    The main strategy used for implementation of quality assurance was integration of the library` services quality assurance agenda into the university structures and the quality assurance mechanisms available and used in Nigerian university libraries were programme accreditation and benchmarking of library systems.

  5. A method of setting limits for the purpose of quality assurance

    International Nuclear Information System (INIS)

    Sanghangthum, Taweap; Suriyapee, Sivalee; Kim, Gwe-Ya; Pawlicki, Todd

    2013-01-01

    The result from any assurance measurement needs to be checked against some limits for acceptability. There are two types of limits; those that define clinical acceptability (action limits) and those that are meant to serve as a warning that the measurement is close to the action limits (tolerance limits). Currently, there is no standard procedure to set these limits. In this work, we propose an operational procedure to set tolerance limits and action limits. The approach to establish the limits is based on techniques of quality engineering using control charts and a process capability index. The method is different for tolerance limits and action limits with action limits being categorized into those that are specified and unspecified. The procedure is to first ensure process control using the I-MR control charts. Then, the tolerance limits are set equal to the control chart limits on the I chart. Action limits are determined using the C pm process capability index with the requirements that the process must be in-control. The limits from the proposed procedure are compared to an existing or conventional method. Four examples are investigated: two of volumetric modulated arc therapy (VMAT) point dose quality assurance (QA) and two of routine linear accelerator output QA. The tolerance limits range from about 6% larger to 9% smaller than conventional action limits for VMAT QA cases. For the linac output QA, tolerance limits are about 60% smaller than conventional action limits. The operational procedure describe in this work is based on established quality management tools and will provide a systematic guide to set up tolerance and action limits for different equipment and processes. (paper)

  6. 31 CFR Appendix D to Part 356 - Description of the Consumer Price Index

    Science.gov (United States)

    2010-07-01

    ... Price Index (“CPI”) for purposes of inflation-protected securities is the non-seasonally adjusted U.S...' services, and drugs. In calculating the index, price changes for the various items are averaged together... Index D Appendix D to Part 356 Money and Finance: Treasury Regulations Relating to Money and Finance...

  7. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  8. Assessment Analysis and Forecasting for Security Early Warning of Energy Consumption Carbon Emissions in Hebei Province, China

    Directory of Open Access Journals (Sweden)

    Yi Liang

    2017-03-01

    Full Text Available Against the backdrop of increasingly serious global climate change and the development of the low-carbon economy, the coordination between energy consumption carbon emissions (ECCE and regional population, resources, environment, economy and society has become an important subject. In this paper, the research focuses on the security early warning of ECCE in Hebei Province, China. First, an assessment index system of the security early warning of ECCE is constructed based on the pressure-state-response (P-S-R model. Then, the variance method and linearity weighted method are used to calculate the security early warning index of ECCE. From the two dimensions of time series and spatial pattern, the security early warning conditions of ECCE are analyzed in depth. Finally, with the assessment analysis of the data from 2000 to 2014, the prediction of the security early warning of carbon emissions from 2015 to 2020 is given, using a back propagation neural network based on a kidney-inspired algorithm (KA-BPNN model. The results indicate that: (1 from 2000 to 2014, the security comprehensive index of ECCE demonstrates a fluctuating upward trend in general and the trend of the alarm level is “Severe warning”–“Moderate warning”–“Slight warning”; (2 there is a big spatial difference in the security of ECCE, with relatively high-security alarm level in the north while it is relatively low in the other areas; (3 the security index shows the trend of continuing improvement from 2015 to 2020, however the security level will remain in the state of “Semi-secure” for a long time and the corresponding alarm is still in the state of “Slight warning”, reflecting that the situation is still not optimistic.

  9. 45 CFR 86.4 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... SEX IN EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 86.4 Assurance required. (a) General. Every application for Federal financial assistance for any education... Director of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  10. 40 CFR 5.115 - Assurance required.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 5.115 Assurance... that applications for Federal financial assistance or awards of Federal financial assistance contain... official of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  11. 28 CFR 54.115 - Assurance required.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 54.115 Assurance... that applications for Federal financial assistance or awards of Federal financial assistance contain... official of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  12. 10 CFR 1042.115 - Assurance required.

    Science.gov (United States)

    2010-01-01

    ... ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 1042.115 Assurance required. (a) General... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  13. A Model for Quality Assurance on Acquisition and Registration, Processing, and Dissemination of Theses and Dissertations Systems

    Directory of Open Access Journals (Sweden)

    Mohammad Javad Ershadi

    2017-06-01

    Full Text Available Developments of recent decades shows that for reducing the financial and opportunities costs as well as increasing productivity, it is necessary to improve the quality of components and systems in organization. Information systems based on these rules should be considered and for improving their productivity, user’s satisfaction and effectiveness it is necessary to quality aspects of these systems are considered too. In this research a quality assurance system is developed to all parts of an information system from data gathering, data entry to indexing and dissemination of information for assuring of quality are included. This model based on continual improvement approach of Deming cycle will change all of its systems and processes so that each development in the system with considering current standards and quality guidelines are done

  14. Quality assurance for health and environmental chemistry: 1986

    International Nuclear Information System (INIS)

    Gautier, M.A.; Gladney, E.S.; Moss, W.D.; Phillips, M.B.; O'Malley, B.T.

    1987-11-01

    This report documents the continuing quality assurance efforts of the Health and Environmental Chemistry Group at the Los Alamos National Laboratory. The philosophy, methodology, and computing resources used by the quality assurance program to encompass the diversity of analytical chemistry practiced in the group are described. Included in the report are all quality assurance reference materials used, along with their certified or consensus concentrations, and all analytical chemistry quality assurance measurements made by HSE-9 during 1986. 27 refs., 3 figs

  15. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  16. Waste Management Quality Assurance Plan

    International Nuclear Information System (INIS)

    1993-01-01

    Lawrence Berkeley Laboratory's Environment Department addresses its responsibilities through activities in a variety of areas. The need for a comprehensive management control system for these activities has been identified by the Department of Energy (DOE). The WM QA (Waste Management Quality Assurance) Plan is an integral part of a management system that provides controls necessary to ensure that the department's activities are planned, performed, documented, and verified. This WM QA Plan defines the requirements of the WM QA program. These requirements are derived from DOE Order 5700.6C, Quality Assurance, the LBL Operating and Assurance Program Plan (OAP, LBL PUB-3111), and other environmental compliance documents applicable to WM activities. The requirements presented herein, as well as the procedures and methodologies that direct the implementation of these requirements, will undergo review and revisions as necessary. The provisions of this QA Plan and its implementing documents apply to quality-affecting activities performed by and for WM. It is also applicable to WM contractors, vendors, and other LBL organizations associated with WM activities, except where such contractors, vendors, or organizations are governed by their own WM-approved QA programs. References used in the preparation of this document are (1) ASME NQA-1-1989, (2) ANSI/ASQC E4 (Draft), (3) Waste Management Quality Assurance Implementing Management Plan (LBL PUB-5352, Rev. 1), (4) LBL Operating and Assurance Program Plan (OAP), LBL PUB-3111, 2/3/93. A list of terms and definitions used throughout this document is included as Appendix A

  17. Model Based Mission Assurance: Emerging Opportunities for Robotic Systems

    Science.gov (United States)

    Evans, John W.; DiVenti, Tony

    2016-01-01

    The emergence of Model Based Systems Engineering (MBSE) in a Model Based Engineering framework has created new opportunities to improve effectiveness and efficiencies across the assurance functions. The MBSE environment supports not only system architecture development, but provides for support of Systems Safety, Reliability and Risk Analysis concurrently in the same framework. Linking to detailed design will further improve assurance capabilities to support failures avoidance and mitigation in flight systems. This also is leading new assurance functions including model assurance and management of uncertainty in the modeling environment. Further, the assurance cases, a structured hierarchal argument or model, are emerging as a basis for supporting a comprehensive viewpoint in which to support Model Based Mission Assurance (MBMA).

  18. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    Science.gov (United States)

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  19. Towards improvement in quality assurance

    International Nuclear Information System (INIS)

    1987-03-01

    This first document in the series of the International Nuclear Safety Advisory Group (INSAG) Technical Notes is a general guideline for the establishment of effective quality assurance procedures at nuclear facilities. It sets out primary requirements such as quality objectives, methods for measuring the effectiveness of the quality assurance programme, priority of activities in relation to importance of safety of items, motivation of personnel

  20. Processing multilevel secure test and evaluation information

    Science.gov (United States)

    Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa

    1994-07-01

    The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.

  1. A conceptual competitive intelligence quality assurance model

    Directory of Open Access Journals (Sweden)

    Tshilidzi Eric Nenzhelele

    2015-12-01

    Full Text Available Competitive Intelligence (CI improves the quality of product and service, decision-making and it improves quality of life. However, it has been established that decision makers are not happy about the quality of CI. This is because enterprises fail in quality assurance of CI. It has been concluded that most enterprises are clueless concerning CI quality assurance. Studies that previously attempted to resolve CI quality problem were limited in scope and focused too much on the quality of information than the overall CI quality. The purpose of this study is to propose a conceptual CI quality assurance model which will help in quality assurance of CI. The research was qualitative in nature and used content analysis.

  2. Quality assurance of radiopharmaceuticals

    International Nuclear Information System (INIS)

    Frier, M.; Hesslewood, S.R.

    1980-01-01

    A practical guide has been composed for all persons involved in the preparation and use of radiopharmaceuticals on methods used in quality assurance and their applications. These methods include the calibration of ionization chamber assay calibrators, the determination of radionuclide purity, radiochemical purity and chemical purity, particle size analysis and the measurement of pH. Quality assurance procedures are described for products not described in Compendial Monographs, or where the monograph exists, additional useful information is provided; such radiopharmaceuticals include technetium, indium-labelled and iodine-labelled products. (U.K.)

  3. 44 CFR 19.115 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 19.115 Assurance required. (a) General. Either at the... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Assurance required. 19.115 Section 19.115 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF...

  4. 22 CFR 146.115 - Assurance required.

    Science.gov (United States)

    2010-04-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 146.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  5. 49 CFR 25.115 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 25.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  6. 22 CFR 229.115 - Assurance required.

    Science.gov (United States)

    2010-04-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 229.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  7. 45 CFR 605.5 - Assurances required.

    Science.gov (United States)

    2010-10-01

    ... ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE General Provisions § 605.5 Assurances required. (a) Assurances. Recipients of Federal financial assistance to which... purpose for which Federal financial assistance is extended or for another purpose involving the provision...

  8. Security of radioactive sources and materials

    International Nuclear Information System (INIS)

    Rodriguez, C.; D'Amato, E.; Fernandez Moreno, S.

    1998-01-01

    The activities involving the use of radiation sources and radioactive materials are subject to the control of the national bodies dedicated to the nuclear regulation. The main objective of this control is to assure an appropriate level of radiological protection and nuclear safety. In Argentina, this function is carried out by the 'Nuclear Regulatory Authority' (ARN) whose regulatory system for radiation sources and radioactive materials comprises a registration, licensing and inspection scheme. The system is designed to keep track of such materials and to allow taking immediate corrective actions in case some incident occurs. Due to the appearance of a considerable number of illicit traffic events involving radiation sources and radioactive materials, the specialized national and international community has begun to evaluate the adoption of supplementary measures to those of 'safety' guided to its prevention and detection (i.e. 'security measures'). This paper presents a view on when the adoption of complementary 'security' measures to those of 'safety' would be advisable and which they would be. This will be done through the analysis of two hypothesis of illicit traffic, the first one with sources and radioactive materials considered as 'registered' and the second, with the same materials designated as 'not registered'. It will also describe succinctly the measures adopted by the ARN or under its analysis regarding the 'security' measures to sources and radioactive materials. (author)

  9. Quality assurance and demolition: 2006 symposium

    International Nuclear Information System (INIS)

    Thierfeldt, S.

    2006-01-01

    The '2006 Symposium: Quality Assurance and Demolition' jointly organized by compra GmbH and Brenk Systemplanung GmbH this year again focused on quality assurance and the demolition of nuclear facilities as its main topics. The papers presented ranged from issues of clearance and disposal to demolition technologies and status reports about specific demolition projects. The sixteen presentations at the '2006 Symposium: Quality Assurance and Demolition' offered an interesting and very topical cross section of decommissioning and demolition of nuclear facilities in Germany. In 2007, the conference about similar main topics will again be held at the Schloss Bensberg Grand Hotel. (orig.)

  10. SWiFT Software Quality Assurance Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Jonathan Charles [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-01

    This document describes the software development practice areas and processes which contribute to the ability of SWiFT software developers to provide quality software. These processes are designed to satisfy the requirements set forth by the Sandia Software Quality Assurance Program (SSQAP). APPROVALS SWiFT Software Quality Assurance Plan (SAND2016-0765) approved by: Department Manager SWiFT Site Lead Dave Minster (6121) Date Jonathan White (6121) Date SWiFT Controls Engineer Jonathan Berg (6121) Date CHANGE HISTORY Issue Date Originator(s) Description A 2016/01/27 Jon Berg (06121) Initial release of the SWiFT Software Quality Assurance Plan

  11. Software Quality Assurance activities of ITER CODAC

    Energy Technology Data Exchange (ETDEWEB)

    Pande, Sopan, E-mail: sopan.pande@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul Lez Durance (France); DiMaio, Franck; Kim, Changseung; Kim, Joohan; Klotz, Wolf-Dieter; Makijarvi, Petri; Stepanov, Denis; Wallander, Anders [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul Lez Durance (France)

    2013-10-15

    Highlights: ► Comprehensive and consistent software engineering and quality assurance of CODAC. ► Applicable to all CODAC software projects executed by ITER DAs and contractors. ► Configurable plans for cost effective application of SQA processes. ► CODAC software plans SQAP, SVVP, SDP, and SCMP. ► CODAC software processes based on IEEE 12207-2008. -- Abstract: Software as an integral part of the plant system I and C is crucial in the manufacturing and integrated operation of ITER plant systems. Software Quality Assurance is necessary to ensure the development and maintenance of consistently high quality I and C software throughout the lifetime of ITER. CODAC decided to follow IEEE 12207-2008 software lifecycle processes for Software Engineering and Software Quality Assurance. Software Development Plan, Software Configuration Management Plan and Software Verification and Validation Plan are the mainstay of Software Quality Assurance which is documented in the Software Quality Assurance Plan. This paper describes the Software Quality Assurance (SQA) activities performed by CODAC. The SQA includes development and maintenance of above plans, processes and resources. With the help of Verification and Validation Teams they gather evidence of process conformance and product conformance, and record process data for quality audits and perform process improvements.

  12. Software Quality Assurance activities of ITER CODAC

    International Nuclear Information System (INIS)

    Pande, Sopan; DiMaio, Franck; Kim, Changseung; Kim, Joohan; Klotz, Wolf-Dieter; Makijarvi, Petri; Stepanov, Denis; Wallander, Anders

    2013-01-01

    Highlights: ► Comprehensive and consistent software engineering and quality assurance of CODAC. ► Applicable to all CODAC software projects executed by ITER DAs and contractors. ► Configurable plans for cost effective application of SQA processes. ► CODAC software plans SQAP, SVVP, SDP, and SCMP. ► CODAC software processes based on IEEE 12207-2008. -- Abstract: Software as an integral part of the plant system I and C is crucial in the manufacturing and integrated operation of ITER plant systems. Software Quality Assurance is necessary to ensure the development and maintenance of consistently high quality I and C software throughout the lifetime of ITER. CODAC decided to follow IEEE 12207-2008 software lifecycle processes for Software Engineering and Software Quality Assurance. Software Development Plan, Software Configuration Management Plan and Software Verification and Validation Plan are the mainstay of Software Quality Assurance which is documented in the Software Quality Assurance Plan. This paper describes the Software Quality Assurance (SQA) activities performed by CODAC. The SQA includes development and maintenance of above plans, processes and resources. With the help of Verification and Validation Teams they gather evidence of process conformance and product conformance, and record process data for quality audits and perform process improvements

  13. A Call to IS Educators to Respond to the Voices of Women in Information Security

    Science.gov (United States)

    Woszczynski, Amy B.; Shade, Sherri

    2010-01-01

    Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed…

  14. SecMon: End-to-End Quality and Security Monitoring System

    OpenAIRE

    Ciszkowski, Tomasz; Eliasson, Charlott; Fiedler, Markus; Kotulski, Zbigniew; Lupu, Radu; Mazurczyk, Wojciech

    2008-01-01

    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable Q...

  15. A Security Level Classification Method for Power Systems under N-1 Contingency

    Directory of Open Access Journals (Sweden)

    Zhigang Lu

    2017-12-01

    Full Text Available Security assessment is crucial for the reliable and secure operation of power systems. This paper proposes a security level classification (SLC method to analyze the security level of power systems both qualitatively and quantitatively. In this SLC method, security levels are graded according to a comprehensive safety index (CSI, which is defined by integrating the system margin index (SMI and load entropy. The SMI depends on the operating load and the total supply capacity (TSC under N-1 contingency, and the load entropy reflects the heterogeneity of load distribution calculated from entropy theory. In order to calculate the TSC under N-1 contingency considering both of the computational accuracy and speed, the TSC is converted into an extended conic quadratic programming (ECQP model. In addition, the load boundary vector (LBV model is established to obtain the capacity limit of each load bus, and thus detect potential risks of power systems. Finally, two modified practical power systems and the IEEE 118-bus test system are studied to validate the feasibility of the proposed SLC method.

  16. Quality assurance - how to involve the employees

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard

    1996-01-01

    An overview of strategies for involvement of employees in quality assurance developement and implementation.......An overview of strategies for involvement of employees in quality assurance developement and implementation....

  17. Quality assurance and nuclear power plant safety

    International Nuclear Information System (INIS)

    Mullan, J.V.

    1983-01-01

    Quality assurance in the nuclear industry was born in the late 1960s. Atomic Energy Control Board staff began its regulatory practice on quality assurance during that period. In this presentation the author traces the circumstances that first led to the establishment of Canadian nuclear power plant quality assurance programmes, summarizes progress over the last decade and a half, and outlines the current regulatory approach and what has been learned so far

  18. Detection of the Security Vulnerabilities in Web Applications

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an iterative process and their quality is the result of the lifecycle activities. The audit and evaluation processes are required by the increased complexity of the business processes supported by IT&C technologies. In order to organize and develop a high-quality audit process, the evaluation team must analyze the risks, threats and vulnerabilities of the information system. The paper highlights the security vulnerabilities in web applications and the processes of their detection. The web applications are used as IT&C tools to support the distributed information processes. They are a major component of the distributed information systems. The audit and evaluation processes are carried out in accordance with the international standards developed for information system security assurance.

  19. A quality assurance initiative for commercial-scale production in high-throughput cryopreservation of blue catfish sperm.

    Science.gov (United States)

    Hu, E; Liao, T W; Tiersch, T R

    2013-10-01

    Cryopreservation of fish sperm has been studied for decades at a laboratory (research) scale. However, high-throughput cryopreservation of fish sperm has recently been developed to enable industrial-scale production. This study treated blue catfish (Ictalurus furcatus) sperm high-throughput cryopreservation as a manufacturing production line and initiated quality assurance plan development. The main objectives were to identify: (1) the main production quality characteristics; (2) the process features for quality assurance; (3) the internal quality characteristics and their specification designs; (4) the quality control and process capability evaluation methods, and (5) the directions for further improvements and applications. The essential product quality characteristics were identified as fertility-related characteristics. Specification design which established the tolerance levels according to demand and process constraints was performed based on these quality characteristics. Meanwhile, to ensure integrity throughout the process, internal quality characteristics (characteristics at each quality control point within process) that could affect fertility-related quality characteristics were defined with specifications. Due to the process feature of 100% inspection (quality inspection of every fish), a specific calculation method, use of cumulative sum (CUSUM) control charts, was applied to monitor each quality characteristic. An index of overall process evaluation, process capacity, was analyzed based on in-control process and the designed specifications, which further integrates the quality assurance plan. With the established quality assurance plan, the process could operate stably and quality of products would be reliable. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    Science.gov (United States)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy

  1. Quality assurance for health and environmental chemistry: 1989

    International Nuclear Information System (INIS)

    Gautier, M.A.; Gladney, E.S.; Koski, N.L.; Jones, E.A.; Phillips, M.B.; O'Malley, B.T.

    1990-12-01

    This report documents the continuing quality assurance efforts of the Health and Environmental Chemistry Group (HSE-9) at the Los Alamos National Laboratory. The philosophy, methodology, computing resources, and laboratory information management system used by the quality assurance program to encompass the diversity of analytical chemistry practiced in the group are described. Included in the report are all quality assurance reference materials used, along with their certified or consensus concentrations, and all analytical chemistry quality assurance measurements made by HSE-9 during 1989. 38 refs., 8 figs., 3 tabs

  2. Decree of the Czechoslovak Atomic Energy Commission concerning the security protection of nuclear installations and nuclear materials

    International Nuclear Information System (INIS)

    1989-01-01

    In compliance with the Czechoslovak State Surveillance over Nuclear Safety of Nuclear Installations Act No. 28/1984, the Decree specifies requirements for assuring security protection of nuclear installations (and their parts) and of nuclear materials with the aim to prevent their abuse for jeopardizing the environment and the health and lives of people. (P.A.)

  3. [The concept and measurement of food security].

    Science.gov (United States)

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  4. 30 CFR 7.7 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 7.7 Section 7.7 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR TESTING, EVALUATION, AND APPROVAL OF MINING PRODUCTS TESTING BY APPLICANT OR THIRD PARTY General § 7.7 Quality assurance. Applicants granted...

  5. Quality assurance for image-guided radiotherapy

    International Nuclear Information System (INIS)

    Marinello, Ginette

    2008-01-01

    The topics discussed include, among others, the following: Quality assurance program; Image guided radiotherapy; Commissioning and quality assurance; Check of agreement between visual and displayed scales; quality controls: electronic portal imaging device (EPID), MV-kV and kV-kV, cone-beam CT (CBCT), patient doses. (P.A.)

  6. 22 CFR 141.4 - Assurances required.

    Science.gov (United States)

    2010-04-01

    ... of the United States for the desegregation of such school or school system, and provides an assurance... other participants. Any such assurance shall include provisions which give the United States a right to... system which the responsible official of the Department of Health, Education, and Welfare determines is...

  7. Quality assurance in nuclear power plant

    International Nuclear Information System (INIS)

    Magalhaes, M.T. de

    1981-01-01

    The factors related to the licensing procedures of a nuclear power plant (quality assurance and safety analysis) are presented and discussed. The consequences of inadequate attitudes towards these factors are shown and suggestions to assure the safety of nuclear power plants in Brazil are presented. (E.G.) [pt

  8. Quality Assurance in Higher Education: Proposals for Consultation.

    Science.gov (United States)

    Higher Education Funding Council for England, Bristol.

    This document sets out for consultation proposals for a revised method for quality assurance of teaching and learning in higher education. The proposals cover: (1) the objectives and principles of quality assurance; (2) an approach to quality assurance based on external audit principles; (3) the collection and publication of information; (4)…

  9. Customers’ Perception regarding Assurance of Bancassurance Channel

    Directory of Open Access Journals (Sweden)

    Choudhury Mousumi

    2016-12-01

    Full Text Available Bancassurance has evolved as a strong distribution channel in India. Bancassurance means that the insurance company and the bank come together to offer insurance products from the counter of the banks to the bank’s customer. The present study attempts to analyse customers’ perception regarding assurance of bancassurance channel in providing insurance-related services. The study also tries to find out the impact of various demographic variables on customers’ perception regarding assurance of bancassurance channel. The study finds that customers consider bancassurance channel having high assurance in providing insurance services. It is also found in the study that there is no significant association between the demographic variables considered in the study and customers’ perception regarding assurance of bancassurance channel.

  10. Quality assurance program plan for radionuclide airborne emissions monitoring

    International Nuclear Information System (INIS)

    Boom, R.J.

    1995-03-01

    This Quality Assurance Program Plan identifies quality assurance program requirements and addresses the various Westinghouse Hanford Company organizations and their particular responsibilities in regards to sample and data handling of airborne emissions. The Hanford Site radioactive airborne emissions requirements are defined in National Emissions Standards for Hazardous Air Pollutants (NESHAP), Code of Federal Regulations, Title 40, Part 61, Subpart H (EPA 1991a). Reporting of the emissions to the US Department of Energy is performed in compliance with requirements of US Department of Energy, Richland Operations Office Order 5400.1, General Environmental Protection Program (DOE-RL 1988). This Quality Assurance Program Plan is prepared in accordance with and to the requirements of QAMS-004/80, Guidelines and Specifications for Preparing Quality Assurance Program Plans (EPA 1983). Title 40 CFR Part 61, Appendix B, Method 114, Quality Assurance Methods (EPA 1991b) specifies the quality assurance requirements and that a program plan should be prepared to meet the requirements of this regulation. This Quality Assurance Program Plan identifies NESHAP responsibilities and how the Westinghouse Hanford Company Environmental, Safety, Health, and Quality Assurance Division will verify that the methods are properly implemented

  11. New Paradigm in Nuclear Safety from Quality Assurance to Safety Management System

    International Nuclear Information System (INIS)

    Lim, Nam-Jin; Park, Chan-Gook; Nam, Ji-Hee; Kim, Kwan-Hyun; Kwon, Hyuk-il; Lee, Young-Gun Lee

    2006-01-01

    The initial concept of Quality Control (QC) controlling the quality of products is now evolving toward the Management System (MS) achieving safety, through Quality Assurance (QA) ensuring the quality of products and Quality Management (QM) managing the quality by a systematic approach. Nuclear safety can be achieved through an integrated MS that ensures the health, environmental, security, quality and economic requirements being considered together with nuclear safety requirements. MS approach is developed through realizing that most of nuclear accidents had occurred not by the malfunction of hardware or equipment, but by the human error. The MS is a set of inter-related or interacting elements (system) that establishes policies and objectives and which enables those objectives to be achieved in an efficient and effective way

  12. National Program of Quality Assurance in Radiotherapy in Cuba

    International Nuclear Information System (INIS)

    Alonso Samper, J. L.; Dominguez Hung, L.; Morales Lopez, J. L.; Alfonso Laguardia, R.; Garcia Yip, F.

    2001-01-01

    It tries on the establishment of a Quality Assurance Nacional System, a Quality Assurance Committee implemented in Cuba, and a Quality Auditory National Program implemented in Cuba to control and assure radiotherapy quality

  13. Quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Gillespie, B.M.; Gleckler, B.P.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results.

  14. Quality assurance

    International Nuclear Information System (INIS)

    Gillespie, B.M.; Gleckler, B.P.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results

  15. A Quality Assurance Program for decommissioning

    International Nuclear Information System (INIS)

    Briggs, P.M.

    1986-01-01

    Defining the Quality Assurance Program for the US Department of Energy Shippingport Station Decommissioning Project (SSDP) was a unique opportunity because this is the first full-sized commercial nuclear power plant to be decommissioned. General Electric Company defined a Quality Assurance Program that provided adequate control, yet was stripped down to the essentials. The Program is designed to provide a flexible degree of monitoring of subcontractor work, built around a core of radiation safety monitoring, detailed planning, inspection and auditing, and operated with a minimum of dedicated personnel. This paper will concentrate on the traditional quality assurance activities, leaving radiation and environmental monitoring for other presentations

  16. Assuring quality in high-consequence engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, Marcey L.; Kolb, Rachel R.

    2014-03-01

    In high-consequence engineering organizations, such as Sandia, quality assurance may be heavily dependent on staff competency. Competency-dependent quality assurance models are at risk when the environment changes, as it has with increasing attrition rates, budget and schedule cuts, and competing program priorities. Risks in Sandia's competency-dependent culture can be mitigated through changes to hiring, training, and customer engagement approaches to manage people, partners, and products. Sandia's technical quality engineering organization has been able to mitigate corporate-level risks by driving changes that benefit all departments, and in doing so has assured Sandia's commitment to excellence in high-consequence engineering and national service.

  17. Patient-related quality assurance with different combinations of treatment planning systems, techniques, and machines. A multi-institutional survey

    Energy Technology Data Exchange (ETDEWEB)

    Steiniger, Beatrice; Schwedas, Michael; Weibert, Kirsten; Wiezorek, Tilo [University Hospital Jena, Department of Radiation Oncology, Jena (Germany); Berger, Rene [SRH Hospital Gera, Department of Radiation Oncology, Gera (Germany); Eilzer, Sabine [Martin-Luther-Hospital, Radiation Therapy, Berlin (Germany); Kornhuber, Christine [University Hospital Halle, Department of Radiation Oncology, Halle (Saale) (Germany); Lorenz, Kathleen [Hospital of Chemnitz, Department for Radiation Oncology, Chemnitz (Germany); Peil, Torsten [MVZ Center for Radiation Oncology Halle GmbH, Halle (Saale) (Germany); Reiffenstuhl, Carsten [University Hospital Carl Gustav Carus, Department of Radiation Oncology, Dresden (Germany); Schilz, Johannes [Helios Hospital Erfurt, Department of Radiation Oncology, Erfurt (Germany); Schroeder, Dirk [SRH Central Hospital Suhl, Department of Radiation Oncology, Suhl (Germany); Pensold, Stephanie [Community Hospital Dresden-Friedrichstadt, Department of Radiation Oncology, Dresden (Germany); Walke, Mathias [Otto-von-Guericke University Magdeburg, Department of Radiation Oncology, Magdeburg (Germany); Wolf, Ulrich [University Hospital Leipzig, Department of Radiation Oncology, Leipzig (Germany)

    2017-01-15

    This project compares the different patient-related quality assurance systems for intensity-modulated radiation therapy (IMRT) and volumetric-modulated arc therapy (VMAT) techniques currently used in the central Germany area with an independent measuring system. The participating institutions generated 21 treatment plans with different combinations of treatment planning systems (TPS) and linear accelerators (LINAC) for the QUASIMODO (Quality ASsurance of Intensity MODulated radiation Oncology) patient model. The plans were exposed to the ArcCHECK measuring system (Sun Nuclear Corporation, Melbourne, FL, USA). The dose distributions were analyzed using the corresponding software and a point dose measured at the isocenter with an ionization chamber. According to the generally used criteria of a 10 % threshold, 3 % difference, and 3 mm distance, the majority of plans investigated showed a gamma index exceeding 95 %. Only one plan did not fulfill the criteria and three of the plans did not comply with the commonly accepted tolerance level of ±3 % in point dose measurement. Using only one of the two examined methods for patient-related quality assurance is not sufficiently significant in all cases. (orig.) [German] Im Rahmen des Projekts sollten die verschiedenen derzeit im mitteldeutschen Raum eingesetzten patientenbezogenen Qualitaetssicherungssysteme zur intensitaetsmodulierten Radiotherapie (IMRT) und volumenmodulierten Arc-Radiotherapie (VMAT) mit einem unabhaengigen Messsystem verglichen werden. Die teilnehmenden Einrichtungen berechneten insgesamt 21 Bestrahlungsplaene mit verschiedenen Planungssystemen (TPS) und Linearbeschleunigern (LINAC) fuer das Patientenmodell QUASIMODO (Quality ASsurance of Intensity MODulated radiation Oncology), die dann auf das ArcCHECK-Phantom (Sun Nuclear Corporation, Melbourne, FL, USA) uebertragen und abgestrahlt wurden. Zur Auswertung wurde sowohl eine Punktmessung im Isozentrum als auch die Dosisverteilung in der Diodenebene des

  18. Multi-perspective analysis of China's energy supply security

    International Nuclear Information System (INIS)

    Geng, Jiang-Bo; Ji, Qiang

    2014-01-01

    China's energy supply security has faced many challenges such as the drastic change of the international energy environment and the domestic energy situation and so on. This paper constructs a multi-dimensional indicator system for the main risks deriving from four aspects to evaluate the situation of China's energy supply security and analyze its evolution characteristics from 1994 to 2011. The results indicate that the situation of China's energy supply security generally presented a downtrend during 1994–2008, as a result of increasing international energy market monopoly and high volatility of international crude oil prices. After 2008, the overall level of China's energy supply security has improved to the level of 2003, which is attributed to the relatively stable international energy environment as well as the effective implementation of energy policies. - Highlights: • A multi-dimensional index system for energy supply security is constructed. • The dynamic influences of external and internal risks are analyzed. • China's energy supply security presents a downward trend during 1994–2008. • The level of China's energy supply security has improved since 2009

  19. 30 CFR 15.8 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 15.8 Section 15.8 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR TESTING, EVALUATION, AND APPROVAL OF... § 15.8 Quality assurance. (a) Applicants granted an approval or an extension of approval under this...

  20. 40 CFR 194.22 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... General Requirements § 194.22 Quality assurance. (a)(1) As soon as practicable after April 9, 1996, the Department shall adhere to a quality assurance program that implements the requirements of ASME NQA-1-1989... elicitation used to support applications for certification or re-certification of compliance; (vi) Design of...

  1. Quality Assurance in Sub-Saharan Africa

    Science.gov (United States)

    Materu, Peter; Righetti, Petra

    2010-01-01

    This article assesses the status and practice of higher education quality assurance in sub-Saharan Africa, focusing on degree-granting tertiary institutions. A main finding is that structured national-level quality assurance processes in African higher education are a very recent phenomenon and that most countries face major capacity constraints.…

  2. Grading of quality assurance requirements

    International Nuclear Information System (INIS)

    1991-01-01

    The present Manual provides guidance and illustrative examples for applying a method by which graded quality assurance requirements may be determined and adapted to the items and services of a nuclear power plant in conformance with the requirements of the IAEA Nuclear Safety Standards (NUSS) Code and Safety Guides on quality assurance. The Manual replaces the previous publication IAEA-TECDOC-303 on the same subject. Various methods of grading quality assurance are available in a number of Member States. During the development of the present Manual it was not considered practical to attempt to resolve the differences between those methods and it was preferred to identify and benefit from the good practices available in all the methods. The method presented in this Manual deals with the aspects of management, documentation, control, verification and administration which affect quality. 1 fig., 4 tabs

  3. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  4. 78 FR 79519 - IndexIQ ETF Trust, et al.; Notice of Application

    Science.gov (United States)

    2013-12-30

    ... ETF Trust, et al.; Notice of Application December 23, 2013. AGENCY: Securities and Exchange Commission... instruments. Applicants: IndexIQ ETF Trust, IndexIQ Active ETF Trust (each, a ``Trust,'' and collectively, the..., to operate as exchange-traded funds (collectively, ``ETFs'' and each, an ``ETF''). In addition...

  5. Irradiation applications for homeland security

    International Nuclear Information System (INIS)

    Desrosiers, Marc F.

    2004-01-01

    In October 2001, first-class mail laced with anthrax was sent to political and media targets resulting in several deaths, illnesses, significant mail-service disruption, and economic loss. The White House Office of Science and Technology Policy established a technical task force on mail decontamination that included three key agencies: National Institute of Standards and Technology with responsibility for radiation dosimetry and coordinating and performing experiments at industrial accelerator facilities; the Armed Forces Radiobiology Research Institute with responsibility for radiobiology; and the US Postal Service with responsibility for radiation-processing quality assurance and quality control. An overview of the anthrax attack decontamination events will be presented as well as expectations for growth in this area and the prospects of other homeland security areas where irradiation technology can be applied

  6. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  7. Application of Quality Assurance to MCandA systems

    International Nuclear Information System (INIS)

    Skinner, A.J.; Delvin, W.L.

    1986-01-01

    Quality Assurance has been applied to the MCandA function within the Department of Energy's Savannah River Operations Office. It was applied to both the activities used to operate the MCandA Branch and the activities used by the Branch to overview the MCandA function of DOE/SR's contractor. In this paper, the principles of quality assurance are reviewed and their application at DOE/SR is discussed. In addition, quality assurance can be applied to the broader MCandA functions required of those facilities producing, using, and handling nuclear materials. Application of quality assurance to those broader functions is also discussed

  8. Quality assurance program plan fuel supply shutdown project

    International Nuclear Information System (INIS)

    Metcalf, I.L.

    1998-01-01

    This Quality Assurance Program plan (QAPP) describes how the Fuel Supply Shutdown (FSS) project organization implements the quality assurance requirements of HNF-MP-599, Project Hanford Quality Assurance Program Description (QAPD) and the B and W Hanford Company Quality Assurance Program Plan (QAPP), FSP-MP-004. The QAPP applies to facility structures, systems, and components and to activities (e.g., design, procurement, testing, operations, maintenance, etc.) that could affect structures, systems, and components. This QAPP also provides a roadmap of applicable Project Hanford Policies and Procedures (PHPP) which may be utilized by the FSS project organization to implement the requirements of this QAPP

  9. Security Assessment Simulation Toolkit (SAST) Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  10. Defining Baconian Probability for Use in Assurance Argumentation

    Science.gov (United States)

    Graydon, Patrick J.

    2016-01-01

    The use of assurance cases (e.g., safety cases) in certification raises questions about confidence in assurance argument claims. Some researchers propose to assess confidence in assurance cases using Baconian induction. That is, a writer or analyst (1) identifies defeaters that might rebut or undermine each proposition in the assurance argument and (2) determines whether each defeater can be dismissed or ignored and why. Some researchers also propose denoting confidence using the counts of defeaters identified and eliminated-which they call Baconian probability-and performing arithmetic on these measures. But Baconian probabilities were first defined as ordinal rankings which cannot be manipulated arithmetically. In this paper, we recount noteworthy definitions of Baconian induction, review proposals to assess confidence in assurance claims using Baconian probability, analyze how these comport with or diverge from the original definition, and make recommendations for future practice.

  11. Laboratory Information Management System Chain of Custody: Reliability and Security

    Science.gov (United States)

    Tomlinson, J. J.; Elliott-Smith, W.; Radosta, T.

    2006-01-01

    A chain of custody (COC) is required in many laboratories that handle forensics, drugs of abuse, environmental, clinical, and DNA testing, as well as other laboratories that want to assure reliability of reported results. Maintaining a dependable COC can be laborious, but with the recent establishment of the criteria for electronic records and signatures by US regulatory agencies, laboratory information management systems (LIMSs) are now being developed to fully automate COCs. The extent of automation and of data reliability can vary, and FDA- and EPA-compliant electronic signatures and system security are rare. PMID:17671623

  12. Nutrition security under extreme events

    Science.gov (United States)

    Martinez, A.

    2017-12-01

    Nutrition security under extreme events. Zero hunger being one of the Sustainable Development Goal from the United Nations, food security has become a trending research topic. However extreme events impact on global food security is not yet 100% understood and there is a lack of comprehension of the underlying mechanisms of global food trade and nutrition security to improve countries resilience to extreme events. In a globalized world, food is still a highly regulated commodity and a strategic resource. A drought happening in a net food-exporter will have little to no effect on its own population but the repercussion on net food-importers can be extreme. In this project, we propose a methodology to describe and quantify the impact of a local drought to human health at a global scale. For this purpose, nutrition supply and global trade data from FAOSTAT have been used with domestic food production from national agencies and FAOSTAT, global precipitation from the Climate Research Unit and health data from the World Health Organization. A modified Herfindahl-Hirschman Index (HHI) has been developed to measure the level of resilience of one country to a drought happening in another country. This index describes how a country is dependent of importation and how diverse are its importation. Losses of production and exportation due to extreme events have been calculated using yield data and a simple food balance at country scale. Results show that countries the most affected by global droughts are the one with the highest dependency to one exporting country. Changes induced by droughts also disturbed their domestic proteins, fat and calories supply resulting most of the time in a higher intake of calories or fat over proteins.

  13. Quality Assurance: Strategic Choices for Higher Education in Turkey

    Directory of Open Access Journals (Sweden)

    Mahmut ÖZER

    2011-01-01

    Full Text Available As the number of students and higher education institutions in the world increases and there is a growing difficulty in financing the higher education systems, decision-makers have begun to show more interest in quality assurance. As quality assurance is given special attention in European countries, developing countries such as Turkey are interested in importing quality assurance systems. It is not possible to set quality assurance without sensitivity toward quality and without having quality as a cultural practice. The most likely encountered quality assurance approach in the world is that the higher education institution itself is responsible for its quality. In addition, external quality assurance procedures used are based on (academic peer review rather than on bureaucratic evaluations. Moreover, there is a lively debate across the world regarding the bureaucratic regulations of the quality assurance agencies and institutions that restrict the autonomy of higher education institutions. Without taking into consideration of the existing centralized structure of the higher education system in Turkey, of meeting social demands for the higher education, and of current higher education enrollment rates, the possible establishment of a quality assurance mechanism that may have sanctions on universities in Turkey is a threat to already limited autonomy of universities and is having a risk of additional bureaucratic burden. By laying out the roles and responsibilities of Turkish Council of Higher Education, the government and universities, this article discusses policies that should be adopted regarding the quality assurance.

  14. 78 FR 79511 - IndexIQ ETF Trust, et al.; Notice of Application

    Science.gov (United States)

    2013-12-30

    ..., to effect changes in the Fund's portfolio as a result of the rebalancing of its Underlying Index (any... (``Portfolio Securities'').\\4\\ Except with respect to Affiliated Index Funds (defined below), no entity that... Redemption Instruments will be identical, unless the Fund is Rebalancing (as defined below). In addition, the...

  15. Quality assurance requirements in various codes and standards

    International Nuclear Information System (INIS)

    Shaaban, H.I.; EL-Sayed, A.; Aly, A.E.

    1987-01-01

    The quality assurance requirements in various countries and according to various international codes and standards are presented, compared and critically discussed. Cases of developing countries are also discussed, and the use of IAEA code of practice and other codes for quality assurance in these countries is reviewed. Recommendations are made regarding the quality assurance system to be applied for Egypt's nuclear power plants

  16. Quality assurance applied to an environmental surveillance program

    International Nuclear Information System (INIS)

    Oakes, T.W.; Shank, K.E.; Eldridge, J.S.

    1977-01-01

    A discussion of a quality assurance program applied to environmental surveillance activities is presented. This includes the philosophy and concepts of quality assurance, along with a detailed assessment of the sources of uncertainty in a monitoring program. The role management must play for a successful program is also discussed, and the quality assurance program implemented at Oak Ridge National Laboratory is presented

  17. Quality assurance organization of the plant owner

    International Nuclear Information System (INIS)

    Staebler, K.

    1980-01-01

    It is not the primary task of the plant owner to assure the quality during erection. It is, however, his responsibility to check the quality assurance system established by the plant, the supplier and the subcontractor. In the lecture, it is shown that the plant owners do this control in the best efficient way. The special consideration of the plant owner in deciding questions of quality assurance is demonstrated by special examples. The meaning of basic safety for the plant owner is presented. (orig./RW)

  18. Quality management and quality assurance contracts

    International Nuclear Information System (INIS)

    Teichler, M.

    1991-01-01

    Quality assurance contracts belong to the most important instruments of quality management systems. As a result of such contracts, quality control is to be done not only by the buyer, but is made a task to be fulfilled by the manufacturer. The author of the article shows that quality assurance contracts do change the contractual relationship between supplier and buyer, but have no effect on economic and practical conditions. This is so because quality assurance contracts apply only to warranty claims, which play a subordinate role in the legal relationship between producer and buyer, or producer and consumer, as compared to the claims for damages arising out of the contracts. (orig.) [de

  19. Quality Assurance in the European Higher Education Area: The Emergence of a German Market for Quality Assurance Agencies

    Science.gov (United States)

    Serrano-Velarde, Kathia E.

    2008-01-01

    Most European countries have introduced systematic quality assurance as part of an overall governance reform aimed at enhancing universities' autonomy. Researchers and economic entrepreneurs tend, however, to underestimate the political dimension of accreditation and evaluation when they consider the contribution of quality assurance to the…

  20. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    2003-03-01

    Good radiotherapy results and safety of treatment require the radiation to be optimally applied to a specified target area and the correct dose. According to international recommendations, the average uncertainty in therapeutic dose should not exceed 5%. The need for high precision in therapeutic dose requires quality assurance covering the entire radiotherapy process. Besides the physical and technical characteristics of the therapy equipment, quality assurance must include all radiotherapy equipment and procedures that are significant for the correct magnitude and precision of application of the therapeutic dose. The duties and responsibilities pertaining to various stages of treatment must also be precisely defined. These requirements may be best implemented through a quality system. The general requirements for supervision and quality assurance of medical radiation apparatus are prescribed in section 40 of the Radiation Act (592/1991, amendment 1142/1998) and in sections 18 and 32 of the Decree of the Ministry of Social Affairs and Health on the medical use of radiation (423/2000). Guide ST 2.2 imposes requirements on structural radiation shielding of radiotherapy equipment and the premises in which it is used, and on warning and safety arrangements. Guide ST 1.1 sets out the general safety principles for radiation practices and regulatory control procedure for the use of radiation. Guide ST 1.6 provides general requirements for operational measures in the use of radiation. This Guide sets out the duties of responsible parties (the party running a radiation practice) in respect of arranging and maintaining radiotherapy quality assurance. The principles set out in this Guide and Guide ST 6.3 may be applied to radionuclide therapy

  1. Quality Assurance in Chinese Higher Education

    Science.gov (United States)

    Li, Yuan

    2010-01-01

    Quality assurance has been integrated into the fabric of higher education in China, with the issue of quality in higher education--how to evaluate it and how to enhance it--now taking centre stage in Chinese higher education. In the past decade, the development of quality assurance in Chinese higher education has covered a broad spectrum of…

  2. Hungary Higher Education Quality Assurance System

    Directory of Open Access Journals (Sweden)

    Che Ru-shan

    2013-07-01

    Full Text Available Higher education quality assurance system has drawn much attention since 1980s. Most countries are committed to build the higher education quality assurance system to meet international standards. Under such an international trend, Hungary also actively promotes higher education reform, and established Hungarian Accreditation Committee and in order to ensure the quality of higher education.

  3. Commissioning quality assurance at Pickering NGS

    International Nuclear Information System (INIS)

    Wieckowski, J.T.

    1983-05-01

    Ontario Hydro decided in 1978 to implement a formal quality assurance program applicable to commissioning and operation of nuclear generating stations. Pickering NGS is the first station to have the commissioning quality assurance (CQA) program applied to it. This paper outlines the scope, implementation, and evaluation of the CQA program as applied to Pickering Unit 5

  4. Nevada Nuclear Waste Storage Investigations: Quality Assurance Plan

    International Nuclear Information System (INIS)

    1980-08-01

    The Nevada Nuclear Waste Storage Investigations (NNWSI) were established by DOE/NV to evaluate the geohydrologic setting and underground rock masses of the Nevada Test Site (NTS) and contiguous areas to determine whether a suitable site exists for constructing a repository for isolating highly radioactive solid wastes. Since the results of these evaluations will impact possible risks to public health and safety, a quality assurance program which conforms to the criteria given in the Code of Federal Regulations is needed to control the quality aspects of the work. This Quality Assurance Plan (QAP) describes the general quality assurance program for the overall NNWSI project under which the quality assurance programs of the individual participating organizations and support contractors are to operate. The details of how each of these groups will meet the criteria will differ among participating organizations and support contractors, and those details are given in the QAPP's listed in Appendix A. It is the purpose of this plan to show the commonality of quality assurance programs in effect within the project and to define how each element fits into the entire picture to give total quality assurance coverage for the NNWSI Project

  5. 10 CFR 71.103 - Quality assurance organization.

    Science.gov (United States)

    2010-01-01

    ... location or locations where activities are performed, the organizational structure for executing the... the organizational structure, the individual(s) assigned the responsibility for assuring effective... performing quality assurance functions must have sufficient authority and organizational freedom to— (1...

  6. Manpower requirements for quality assurance during operation

    International Nuclear Information System (INIS)

    Pratt, J.M.; Sollenberger, L.G.

    1982-01-01

    As a result of the Three Mile Island accident and the findings presented in various investigatory reports, some fundamental changes are taking place in the role and scope of quality assurance. Recent changes to United States national codes, guides and standards are analysed in order to identify the principles involved. This analysis shows that the scope of the programme is being extended beyond the equipment designated 'nuclear safety related' and greater emphasis is being placed upon the independent verification of the satisfactory performance of activities affecting safety. Such fundamental changes could lead to a significant increase in the number of quality assurance personnel required to support an operating nuclear power plant. The evolving quality assurance organization at Three Mile Island is used to illustrate how these fundamental changes could affect the quality assurance organization and manpower requirements. (author)

  7. [Quality assurance in interventional cardiology].

    Science.gov (United States)

    Gülker, H

    2009-10-01

    Quality assurance in clinical studies aiming at approval of pharmaceutical products is submitted to strict rules, controls and auditing regulations. Comparative instruments to ensure quality in diagnostic and therapeutic procedures are not available in interventional cardiology, likewise in other fields of cardiovascular medicine. Quality assurance simply consists of "quality registers" with basic data not externally controlled. Based on the experiences of clinical studies and their long history of standardization it is assumed that these data may be severely flawed thus being inappropriate to set standards for diagnostic and therapeutic strategies. The precondition for quality assurance are quality data. In invasive coronary angiography and intervention medical indications, the decision making process interventional versus surgical revascularization, technical performance and after - care are essential aspects affecting quality of diagnostics and therapy. Quality data are externally controlled data. To collect quality data an appropriate infrastructure is a necessary precondition which is not existent. For an appropriate infrastructure investments have to be done both to build up as well as to sustain the necessary preconditions. As long as there are no infrastructure and no investments there will be no "quality data". There exist simply registers of data which are not proved to be a basis for significant assurance and enhancement in quality in interventional coronary cardiology. Georg Thieme Verlag KG Stuttgart, New York.

  8. Quality assurance in Hanford site defense waste operations

    International Nuclear Information System (INIS)

    Wojtasek, R.D.

    1989-01-01

    This paper discusses quality assurance as an integral part of conducting waste management operations. The storage, treatment, and disposal of radioactive and non- radioactive hazardous wastes at Hanford are described. The author reports that quality assurance programs provide confidence that storage, treatment, and disposal facilities and systems perform as intended. Examples of how quality assurance is applied to Hanford defense waste operations are presented

  9. Guidelines for comprehensive quality assurance in brachytherapy

    International Nuclear Information System (INIS)

    Goldson, A.L.; Nibhanupudy, J.R.

    1984-01-01

    Brachytherapy treatment techniques can provide significant improvement in local control and overall survival, but only when quality assurance can be guaranteed. To establish brachytherapy quality assurance, basic requirements for three predetermined subdivisions of clinical institutions will be forwarded. These are: (1) centers having minimum requirements to provide brachytherapy, (2) intermediate centers such as regional or community hospitals, and (3) optimal centers such as university hospital and cancer centers. This presentation will highlight personnel needs, equipment requirements, academic activities, clinical experience with these systems and proposed quality assurance guidelines

  10. Commissioning quality assurance for nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1986-09-01

    This standard contains the requirements for the quality assurance program applicable to the commissioning phase of a nuclear power plant. This standard embodies the relevant quality assurance requirements of CSA Standard CAN3-N286.0, and is the governing Standard for commissioning quality assurance activities in the event of any conflicting requirements. This Standard applies to the commissioning of safety-related equipment, systems, and structures as identified by the owner. It may be applied to other equipment, systems, and structures at the discretion of the owner. 1 fig.

  11. Tritium systems test assembly quality assurance program

    International Nuclear Information System (INIS)

    Kerstiens, F.L.; Wilhelm, R.C.

    1986-07-01

    A quality assurance program should establish the planned and systematic actions necessary to provide adequate confidence that fusion facilities and their subsystems will perform satisfactorily in service. The Tritium Systems Test Assembly (TSTA) Quality Assurance Program has been designed to assure that the designs, tests, data, and interpretive reports developed at TSTA are valid, accurate, and consistent with formally specified procedures and reviews. The quality consideration in all TSTA activities is directed toward the early detection of quality problems, coupled with timely and positive disposition and corrective action

  12. Commissioning quality assurance for nuclear power plants

    International Nuclear Information System (INIS)

    1986-09-01

    This standard contains the requirements for the quality assurance program applicable to the commissioning phase of a nuclear power plant. This standard embodies the relevant quality assurance requirements of CSA Standard CAN3-N286.0, and is the governing Standard for commissioning quality assurance activities in the event of any conflicting requirements. This Standard applies to the commissioning of safety-related equipment, systems, and structures as identified by the owner. It may be applied to other equipment, systems, and structures at the discretion of the owner. 1 fig

  13. Characteristics quality system assurance of university programs

    Directory of Open Access Journals (Sweden)

    Lucian Ion Medar

    2011-03-01

    Full Text Available Quality assurance program of study requires time, dedication, effort, innovative thinking and creativity. Competitive research programs monitored by quality assurance system to create the desired results on the relationship between learning and teaching methods and assessment.

  14. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  15. [Simulation of urban ecological security pattern based on cellular automata: a case of Dongguan City, Guangdong Province of South China].

    Science.gov (United States)

    Yang, Qing-Sheng; Qiao, Ji-Gang; Ai, Bin

    2013-09-01

    Taking the Dongguan City with rapid urbanization as a case, and selecting landscape ecological security level as evaluation criterion, the urbanization cellular number of 1 km x 1 km ecological security cells was obtained, and imbedded into the transition rules of cellular automata (CA) as the restraint term to control urban development, establish ecological security urban CA, and simulate ecological security urban development pattern. The results showed the integrated landscape ecological security index of the City decreased from 0.497 in 1998 to 0.395 in 2005, indicating that the ecological security at landscape scale was decreased. The CA-simulated integrated ecological security index of the City in 2005 was increased from the measured 0.395 to 0.479, showing that the simulated urban landscape ecological pressure from human became lesser, ecological security became better, and integrated landscape ecological security became higher. CA could be used as an effective tool in researching urban ecological security.

  16. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  17. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  18. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  19. 10 CFR 61.63 - Financial assurances for institutional controls.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Financial assurances for institutional controls. 61.63... RADIOACTIVE WASTE Financial Assurances § 61.63 Financial assurances for institutional controls. (a) Prior to... the Commission to ensure that changes in inflation, technology and disposal facility operations are...

  20. Quality assurance program plan for radionuclide airborne emissions monitoring

    International Nuclear Information System (INIS)

    Boom, R.J.

    1995-12-01

    This Quality Assurance Program Plan identifies quality assurance program requirements and addresses the various Westinghouse Hanford Company organizations and their particular responsibilities in regards to sample and data handling of radiological airborne emissions. This Quality Assurance Program Plan is prepared in accordance with and to written requirements