WorldWideScience

Sample records for security assurance index

  1. Security assurances and regional stability

    International Nuclear Information System (INIS)

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  2. Nuclear power: energy security and supply assurances

    International Nuclear Information System (INIS)

    Rogner, H.H.; McDonald, A.

    2008-01-01

    Expectations are high for nuclear power. This paper first summarizes recent global and regional projections for the medium-term, including the 2007 updates of IAEA projections plus International Energy Agency and World Energy Technology Outlook projections to 2030 and 2050. One driving force for nuclear power is concern about energy supply security. Two potential obstacles are concerns about increased nuclear weapon proliferation risks, and concerns by some countries about potential politically motivated nuclear fuel supply interruptions. Concerning supply security, the paper reviews different definitions, strategies and costs. Supply security is not free; nor does nuclear power categorically increase energy supply security in all situations. Concerning proliferation and nuclear fuel cut-off risks, the IAEA and others are exploring possible 'assurance of supply' mechanisms with 2 motivations. First, the possibility of a political fuel supply interruption is a non-market disincentive discouraging investment in nuclear power. Fuel supply assurance mechanisms could reduce this disincentive. Second, the risk of interruption creates an incentive for a country to insure against that risk by developing a national enrichment capability. Assurance mechanisms could reduce this incentive, thereby reducing the possible spread of new national enrichment capabilities and any associated weapon proliferation risks. (orig.)

  3. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  4. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  5. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  6. Kali Linux assuring security by penetration testing

    CERN Document Server

    Ali, Shakeel; Allen, Lee

    2014-01-01

    Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.

  7. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  8. Incorporating Global Information Security and Assurance in I.S. Education

    Science.gov (United States)

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  9. 17 CFR 41.15 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Science.gov (United States)

    2010-04-01

    ..., that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer included in the index is an equity security, as defined in section 3(a)(11) of the Securities Exchange Act... of 1934; (B) The issuer of the security has a worldwide market value of its outstanding common equity...

  10. Creating energy security indexes with decision matrices and quantitative criteria

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Larry; Shupe, Darren

    2010-09-15

    Energy security is becoming an important policy issue in a growing number of jurisdictions because of volatile energy markets and production challenges faced by many producers. As a result, policymakers and politicians are looking for tools or methods that can create an energy security index with results that are justifiable, understandable, and reproducible. This paper describes a method which employs a decision matrix to produce an energy security index using quantitative criteria and metrics. The method allows a range of indexes to be produced, thereby offering further insight into the state of a jurisdiction's energy security.

  11. Software Security Assurance: A State-of-Art Report (SAR)

    Science.gov (United States)

    2007-07-31

    analysis of security management processes: includes organizational assessment, asset valuation , threat identification, vulnerability assessment...Available from: http://www.cigital.com/papers/download/bsi2-misuse.pdf 200 Meledath Damodaran , “Secure Software Development Using Use Cases and Misuse

  12. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  13. An analysis of Indonesia’s information security index: a case study in a public university

    Science.gov (United States)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  14. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  15. Quality assurance: using the exposure index and the deviation index to monitor radiation exposure for portable chest radiographs in neonates

    International Nuclear Information System (INIS)

    Cohen, Mervyn D.; Cooper, Matt L.; Piersall, Kelly; Apgar, Bruce K.

    2011-01-01

    Many methods are used to track patient exposure during acquisition of plain film radiographs. A uniform international standard would aid this process. To evaluate and describe a new, simple quality-assurance method for monitoring patient exposure. This method uses the ''exposure index'' and the ''deviation index,'' recently developed by the International Electrotechnical Commission (IEC) and American Association of Physicists in Medicine (AAPM). The deviation index measures variation from an ideal target exposure index value. Our objective was to determine whether the exposure index and the deviation index can be used to monitor and control exposure drift over time. Our Agfa workstation automatically keeps a record of the exposure index for every patient. The exposure index and deviation index were calculated on 1,884 consecutive neonatal chest images. Exposure of a neonatal chest phantom was performed as a control. Acquisition of the exposure index and calculation of the deviation index was easily achieved. The weekly mean exposure index of the phantom and the patients was stable and showed <10% change during the study, indicating no exposure drift during the study period. The exposure index is an excellent tool to monitor the consistency of patient exposures. It does not indicate the exposure value used, but is an index to track compliance with a pre-determined target exposure. (orig.)

  16. Quality assurance: using the exposure index and the deviation index to monitor radiation exposure for portable chest radiographs in neonates

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, Mervyn D. [Indiana University School of Medicine, Department of Radiology, Riley Children' s Hospital, Indianapolis, IN (United States); Riley Hospital for Children, Department of Radiology, Indianapolis, IN (United States); Cooper, Matt L.; Piersall, Kelly [Indiana University School of Medicine, Department of Radiology, Riley Children' s Hospital, Indianapolis, IN (United States); Apgar, Bruce K. [Agfa HealthCare Corporation, Greenville, SC (United States)

    2011-05-15

    Many methods are used to track patient exposure during acquisition of plain film radiographs. A uniform international standard would aid this process. To evaluate and describe a new, simple quality-assurance method for monitoring patient exposure. This method uses the ''exposure index'' and the ''deviation index,'' recently developed by the International Electrotechnical Commission (IEC) and American Association of Physicists in Medicine (AAPM). The deviation index measures variation from an ideal target exposure index value. Our objective was to determine whether the exposure index and the deviation index can be used to monitor and control exposure drift over time. Our Agfa workstation automatically keeps a record of the exposure index for every patient. The exposure index and deviation index were calculated on 1,884 consecutive neonatal chest images. Exposure of a neonatal chest phantom was performed as a control. Acquisition of the exposure index and calculation of the deviation index was easily achieved. The weekly mean exposure index of the phantom and the patients was stable and showed <10% change during the study, indicating no exposure drift during the study period. The exposure index is an excellent tool to monitor the consistency of patient exposures. It does not indicate the exposure value used, but is an index to track compliance with a pre-determined target exposure. (orig.)

  17. Achieving Security Assurance with Assertion-based Application Construction

    Directory of Open Access Journals (Sweden)

    Carlos E. Rubio-Medrano

    2015-12-01

    Full Text Available Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs, which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may consequently occur. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.

  18. A quality assurance index for brachytherapy treatment plan verification

    International Nuclear Information System (INIS)

    Simpson, J.B.; Clarke, J.P.

    2000-01-01

    A method is described which provides an independent verification of a brachytherapy treatment plan. The method is applicable to any common geometric configuration and utilises a simple equation derived from a common form of nonlinear regression. The basis for the index value is the relationship between the treatment time, prescribed dose, source strength and plan geometry. This relationship may be described mathematically as: Total Treatment Time ∝ Prescribed Dose/Source Strength x (a geometric term) with the geometric term incorporating three geometric components, namely the distance from source positions to points of dose normalisation (d), the total length of the dwell positions (L), and the number of source trains or catheters (N). A general equation of the form GF = k (d) -α (L) -β (N) -y is used to describe the plan geometry, where GF is what we have termed the geometric factor, k is a constant of proportionality and the exponents are derived from the non-linear regression process. The resulting index is simple to calculate prior to patient treatment and sensitive enough to identify significant error whilst being robust enough to allow for a normal degree of geometric distortion

  19. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  20. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  1. Assuring the energy security; Para garantizar la seguridad energetica

    Energy Technology Data Exchange (ETDEWEB)

    Yergin, Daniel [Cambridge Energy Research Associates (CERA) (United States)

    2006-04-15

    Both the institutions and the policies adopted after the 1973 Arab oil embargo aren't able to satisfy both the energy consumers' and producers' necessities. It is necessary to extend the definition of energy security in order to stand up to the challenges of a globalized world. [Spanish] Las instituciones y politicas adoptadas despues del embargo petrolero arabe de 1973 ya no pueden satisfacer las necesidades de los consumidores y productores de energia. Se requiere expandir la definicion de seguridad energetica para hacer frente a los desafios de un mundo globalizado.

  2. A SES (sustainable energy security) index for developing countries

    International Nuclear Information System (INIS)

    Narula, Kapil; Reddy, B. Sudhakara

    2016-01-01

    Measuring the performance of the energy system of a country is a prerequisite for framing good energy polices. However, the existing indices which claim to measure energy security have limited applicability for developing countries. Energy sustainability is also increasingly gaining importance and countries are keen to measure it to tailor their energy policies. Therefore, the concept of SES (sustainable energy security) has been proposed as the goal for a developing country. This paper presents an analytical framework for the assessment of SES of an energy system and the methodology for constructing an SES index. A hierarchical structure has been proposed and the energy system has been divided into 'supply', 'conversion & distribution' and 'demand' sub-systems. Each subsystem is further divided into its components which are evaluated for four dimensions of SES, Availability, Affordability, Efficiency and (Environmental) Acceptability using quantitative metrics. Energy indices are constructed using 'scores' (objective values), and 'weights' (subjective values representing tradeoffs) which are then aggregated, bottom-up, to obtain an overall SES Index for a country. The proposed SES Index is multidimensional, quantitative, modular, systemic and flexible. Such a SES Index can be used to design policy interventions for transitioning to a sustainable and a secure energy future. - Highlights: • A SES (sustainable energy security) index is proposed for developing countries. • A hierarchical structure includes the entire energy system from supply to end use. • The performance of all energy sources, energy carriers and sectors is assessed. • Availability, affordability, efficiency and acceptability dimensions are evaluated. • The SES index is multidimensional, quantitative, modular, systemic and flexible.

  3. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  4. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  5. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  6. Use of Diplomatic Assurances in Terrorism-related Cases: In search of a Balance between Security Concerns and Human Rights

    Directory of Open Access Journals (Sweden)

    Bibi van Ginkel

    2010-03-01

    Full Text Available In this paper, Research Fellow Dr. Bibi van Ginkel and intern Federico Rojas analyse the different policies on diplomatic assurances in a number of countries that are representative of a certain trend and attempt to clarify the criteria that have to be fulfilled before assurance may be used. Key in the whole discussion surrounding the use of diplomatic assurances is finding the right balance between national security concerns and human rights obligations. The outcomes of the Expert Meeting on this topic, that took place on 22 March 2011, have been incorporated in this paper.

  7. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    Monitoring ISO /IEC 12207 2008(E) IEEE 1062 1998 PMBOK 3.0 Initiating Closing 3. Monitoring & Controlling 1. Planning 2. Executing Follow-on...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic...they are met. This may also include a plan for testing that SwA requirements are met. The [NDIA] and [ ISO /IEC 15026] provide details on structure and

  8. Global Food Security Index Studies and Satellite Information

    Science.gov (United States)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  9. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  10. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  11. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  12. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    Science.gov (United States)

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  13. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Science.gov (United States)

    2010-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer included in the index is an equity security, as defined in section... its outstanding common equity held by non-affiliates of $71 million or more; (C) The issuer of the...

  14. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  15. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  16. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  17. Permission-based Index Clustering for Secure Multi-User Search

    OpenAIRE

    Eirini C. Micheli; Giorgos Margaritis; Stergios V. Anastasiadis

    2015-01-01

    Secure keyword search in shared infrastructures prevents stored documents from leaking sensitive information to unauthorized users. A shared index provides confidentiality if it is exclusively used by users authorized to search all the indexed documents. We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search. The Lethe workflow clusters together documents with similar sets of authorized users, and creates shared indices for configurable docume...

  18. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  19. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  20. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    Science.gov (United States)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  1. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  2. Interpretation of Gamma Index for Quality Assurance of Simultaneously Integrated Boost (SIB) IMRT Plans for Head and Neck Carcinoma

    Science.gov (United States)

    Atiq, Maria; Atiq, Atia; Iqbal, Khalid; Shamsi, Quratul ain; Andleeb, Farah; Buzdar, Saeed Ahmad

    2017-12-01

    Objective: The Gamma Index is prerequisite to estimate point-by-point difference between measured and calculated dose distribution in terms of both Distance to Agreement (DTA) and Dose Difference (DD). This study aims to inquire what percentage of pixels passing a certain criteria assure a good quality plan and suggest gamma index as efficient mechanism for dose verification of Simultaneous Integrated Boost Intensity Modulated Radiotherapy plans. Method: In this study, dose was calculated for 14 head and neck patients and IMRT Quality Assurance was performed with portal dosimetry using the Eclipse treatment planning system. Eclipse software has a Gamma analysis function to compare measured and calculated dose distribution. Plans of this study were deemed acceptable when passing rate was 95% using tolerance for Distance to agreement (DTA) as 3mm and Dose Difference (DD) as 5%. Result and Conclusion: Thirteen cases pass tolerance criteria of 95% set by our institution. Confidence Limit for DD is 9.3% and for gamma criteria our local CL came out to be 2.0% (i.e., 98.0% passing). Lack of correlation was found between DD and γ passing rate with R2 of 0.0509. Our findings underline the importance of gamma analysis method to predict the quality of dose calculation. Passing rate of 95% is achieved in 93% of cases which is adequate level of accuracy for analyzed plans thus assuring the robustness of SIB IMRT treatment technique. This study can be extended to investigate gamma criteria of 5%/3mm for different tumor localities and to explore confidence limit on target volumes of small extent and simple geometry.

  3. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  4. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  5. Potential of insects as food and feed in assuring food security.

    Science.gov (United States)

    van Huis, Arnold

    2013-01-01

    With a growing world population and increasingly demanding consumers, the production of sufficient protein from livestock, poultry, and fish represents a serious challenge for the future. Approximately 1,900 insect species are eaten worldwide, mainly in developing countries. They constitute quality food and feed, have high feed conversion ratios, and emit low levels of greenhouse gases. Some insect species can be grown on organic side streams, reducing environmental contamination and transforming waste into high-protein feed that can replace increasingly more expensive compound feed ingredients, such as fish meal. This requires the development of cost-effective, automated mass-rearing facilities that provide a reliable, stable, and safe product. In the tropics, sustainable harvesting needs to be assured and rearing practices promoted, and in general, the food resource needs to be revalorized. In the Western world, consumer acceptability will relate to pricing, perceived environmental benefits, and the development of tasty insect-derived protein products.

  6. A Common Criteria-Based Team Project for High Assurance Secure Systems

    Science.gov (United States)

    2005-01-01

    experience in the FHM, full system documentation, and plenty of time. The students had little experience and little time. The MINIX operating... MINIX is a very appropriate target for student enhancements. Since the principle objective of Secure Systems is to teach the concepts of...to construct a system when one of the developmental threats is subversion. Because students were studying MINIX in a prerequisite operating systems

  7. Control and Assurance in E-Commerce: Privacy, Integrity and Security at eBay

    OpenAIRE

    Rong-Ruey Duh; Karim Jamal; Shyam NMI Sunder

    2001-01-01

    Growth of online auctions and other forms of e-commerce has been hampered by concerns about the privacy, integrity, and security of online transactions. To earn the trust of their participants, new e-commerce organizations, like traditional organizations, have to reach the state of expectations equilibrium or control - a state where the actual behavior of participants corresponds to what others expect them to do. Since e-commerce companies provide electronic platforms where buyers and sellers...

  8. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  9. Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

    Directory of Open Access Journals (Sweden)

    Jun Hong

    2017-01-01

    Full Text Available As cloud computing has been popularized massively and rapidly, individuals and enterprises prefer outsourcing their databases to the cloud service provider (CSP to save the expenditure for managing and maintaining the data. The outsourced databases are hosted, and query services are offered to clients by the CSP, whereas the CSP is not fully trusted. Consequently, the security shall be violated by multiple factors. Data privacy and query integrity are perceived as two major factors obstructing enterprises from outsourcing their databases. A novel scheme is proposed in this paper to effectuate k-nearest neighbors (kNN query and kNN query authentication on an encrypted outsourced spatial database. An asymmetric scalar-product-preserving encryption scheme is elucidated, in which data points and query points are encrypted with diverse encryption keys, and the CSP can determine the distance relation between encrypted data points and query points. Furthermore, the similarity search tree is extended to build a novel verifiable SS-tree that supports efficient kNN query and kNN query verification. It is indicated from the security analysis and experiment results that our scheme not only maintains the confidentiality of outsourced confidential data and query points but also has a lower kNN query processing and verification overhead than the MR-tree.

  10. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  11. SU-E-T-212: Influence of the Modulation Index On Daily Quality Assurance in Rapid Arc Treatments

    International Nuclear Information System (INIS)

    Wessels, C; Dumas, J-L; Francois, P; Mazal, A

    2014-01-01

    Purpose: At our Institute some measured parameters for daily quality assurance (DQA) of dynamic arc therapy plans showed an unexpected behavior, therefore an investigation of the influence of the magnitude of modulation was conducted. Methods: In our clinical practice all DQAs of dynamic arc therapy plans are measured and analyzed prior to treatments using commercial software. For this study these plans were additionally exported to our in-house software written in MATLAB.The developed software extracted the leaf position, gantry angle, cumulative meterset weight of each control point (CP) and the total number of Monitor Units (MU) of each arc. Based on this information we calculated the leaf travel distance, irradiated segment area, number of MUs and dose rate for each CP. These data allowed us to calculate the modulation indexes (MI) of the plans, applying five different definitions of MI. The results were then correlated to the results of our DQA measurements.To validate the software, additional plans of known MIs were created and analyzed. For confirmation, the calculated parameters were compared to the segmented treatment table (STT) coming from the treatment planning system. Results: All calculated CP-parameters matched the STT by 99% or better. For linac 1, the comparison of the MI evaluation and the DQA results showed a slight tendency: 91.3% failed DQA plans had a MI lower than the average value. For this definition we consider that the lower the MI the higher the modulation. The results of the linac 2 present no significant relevance due to the low sample sizes for each DQA software. Conclusion: Available data and given definitions of the modulation index do not bring conclusive results; one cannot find a clear and distinct correlation with the failure of the DQA. The ongoing analysis with an increased sample size might lead to another conclusion

  12. Social Security cost-of-living adjustments and the Consumer Price Index.

    Science.gov (United States)

    Burdick, Clark; Fisher, Lynn

    2007-01-01

    OASDI benefits are indexed for inflation to protect beneficiaries from the loss of purchasing power implied by inflation. In the absence of such indexing, the purchasing power of Social Security benefits would be eroded as rising prices raise the cost of living. By statute, cost-of-living adjustments (COLAs) for Social Security benefits are calculated using the Bureau of Labor Statistics (BLS) Consumer Price Index for Urban Wage Earners and Clerical Workers (CPI-W). Some argue that this index does not accurately reflect the inflation experienced by the elderly population and should be changed to an elderly-specific price index such as the Experimental Consumer Price Index for Americans 62 Years of Age and Older, often referred to as the Consumer Price Index for the Elderly (CPI-E). Others argue that the measure of inflation underlying the COLA is technically biased, causing it to overestimate changes in the cost of living. This argument implies that current COLAs tend to increase, rather than merely maintain, the purchasing power of benefits over time. Potential bias in the CPI as a cost-of-living index arises from a number of sources, including incomplete accounting for the ability of consumers to substitute goods or change purchasing outlets in response to relative price changes. The BLS has constructed a new index called the Chained Consumer Price Index for All Urban Consumers (C-CPI-U) that better accounts for those consumer adjustments. Price indexes are not true cost-of-living indexes, but approximations of cost-of-living indexes (COLI). The Bureau of Labor Statistics (2006a) explains the difference between the two: As it pertains to the CPI, the COLI for the current month is based on the answer to the following question: "What is the cost, at this month ' market prices, of achieving the standard of living actually attained in the base period?" This cost is a hypothetical expenditure-the lowest expenditure level necessary at this month's prices to achieve the

  13. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  14. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  15. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  16. Development of the system based code. v. 5. Method of margin exchange. pt. 2. Determination of quality assurance index based on a 'Vector Method'

    International Nuclear Information System (INIS)

    Asayama, Tai

    2003-03-01

    For the commercialization of fast breeder reactors, 'System Based Code', a completely new scheme of a code on structural integrity, is being developed. One of the distinguished features of the System Based Code is that it is able to determine a reasonable total margin on a structural of system, by allowing the exchanges of margins between various technical items. Detailed estimation of failure probability of a given combination of technical items and its comparison with a target value is one way to achieve this. However, simpler and easier methods that allow margin exchange without detailed calculation of failure probability are desirable in design. The authors have developed a simplified method such as a 'design factor method' from this viewpoint. This report describes a 'Vector Method', which was been newly developed. Following points are reported: 1) The Vector Method allows margin exchange evaluation on an 'equi-quality assurance plane' using vector calculation. Evaluation is easy and sufficient accuracy is achieved. The equi-quality assurance plane is obtained by a projection of an 'equi-failure probability surface in a n-dimensional space, which is calculated beforehand for typical combinations of design variables. 2) The Vector Method is considered to give the 'Quality Assurance Index Method' a probabilistic interpretation. 3) An algebraic method was proposed for the calculation of failure probabilities, which is necessary to obtain a equi-failure probability surface. This method calculates failure probabilities without using numerical methods such as Monte Carlo simulation or numerical integration. Under limited conditions, this method is quite effective compared to numerical methods. 4) An illustration of the procedure of margin exchange evaluation is given. It may be possible to use this method to optimize ISI plans; even it is not fully implemented in the System Based Code. (author)

  17. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    Science.gov (United States)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  18. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    Science.gov (United States)

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. Conclusions The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated.The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for “cradle to the grave” treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system. PMID:17435617

  19. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures.

    Science.gov (United States)

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-11

    , EHR knowledge, and the concern for privacy and the security of medical records (P secure than EHRs and those who believed otherwise. The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated. The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for "cradle to the grave" treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system.

  20. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  1. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-02-01

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide and the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the

  2. Quality assurance

    International Nuclear Information System (INIS)

    Kunich, M.P.; Vieth, D.L.

    1989-01-01

    This paper provides a point/counterpoint view of a quality assurance director and a project manager. It presents numerous aspects of quality assurance requirements along with analyses as to the value of each

  3. PENGARUH MODEL PEMBELAJARAN ASSURANCE, RELEVANCE, INTEREST, ASSESSMENT, SATISFACTION DENGAN STRATEGI ACTIVE LEARNING TIPE INDEX CARD MATCH TERHADAP KEMAMPUAN PEMECAHAN MASALAH MATEMATIK SISWA SMA

    Directory of Open Access Journals (Sweden)

    Frasticha Frasticha

    2016-08-01

    Full Text Available Pemecahan masalah merupakan kegiatan matematika yang sulit baik dalam mempelajari maupun mengajarkannya, sehingga diperlukan adanya suatu model pembelajaran yang dapat memberikan pengaruh positif terhadap kemampuan pemecahan masalah siswa. Salah satu model pembelajaran yang dapat digunakan yaitu model pembelajaran ARIAS dengan strategi active learning tipe ICM. Penelitian ini bertujuan untuk mengetahui: (1 model pembelajaran ARIAS dengan strategi active learning tipe ICM berpengaruh terhadap kemampuan pemecahan masalah matematik siswa SMA; (2 Sikap siswa terhadap pembelajaran matematika menggunakan model pembelajaran ARIAS dengan strategi active learning tipe ICM. Subjek penelitian ini adalah siswa kelas XI IPA 1 dengan jumlah 38 siswa sebagai kelas kontrol dan XI IPA 2 dengan jumlah 39 siswa sebagai kelas eksperimen di SMAN 19 Kabupaten Tangerang pada tahun ajaran 2015-2016. Metode penelitian yang digunakan adalah metode penelitian eksperimen dengan adalah desain kuasi eksperimen dengan bentuk Nonequivalent Control Group serta Cluster Sampling sebagai teknik pengambilan sampel. Analisis data dalam penelitian ini menggunakan SPSS Statistics Version 22. Hasil penelitian :(1 model pembelajaran ARIAS dengan strategi active learning tipe ICM berpengaruh terhadap kemampuan pemecahan masalah matematik siswa SMA dan memberikan pengaruh yang positif; (2 sikap siswa positif terhadap model pembelajaran ARIAS dengan strategi active learning tipe ICM. Kata Kunci: Assurance Relevance Interest Assessment Satisfaction, Index Card Match, Kemampuan Pemecahan Masalah

  4. Development of an Audit Classification Index (ACI) for Federal E-Learning Systems Security Vulnerabilities

    Science.gov (United States)

    Johnson, Gerald D.

    2012-01-01

    As U.S federal government agencies have increased the use of the Internet to utilize technologies such as e-learning, U.S. federal government information systems have become more exposed to security vulnerabilities that may contribute to system attacks and system exploitation. U.S. federal government agencies are required to come up with their own…

  5. Indexed

    CERN Document Server

    Hagy, Jessica

    2008-01-01

    Jessica Hagy is a different kind of thinker. She has an astonishing talent for visualizing relationships, capturing in pictures what is difficult for most of us to express in words. At indexed.blogspot.com, she posts charts, graphs, and Venn diagrams drawn on index cards that reveal in a simple and intuitive way the large and small truths of modern life. Praised throughout the blogosphere as “brilliant,” “incredibly creative,” and “comic genius,” Jessica turns her incisive, deadpan sense of humor on everything from office politics to relationships to religion. With new material along with some of Jessica’s greatest hits, this utterly unique book will thrill readers who demand humor that makes them both laugh and think.

  6. Benchmarking Software Assurance Implementation

    Science.gov (United States)

    2011-05-18

    product The chicken#. (a.k.a. Process Focused Assessment ) – Management Systems ( ISO 9001, ISO 27001 , ISO 2000) – Capability Maturity Models (CMMI...Assurance PRM, RMM, Assurance for CMMI)) – Lifecycle Processes ( ISO /IEEE 15288, ISO /IEEE 12207) – COBIT, ITIL, MS SDL, OSAMM, BSIMM 5 The egg...a.k.a Product Focused Assessments) – SCAP - NIST-SCAP – ISO /OMG W3C – KDM, BPMN, RIF, XMI, RDF – OWASP Top 10 – SANS TOP 25 – Secure Code Check Lists

  7. Quality assurance

    International Nuclear Information System (INIS)

    Cante; Feger; Genevray; Hennion; Moneyron; Monneyron; Normand; Rastoin; Silberstein; Vaujour.

    1976-01-01

    The general principles of quality assurance and their applications within the French industrial and commercial regulations are presented. The conditions for the practical application of quality assurance to the different stages of the life of a nuclear power station (design, development, operation) are considered and a special mention is made of nuclear fuels and liquid sodium cooled reactors [fr

  8. Quality assurance

    International Nuclear Information System (INIS)

    1996-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (NRA SR) was focused on support of quality assurance programmes development at responsible organizations Bohunice V-1 and V-v and Mochovce NPPs and their inspection. Development of the level two documentation of a partial quality assurance programme for NPP operation continued at Mochovce NPP. Most of documentation has been submitted to NRA SR for comments and approval. NRA SR invited a mission of French experts to Mochovce NPP to review preparation and performance of internal audits that would be beneficial for improvement in this kind activities at the NPP. Bohunice NPP continued in development of a partial quality assurance programme for operation. The Quality Assurance Programme submitted to NRA SR for approval. Based on a request of Bohunice NPPs, NRA SR consulted the draft quality assurance programme developed by Siemens for stage of the 'Basic Design' of V-1 NPP upgrading. The programme had not been submitted for approval to NRA SR prior to completion of works by Siemens. Based on an internal audit that had been performed, corrective measures were proposed to meet requirements on review and approval of suppliers quality assurance programmes. Requirements related to the quality assurance at nuclear installations were prepared to be incorporated into principles of a act on peaceful use of nuclear power in Slovak Republic

  9. Designing time-of-use program based on stochastic security constrained unit commitment considering reliability index

    International Nuclear Information System (INIS)

    Nikzad, Mehdi; Mozafari, Babak; Bashirvand, Mahdi; Solaymani, Soodabeh; Ranjbar, Ali Mohamad

    2012-01-01

    Recently in electricity markets, a massive focus has been made on setting up opportunities for participating demand side. Such opportunities, also known as demand response (DR) options, are triggered by either a grid reliability problem or high electricity prices. Two important challenges that market operators are facing are appropriate designing and reasonable pricing of DR options. In this paper, time-of-use program (TOU) as a prevalent time-varying program is modeled linearly based on own and cross elasticity definition. In order to decide on TOU rates, a stochastic model is proposed in which the optimum TOU rates are determined based on grid reliability index set by the operator. Expected Load Not Supplied (ELNS) is used to evaluate reliability of the power system in each hour. The proposed stochastic model is formulated as a two-stage stochastic mixed-integer linear programming (SMILP) problem and solved using CPLEX solver. The validity of the method is tested over the IEEE 24-bus test system. In this regard, the impact of the proposed pricing method on system load profile; operational costs and required capacity of up- and down-spinning reserve as well as improvement of load factor is demonstrated. Also the sensitivity of the results to elasticity coefficients is investigated. -- Highlights: ► Time-of-use demand response program is linearly modeled. ► A stochastic model is proposed to determine the optimum TOU rates based on ELNS index set by the operator. ► The model is formulated as a short-term two-stage stochastic mixed-integer linear programming problem.

  10. Assuring Software Reliability

    Science.gov (United States)

    2014-08-01

    technologies and processes to achieve a required level of confidence that software systems and services function in the intended manner. 1.3 Security Example...that took three high-voltage lines out of service and a software fail- ure (a race condition3) that disabled the computing service that notified the... service had failed. Instead of analyzing the details of the alarm server failure, the reviewers asked why the following software assurance claim had

  11. Quality assurance

    OpenAIRE

    Cauchi, Maurice A.M.

    1993-01-01

    The concept of quality assurance refers more specifically to the process of objectifying and clearly enunciating goals, and providing means of assessing the outcomes. In this article the author mentions four fundamental elements of quality assurance which should be applied in the medical profession in Malta. These elements should relate to professional performance, resource utilisation, risk management and patient satisfaction. The aim of the medical professionals in Malta is to provide the b...

  12. Financial assurances

    International Nuclear Information System (INIS)

    Paton, R.F.

    1990-01-01

    US Ecology is a full service waste management company. The company operates two of the nation's three existing low-level radioactive waste (LLRW) disposal facilities and has prepared and submitted license applications for two new LLRW disposal facilities in California and Nebraska. The issue of financial assurances is an important aspect of site development and operation. Proper financial assurances help to insure that uninterrupted operation, closure and monitoring of a facility will be maintained throughout the project's life. Unfortunately, this aspect of licensing is not like others where you can gauge acceptance by examining approved computer codes, site performance standards or applying specific technical formulas. There is not a standard financial assurance plan. Each site should develop its requirements based upon the conditions of the site, type of design, existing state or federal controls, and realistic assessments of future financial needs. Financial assurances at U.S. Ecology's existing sites in Richland, Washington, and Beatty, Nevada, have been in place for several years and are accomplished in a variety of ways by the use of corporate guarantees, corporate capital funds, third party liability insurance, and post closure/long-term care funds. In addressing financial assurances, one can divide the issue into three areas: Site development/operations, third party damages, and long-term care/cleanup

  13. Quality assurance programs from laboratories offering radiological protection services

    International Nuclear Information System (INIS)

    Marrero Garcia, M.; Prendes Alonso, M.; Jova Sed, L.; Morales Monzon, J.A.

    1998-01-01

    The implementation of an adequate program for quality assurance in institutions servicing radiological protection programs will become an additional tool to achieve security targets included in that program. All scientific and technical services offered by CPHR employ quality assurance systems

  14. ECLIPSE, an Emerging Standardized Modular, Secure and Affordable Software Toolset in Support of Product Assurance, Quality Assurance and Project Management for the Entire European Space Industry (from Innovative SMEs to Primes and Institutions)

    Science.gov (United States)

    Bennetti, Andrea; Ansari, Salim; Dewhirst, Tori; Catanese, Giuseppe

    2010-08-01

    The development of satellites and ground systems (and the technologies that support them) is complex and demands a great deal of rigor in the management of both the information it relies upon and the information it generates via the performance of well established processes. To this extent for the past fifteen years Sapienza Consulting has been supporting the European Space Agency (ESA) in the management of this information and provided ESA with ECSS (European Cooperation for Space Standardization) Standards based Project Management (PM), Product Assurance (PA) and Quality Assurance (QA) software applications. In 2009 Sapienza recognised the need to modernize, standardizing and integrate its core ECSS-based software tools into a single yet modularised suite of applications named ECLIPSE aimed at: • Fulfilling a wider range of historical and emerging requirements, • Providing a better experience for users, • Increasing the value of the information it collects and manages • Lowering the cost of ownership and operation • Increasing collaboration within and between space sector organizations • Aiding in the performance of several PM, PA, QA, and configuration management tasks in adherence to ECSS standards. In this paper, Sapienza will first present the toolset, and a rationale for its development, describing and justifying its architecture, and basic modules composition. Having defined the toolset architecture, this paper will address the current status of the individual applications. A compliance assessment will be presented for each module in the toolset with respect to the ECSS standard it addresses. Lastly experience from early industry and Institutional users will be presented.

  15. Quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Gillespie, B.M.; Gleckler, B.P.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results.

  16. Quality assurance

    International Nuclear Information System (INIS)

    Gillespie, B.M.; Gleckler, B.P.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results

  17. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  18. Review of the National Information Assurance Partnership (NIAP)

    National Research Council Canada - National Science Library

    Larsen, Gregory N; Burton, J. K; Cohen, Patricia A; Harvey, Rick A; Meeson, Reginald N; Nash, Michael S; Nash, Sarah H; Schneider, Edward A; Simpson, William R; Stytz, Martin R; Wheeler, David A

    2006-01-01

    This study was mandated by the National Strategy to Secure Cyberspace which requires the federal government to conduct a comprehensive review of the National Information Assurance Partnership (NIAP...

  19. Validation of the Social Security Death Index (SSDI): An Important Readily-Available Outcomes Database for Researchers.

    Science.gov (United States)

    Quinn, James; Kramer, Nathan; McDermott, Daniel

    2008-01-01

    To determine the accuracy of the online Social Security Death Index (SSDI) for determining death outcomes. We selected 30 patients who were determined to be dead and 90 patients thought to be alive after an ED visit as determined by a web-based searched of the SSDI. For those thought to be dead we requested death certificates. We then had a research coordinator blinded to the results of the SSDI search, complete direct follow-up by contacting the patients, family or primary care physicians to determine vital status. To determine the sensitivity and specificity of the SSDI for death at six months in this cohort, we used direct follow-up as the criterion reference and calculated 95% confidence intervals. Direct follow-up was completed for 90% (108 of 120) of the patients. For those patients 20 were determined to be dead and 88 alive. The dead were more likely to be male (57%) and older [(mean age 83.9 (95% CI 79.1 - 88.7) vs. 60.9 (95% CI 56.4 - 65.4) for those alive]. The sensitivity of the SSDI for those with completed direct follow-up was 100% (95% CI 91 -100%) with specificity of 100% (95% CI 98-100%). Of the 12 patients who were not able to be contacted through direct follow-up, the SSDI indicated that 10 were dead and two were alive. SSDI is an accurate measure of death outcomes and appears to have the advantage of finding deaths among patients lost to follow-up.

  20. Quality assurance

    International Nuclear Information System (INIS)

    Hiller, G.H.

    1979-01-01

    This compendium intends to give fast bibliographic information and to fill the visible gap between documentation and general bibliographic information. The reader is given an outline of quality assurance and some examples of techniques from the relevant literature. The practical engineer, who is always short of time, is thus offered a quick survey and a fast deepening of his understanding by means of literature dealing specifically with his unresolved problems. The mansucript has been kept in tis original form in order to speed up tis publication. The RKW technical department limited itself to checking its contents and the adherence to the established information goals. (orig.) 891 RW/orig. 892 MB [de

  1. HARD - The High Assurance Remote Authentication Device Project

    OpenAIRE

    2006-01-01

    The HARD project will build and evaluate a high assurance network access device. The purpose of this device is to provide an unforgeable trusted path with which network clients can securely interact with security-enabled remote servers.

  2. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  3. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  4. Information Assurance in Saudi Organizations - An Empirical Study

    Science.gov (United States)

    Nabi, Syed Irfan; Mirza, Abdulrahman A.; Alghathbar, Khaled

    This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom.

  5. Afghanistan Index

    DEFF Research Database (Denmark)

    Linnet, Poul Martin

    2007-01-01

    basis. The data are divided into different indicators such as security, polls, drug, social, economic, refugees etc. This represents a practical division and does not indicate that a picture as to for instance security can be obtained by solely looking at the data under security. In order to obtain...... a more valid picture on security this must incorporate an integrated look on all data meaning that for instance the economic data provides an element as to the whole picture of security.......The Afghanistan index is a compilation of quantitative and qualitative data on the reconstruction and security effort in Afghanistan. The index aims at providing data for benchmarking of the international performance and thus provides the reader with a quick possibility to retrieve valid...

  6. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  7. The relationship between dietary patterns, body mass index percentile, and household food security in young urban children.

    Science.gov (United States)

    Trapp, Christine M; Burke, Georgine; Gorin, Amy A; Wiley, James F; Hernandez, Dominica; Crowell, Rebecca E; Grant, Autherene; Beaulieu, Annamarie; Cloutier, Michelle M

    2015-04-01

    The relationship between food insecurity and child obesity is unclear. Few studies have examined dietary patterns in children with regard to household food security and weight status. The aim of this study was to examine the association between household food security, dietary intake, and BMI percentile in low-income, preschool children. Low-income caregivers (n=222) with children ages 2-4 years were enrolled in a primary-care-based obesity prevention/reversal study (Steps to Growing Up Healthy) between October 2010 and December 2011. At baseline, demographic data, household food security status (US Household Food Security Instrument) and dietary intake (Children's Dietary Questionnaire; CDQ) were collected. BMI percentile was calculated from anthropometric data. Participating children were primarily Hispanic (90%), Medicaid insured (95%), 50% female, 35±8.7 months of age (mean±standard deviation), 19% overweight (BMI 85th-94th percentile), and 29% obese (≥95th percentile). Thirty-eight percent of interviews were conducted in Spanish. Twenty-five percent of households reported food insecurity. There was no association between household food insecurity and child BMI percentile. Dietary patterns of the children based on the CDQ did not differ by household food security status. Food group subscale scores (fruit and vegetable, fat from dairy, sweetened beverages, and noncore foods) on the CDQ did not differ between normal weight and overweight/obese children. Maternal depression and stress did not mediate the relationship between household food insecurity and child weight status. Hispanic children were more likely to be overweight or obese in both food-secure and food-insecure households. Household food insecurity was not associated with child BMI percentile in this study. Dietary intake patterns of children from food-insecure households were not different compared to those from food-secure households.

  8. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  9. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  10. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  11. Quality Assurance - Construction

    DEFF Research Database (Denmark)

    Gaarslev, Axel

    1996-01-01

    Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies......Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies...

  12. Overview of the Hanford Site Performance Assurance Program

    International Nuclear Information System (INIS)

    Duncan, M.R.; Billings, M.P.; Delvin, W.L.; Scott, D.D.; Weatherby, J.W.

    1991-01-01

    This paper reports on a safeguards and security performance assurance program which encompasses the routine and special activities carried out to assure that safeguards and security subsystems and components are operating in a effective and reliable manner. At the Hanford Site, performance assurance involves widely varied activities, e.g., force-on-force exercises, functional testing of security components, and limited scope performance testing of material control and accountability subsystems. These activities belong to one of four categories: performance testing, functional testing, inspection, and preventive maintenance. Using categories has aided in identifying and assessing the relevant contribution each activity makes to the performance assurance program. Efforts have progressed toward incorporating performance assurance activities into the assessment of protection effectiveness required for Master Safeguards and Security Agreement development and its associated verification and validation process

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 644 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... Ethics review n international health research: quality assurance or bureaucratic nightmare? Details ... Audit of Management of Open Fractures, Details PDF.

  14. Introduction to quality assurance

    International Nuclear Information System (INIS)

    Kaden, W.

    1980-01-01

    In today's interpretation 'quality assurance' means 'good management'. Quality assurance has to cover all phases of a work, but all quality assurance measures must be adapted to the relevance and complexity of the actual task. Examples are given for the preparation of quality classes, the organization of quality assurance during design and manufacturing and for auditing. Finally, efficiency and limits of quality assurance systems are described. (orig.)

  15. Quality assurance systems at SKODA JS

    International Nuclear Information System (INIS)

    Janecek, P.

    2000-01-01

    In addition to technical requirements put upon the design, manufacture, installation and commissioning of equipment for nuclear power plants, emphasis is laid upon quality assurance of such activities so as to secure nuclear safety of installations over the world. As the technical level of nuclear safety assurance is being enhanced continuously, the requirements are becoming more and more stringent, which is mirrored by the relevant standards and legislation. SKODA JS has always been pursuing the quality goal and has been contributing to this aspect markedly. The quality assurance system at SKODA JS helps the company to satisfy all the appropriate requirements of its customers as well as the applicable standards and regulations. (author)

  16. Quality assurance records system

    International Nuclear Information System (INIS)

    1979-01-01

    This Safety Guide was prepared as part of the Agency's programme, referred to as the NUSS programme, for establishing Codes of Practice and Safety Guides relating to nuclear power plants. It supplements the IAEA Code of Practice on Quality Assurance for Safety in Nuclear Power Plants (IAEA Safety Series No.50-C-QA), which requires that for each nuclear power plant a system for the generation, identification, collection, indexing, filing, storing, maintenance and disposition of quality assurance records shall be established and executed in accordance with written procedures and instructions. The purpose of this Safety Guide is to provide assistance in the establishment and operation of such a system. An orderly established and maintained records system is considered to be part of the means of providing a basis for an appropriate level of confidence that the activities which affect the quality of a nuclear power plant have been performed in accordance with the specific requirements and that the required quality has been achieved and is maintained

  17. Future of Assurance: Ensuring that a System is Trustworthy

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire

    Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.

  18. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  19. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  20. Food assistance is associated with improved body mass index, food security and attendance at clinic in an HIV program in central Haiti: a prospective observational cohort study

    Directory of Open Access Journals (Sweden)

    Ivers Louise C

    2010-08-01

    Full Text Available Abstract Background Few data are available to guide programmatic solutions to the overlapping problems of undernutrition and HIV infection. We evaluated the impact of food assistance on patient outcomes in a comprehensive HIV program in central Haiti in a prospective observational cohort study. Methods Adults with HIV infection were eligible for monthly food rations if they had any one of: tuberculosis, body mass index (BMI 2, CD4 cell count 3 (in the prior 3 months or severe socio-economic conditions. A total of 600 individuals (300 eligible and 300 ineligible for food assistance were interviewed before rations were distributed, at 6 months and at 12 months. Data collected included demographics, BMI and food insecurity score (range 0 - 20. Results At 6- and 12-month time-points, 488 and 340 subjects were eligible for analysis. Multivariable analysis demonstrated that at 6 months, food security significantly improved in those who received food assistance versus who did not (-3.55 vs -0.16; P Conclusions Food assistance was associated with improved food security, increased BMI, and improved adherence to clinic visits at 6 and 12 months among people living with HIV in Haiti and should be part of routine care where HIV and food insecurity overlap.

  1. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  2. Quality assurance in the design

    International Nuclear Information System (INIS)

    Edelmann, J.

    1980-01-01

    System- and product-related quality assurance measures are completing one another. Certainly it is possible to detect a lot of defects in the single technical document by well controlled product related quality inspections and to avoid the consequences of these defects; but also a not unimportant part of defects and deviations has its origin in system linked deficiencies. The latter can be detected more easily and more securely by means of system related reviews (System audit, Product audit). But also the sole implementation of system related quality assurance measures keeps the danger to get stuck only in formality and to loose all references to the specific characteristics of the product. (orig./RW)

  3. HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Artur Sosin

    2018-04-01

    Full Text Available The competitive world we live in today is characterized by an environment where the advancement of technology has increased the number of complex vulnerabilities and sophisticated attacks. Organizations around the globe are facing now the same challenges of implementing data protection and securing information assurance. The purpose of this paper is to prove that Information Assurance has become one of the most important tools in creating and maintaining a competitive advantage in today’s competitive and global marketplace. This paper also presents the relationship between information assurance and cybersecurity, and their connection with confidentiality, integrity, availability (CIA triad. Furthermore, assuring information and providing security is a life cycle process which needs a comprehensive understanding, skills, and experience in order to protect today’s risk management challenges. The author concludes the paper with the importance of information assurance policies which are the fundamental guidelines for protecting information assets and fulfilling information assurance objectives of an organization.

  4. SECURE MATHEMATICALLY- ASSURED COMPOSITION OF CONTROL MODELS

    Science.gov (United States)

    2017-09-27

    and in fact, often introduces new vulnerabilities that can be exploited. The situation is even worse for em - bedded software because it is often...fork- bomb is a program which continuously replicates itself, thus making it very hard to kill off all instances of the forkbomb. This causes the...binaries. In Eduardo Tovar, editor, IEEE Real-Time and Em - bedded Technology and Applications Symposium (RTAS), pages 97–106, Philadelphia, USA, April 2013

  5. Computer software quality assurance

    International Nuclear Information System (INIS)

    Ives, K.A.

    1986-06-01

    The author defines some criteria for the evaluation of software quality assurance elements for applicability to the regulation of the nuclear industry. The author then analyses a number of software quality assurance (SQA) standards. The major extracted SQA elements are then discussed, and finally specific software quality assurance recommendations are made for the nuclear industry

  6. Data Quality Assurance Governance

    OpenAIRE

    Montserrat Gonzalez; Stephanie Suhr

    2016-01-01

    This deliverable describes the ELIXIR-EXCELERATE Quality Management Strategy, addressing EXCELERATE Ethics requirement no. 5 on Data Quality Assurance Governance. The strategy describes the essential procedures and practices within ELIXIR-EXCELERATE concerning planning of quality management, performing quality assurance and controlling quality. It also depicts the overall organisation of ELIXIR with emphasis on authority and specific responsibilities related to quality assurance.

  7. Multinational Quality Assurance

    Science.gov (United States)

    Kinser, Kevin

    2011-01-01

    Multinational colleges and universities pose numerous challenges to the traditional models of quality assurance that are designed to validate domestic higher education. When institutions cross international borders, at least two quality assurance protocols are involved. To guard against fraud and abuse, quality assurance in the host country is…

  8. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  9. Use of Evaluation Criteria in Security Education

    National Research Council Canada - National Science Library

    Nguyen, Thuy D; Irvine, Cynthia E

    2008-01-01

    .... A cornerstone of this success will be the ability of Information Assurance professionals to develop sound security requirements and determine the suitability of evaluated security products for mission-specific systems...

  10. The application of quality assurance

    International Nuclear Information System (INIS)

    Lovatt, G.B.

    1988-01-01

    The paper concerns the application of quality assurance to structures, systems and components for the design, construction and operation of nuclear power plant and fuel reprocessing plant. A description is given of:- the requirements for quality assurance, the establishment of quality assurance arrangements, quality assurance documents structure, and quality assurance manuals and programmes. Quality assurance procedures and auditing are also discussed. (U.K.)

  11. Quality assurance of nuclear energy

    International Nuclear Information System (INIS)

    1994-12-01

    It consists of 14 chapters, which are outline of quality assurance of nuclear energy, standard of quality assurance, business quality assurance, design quality assurance, purchase quality assurance, production quality assurance, a test warranty operation warranty, maintenance warranty, manufacture of nuclear power fuel warranty, computer software warranty, research and development warranty and quality audit.

  12. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  13. High assurance SPIRAL

    Science.gov (United States)

    Franchetti, Franz; Sandryhaila, Aliaksei; Johnson, Jeremy R.

    2014-06-01

    In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and future embedded and high performance embedded system processors. High Assurance SPIRAL is a scalable methodology to translate a high level specification of a high assurance controller into a highly resource-efficient, platform-adapted, verified control software implementation for a given platform in a language like C or C++. High Assurance SPIRAL proves that the implementation is equivalent to the specification written in the control engineer's domain language. Our approach scales to problems involving floating-point calculations and provides highly optimized synthesized code. It is possible to estimate the available headroom to enable assurance/performance trade-offs under real-time constraints, and enables the synthesis of multiple implementation variants to make attacks harder. At the core of High Assurance SPIRAL is the Hybrid Control Operator Language (HCOL) that leverages advanced mathematical constructs expressing the controller specification to provide high quality translation capabilities. Combined with a verified/certified compiler, High Assurance SPIRAL provides a comprehensive complete solution to the efficient synthesis of verifiable high assurance controllers. We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned ground vehicle and on a Synthetic Car in a real-time simulator.

  14. Revitalizing quality assurance

    International Nuclear Information System (INIS)

    Hawkins, F.C.

    1998-01-01

    The image of someone inspecting or auditing often comes to mind when people hear the term quality assurance. Although partially correct, this image is not the complete picture. The person doing the inspecting or auditing is probably part of a traditional quality assurance organization, but that organization is only one aspect of a properly conceived and effectively implemented quality assurance system whose goal is improved facility safety and reliability. This paper introduces the underlying philosophies and basic concepts of the International Atomic Energy Agency's new quality assurance initiative that began in 1991 as part of a broad Agency-wide program to enhance nuclear safety. The first product of that initiative was publication in 1996 of a new Quality Assurance Code 50-C/SG-Q and fourteen related Safety Guides. This new suite of documents provide the technical and philosophical foundation upon which Member States can base their quality assurance programs. (author)

  15. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  16. Implementing a High-Assurance Smart-Card OS

    Science.gov (United States)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  17. Audit Characteristics for Information System Security

    OpenAIRE

    Marius POPA; Mihai DOINEA

    2007-01-01

    The paper presents the main aspects regarding the development of the information security and assurance of their security. The information systems, standards and audit processes definitions are offered. There are presented the most important security standards used in information system security assessment

  18. Quality assurance in radiodiagnosis

    International Nuclear Information System (INIS)

    Ghilardi Netto, T.; Sao Paulo Univ., Ribeirao Preto

    1983-01-01

    The following topics are dealt with: 1) the importance of the application of a quality assurance program in radiodiagnosis, with its main consequences : improvement of imaging quality, reduction of the patient expossure rate, cost reduction and 2) how to introduce the quality assurance control in the radiodiagnostic area. (M.A.) [pt

  19. Quality assurance program

    International Nuclear Information System (INIS)

    Brooks, G.L.

    The concept of levels of quality assurance as applied to CANDU-type nuclear power plant components, i.e. maintaining an appropriate cost/benefit ratio, is introduced. The design process itself has quality assurance features by virtue of multi-level review. (E.C.B.)

  20. 76 FR 35245 - Country Investors Life Assurance Company, et al.

    Science.gov (United States)

    2011-06-16

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29691; File No. 812-13865] Country Investors Life Assurance Company, et al. June 9, 2011. AGENCY: Securities and Exchange Commission (the ``Commission''). ACTION: Notice of application for an order pursuant to Section 26(c) of the Investment Company...

  1. Laboratory quality assurance

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1977-01-01

    The elements (principles) of quality assurance can be applied to the operation of the analytical chemistry laboratory to provide an effective tool for indicating the competence of the laboratory and for helping to upgrade competence if necessary. When used, those elements establish the planned and systematic actions necessary to provide adequate confidence in each analytical result reported by the laboratory (the definition of laboratory quality assurance). The elements, as used at the Hanford Engineering Development Laboratory (HEDL), are discussed and they are qualification of analysts, written methods, sample receiving and storage, quality control, audit, and documentation. To establish a laboratory quality assurance program, a laboratory QA program plan is prepared to specify how the elements are to be implemented into laboratory operation. Benefits that can be obtained from using laboratory quality assurance are given. Experience at HEDL has shown that laboratory quality assurance is not a burden, but it is a useful and valuable tool for the analytical chemistry laboratory

  2. Quality assurance of metabolomics.

    Science.gov (United States)

    Bouhifd, Mounir; Beger, Richard; Flynn, Thomas; Guo, Lining; Harris, Georgina; Hogberg, Helena; Kaddurah-Daouk, Rima; Kamp, Hennicke; Kleensang, Andre; Maertens, Alexandra; Odwin-DaCosta, Shelly; Pamies, David; Robertson, Donald; Smirnova, Lena; Sun, Jinchun; Zhao, Liang; Hartung, Thomas

    2015-01-01

    Metabolomics promises a holistic phenotypic characterization of biological responses to toxicants. This technology is based on advanced chemical analytical tools with reasonable throughput, including mass-spectroscopy and NMR. Quality assurance, however - from experimental design, sample preparation, metabolite identification, to bioinformatics data-mining - is urgently needed to assure both quality of metabolomics data and reproducibility of biological models. In contrast to microarray-based transcriptomics, where consensus on quality assurance and reporting standards has been fostered over the last two decades, quality assurance of metabolomics is only now emerging. Regulatory use in safety sciences, and even proper scientific use of these technologies, demand quality assurance. In an effort to promote this discussion, an expert workshop discussed the quality assurance needs of metabolomics. The goals for this workshop were 1) to consider the challenges associated with metabolomics as an emerging science, with an emphasis on its application in toxicology and 2) to identify the key issues to be addressed in order to establish and implement quality assurance procedures in metabolomics-based toxicology. Consensus has still to be achieved regarding best practices to make sure sound, useful, and relevant information is derived from these new tools.

  3. DOE financial assurance presentation

    International Nuclear Information System (INIS)

    Huck, R.

    1990-01-01

    The presentation topic is California's approach to license application review in meeting financial assurances for the proposed Ward Valley site. The purpose of the presentation is to provide information on specific financial assurance provisions contained in 10 CFR Part 61 and how California intends to satisfy those requirements. Also, as rate setter, California intends to demonstrate how it will assure allowable costs to the rate base though a financial prudency review. The key provisions of financial assurance are: 10 CFR Section 61.61 - This provision requires an applicant to demonstrate its ability to finance licensed activities; 10 CFR Section 61.62 - This provision requires an applicant to provide assurance that sufficient funds will be available for site closure and stabilization; and 10 CFR Section 61.63 - This provision requires an applicant to provide 'a copy of a binding arrangement, such as a lease, between the applicant and the disposal site owner, so that sufficient funds will be available to cover the costs of the institutional control period.' To assist California in its determination of financial assurance compliance to be demonstrated by the applicant for Part 61 requirements, is NUREG guidance document 1199 'Standard Format and Content of a License Application for a Low-Level Radioactive Waste (LLRW) Disposal Facility.' The detailed financial assurance provisions of NUREG 1199 are then embodied in NUREG 1200, 'Standard Review Plant for the Review of a License Application for a LLRW Disposal Facility.'

  4. Software quality assurance handbook

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  5. Quality assurance and management

    International Nuclear Information System (INIS)

    Newcomb, W.E.

    1989-01-01

    This paper traces the evolution of the quality assurance program of an office of waste management development (OWTD). The program's needs and commitment are examined. The author reports on the role of program and technical managers in such a program

  6. RAVEN Quality Assurance Activities

    Energy Technology Data Exchange (ETDEWEB)

    Cogliati, Joshua Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    This report discusses the quality assurance activities needed to raise the Quality Level of Risk Analysis in a Virtual Environment (RAVEN) from Quality Level 3 to Quality Level 2. This report also describes the general RAVEN quality assurance activities. For improving the quality, reviews of code changes have been instituted, more parts of testing have been automated, and improved packaging has been created. For upgrading the quality level, requirements have been created and the workflow has been improved.

  7. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    Groth, S.; Meghzifene, A.; Tatsuzaki, H.; Levin, V.; Izewska, J.

    2001-01-01

    Quality assurance in the management of a patient receiving radiation therapy and the role of the radiation oncologist and medical physicist in this process is described. The constraints on available personnel are recognised and the need for further education resources and IAEA activities in education for both groups described. IAEA activities in the clinical and dosimetric aspects and the resultant publications and education have contributed to a culture of quality assurance. (author)

  8. Quality assurance in NDT

    International Nuclear Information System (INIS)

    Krishnamoorthy, K.

    2010-01-01

    The importance of Nondestructive Testing (NDT) as a Quality Control/Quality Assurance tool in the industrial domain cannot be over-emphasized. With the rapid advancement in research and technology, the NDT field is becoming larger and more sophisticated day by day. Innovative research in materials science and digital technology is paving the way for more and more new methods in NDT technology. Although the NDT technology has improved over the years, the basic 'human factor' underlying the success of the NDT field remains the same. There are two major factors that influence the 'Quality Assurance in NDT'. First, knowledgeable and skilled NDT Operators are the most important factor in assuring the reliable test results. Second, the Management oversight of the NDT operations plays a major role in assuring the overall quality of NDT. Management responsibilities include the implementation of a Quality Management System (QMS) that focuses on the NDT operations and apply all the elements of Quality Assurance relevant to NDT. Whether the NDT operations are performed in-house or by a contractor, periodic Management Self-assessments should include the following question: How can the Management assess and improve the 'Quality Assurance in NDT'? This paper attempts to answer the above question. Some practical examples are provided to illustrate the potential quality incidents that could lead to costly failures, and the role of NDT Operator and the Management in preventing such quality incidents. Also, some guidelines are provided on how the Management can apply the elements of Quality Assurance to NDT in order to assess and improve the 'Quality Assurance in NDT'. (author)

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1732 ... Journal Home > Advanced Search > Browse Title Index ... Vol 10, No 3 (2007), An Audit Of Perioperative Cardiac Arrest At ... Vol 11, No 4 (2008), An Audit Of Rejected Repeated X-ray Films As A Quality Assurance ...

  10. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  11. Organic flow assurance, pour point depressant development through experimental design

    OpenAIRE

    Norland, Anne Kristine

    2012-01-01

    Master's thesis in Environmental technology Flow assurance is of great importance in the oil and gas industry, where the main objective is to provide and secure the transport of the well stream fluid from the reservoir to the process facilities. The main challenges in flow assurance are solid depositions in the pipelines, which can lead to reduction in the production, or in worst case completely block the pipelines. Wax deposition is a common problem in the oil industry, especially with...

  12. Quality assurance in nuclear fuel element component supply

    International Nuclear Information System (INIS)

    Jenkins, B.P.

    1987-01-01

    The paper describes the application of Quality Assurance to nuclear fuel element component supply. The Quality Assurance programme includes integrated procurement, purchasing, surveillance and receipt inspection functions. Purchasing policy is based on a consistent preference for competitive tendering. Multiple sourcing is used to encourage competitive pricing and increase security of supply. A receipt inspection facility is maintained to ensure the high product quality levels demanded by the nuclear industry. (U.K.)

  13. Assurance Evaluation for OSS Adoption in a Telco Context

    Science.gov (United States)

    Ardagna, Claudio A.; Banzi, Massimo; Damiani, Ernesto; El Ioini, Nabil; Frati, Fulvio

    Software Assurance (SwA) is a complex concept that involves different stages of a software development process and may be defined differently depending on its focus, as for instance software quality, security, or dependability. In Computer Science, the term assurance is referred to all activities necessary to provide enough confidence that a software product will satisfy its users’ functional and non-functional requirements.

  14. 10 CFR 780.8 - Security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  15. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  16. 222-S Laboratory Quality Assurance Plan. Revision 1

    International Nuclear Information System (INIS)

    Meznarich, H.K.

    1995-01-01

    This Quality Assurance Plan provides,quality assurance (QA) guidance, regulatory QA requirements (e.g., 10 CFR 830.120), and quality control (QC) specifications for analytical service. This document follows the U.S Department of Energy (DOE) issued Hanford Analytical Services Quality Assurance Plan (HASQAP). In addition, this document meets the objectives of the Quality Assurance Program provided in the WHC-CM-4-2, Section 2.1. Quality assurance elements required in the Guidelines and Specifications for Preparing Quality Assurance Program Plans (QAMS-004) and Interim Guidelines and Specifications for Preparing Quality Assurance Project Plans (QAMS-005) from the US Environmental Protection Agency (EPA) are covered throughout this document. A quality assurance index is provided in the Appendix A. This document also provides and/or identifies the procedural information that governs laboratory operations. The personnel of the 222-S Laboratory and the Standards Laboratory including managers, analysts, QA/QC staff, auditors, and support staff shall use this document as guidance and instructions for their operational and quality assurance activities. Other organizations that conduct activities described in this document for the 222-S Laboratory shall follow this QA/QC document

  17. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  18. Quality assurance of radiopharmaceuticals

    International Nuclear Information System (INIS)

    Frier, M.; Hesslewood, S.R.

    1980-01-01

    A practical guide has been composed for all persons involved in the preparation and use of radiopharmaceuticals on methods used in quality assurance and their applications. These methods include the calibration of ionization chamber assay calibrators, the determination of radionuclide purity, radiochemical purity and chemical purity, particle size analysis and the measurement of pH. Quality assurance procedures are described for products not described in Compendial Monographs, or where the monograph exists, additional useful information is provided; such radiopharmaceuticals include technetium, indium-labelled and iodine-labelled products. (U.K.)

  19. Software quality assurance

    CERN Document Server

    Laporte, Claude Y

    2018-01-01

    This book introduces Software Quality Assurance (SQA) and provides an overview of standards used to implement SQA. It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace. * Includes supplementary website with an instructor's guide and solutions * Applies IEEE software standards as well as the Capability Maturity Model Integration for Development (CMMI) * Illustrates the application of software quality assurance practices through the use of practical examples, quotes from experts, and tips from the authors

  20. Nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    1976-01-01

    Full text: Quality assurance is used extensively in the design, construction and operation of nuclear power plants. This methodology is applied to all activities affecting the quality of a nuclear power plant in order to obtain confidence that an item or a facility will perform satisfactorily in service. Although the achievement of quality is the responsibility of all parties participating in a nuclear power project, establishment and implementation of the quality assurance programme for the whole plant is a main responsibility of the plant owner. For the plant owner, the main concern is to achieve control over the quality of purchased products or services through contractual arrangements with the vendors. In the case of purchase of nuclear fuel, the application of quality assurance might be faced with several difficulties because of the lack of standardization in nuclear fuel and the proprietary information of the fuel manufacturers on fuel design specifications and fuel manufacturing procedures. The problems of quality assurance for purchase of nuclear fuel were discussed in detail during the seminar. Due to the lack of generally acceptable standards, the successful application of the quality assurance concept to the procurement of fuel depends on how much information can be provided by the fuel manufacturer to the utility which is purchasing fuel, and in what form and how early this information can be provided. The extent of information transfer is basically set out in the individual vendor-utility contracts, with some indirect influence from the requirements of regulatory bodies. Any conflict that exists appears to come from utilities which desire more extensive control over the product they are buying. There is a reluctance on the part of vendors to permit close insight of the purchasers into their design and manufacturing procedures, but there nevertheless seems to be an increasing trend towards release of more information to the purchasers. It appears that

  1. Medicine in Ancient Assur

    DEFF Research Database (Denmark)

    Arbøll, Troels Pank

    This dissertation is a microhistorical study of a single individual named Kiṣir-Aššur who practiced medicine in the ancient city of Assur (modern northern Iraq) in the 7th century BCE. The study provides the first detailed analysis of one healer’s education and practice in ancient Mesopotamia...

  2. Quality assurance. 6. ed.

    International Nuclear Information System (INIS)

    Masing, W.

    1979-01-01

    Brief introduction to the quality sector. After some explanations of the terms of quality, feature, and defect, the article discusses the planning of quality and testing, industrial metrology, the test risk, quality assurance, quality enhancement, quality cost, and organisational problems. (RW) [de

  3. Quality Assurance Program Description

    Energy Technology Data Exchange (ETDEWEB)

    Halford, Vaughn Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ryder, Ann Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-01

    Effective May 1, 2017, led by a new executive leadership team, Sandia began operating within a new organizational structure. National Technology and Engineering Solutions of Sandia (Sandia’s) Quality Assurance Program (QAP) was established to assign responsibilities and authorities, define workflow policies and requirements, and provide for the performance and assessment of work.

  4. [Integrated quality assurance].

    Science.gov (United States)

    Bögel, K; Stöhr, K

    1994-07-01

    The definition of terms and connotation of "Quality", "Quality Assurance" and "Integration" lead to an analysis and understanding of inhibiting and fostering factors of the "Health Triad" of people, animals and environment. Although "Quality" is largely or ultimately determined by the consumer, there are considerable differences as this term is applied by (a) the individual consumer, (b) the dynamic producer defending or gaining markets, (c) those engaged in traditional product manufacturing, or (d) governments setting (minimum) requirements for the sake of free trade. "Quality Assurance" offers cooperation of partners all along the food chain from "pasture to table". The managerial process turned into a continuum of responsibility and agreement on processes and product characteristics. This overcomes the disadvantages of strategies stressing distinct defense barriers. In practice this philosophy of a predominant role of defence barriers proved largely partnership destructive, in that it permitted to shift responsibilities for failures and to claim administrative competence according to momentary situations and interests. "Integrated Quality Assurance" means mutual agreement of two or more partners along the food chain (e. g. feed producers, farmers, animal health industry, veterinarians and food processors) on product characteristics and production methods. It involves essential system elements including facilities, materials, manpower, information, transport, management etc. Different principles and procedures of quality assurance have been introduced in practice, including agriculture and food processing. These different approaches are not mutually exclusive but largely of complementary nature.(ABSTRACT TRUNCATED AT 250 WORDS)

  5. Providing Continuous Assurance

    NARCIS (Netherlands)

    Kocken, Jonne; Hulstijn, Joris

    2017-01-01

    It has been claimed that continuous assurance can be attained by combining continuous monitoring by management, with continuous auditing of data streams and the effectiveness of internal controls by an external auditor. However, we find that in existing literature the final step to continuous

  6. Chapter 8: Quality assurance

    International Nuclear Information System (INIS)

    2001-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (UJD) have been focused on inspection of quality assurance programmes of Slovak Power Stations, plc. and its daughter companies at Bohunice and Mochovce. Two quality assurance inspections in the area of periodical in service inspections (V-2 units) and tests of selected equipment (NPP V-2 units) and operation control (V-1 units) has been performed at NPPs Bohunice. One violation of decree on quality assurance of selected equipment has been found in the area of documentation archiving. The inspection concerning the implementation of quality assurance programme for operation of NPP Mochovce in the area of operation control has been performed focused on safety aspects of operation, operational procedures, control of operational events and feedback from operational experience. The results of this inspection were positive. Inspection of implementation of quality assurance programme for operation of radioactive waste repository (RU RAW) at the Mochovce location has been performed focused on receiving of containers, with radioactive wastes, containers handling, radiation monitoring, activities of documentation control and radiation protection at the repository site. No serious deficiencies have been found out. Also one inspection of experimental nuclear installations of VUJE Trnava at Jaslovske Bohunice site has been performed focused on procurement control, quality audits, documentation and quality records control when performing activities at experimental nuclear installations. The activity on development of internal quality assurance system continued. The implementation of this system will assure quality and effective fulfilment enlarged tasks of UJD with limited resources for its activity. The analyses of possible use of existing internal administrative control documentation as a basis for future quality system procedures was performed in co-operation with an external specialised organisation. The

  7. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the nee...

  8. Reflection on Quality Assurance System of Higher Vocational Education under Big Data Era

    Directory of Open Access Journals (Sweden)

    Jiang Xinlan

    2015-01-01

    Full Text Available Big data has the features like Volume, Variety, Value and Velocity. Here come the new opportunities and challenges for construction of Chinese quality assurance system of higher vocational education under big data era. There are problems in current quality assurance system of higher vocational education, such as imperfect main body, non-formation of internally and externally incorporated quality assurance system, non-scientific security standard and insufficiency in security investment. The construction of higher vocational education under big data era requires a change in the idea of quality assurance system construction to realize the multiple main bodies and multiple layers development trend for educational quality assurance system, and strengthen the construction of information platform for quality assurance system.

  9. INDEXING AND INDEX FUNDS

    Directory of Open Access Journals (Sweden)

    HAKAN SARITAŞ

    2013-06-01

    Full Text Available Proponents of the efficient market hypothesis believe that active portfolio management is largely wasted effort and unlikely to justify the expenses incurred. Therefore, they advocate a passive investment strategy that makes no attempt to outsmart the market. One common strategy for passive management is indexing where a fund is designed to replicate the performance of a broad-based index of stocks and bonds. Traditionally, indexing was used by institutional investors, but today, the use of index funds proliferated among individual investors. Over the years, both international and domestic index funds have disproportionately outperformed the market more than the actively managed funds have.

  10. BYU Food Quality Assurance Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Quality Assurance Lab is located in the Eyring Science Center in the department of Nutrition, Dietetics, and Food Science. The Quality Assurance Lab has about 10...

  11. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  12. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  13. Assurance in Agent-Based Systems

    Energy Technology Data Exchange (ETDEWEB)

    Gilliom, Laura R.; Goldsmith, Steven Y.

    1999-05-10

    Our vision of the future of information systems is one that includes engineered collectives of software agents which are situated in an environment over years and which increasingly improve the performance of the overall system of which they are a part. At a minimum, the movement of agent and multi-agent technology into National Security applications, including their use in information assurance, is apparent today. The use of deliberative, autonomous agents in high-consequence/high-security applications will require a commensurate level of protection and confidence in the predictability of system-level behavior. At Sandia National Laboratories, we have defined and are addressing a research agenda that integrates the surety (safety, security, and reliability) into agent-based systems at a deep level. Surety is addressed at multiple levels: The integrity of individual agents must be protected by addressing potential failure modes and vulnerabilities to malevolent threats. Providing for the surety of the collective requires attention to communications surety issues and mechanisms for identifying and working with trusted collaborators. At the highest level, using agent-based collectives within a large-scale distributed system requires the development of principled design methods to deliver the desired emergent performance or surety characteristics. This position paper will outline the research directions underway at Sandia, will discuss relevant work being performed elsewhere, and will report progress to date toward assurance in agent-based systems.

  14. Assurance in Agent-Based Systems

    International Nuclear Information System (INIS)

    Gilliom, Laura R.; Goldsmith, Steven Y.

    1999-01-01

    Our vision of the future of information systems is one that includes engineered collectives of software agents which are situated in an environment over years and which increasingly improve the performance of the overall system of which they are a part. At a minimum, the movement of agent and multi-agent technology into National Security applications, including their use in information assurance, is apparent today. The use of deliberative, autonomous agents in high-consequence/high-security applications will require a commensurate level of protection and confidence in the predictability of system-level behavior. At Sandia National Laboratories, we have defined and are addressing a research agenda that integrates the surety (safety, security, and reliability) into agent-based systems at a deep level. Surety is addressed at multiple levels: The integrity of individual agents must be protected by addressing potential failure modes and vulnerabilities to malevolent threats. Providing for the surety of the collective requires attention to communications surety issues and mechanisms for identifying and working with trusted collaborators. At the highest level, using agent-based collectives within a large-scale distributed system requires the development of principled design methods to deliver the desired emergent performance or surety characteristics. This position paper will outline the research directions underway at Sandia, will discuss relevant work being performed elsewhere, and will report progress to date toward assurance in agent-based systems

  15. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    , on the one hand, to advance internationalisation of quality assurance of higher education, and on the other hand, allow for the differences in the national approaches to quality assurance. The paper will focus on two issues: first, the strength and weaknesses of the method employed and of the use of the ENQA......The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the need...

  16. Metrology's role in quality assurance

    International Nuclear Information System (INIS)

    Zeederberg, L.B.

    1982-01-01

    Metrology, the science of measurement, is playing an increasing role in modern industry as part of an on-going quality assurance programme. At Escom, quality assurance was critical during the construction of the Koeberg nuclear facility, and also a function in controlling services provided by Escom. This article deals with the role metrology plays in quality assurance

  17. Towards Agile Security Risk Management in RE and Beyond

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Bakalova, Z.; Tun, Thein Tan; Daneva, Maia

    Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security

  18. 75 FR 64642 - Indexed Annuities

    Science.gov (United States)

    2010-10-20

    ... 3235-AK16 Indexed Annuities AGENCY: Securities and Exchange Commission. ACTION: Final rule; withdrawal... under the Securities Act of 1933, which defines the terms ``annuity contract'' and ``optional annuity... under the Securities Act of 1933.\\1\\ Rule 151A defines the terms ``annuity contract'' and ``optional...

  19. Information Assurance in Networked Enterprises: MICSS Class Experiments and Industry Survey Analysis

    National Research Council Canada - National Science Library

    Ray, Parbati

    2001-01-01

    .... The surveys give an insight into how inter-networked companies use their ERP systems, whet their current policies maybe with respect to information management, and what their security and assurance problems maybe...

  20. Cyber-assurance for the Internet of Things

    CERN Document Server

    2017-01-01

    This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, rotect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication...

  1. Quality assurance in microbiology

    OpenAIRE

    Arora D

    2004-01-01

    Quality assurance (QA) is the total process whereby the quality of laboratory reports can be guaranteed. The term quality control covers that part of QA, which primarily concerns the control of errors in the performance of tests and verification of test results. All materials, equipment and procedures must be adequately controlled. Culture media must be tested for sterility and performance. Each laboratory must have standard operating procedures (SOPs). QA of pre-analytical, analytical and po...

  2. Introduction to quality assurance

    International Nuclear Information System (INIS)

    Raisic, N.

    1980-01-01

    Safety requirements set forth in the regulatory requirement, codes, standards as well as other requirements for various aspects of nuclear power plant design and operation are strictly implemented through QA activities. The overall QA aim is to assure that the plant is soundly and correctly designed and that it is built, tested and operated in accordance with stringent quality standards and conservative engineering practices. In this way a high degree of freedom from faults and errors can be achieved. (orig.)

  3. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    2003-03-01

    Good radiotherapy results and safety of treatment require the radiation to be optimally applied to a specified target area and the correct dose. According to international recommendations, the average uncertainty in therapeutic dose should not exceed 5%. The need for high precision in therapeutic dose requires quality assurance covering the entire radiotherapy process. Besides the physical and technical characteristics of the therapy equipment, quality assurance must include all radiotherapy equipment and procedures that are significant for the correct magnitude and precision of application of the therapeutic dose. The duties and responsibilities pertaining to various stages of treatment must also be precisely defined. These requirements may be best implemented through a quality system. The general requirements for supervision and quality assurance of medical radiation apparatus are prescribed in section 40 of the Radiation Act (592/1991, amendment 1142/1998) and in sections 18 and 32 of the Decree of the Ministry of Social Affairs and Health on the medical use of radiation (423/2000). Guide ST 2.2 imposes requirements on structural radiation shielding of radiotherapy equipment and the premises in which it is used, and on warning and safety arrangements. Guide ST 1.1 sets out the general safety principles for radiation practices and regulatory control procedure for the use of radiation. Guide ST 1.6 provides general requirements for operational measures in the use of radiation. This Guide sets out the duties of responsible parties (the party running a radiation practice) in respect of arranging and maintaining radiotherapy quality assurance. The principles set out in this Guide and Guide ST 6.3 may be applied to radionuclide therapy

  4. SGHWR - quality assurance documentation

    International Nuclear Information System (INIS)

    Garrard, R.S.; Caulfield, J.

    1976-01-01

    The quality assurance program for a modern power station such as an SGHWR type reactor plant must include a record of quality achievement. The case history record which is evidence of the actual quality of the plant and is a data bank of design, manufacture, and results of inspections and tests, is described. Documentation distribution, which keeps all key areas informed of plant item quality status, and the retrieval and storage of information, are briefly discussed. (U.K.)

  5. High-Assurance Spiral

    Science.gov (United States)

    2017-11-01

    HIGH-ASSURANCE SPIRAL CARNEGIE MELLON UNIVERSITY NOVEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO...MU 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15217 8. PERFORMING ORGANIZATION...Approved for Public Release; Distribution Unlimited. Carnegie Mellon Carnegie Mellon HA SPIRAL Code Synthesis KeYmaera X Hybrid Theorem Prover

  6. Software Quality Assurance Metrics

    Science.gov (United States)

    McRae, Kalindra A.

    2004-01-01

    Software Quality Assurance (SQA) is a planned and systematic set of activities that ensures conformance of software life cycle processes and products conform to requirements, standards and procedures. In software development, software quality means meeting requirements and a degree of excellence and refinement of a project or product. Software Quality is a set of attributes of a software product by which its quality is described and evaluated. The set of attributes includes functionality, reliability, usability, efficiency, maintainability, and portability. Software Metrics help us understand the technical process that is used to develop a product. The process is measured to improve it and the product is measured to increase quality throughout the life cycle of software. Software Metrics are measurements of the quality of software. Software is measured to indicate the quality of the product, to assess the productivity of the people who produce the product, to assess the benefits derived from new software engineering methods and tools, to form a baseline for estimation, and to help justify requests for new tools or additional training. Any part of the software development can be measured. If Software Metrics are implemented in software development, it can save time, money, and allow the organization to identify the caused of defects which have the greatest effect on software development. The summer of 2004, I worked with Cynthia Calhoun and Frank Robinson in the Software Assurance/Risk Management department. My task was to research and collect, compile, and analyze SQA Metrics that have been used in other projects that are not currently being used by the SA team and report them to the Software Assurance team to see if any metrics can be implemented in their software assurance life cycle process.

  7. Power transformers quality assurance

    CERN Document Server

    Dasgupta, Indrajit

    2009-01-01

    About the Book: With the view to attain higher reliability in power system operation, the quality assurance in the field of distribution and power transformers has claimed growing attention. Besides new developments in the material technology and manufacturing processes of transformers, regular diagnostic testing and maintenance of any engineering product may be ascertained by ensuring: right selection of materials and components and their quality checks. application of correct manufacturing processes any systems engineering. the user`s awareness towards preventive maintenance. The

  8. Information Assurance within the United States Air Force

    Science.gov (United States)

    Cherry, John D.

    2010-01-01

    According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…

  9. Authentication Assurance Level Application to the Inventory Sampling Measurement System

    International Nuclear Information System (INIS)

    Devaney, Mike M.; Kouzes, Richard T.; Hansen, Randy R.; Geelhood, Bruce D.

    2001-01-01

    This document concentrates on the identification of a standardized assessment approach for the verification of security functionality in specific equipment, the Inspection Sampling Measurement System (ISMS) being developed for MAYAK. Specifically, an Authentication Assurance Level 3 is proposed to be reached in authenticating the ISMS

  10. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  11. Measurement quality assurance

    International Nuclear Information System (INIS)

    Eisenhower, E.H.

    1988-01-01

    The quality of a radiation protection program can be no better than the quality of the measurements made to support it. In many cases, that quality is unknown and is merely implied on the basis of a calibration of a measuring instrument. If that calibration is inappropriate or is performed improperly, the measurement result will be inaccurate and misleading. Assurance of measurement quality can be achieved if appropriate procedures are followed, including periodic quality control actions that demonstrate adequate performance. Several national measurement quality assurance (MQA) programs are operational or under development in specific areas. They employ secondary standards laboratories that provide a high-quality link between the National Bureau of Standards and measurements made at the field use level. The procedures followed by these secondary laboratories to achieve MQA will be described, as well as plans for similar future programs. A growing general national interest in quality assurance, combined with strong specific motivations for MQA in the area of ionizing radiation, will provide continued demand for appropriate national programs. Such programs must, however, employ procedures that are cost effective and must be developed with participation by all affected parties

  12. Helical Tomotherapy Quality Assurance

    International Nuclear Information System (INIS)

    Balog, John; Soisson, Emilie

    2008-01-01

    Helical tomotherapy uses a dynamic delivery in which the gantry, treatment couch, and multileaf collimator leaves are all in motion during treatment. This results in highly conformal radiotherapy, but the complexity of the delivery is partially hidden from the end-user because of the extensive integration and automation of the tomotherapy control systems. This presents a challenge to the medical physicist who is expected to be both a system user and an expert, capable of verifying relevant aspects of treatment delivery. A related issue is that a clinical tomotherapy planning system arrives at a customer's site already commissioned by the manufacturer, not by the clinical physicist. The clinical physicist and the manufacturer's representative verify the commissioning at the customer site before acceptance. Theoretically, treatment could begin immediately after acceptance. However, the clinical physicist is responsible for the safe and proper use of the machine. In addition, the therapists and radiation oncologists need to understand the important machine characteristics before treatment can proceed. Typically, treatment begins about 2 weeks after acceptance. This report presents an overview of the tomotherapy system. Helical tomotherapy has unique dosimetry characteristics, and some of those features are emphasized. The integrated treatment planning, delivery, and patient-plan quality assurance process is described. A quality assurance protocol is proposed, with an emphasis on what a clinical medical physicist could and should check. Additionally, aspects of a tomotherapy quality assurance program that could be checked automatically and remotely because of its inherent imaging system and integrated database are discussed

  13. Specified assurance level sampling procedure

    International Nuclear Information System (INIS)

    Willner, O.

    1980-11-01

    In the nuclear industry design specifications for certain quality characteristics require that the final product be inspected by a sampling plan which can demonstrate product conformance to stated assurance levels. The Specified Assurance Level (SAL) Sampling Procedure has been developed to permit the direct selection of attribute sampling plans which can meet commonly used assurance levels. The SAL procedure contains sampling plans which yield the minimum sample size at stated assurance levels. The SAL procedure also provides sampling plans with acceptance numbers ranging from 0 to 10, thus, making available to the user a wide choice of plans all designed to comply with a stated assurance level

  14. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activities and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities wihtin the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  15. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activitie and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities within the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  16. The quality assurance liaison: Combined technical and quality assurance support

    International Nuclear Information System (INIS)

    Bolivar, S.L.; Day, J.L.

    1993-01-01

    This paper describes the role of the quality assurance liaison, the responsibilities of this position, and the evolutionary changes in duties over the last six years. The role of the quality assurance liaison has had a very positive impact on the Los Alamos Yucca Mountain Site Characterization (YW) quality assurance program. Having both technical and quality assurance expertise, the quality assurance liaisons are able to facilitate communications with scientists on quality assurance issues and requirements, thereby generating greater productivity in scientific investigations. The quality assurance liaisons help ensure that the scientific community knows and implements existing requirements, is aware of new or changing regulations, and is able to conduct scientific work within Project requirements. The influence of the role of the quality assurance liaison can be measured by an overall improvement in attitude of the staff regarding quality assurance requirements and improved job performance, as well as a decrease in deficiencies identified during both internal and external audits and surveillances. This has resulted in a more effective implementation of quality assurance requirements

  17. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  18. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  19. Secure computing on reconfigurable systems

    OpenAIRE

    Fernandes Chaves, R.J.

    2007-01-01

    This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performa...

  20. Hyperthermia quality assurance

    International Nuclear Information System (INIS)

    Shrivastava, P.N.; Paliwal, B.R.

    1984-01-01

    Hyperthermia Physics Center (HPC) operating under contract with the National Cancer Institute is developing a Quality Assurance program for local and regional hyperthermia. The major clinical problem in hyperthermia treatments is that they are extremely difficult to plan, execute, monitor and reproduce. A scientific basis for treatment planning can be established only after ensuring that the performance of heat generating and temperature monitoring systems are reliable. The HPC is presently concentrating on providing uniform NBS traceable calibration of thermometers and evaluation of reproducibility for power generator operation, applicator performance, phanta compositions, system calibrations and personnel shielding. The organizational plan together with recommended evaluation measurements, procedures and criteria are presented

  1. How much quality assurance?

    International Nuclear Information System (INIS)

    Beatty, R.A.; Talboy, J.H.

    1988-01-01

    This paper describes the approach used at Argonne National Laboratory to apply the techniques of quality assurance to research and development activities. The discussion includes the approach, the reasons that it is gaining acceptance, and its wide applicability. This approach is founded on the lessons learned in management of quality at Argonne National Laboratory over a period of more than 15 years. The discussion is confined to the practices at the Illinois site of the Laboratory where more than 3000 researchers and support personnel conduct basic and technology-directed research

  2. Quality assurance services

    International Nuclear Information System (INIS)

    For over 20 years the quality assurance services at the Springfields Laboratories have been concerned with manufacturing both simple and complex engineering products to the highest standard. The scientists working there have considerable expertise in the practical application of quality control and the development and design of inspection and non-destructive testing equipment. The folder contains six sheets or leaflets illustrating the work and equipment. The subjects are the mechanical standards laboratory, non-destructive testing, the digitising table, the peripheral camera, automated measurement, data handling and presentation, and the computer controlled three axis co-ordinate measuring machine. (U.K.)

  3. Reactor system safety assurance

    International Nuclear Information System (INIS)

    Mattson, R.J.

    1984-01-01

    The philosophy of reactor safety is that design should follow established and conservative engineering practices, there should be safety margins in all modes of plant operation, special systems should be provided for accidents, and safety systems should have redundant components. This philosophy provides ''defense in depth.'' Additionally, the safety of nuclear power plants relies on ''safety systems'' to assure acceptable response to design basis events. Operating experience has shown the need to study plant response to more frequent upset conditions and to account for the influence of operators and non-safety systems on overall performance. Defense in depth is being supplemented by risk and reliability assessment

  4. Quality assurance program

    International Nuclear Information System (INIS)

    1977-07-01

    This topical report describes the Gibbs and Hill Quality Assurance Program and sets forth the methods to be followed in controlling quality-related activities performed by Gibbs and Hill and its contractors. The program is based on company experience in nuclear power and related work, and defines a system found effective in providing independent control of quality-related functions and documentation. The scope of the report covers activities involving nuclear safety-related structures, systems, and components covered by Gibbs and Hill' contractual obligation to the Utility Owner for each project

  5. BWR internals life assurance

    International Nuclear Information System (INIS)

    Herrera, M.L.; Stancavage, P.P.

    1988-01-01

    Boiling water reactor (BWR) internal components play an important role in power plant life extension. Many important internals were not designed for easy removal and changes in material properties and local environmental effects due to high radiation makes stress corrosion cracking more likely and more difficult to correct. Over the past several years, operating experience has shown that inspection, monitoring and refurbishment can be accomplished for internal structures with existing technology. In addition, mitigation techniques which address the causes of degradation are available to assure that life extension targets can be met. This paper describes the many considerations and aspects when evaluating life extension for reactor vessel internals

  6. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  7. Effective information management and assurance for a modern organisation during a crisis.

    Science.gov (United States)

    MacLeod, Andrew

    2015-01-01

    During a crisis, organisations face a major unpredictable event with potentially negative consequences. Effective information management and assurance can assist the organisation in making sure that they have the correct information in a secure format to make decisions to recover their operations. The main elements of effective information management and assurance are confidentiality, integrity and availability, combined with non-repudiation. Should an element of effective information management or assurance be removed it can have a detrimental effect on the other elements and render the information management and assurance practices of the organisation ineffectual.

  8. The role of quality assurance in the nuclear industry

    International Nuclear Information System (INIS)

    1985-01-01

    The paper reports on the proceedings of a one day conference on ''the role of quality assurance in the nuclear industry'', presented by the British Nuclear Forum Working Group on Quality Assurance, 1985. The conference reviews the application and effectiveness of the British Standards in the light of experience with the AGR programme, and considers the lessons learned that will benefit future projects. Seven papers are presented at the conference, of which five deal with the AGR experience with respect to quality assurance in design and manufacture. The remaining two papers examine quality assurance in computing software and building on the AGR experience. All seven papers are selected for INIS and indexed separately. (U.K.)

  9. Software Quality Assurance Audits Guidebooks

    Science.gov (United States)

    1990-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes that are used in software development. The Software Assurance Guidebook, NASA-GB-A201, issued in September, 1989, provides an overall picture of the NASA concepts and practices in software assurance. Second level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the second level Software Quality Assurance Audits Guidebook that describes software quality assurance audits in a way that is compatible with practices at NASA Centers.

  10. Quality assurance and reliability

    International Nuclear Information System (INIS)

    Normand, J.; Charon, M.

    1975-01-01

    Concern for obtaining high-quality products which will function properly when required to do so is nothing new - it is one manifestation of a conscientious attitude to work. However, the complexity and cost of equipment and the consequences of even temporary immobilization are such that it has become necessary to make special arrangements for obtaining high-quality products and examining what one has obtained. Each unit within an enterprise must examine its own work or arrange for it to be examined; a unit whose specific task is quality assurance is responsible for overall checking, but does not relieve other units of their responsibility. Quality assurance is a form of mutual assistance within an enterprise, designed to remove the causes of faults as far as possible. It begins very early in a project and continues through the ordering stage, construction, start-up trials and operation. Quality and hence reliability are the direct result of what is done at all stages of a project. They depend on constant attention to detail, for even a minor piece of poor workmanship can, in the case of an essential item of equipment, give rise to serious operational difficulties

  11. Quality-Assurance Program Plan

    International Nuclear Information System (INIS)

    Kettell, R.A.

    1981-05-01

    This Quality Assurance Program Plan (QAPP) is provided to describe the Quality Assurance Program which is applied to the waste management activities conducted by AESD-Nevada Operations at the E-MAD Facility located in Area 25 of the Nevada Test Site. The AESD-Nevada Operations QAPP provides the necessary systematic and administrative controls to assure activities that affect quality, safety, reliability, and maintainability during design, procurement, fabrication, inspection, shipments, tests, and storage are conducted in accordance with established requirements

  12. Quality assurance of fuel elements

    International Nuclear Information System (INIS)

    Hoerber, J.

    1980-01-01

    The quality assurance activities for reactor fuel elements are based on a quality assurance system which implies the requirements resulting from the specifications, regulations of the authorities, national standards and international rules and regulations. The quality assurance related to production of reactor fuel will be shown for PWR fuel elements in all typical fabrication steps as conversion into UO 2 -powder, pelletizing, rodmanufacture and assembling. A wide range of destructive and nondestructive techniques is applied. Quality assurance is not only verified by testing techniques but also by process monitoring by means of parameter control in production and testing procedures. (RW)

  13. A test of the resource security and the body mass index reference point hypotheses of body dissatisfaction amongst adolescents in eight countries.

    Science.gov (United States)

    Mellor, David; Fuller-Tyszkiewicz, Matthew; McCabe, Marita P; Ricciardelli, Lina A; Skouteris, Helen; Mussap, Alexander J

    2014-01-01

    This study aimed to identify cultural-level variables that may influence the extent to which adolescents from different cultural groups are dissatisfied with their bodies. A sample of 1730 male and 2000 female adolescents from Australia, Fiji, Malaysia, Tonga, Tongans in New Zealand, China, Chile, and Greece completed measures of body satisfaction, and the sociocultural influences on body image and body change questionnaire, and self-reported height and weight. Country gross domestic product and national obesity were recorded using global databases. Prevalence of obesity/overweight and cultural endorsement of appearance standards explained variance in individual-level body dissatisfaction (BD) scores, even after controlling for the influence of individual differences in body mass index and internalization of appearance standards. Cultural-level variables may account for the development of adolescent BD.

  14. Nuclear fuel assurance: origins, trends, and policy issues

    International Nuclear Information System (INIS)

    Neff, T.L.; Jacoby, H.D.

    1979-02-01

    The economic, technical and political issues which bear on the security of nuclear fuel supply internationally are addressed. The structure of international markets for nuclear fuel is delineated; this includes an analysis of the political constraints on fuel availability, especially the connection to supplier nonproliferation policies. The historical development of nuclear fuel assurance problems is explored and an assessment is made of future trends in supply and demand and in the political context in which fuel trade will take place in the future. Finally, key events and policies which will affect future assurance are identified

  15. The case of sustainability assurance: constructing a new assurance service

    NARCIS (Netherlands)

    O'Dwyer, B.

    2011-01-01

    This paper presents an in-depth longitudinal case study examining the processes through which practitioners in two Big 4 professional services firms have attempted to construct sustainability assurance (independent assurance on sustainability reports). Power’s (1996, 1997, 1999, 2003) theorization

  16. FESA Quality Assurance

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    FESA is a framework used by 100+ developers at CERN to design and implement the real-time software used to control the accelerators. Each new version must be tested and qualified to ensure that no backward compatibility issues have been introduced and that there is no major bug which might prevent accelerator operations. Our quality assurance approach is based on code review and a two-level testing process. The first level is made of unit-test (Python unittest & Google tests for C++). The second level consists of integration tests running on an isolated test environment. We also use a continuous integration service (Bamboo) to ensure the tests are executed periodically and the bugs caught early. In the presentation, we will explain the reasons why we took this approach, the results and some thoughts on the pros and cons.

  17. Subsurface quality assurance practices

    International Nuclear Information System (INIS)

    1987-08-01

    This report addresses only the concept of applying Nuclear Quality Assurance (NQA) practices to repository shaft and subsurface design and construction; how NQA will be applied; and the level of detail required in the documentation for construction of a shaft and subsurface repository in contrast to the level of detail required in the documentation for construction of a traditional mine. This study determined that NQA practices are viable, attainable, as well as required. The study identified the appropriate NQA criteria and the repository's major structures, systems, items, and activities to which the criteria are applicable. A QA plan, for design and construction, and a list of documentation, for construction, are presented. 7 refs., 1 fig., 18 tabs

  18. Concrete quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Holz, N. [Harza Engineering Company, Chicago, IL (United States)

    2000-08-01

    This short article reports on progress at the world's largest civil construction project, namely China's Three Gorges hydro project. Work goes on around the clock to put in place nearly 28 M m{sup 3} of concrete. At every stage of the work there is strong emphasis on quality assurance (QA) and concrete is no exception. The US company Harza Engineering has been providing QA since the mid-1980s and concrete QA has been based on international standards. Harza personnel work in the field with supervisors developing educational tools for supervising concrete construction and quality, as well as providing training courses in concrete technology. Some details on flood control, capacity, water quality and environmental aspects are given..

  19. Construction quality assurance report

    International Nuclear Information System (INIS)

    Roscha, V.

    1994-01-01

    This report provides a summary of the construction quality assurance (CQA) observation and test results, including: The results of the geosynthetic and soil materials conformance testing. The observation and testing results associates with the installation of the soil liners. The observation and testing results associated with the installation of the HDPE geomembrane liner systems. The observation and testing results associated with the installation of the leachate collection and removal systems. The observation and testing results associated with the installation of the working surfaces. The observation and testing results associated with in-plant manufacturing process. Summary of submittal reviews by Golder Construction Services, Inc. The submittal and certification of the piping material specifications. The observation and verification associated of the Acceptance Test Procedure results of the operational equipment functions. Summary of the ECNs which are incorporated into the project

  20. 40 CFR 792.35 - Quality assurance unit.

    Science.gov (United States)

    2010-07-01

    ... monitoring each study to assure management that the facilities, equipment, personnel, methods, practices... schedule sheet of all studies conducted at the testing facility indexed by test substance and containing... management immediately. (4) Periodically submit to management and the study director written status reports...

  1. Recent Trends in Quality Assurance

    Science.gov (United States)

    Amaral, Alberto; Rosa, Maria Joao

    2010-01-01

    In this paper we present a brief description of the evolution of quality assurance in Europe, paying particular attention to its relationship to the rising loss of trust in higher education institutions. We finalise by analysing the role of the European Commission in the setting up of new quality assurance mechanisms that tend to promote…

  2. Quality assurance of operating instructions

    International Nuclear Information System (INIS)

    Asmuss, G.

    1992-01-01

    It is pointed out that the quality assurance at nuclear power stations must be supported by national and international regulations. Quality assurance is explained using the example of the design of a pressurised water reactor. The operating and emergency manuals are discussed and examples for their structure put forward. The significance of updating is emphasised. 15 figs., 19 refs

  3. Project Specific Quality Assurance Plan

    International Nuclear Information System (INIS)

    Pedersen, K.S.

    1995-01-01

    This Quality Assurance Project Plan (QAPP) identifies the Westinghouse Hanford Co. (WHC) Quality Assurance (QA) program requirements for all contractors involved in the planning and execution of the design, construction, testing and inspection of the 200 Area Effluent BAT/AKART Implementation, Project W-291

  4. Printed Circuit Board Quality Assurance

    Science.gov (United States)

    Sood, Bhanu

    2016-01-01

    PCB Assurance Summary: PCB assurance actives are informed by risk in context of the Project. Lessons are being applied across Projects for continuous improvements. Newer component technologies, smaller/high pitch devices: tighter and more demanding PCB designs: Identifying new research areas. New materials, designs, structures and test methods.

  5. R D software quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Hood, F.C.

    1991-10-01

    Research software quality assurance (QA) requirements must be adequate to strengthen development or modification objectives, but flexible enough not to restrict creativity. Application guidelines are needed for the different kinds of research and development (R D) software activities to assure project objectives are achieved.

  6. Towards improvement in quality assurance

    International Nuclear Information System (INIS)

    1987-03-01

    This first document in the series of the International Nuclear Safety Advisory Group (INSAG) Technical Notes is a general guideline for the establishment of effective quality assurance procedures at nuclear facilities. It sets out primary requirements such as quality objectives, methods for measuring the effectiveness of the quality assurance programme, priority of activities in relation to importance of safety of items, motivation of personnel

  7. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  8. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  9. The Canadian National Retirement Risk Index: employing statistics Canada's LifePaths to measure the financial security of future Canadian seniors.

    Science.gov (United States)

    MacDonald, Bonnie-Jeanne; Moore, Kevin D; Chen, He; Brown, Robert L

    2011-01-01

    This article measures a Canadian National Retirement Risk Index (NRRI). Originally developed by the Center for Retirement Research at Boston College, the NRRI is a forward-looking measure that evaluates the proportion of working-aged individuals who are at risk of not maintaining their standard of living in retirement. The Canadian retirement income system has been very effective in reducing elderly poverty, but our results suggest that it has been much less successful in maintaining the living standards of Canadians after retirement. Since the earlier years of the new millennium, we find that approximately one-third of retiring Canadians have been unable to maintain their working-age consumption after retirement—a trend that is projected to worsen significantly for future Canadian retirees. The release of the Canadian NRRI is timely given the widespread concern that the current Canadian retirement income system is inadequate. Many proposals have recently emerged to extend and/or enhance Canadian public pensions, and the NRRI is a tool to test their merit. The methodology underlying the Canadian NRRI is uniquely sophisticated and comprehensive on account of our employment of Statistics Canada’s LifePaths, a state-of-the-art stochastic microsimulation model of the Canadian population. For instance, the Canadian NRRI is novel in that it models all of the relevant sources of consumption before and after retirement, while accounting for important features that are typically neglected in retirement adequacy studies such as family size, the variation of consumption over a person’s lifetime, and the heterogeneity among the life courses of individuals.

  10. SEED: A Suite of Instructional Laboratories for Computer Security Education

    Science.gov (United States)

    Du, Wenliang; Wang, Ronghua

    2008-01-01

    The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…

  11. Information Security for Business: the Necessity of Reputational Risk Management

    Directory of Open Access Journals (Sweden)

    Vitaly Eduardovich Dorokhov

    2015-06-01

    Full Text Available The article presents the analysis of actual information security problems in commercial segment. The main directions in regulations of the Russian Federation connected with information security assurance are defined. The results indicate the insufficiency of legal regulation in prevention of reputational losses due to information security incidents

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  14. Methods of Software Quality Assurance under a Nuclear Quality Assurance Program

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Young Jun; Cha, Kyung Ho; Cheon, Se Woo; Lee, Jang Soo; Kwon, Kee Choon

    2005-01-01

    This paper addresses a substantial implementation of a software quality assurance under a nuclear quality assurance program. The relationship of the responsibility between a top-level nuclear quality assurance program such as ASME/NQA-1 and its lower level software quality assurance is described. Software quality assurance activities and software quality assurance procedures during the software development life cycle are also described

  15. Quality assurance during site construction

    International Nuclear Information System (INIS)

    Dommke, J.; Jurgutat, H.

    1980-01-01

    During the time of planing and construction of a nuclear power plant, the following proceeding is approved: - the deliverer of a nuclear power plant provides the reports fixing the quality assurance program, it means that he is responsible to write the safety analysis report, the specifications for the erection of the components, the working manuals and specifications for testing (eg nondestr. testing) - the manufacturing of components or systems will be controlled by an own independent quality assurance group, provided that this group was checked by the quality assurance group of the applicant - the TUeV with its independent assessors will fix the requirements relating to quality assurance in its assessment. On this basis the examination of the applicants specifications, working manuals, testing specifications will be done. The efficiency of quality assurance at the manufacturer and at the applicant will be checked by the TUeV specialists by considering specifications of modifications, repairs or tolerances. A mean point of the quality assurance in Germany is the dynamic adjustment, of an action on the latest state of engineering or science. If there exists a change of rules or guidelines, the quality assurance requirements have to be fit on this state in so far as it is feasible from the technical point of view. (orig./RW)

  16. Ballistic quality assurance

    International Nuclear Information System (INIS)

    Cassol, E.; Bonnet, J.; Porcheron, D.; Mazeron, J.J.; Peiffert, D.; Alapetite, C.

    2012-01-01

    This review describes the ballistic quality assurance for stereotactic intracranial irradiation treatments delivered with Gamma Knife R either dedicated or adapted medical linear accelerators. Specific and periodic controls should be performed in order to check the mechanical stability for both irradiation and collimation systems. If this step remains under the responsibility of the medical physicist, it should be done in agreement with the manufacturer's technical support. At this time, there are no recent published guidelines. With technological developments, both frequency and accuracy should be assessed in each institution according to the treatment mode: single versus hypo-fractionated dose, circular collimator versus micro-multi-leaf collimators. In addition, 'end-to-end' techniques are mandatory to find the origin of potential discrepancies and to estimate the global ballistic accuracy of the delivered treatment. Indeed, they include frames, non-invasive immobilization devices, localizers, multimodal imaging for delineation and in-room positioning imaging systems. The final precision that could be reasonably achieved is more or less 1 mm. (authors)

  17. Quality assurance and accreditation.

    Science.gov (United States)

    1997-01-01

    In 1996, the Joint Commission International (JCI), which is a partnership between the Joint Commission on Accreditation of Healthcare Organizations and Quality Healthcare Resources, Inc., became one of the contractors of the Quality Assurance Project (QAP). JCI recognizes the link between accreditation and quality, and uses a collaborative approach to help a country develop national quality standards that will improve patient care, satisfy patient-centered objectives, and serve the interest of all affected parties. The implementation of good standards provides support for the good performance of professionals, introduces new ideas for improvement, enhances the quality of patient care, reduces costs, increases efficiency, strengthens public confidence, improves management, and enhances the involvement of the medical staff. Such good standards are objective and measurable; achievable with current resources; adaptable to different institutions and cultures; and demonstrate autonomy, flexibility, and creativity. The QAP offers the opportunity to approach accreditation through research efforts, training programs, and regulatory processes. QAP work in the area of accreditation has been targeted for Zambia, where the goal is to provide equal access to cost-effective, quality health care; Jordan, where a consensus process for the development of standards, guidelines, and policies has been initiated; and Ecuador, where JCI has been asked to help plan an approach to the evaluation and monitoring of the health care delivery system.

  18. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The framework......’s flexibility allows for the addition of constructs that model new security properties as well as new plugins that implement the security properties. In order to provide higher security assurances, the system specification can be verified by formal methods tools such as the Beliefs and Knowledge (BAK) tool...

  19. Managerial attitude toward quality assurance

    International Nuclear Information System (INIS)

    Kirschenmann, H.J.

    1983-01-01

    This paper will present what relationships exist between the attitude toward quality assurance and the variables of training and experience on the part of managers within the nuclear power industry. Managerial attitude toward quality assurance was measured via questionnaires submitted to managers within architect-engineering, nuclear steam supplier, and constructor firms throughout the United States. The data from the completed questionnaires were statistically analyzed using the chi-square test and conclusions were drawn. Additional study results related to major factors for positive and negative attitudes toward quality assurance will be presented

  20. Quality assurance of polymer concrete

    International Nuclear Information System (INIS)

    Schulz, H.

    1984-01-01

    With polymer concrete, a whole range of organisational and functional measures have to be met in order to assure the required quality with an economic expenditure. Quality assurance begins in the design and does not end in the production, rather includes all fields of the enterprise. The following deals with a particular range of the total complex, the inspection methods for assuring the quality of machine components of polymer concrete, particularly machine tool bases, this being through the control of the raw material, the production and the finished product. (orig.) [de

  1. Impact of proposed financial assurance requirements on nuclear materials licensees

    International Nuclear Information System (INIS)

    Hendrickson, P.L.; Scott, M.J.; Mullen, M.F.; Nicholls, A.K.; Smith, S.A.

    1987-09-01

    The NRC is considering a possible rulemaking that would require certain nuclear materials licensees to demonstrate financial ability to clean up accidental releases of radioactive materials. The rulemaking would potentially affect approximately 16,350 NRC and Agreement State licensees. This report was prepared for NRC by the Pacific Northwest Laboratory to provide background information and analysis for the potential rulemaking. Specific topics examined in the report include: (1) characteristics of potentially affected licensees, (2) the availability and cost of various financial assurance mechanisms, (3) the financial impacts for licensees (including licensees classified as small businesses) of providing $2M of assurance per licensee and a sliding amount of assurance tied to risk, (4) the cost of administering a financial assurance rule, and (5) overall benefits and costs. Tabular information on past material licensee accidents and cleanup efforts is also included. The financial occurrence mechanism that appears to be most suitable for providing the desired financial assurance is one or more newly formed captive insurance companies. Potential benefits of the rulemaking include reduced need for taxpayer-funded cleanup of accidental releases, reduces administrative time to secure such funds, and the possibility of more cleanup with correspondingly reduced occupational and public exposure to radioactive materials

  2. Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.

    Science.gov (United States)

    Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger

    2016-10-26

    Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.

  3. Radiation shielding quality assurance

    Science.gov (United States)

    Um, Dallsun

    For the radiation shielding quality assurance, the validity and reliability of the neutron transport code MCNP, which is now one of the most widely used radiation shielding analysis codes, were checked with lot of benchmark experiments. And also as a practical example, follows were performed in this thesis. One integral neutron transport experiment to measure the effect of neutron streaming in iron and void was performed with Dog-Legged Void Assembly in Knolls Atomic Power Laboratory in 1991. Neutron flux was measured six different places with the methane detectors and a BF-3 detector. The main purpose of the measurements was to provide benchmark against which various neutron transport calculation tools could be compared. Those data were used in verification of Monte Carlo Neutron & Photon Transport Code, MCNP, with the modeling for that. Experimental results and calculation results were compared in both ways, as the total integrated value of neutron fluxes along neutron energy range from 10 KeV to 2 MeV and as the neutron spectrum along with neutron energy range. Both results are well matched with the statistical error +/-20%. MCNP results were also compared with those of TORT, a three dimensional discrete ordinates code which was developed by Oak Ridge National Laboratory. MCNP results are superior to the TORT results at all detector places except one. This means that MCNP is proved as a very powerful tool for the analysis of neutron transport through iron & air and further it could be used as a powerful tool for the radiation shielding analysis. For one application of the analysis of variance (ANOVA) to neutron and gamma transport problems, uncertainties for the calculated values of critical K were evaluated as in the ANOVA on statistical data.

  4. An overview of quality assurance

    International Nuclear Information System (INIS)

    Morris, I.T.

    1983-01-01

    A good quality assurance program seeks to minimise radiation exposure and maximise image quality. Factors considered are equipment performance, films and screens, film processing, viewing conditions and film repeats

  5. BUILDING "BRIDGES" WITH QUALITY ASSURANCE

    Science.gov (United States)

    The papr describes how, rather than building "bridges" across centuries, quality assurance (QA) personnel have the opportunity to build bridges across technical disciplines, between public and private organizations, and between different QA groups. As reviewers and auditors of a...

  6. QANU - Quality Assurance Netherlands Universities

    DEFF Research Database (Denmark)

    Jensen, Henrik Toft; Maria E., Weber; Vyt, André

    The Quality Assurance Netherlands Universities (QANU) underwent an ENQA-coordinated external review in 2016. The review was chaired by Henrik Toft Jensen, Research fellow at Roskilde University (RUC), Denmark....

  7. Quality assurance in nuclear medicine

    International Nuclear Information System (INIS)

    Kaul, A.

    1986-01-01

    'Quality Assurance in Nuclear Medicine' is the title of the English language original that has been translated into German. The manual very extensively deals with quality control of nuclear medical equipment. Tests are explained for checking radioactivity measuring devices, manual and automatic in-vitro sample measuring systems, in-vivo measuring systems with single or multiple detectors, rectlinear scanners, and gamma cameras, including the phantoms required for the methods. Other chapters discuss the quality control of radiopharmaceuticals, or the quality assurance in data recording and evaluation of results. Helpful comments on the organisation of quality assurance programms are given. The book is intended as a practical guide for introducing quality assurance principles in nuclear medicine in the Federal Republic of Germany. With 13 figs., 22 tabs [de

  8. System management and quality assurance

    International Nuclear Information System (INIS)

    Sastry, A.M.

    1989-01-01

    This paper describes the principles of system management and shows the relationship to quality assurance. It discusses the need for balanced attention to all the project management controls required for project success

  9. Quality Assurance Training Tracking (QATTS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This is metadata documentation for the Quality Assurance Training Tracking System (QATTS) which tracks Quality Assurace training given by R7 QA staff to in-house...

  10. The Italian compliance assurance programme

    International Nuclear Information System (INIS)

    Trivelloni, S.

    1999-01-01

    An overview is given of the compliance assurance programme that is applied in Italy and the role of the different competent authorities that have responsibilities for the transport of radioactive materials is described. (author)

  11. Material quality assurance risk assessment.

    Science.gov (United States)

    2013-01-01

    Over the past two decades the role of SHA has shifted from quality control (QC) of materials and : placement techniques to quality assurance (QA) and acceptance. The role of the Office of Materials : Technology (OMT) has been shifting towards assuran...

  12. Quality assurance within regulatory bodies

    International Nuclear Information System (INIS)

    1999-06-01

    The IAEA directed extensive efforts during the years 1991 to 1995 to the integral revision of all NUSS quality assurance publications, which were approved and issued as Safety Series No.50-C/SG-Q, Quality Assurance for Safety in Nuclear Power Plants and other Nuclear Installations (1996). When these quality assurance publications were developed, their prime focus was on requirements against which work performed by the licensees could be measured and assessed by the regulatory bodies. In this way, they only helped to facilitate the functions of regulators. No requirements or recommendations were provided on how the regulators should ensure the effective implementation of their own activities. The present publication is a first attempt to collect, integrate and offer available experience to directly support performance of regulatory activities. It presents a comprehensive compilation on the application of quality assurance principles and methods by regulatory bodies to their activities. The aim is consistent good performance of regulatory activities through a systematic approach

  13. 7 CFR 1980.333 - Promissory notes and security instruments.

    Science.gov (United States)

    2010-01-01

    ... promissory notes, real estate mortgages, including deeds of trust and similar instruments, and security... Interest Assistance Agreement, assure that the closing agent properly records a junior mortgage or deed of...

  14. Quality assurance in plant engineering

    International Nuclear Information System (INIS)

    Ohsumi, Morimichi

    1977-01-01

    Quality assurance is defined as the intentional and systematic activity carried out to obtain such reliability that the functions of nuclear power generating plants are demonstrated during the plant operation, and the section in charge has the role to organize, adjust and communicate so that the related sections can work smoothly. There are many documents concerning the quality assurance, such as quality assurance basic program, quality assurance manual, quality control plan and its manual and many specifications, etc. The content of the quality assurance is different for every step of plant planning such as at inquiry and order receiving, and prior to manufacturing, for example, inspection specification being decided for the material and the welded parts of classified pipings at the step of order receiving. Document management, engineering schedule and the custody of quality records are also quality assurance activities. Design management is controlled step by step; plant planning including safety analysis, overall layout plan, conceptual design of buildings, aseismatic design guide, heat balance and so on, system design mainly with system description, piping design including piping specification, standard dimensions of edge preparation, piping and valve lists, inspection manual, etc., detailed design, standardization of piping and design review, etc. are explained. The management of the intermediate between soft and hard parts consists of the quality check for material manufacturers and shipment inspection, etc. (Nakai, Y.)

  15. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  17. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    OpenAIRE

    Errol A. Blake

    2007-01-01

    Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions ...

  18. Data Leakage Prevention for Secure Cross-Domain Information Exchange

    OpenAIRE

    Nordbotten, Nils Agne; Engelstad, Paal E.; Kongsgård, Kyrre Wahl; Haakseth, Raymond; Mancini, Federico

    2017-01-01

    Cross-domain information exchange is an increasingly important capability for conducting efficient and secure operations, both within coalitions and within single nations. A data guard is a common cross-domain sharing solution that inspects the security labels of exported data objects and validates that they are such that they can be released according to policy. While we see that guard solutions can be implemented with high assurance, we find that obtaining an equivalent level of assurance i...

  19. Thoughts on Internal and External Quality Assurance

    Science.gov (United States)

    Zhang, Jianxin

    2012-01-01

    Quality assurance of higher education is made up of two parts: internal quality assurance (IQA) and external quality assurance (EQA). Both belong to a union of the coexistence and balance of yin and yang. But in reality there exists a paradox of "confusion of quality assurance (QA) subject consciousness, singularity of social QA and lack of QA…

  20. 10 CFR 71.37 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance. 71.37 Section 71.37 Energy NUCLEAR... Package Approval § 71.37 Quality assurance. (a) The applicant shall describe the quality assurance program... quality assurance program that are applicable to the particular package design under consideration...

  1. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  2. Internet of Things: Current Challenges in the Quality Assurance and Testing Methods

    OpenAIRE

    Bures, Miroslav; Cerny, Tomas; Ahmed, Bestoun S.

    2018-01-01

    Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user's privacy, the reliability of the service, interoperability, and integration are discussed. All these create a demand for specific Quality Assurance methodology for the IoT solutions. In the paper, we present the state of the art of this domain and we discuss particular areas of system testing discipline, which is not covered...

  3. Use of quality assurance criteria in the work of the regulating body: Cuban experience

    International Nuclear Information System (INIS)

    Sarabia Molina, I.

    1998-01-01

    This paper shows experiences obtained by CNSN, a competent organization in charge of radiological nuclear security and accounting and control of nuclear materials in the Republic of Cuba. It analyses quality assurance criteria while carrying out functions and responsibilities entrusted to it by the regulation in force. This paper also shows main advantages and disadvantages derived from the use of quality assurance methods in the regulation and control as well as on its evolution in time and also in the near future

  4. Security and Privacy Assurance Research (SPAR) Pilot Final Report

    Science.gov (United States)

    2015-11-30

    Terms AES Advanced Encryption Standard. Current U.S. standard for symmetric cipher. API Application Program Interface. AWS Amazon Web Services B-tree...solve this problem in theory. Tools such as multi-party computation, homomorphic encryption , and symmetric searchable encryption allow parties to...as multi-party computation [16], fully homomorphic encryption [11], private informa- tion retrieval [8] and symmetric searchable encryption [37] allow

  5. Cloud and mobile security assurance : a memory forensics approach

    OpenAIRE

    Vella, Mark; Computer Science Annual Workshop CSAW’14

    2014-01-01

    Cloud computing nowadays constitutes a substantial portion of new enterprise IT spending. Whether signing up for applications deployed as a service, or outsourcing hosting concerns to third parties, cloud computing is taking us back to the days of the data center. Virtualization is a key enabler technology that enables consolidation of hardware utilization and provides the notion of elastic computing whereby hardware resources are allocated on demand. Mobile devices represent a natural fit to...

  6. Self-Protecting Security for Assured Information Sharing

    Science.gov (United States)

    2015-08-29

    reveal the identity of a serial killer or spy, provide the exact location of buried treasure worth millions, expose a secret society, illuminate our...created variously by professional cryptographers, amateurs, artists, killers , and victims. In some cases the identity of the author is also unknown. The

  7. Extending AADL for Security Design Assurance of Cyber Physical Systems

    Science.gov (United States)

    2015-12-16

    for fast serial data exchange between electronic controllers in motor vehicles. Instigators include buttons that the driver can use to turn on the CC...is used to infuse a pain killer at a prescribed basal flow rate that can be augmented by the patient or clinician in response to patient need within

  8. Norwegian Security Determinants: Deterrence and Reassurance.

    Science.gov (United States)

    1984-03-01

    September 1979, pp. 20-25; Rear Admiral 104 |eve Roy Breivik , R.N.N., Inspector General, "Assuring the Security of Reinforcements to Norway," NATO’s Fift...2-15; a:zc $ Patrick Wall, "The Third Battle of the Atlantic," i Power, July 1981, pp. 52-57. 11 Richard K. Betts, "Surprise Attack: NATO’s...Force," NATO’s Fifteen Nations, December 1977-January 1978, pp. 81-89. 186 Breivik , Pear Admiral Roy, R.N.N., "Assuring the Security: of Reinforcements

  9. Quality assurance program plan for SNF characterization support project

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides information on how the Quality Assurance Program is implemented for the Spent Nuclear Fuel Characterization Support Project. This QAPP has been developed specifically for the Spent Nuclear Fuel Characterization Support Project, per Letter of Instruction (LOI) from Duke Engineering and Services Company, letter No. DESH-9655870, dated Nov. 22, 1996. It applies to those items and tasks which affect the completion of activities identified in the work breakdown structure of the Project Management Plan (PMP) and LOI. These activities include installation of sectioning equipment and furnace, surface and subsurface examinations, sectioning for metallography, and element drying and conditioning testing, as well as project related operations within the 327 facility as it relates to the specific activities of this project. General facility activities are covered in other appropriate QA-PPS. In addition, this QAPP supports the related quality assurance activities addressed in CM-2-14, Hazardous Material Packaging and Shipping,1261 and HSRCM-1, Hanford Site Radiological Control Manual. The 327 Building is currently transitioning from being a Pacific Northwest National Laboratory (PNNL) managed facility to a Babcock and Wilcox Hanford Company (BVMC) managed facility. During this transition process existing procedures and documents will be utilized until replaced by BVMC procedures and documents. These documents conform to the requirements found in PNL-MA-70, Quality Assurance Manual and PNL-MA-8 1, Hazardous Materials Shipping Manual. The Quality Assurance Program Index (QAPI) contained in Table 1 provides a matrix which shows how project activities relate to IO CFR 830.120 and 5700.6C criteria. Quality Assurance program requirements will be addressed separate from the requirements specified in this document. Other Hanford Site organizations/companies may be utilized in support of this project and the subject organizations are

  10. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  11. Proposals to Restructure Social Security

    OpenAIRE

    Peter A. Diamond

    1996-01-01

    This paper discusses five proposed changes in Social Security: indexing the normal retirement age to life expectancy (as Sweden is doing); investing part of the trust funds in private securities; partial privatization (as has been proposed by Senators Kerrey and Simpson, Sweden is doing and Mexico has done); replacing Social Security by individually mandated savings (as was done in Chile in 1981); and mandating employer provided retirement savings (as recently legislated in Australia and is e...

  12. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  13. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  14. Information security management handbook, v.7

    CERN Document Server

    O'Hanley, Richard

    2013-01-01

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2(R) CISSP Common Body of Knowledge (CBK(R)), this volume features 27 new chapters on topics

  15. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  16. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  17. Quality assurance handbook for measurement laboratories

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1984-10-01

    This handbook provides guidance in the application of quality assurance to measurement activities. It is intended to help those persons making measurements in applying quality assurance to their work activities by showing how laboratory practices and quality assurance requirements are integrated to provide control within those activities. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across all types of measurement laboratories. This handbook also can assist quality assurance personnel in understanding the relationships between laboratory practices and quality assurance requirements. The handbook is composed of three chapters and several appendices. Basic guidance is provided by the three chapters. In Chapter 1, the role of quality assurance in obtaining quality data and the importance of such data are discussed. Chapter 2 presents the elements of laboratory quality assurance in terms of practices that can be used in controlling work activities to assure the acquisition of quality data. Chapter 3 discusses the implementation of laboratory quality assurance. The appendices provide supplemental information to give the users a better understanding of the following: what is quality assurance; why quality assurance is required; where quality assurance requirements come from; how those requirements are interpreted for application to laboratory operations; how the elements of laboratory quality assurance relate to various laboratory activities; and how a quality assurance program can be developed

  18. Concepts of nuclear quality assurance

    International Nuclear Information System (INIS)

    Randers, G.; Morris, P.A.; Pomeroy, D.

    1976-01-01

    While the safety record of the nuclear industry continues to be excellent, the forced outage rates for recent years continue to be 15% or more. Quality assurance, therefore, needs to be applied not only to nuclear safety matters, but to the goals of increased productivity and reduced construction and operating costs. Broadening the application of the general concept of quality assurance in this way leads to the introduction of reliability technology. The total activity might better be called reliability assurance. That effective quality assurance systems do pay off is described by examples from the utility industry, from a manufacturer of instruments and systems and from the experience of Westinghouse Electric Company's manufacturing divisions. The special situation of applying quality assurance to nuclear fuel is discussed. Problems include the lack of a fully developed regulatory policy in this area, incomplete understanding of the mechanism for pellet-clad interaction failures, incomplete access to manufacturers design and process information, inability to make desirable changes on a timely basis and inadequate feedback of irradiation experience. (author)

  19. Qualtity assurance in nuclear technology

    International Nuclear Information System (INIS)

    Roesler, U.

    1977-01-01

    The demand for safety in nuclear power plants is rooted in the Atomic Energy Act of the Federal Republic of Germany, under which 'preplanned safety' is a licensing condition. Moreover, the safety of nuclear power plants is outlined in more precise terms in the guidelines of the German Advisory Committee for Reactor Safeguards (Reaktorsicherheitskommission). The usual approach taken in this country, i.e., to establish quality assurance for each specific product, with supplementary quality assurance measures geared to systems requirements being implemented by industry, has proved to work satisfactorily. Product-based quality assurance mainly stems from the classical quality control concept, whereas systems-based quality assurance primarily is to ensure that both manufacturers and systems suppliers take all measures in advance which are needed for the satisfactory processing of an order and to achieve the quality level required. The special features and the advantages of the joint action of manufacturers, systems suppliers and experts, which are characteristic of the German approach, very clearly emerge from a comparison with practices in the United States. In the further refinement of the quality assurance concept as practised in Germany, qhich will have a particularly great impact on costs and schedules because of the manpower requirement involved, it should be carefully weighed where there are exaggerations and unnecessary complications which can no longer be justified by the demand for more safety. (orig.) [de

  20. Waste Management Quality Assurance Plan

    International Nuclear Information System (INIS)

    1993-01-01

    Lawrence Berkeley Laboratory's Environment Department addresses its responsibilities through activities in a variety of areas. The need for a comprehensive management control system for these activities has been identified by the Department of Energy (DOE). The WM QA (Waste Management Quality Assurance) Plan is an integral part of a management system that provides controls necessary to ensure that the department's activities are planned, performed, documented, and verified. This WM QA Plan defines the requirements of the WM QA program. These requirements are derived from DOE Order 5700.6C, Quality Assurance, the LBL Operating and Assurance Program Plan (OAP, LBL PUB-3111), and other environmental compliance documents applicable to WM activities. The requirements presented herein, as well as the procedures and methodologies that direct the implementation of these requirements, will undergo review and revisions as necessary. The provisions of this QA Plan and its implementing documents apply to quality-affecting activities performed by and for WM. It is also applicable to WM contractors, vendors, and other LBL organizations associated with WM activities, except where such contractors, vendors, or organizations are governed by their own WM-approved QA programs. References used in the preparation of this document are (1) ASME NQA-1-1989, (2) ANSI/ASQC E4 (Draft), (3) Waste Management Quality Assurance Implementing Management Plan (LBL PUB-5352, Rev. 1), (4) LBL Operating and Assurance Program Plan (OAP), LBL PUB-3111, 2/3/93. A list of terms and definitions used throughout this document is included as Appendix A

  1. Quality assurance in nuclear medicine

    International Nuclear Information System (INIS)

    Paras, P.

    1978-01-01

    Quality assurance practices must be followed throughout the entire nuclear medicine process, from the initial decision to perform a particular procedure, through the interpretation and reporting of the results. The various parameters that can be defined and measured in each area must be monitored by quality control tests to assure the excellence of the total nuclear medicine process. The presentation will discuss each of the major areas of nuclear medicine quality control and their interaction as a part of the entire system. Quality control testing results and recommendations for measurements of radioactivity distribution will be described with emphasis on imaging equipment and dose calibrating instrumentation. The role of the health physicist in a quality assurance program will be stressed. (author)

  2. Modernization of software quality assurance

    Science.gov (United States)

    Bhaumik, Gokul

    1988-01-01

    The customers satisfaction depends not only on functional performance, it also depends on the quality characteristics of the software products. An examination of this quality aspect of software products will provide a clear, well defined framework for quality assurance functions, which improve the life-cycle activities of software development. Software developers must be aware of the following aspects which have been expressed by many quality experts: quality cannot be added on; the level of quality built into a program is a function of the quality attributes employed during the development process; and finally, quality must be managed. These concepts have guided our development of the following definition for a Software Quality Assurance function: Software Quality Assurance is a formal, planned approach of actions designed to evaluate the degree of an identifiable set of quality attributes present in all software systems and their products. This paper is an explanation of how this definition was developed and how it is used.

  3. Grading of quality assurance requirements

    International Nuclear Information System (INIS)

    1991-01-01

    The present Manual provides guidance and illustrative examples for applying a method by which graded quality assurance requirements may be determined and adapted to the items and services of a nuclear power plant in conformance with the requirements of the IAEA Nuclear Safety Standards (NUSS) Code and Safety Guides on quality assurance. The Manual replaces the previous publication IAEA-TECDOC-303 on the same subject. Various methods of grading quality assurance are available in a number of Member States. During the development of the present Manual it was not considered practical to attempt to resolve the differences between those methods and it was preferred to identify and benefit from the good practices available in all the methods. The method presented in this Manual deals with the aspects of management, documentation, control, verification and administration which affect quality. 1 fig., 4 tabs

  4. About Security in Contemporary World

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2015-06-01

    Full Text Available The task to ensure security in contemporary world is a complicated political, scientific-technological and socio-economic problem. As the security itself is complicated, multifactor and hierarchized phenomen also its investigation has to be of an interdisciplinary character. The character of security environment, the character of security risks and threats and also the character of tools for their elimination are essentially changing. The basis to security of social subject consisted in arrangement of the conditions for their existence, to surviving in the present time and advancement into the future. Assurance of this condition means it provided ability to the social subjects to eliminated threats that are defined. In situations of asymmetrical security, the threats are not always clearly defined. They often consist of their own structure systems, in relationships and status the subjects of internationals relations. Asymmetrical of security, by our opinion, presents a discrepancy, unbalance, non-parity between subjects of the international security environment. The unbalance, discrepancy, non-parity has political, military, economic, law, social and societal dimensions.

  5. Waste Management Quality Assurance Plan

    International Nuclear Information System (INIS)

    2006-01-01

    The WMG QAP is an integral part of a management system designed to ensure that WMG activities are planned, performed, documented, and verified in a manner that assures a quality product. A quality product is one that meets all waste acceptance criteria, conforms to all permit and regulatory requirements, and is accepted at the offsite treatment, storage, and disposal facility. In addition to internal processes, this QA Plan identifies WMG processes providing oversight and assurance to line management that waste is managed according to all federal, state, and local requirements for waste generator areas. A variety of quality assurance activities are integral to managing waste. These QA functions have been identified in the relevant procedures and in subsequent sections of this plan. The WMG QAP defines the requirements of the WMG quality assurance program. These requirements are derived from Department of Energy (DOE) Order 414.1C, Quality Assurance, Contractor Requirements Document, the LBNL Operating and Assurance Program Plan (OAP), and other applicable environmental compliance documents. The QAP and all associated WMG policies and procedures are periodically reviewed and revised, as necessary, to implement corrective actions, and to reflect changes that have occurred in regulations, requirements, or practices as a result of feedback on work performed or lessons learned from other organizations. The provisions of this QAP and its implementing documents apply to quality-affecting activities performed by the WMG; WMG personnel, contractors, and vendors; and personnel from other associated LBNL organizations, except where such contractors, vendors, or organizations are governed by their own WMG-approved QA programs

  6. Quality assurance in medical laboratories

    International Nuclear Information System (INIS)

    Boroviczeny, K.G. von; Merten, R.; Merten, U.P.

    1987-01-01

    The book presents a comprehensive and specified survey of the quality assurance measures and methods applied in medical laboratories in the pre-analytical phase and in the analytical and post-analytical phases. It also gives information on computer-aided procedures, cost-benefit analyses in this field, and on official requirements and standards in the fields of clinical chemistry, hematology, immunology and microbiology, and equipment testing and inspection. One chapter of the book particularly deals with quality assurance for radioimmunological in-vitro analyses. With 112 figs., 337 tabs [de

  7. Quality assurance in radiation processing

    International Nuclear Information System (INIS)

    Noriah Mod Ali

    2002-01-01

    The growth of the radiation processing industries in Malaysia has presented the SSDL-MINT a new set of parameter for the Quality Assurance (QA) programs. The large massive doses of radiation required for commercial application of sterilization, cross-linking etc needs measurement method outside the scope of familiar radiation detection instruments. This requires establishment of proper calibration procedure and selection of appropriate transfer system/technique to assure adequate traceability to an international radiation standard. The benefit of accurate in-plant dosimetry for the operator, approving authority and purchaser are balanced against the extra dosimetric efforts required for good QA is presented. (Author)

  8. The challenge of quality assurance

    International Nuclear Information System (INIS)

    Simon, R.; Krischer, W.; Price, M.S.T.

    1986-01-01

    The paper presents the aims of quality assurance in the design and production of radioactive waste packages. It lists the most relevant acceptance criteria and regulatory requirements, investigates the institutional and technical problems of carrying out Quality Assurance and presents suggestions for establishing suitable organisational structures and technical programmes to provide adequate confidence in the safe nature and the performance of waste packages. The Commission of European Communities has laid emphasis on the development of appropriate test methods in its last research and development programme. First results of the work are reviewed in the context of international progress in this field. (author)

  9. Quality assurance of qualitative analysis

    DEFF Research Database (Denmark)

    Ríos, Ángel; Barceló, Damiá; Buydens, Lutgarde

    2003-01-01

    The European Commission has supported the G6MA-CT-2000-01012 project on "Metrology of Qualitative Chemical Analysis" (MEQUALAN), which was developed during 2000-2002. The final result is a document produced by a group of scientists with expertise in different areas of chemical analysis, metrology...... and quality assurance. One important part of this document deals, therefore, with aspects involved in analytical quality assurance of qualitative analysis. This article shows the main conclusions reported in the document referring to the implementation of quality principles in qualitative analysis...

  10. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  11. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    Directory of Open Access Journals (Sweden)

    Errol A. Blake

    2007-12-01

    Full Text Available Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.

  12. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  13. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  14. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  15. Index of cyber integrity

    Science.gov (United States)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  16. Quality Assurance 1992-2012

    Science.gov (United States)

    Brown, Roger

    2012-01-01

    As the author's contribution to a series marking the Golden Jubilee of the Association of University Administrators, he reflects on changes in quality assurance over the past twenty years and speculates on what the future may hold for quality as the association moves into a new and very different competitive regime. He begins by discussing the…

  17. Redefining and expanding quality assurance.

    Science.gov (United States)

    Robins, J L

    1992-12-01

    To meet the current standards of excellence necessary for blood establishments, we have learned from industry that a movement toward organization-wide quality assurance/total quality management must be made. Everyone in the organization must accept responsibility for participating in providing the highest quality products and services. Quality must be built into processes and design systems to support these quality processes. Quality assurance has been redefined to include a quality planning function described as the most effective way of designing quality into processes. A formalized quality planning process must be part of quality assurance. Continuous quality improvement has been identified as the strategy every blood establishment must support while striving for error-free processing as the long-term objective. The auditing process has been realigned to support and facilitate this same objective. Implementing organization-wide quality assurance/total quality management is one proven plan for guaranteeing the quality of the 20 million products that are transfused into 4 million patients each year and for moving toward the new order.

  18. Quality assurance during site construction

    International Nuclear Information System (INIS)

    Eymess, K.J.; Haas, R.; Wellnitz, G.

    1980-01-01

    Quality Assurance for Nuclear Power Plants under consideration of pipe assembling. Flow of Quality Requirements during: - Desing - Construction - Procurement - Prefabrication - Site. Organizational Requirements and Measurements during Erection: - Incoming Control - Material Storage - Surveillance of Tools - Weld Surveillance - Nondestructive Testing - Cleaning - Final Documentation. Qualification and Training of QA Personnel. (orig.)

  19. Quality assurance manual: Volume 1

    International Nuclear Information System (INIS)

    Oijala, J.E.

    1988-06-01

    Stanford Linear Accelerator Center (SLAC) is a DOE-supported research facility that carries out experimental and theoretical research in high energy physics and developmental work in new techniques for particle acceleration and experimental instrumentation. The purpose of this manual is to describe SLAC quality assurance policies and practices in various parts of the Laboratory

  20. Quality assurance issues and PACS

    NARCIS (Netherlands)

    Banta, H.D.

    1992-01-01

    Quality assessment and assurance is a growing concern in all areas of health care. The concern is fueled by a body of evidence that indicates that quality of care is not optimal, and in many instances, is unacceptably low. Although different standards for quality have been proposed, health outcome

  1. [Quality assurance in interventional cardiology].

    Science.gov (United States)

    Gülker, H

    2009-10-01

    Quality assurance in clinical studies aiming at approval of pharmaceutical products is submitted to strict rules, controls and auditing regulations. Comparative instruments to ensure quality in diagnostic and therapeutic procedures are not available in interventional cardiology, likewise in other fields of cardiovascular medicine. Quality assurance simply consists of "quality registers" with basic data not externally controlled. Based on the experiences of clinical studies and their long history of standardization it is assumed that these data may be severely flawed thus being inappropriate to set standards for diagnostic and therapeutic strategies. The precondition for quality assurance are quality data. In invasive coronary angiography and intervention medical indications, the decision making process interventional versus surgical revascularization, technical performance and after - care are essential aspects affecting quality of diagnostics and therapy. Quality data are externally controlled data. To collect quality data an appropriate infrastructure is a necessary precondition which is not existent. For an appropriate infrastructure investments have to be done both to build up as well as to sustain the necessary preconditions. As long as there are no infrastructure and no investments there will be no "quality data". There exist simply registers of data which are not proved to be a basis for significant assurance and enhancement in quality in interventional coronary cardiology. Georg Thieme Verlag KG Stuttgart, New York.

  2. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  3. Engineering secure Internet of Things systems

    CERN Document Server

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  4. Characteristics quality system assurance of university programs

    Directory of Open Access Journals (Sweden)

    Lucian Ion Medar

    2011-03-01

    Full Text Available Quality assurance program of study requires time, dedication, effort, innovative thinking and creativity. Competitive research programs monitored by quality assurance system to create the desired results on the relationship between learning and teaching methods and assessment.

  5. Has quality assurance outlived its usefulness

    International Nuclear Information System (INIS)

    Goldenberg, N.

    1989-01-01

    This paper explores the impact that better management and increased productivity will have on the need for, and role of, quality assurance in the future. The author discusses criticisms of existing quality assurance programs

  6. Material quality assurance risk assessment : [summary].

    Science.gov (United States)

    2013-01-01

    With the shift from quality control (QC) of materials and placement techniques : to quality assurance (QA) and acceptance over the years, the role of the Office : of Materials Technology (OMT) has been shifting towards assurance of : material quality...

  7. Quality assurance manual: Volume 2, Appendices

    International Nuclear Information System (INIS)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department

  8. Nova laser assurance-management system

    International Nuclear Information System (INIS)

    Levy, A.J.

    1983-01-01

    In a well managed project, Quality Assurance is an integral part of the management activities performed on a daily basis. Management assures successful performance within budget and on schedule by using all the good business, scientific, engineering, quality assurance, and safety practices available. Quality assurance and safety practices employed on Nova are put in perspective by integrating them into the overall function of good project management. The Nova assurance management system was developed using the quality assurance (QA) approach first implemented at LLNL in early 1978. The LLNL QA program is described as an introduction to the Nova assurance management system. The Nova system is described pictorially through the Nova configuration, subsystems and major components, interjecting the QA techniques which are being pragmatically used to assure the successful completion of the project

  9. Quality assurance - how to involve the employees

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard

    1996-01-01

    An overview of strategies for involvement of employees in quality assurance developement and implementation.......An overview of strategies for involvement of employees in quality assurance developement and implementation....

  10. Integrating quality assurance and research and development

    International Nuclear Information System (INIS)

    Dronkers, J.J.

    1985-01-01

    Quality assurance programs cannot be transferred from one organization to another without attention to existing cultures and traditions. Introduction of quality assurance programs constitutes a significant change and represents a significant impact on the organizational structure and operational mode. Quality assurance professionals are change agents, but do not know how to be effective ones. Quality assurance as a body of knowledge and experience can only become accepted when its practitioners become familiar with their role as change agents. 8 references

  11. 2. Product quality control and assurance system

    International Nuclear Information System (INIS)

    1990-01-01

    Product quality control and assurance are dealt with in relation to reliability in nuclear power engineering. The topics treated include product quality control in nuclear power engineering, product quality assurance of nuclear power plant equipment, quality assurance programs, classification of selected nuclear power equipment, and standards relating to quality control and assurance and to nuclear power engineering. Particular attention is paid to Czechoslovak and CMEA standards. (P.A.). 2 figs., 1 tab., 12 refs

  12. Walkability Index

    Science.gov (United States)

    The Walkability Index dataset characterizes every Census 2010 block group in the U.S. based on its relative walkability. Walkability depends upon characteristics of the built environment that influence the likelihood of walking being used as a mode of travel. The Walkability Index is based on the EPA's previous data product, the Smart Location Database (SLD). Block group data from the SLD was the only input into the Walkability Index, and consisted of four variables from the SLD weighted in a formula to create the new Walkability Index. This dataset shares the SLD's block group boundary definitions from Census 2010. The methodology describing the process of creating the Walkability Index can be found in the documents located at ftp://newftp.epa.gov/EPADataCommons/OP/WalkabilityIndex.zip. You can also learn more about the Smart Location Database at https://edg.epa.gov/data/Public/OP/Smart_Location_DB_v02b.zip.

  13. Quality assurance in the nuclear industry

    International Nuclear Information System (INIS)

    Knoedler, D.

    1978-01-01

    Quality assurance is the sum of all activities systematically planned, practiced, and controlled with the aim to assure the quality of deliveries and performances. This assurance today covers all phases of activities, from the planning (including a determination of the required and necessary quality characteristics) to the start-up of a plant. (orig./RW) [de

  14. Quality assurance management policies and requirements

    International Nuclear Information System (INIS)

    1985-10-01

    The purpose of this document is to: set forth overall, integrated quality assurance management policies and requirements for the entire Civilian Radioactive Waste Management Program; define management responsibilities for assuring quality; and provide a general framework for the development of more detailed quality assurance management policies and requirements by program, project, and contractor organizations

  15. 40 CFR 31.45 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Quality assurance. 31.45 Section 31.45... Requirements Reports, Records, Retention, and Enforcement § 31.45 Quality assurance. If the grantee's project... quality assurance practices consisting of policies, procedures, specifications, standards, and...

  16. 7 CFR 652.7 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Quality assurance. 652.7 Section 652.7 Agriculture... assurance. (a) NRCS will review, in consultation with the Farm Service Agency, as appropriate, the quality... information obtained through its quality assurance process, documentation submitted by the technical service...

  17. 30 CFR 74.9 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 74.9 Section 74.9 Mineral... DUST SAMPLING DEVICES Requirements for Continuous Personal Dust Monitors § 74.9 Quality assurance. (a) General requirements. The applicant shall establish and maintain a quality control system that assures...

  18. 40 CFR 30.54 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Quality assurance. 30.54 Section 30.54... NON-PROFIT ORGANIZATIONS Post-Award Requirements Reports and Records § 30.54 Quality assurance. If the... data generation, the grantee shall develop and implement quality assurance practices consisting of...

  19. 10 CFR 76.93 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Quality assurance. 76.93 Section 76.93 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safety § 76.93 Quality assurance. The Corporation shall establish, maintain, and execute a quality assurance program satisfying each of...

  20. An approach to total quality assurance

    International Nuclear Information System (INIS)

    Archer, L.G.

    1976-01-01

    Total Quality Assurance must be based on amalgamating three quality functions: effective quality control, competent inspection, and regularly audited Quality Assurance programmes. In applying these functions the fuel supplier must regard each of his sub-contractors as part of his own works and ensure a common policy of motivated Quality Assurance throughout his own works and those of his suppliers. (author)

  1. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  2. Quality assurance for hammer forgings

    International Nuclear Information System (INIS)

    Potthast, E.

    1984-01-01

    The quality assurance program introduced by Arbed Saarstahl and laid down in a quality assurance manual is described. A particular attention is attached thereby both to quality practice proper and to a reliable flow of information amongst all the persons involved. The production and test sequence schedules of the hammer forging plant are illustrated by the example of a forged valve housing for nuclear power plants. These schedules specify not only the forging process in the individual production stages but also the workpiece contour after each working operation, the heat treatment, the furnace charging, and the inspection of finished parts. The formalization of the tests is designed both to promote the customer's trust towards the supplier and to prevent the formal operations involved from hindering further technical development. (orig.) [de

  3. New techniques in quality assurance

    International Nuclear Information System (INIS)

    Fornicola, J.C.

    1987-01-01

    GPU Nuclear Corp. has a multifaceted quality assurance (QA) program. This program includes a comprehensive QA organization to help ensure its implementation. The QA organization employs various techniques in assuring quality at GPU Nuclear. These techniques not only include the typical QA/quality-control verification activities, i.e., QA engineering, quality control, and audits, but also include some new innovative techniques. Several new techniques have been developed for verifying activities. These techniques include monitoring and functional audits of safety systems. Several new techniques for assessing performance and adequacy and effectiveness of plant and QA programs, such as plant assessments and QA systems engineering evaluations, have also been developed. This paper provides an overview of these and other new techniques being employed by GPU Nuclear's QA organization

  4. Assuring quality in narrative analysis.

    Science.gov (United States)

    Bailey, P H

    1996-04-01

    Many nurse-researchers using qualitative strategies have been concerned with assuring quality in their work. The early literature reveals that the concepts of validity and reliability, as understood from the positivist perspective, are somehow inappropriate and inadequate when applied to interpretive research. More recent literature suggests that because of the positivist and interpretive paradigms are epistemologically divergent, the transfer of quality criteria from one perspective to the other is not automatic or even reasonable. The purpose of this article, therefore, is to clarify what the terms quality, trustworthiness, credibility, authenticity, and goodness mean in qualitative research findings. The process of assuring quality, validation, in qualitative research will be discussed within the context of the interpretive method, narrative analysis. A brief review of quality in narrative analysis nursing research will also be presented.

  5. Quality management and quality assurance

    International Nuclear Information System (INIS)

    Pieroni, N.

    1991-01-01

    The main common difficulties are presented found in the implementation of effective Quality Management and Quality Assurance Programmes, based on the recommendations of the IAEA International Nuclear Safety Advisory Group, the information collected by the IAEA experts participating in its meetings, and the results of the IAEA Operational Safety Review Team missions. The difficulties were identified in several areas. The most relevant root causes can be characterized as lack of understanding of quality principles and difficulty in implementation by the responsible management. The IAEA programme is described attempting to provide advice and support in the implementation of an effective quality programme through a number of activities including: preparation of practical guidelines, training programmes for management personnel, assistance in building up qualified manpower, and promoting the quest for excellence through the exchange of experience in the implementation of effective Quality Management and Quality Assurance Programmes in nuclear power plants with good performance records. (Z.S.)

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  8. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  9. Quality assurance in diagnostic radiology

    International Nuclear Information System (INIS)

    1982-01-01

    The present guide endeavours to provide an outline of the type of quality assurance programme to be recommended for (1) routine implementation by those performing radiodiagnostic procedures (medical radiology technicians, medical physicists, and radiologists), (2) for application by the responsible national authorities, and (3) for use by international bodies such as the International Society of Radiology (ISR), the International Commission on Radiological Protection (ICRP), and the International Commission on Radiation Units and Measurements (ICRU)

  10. Quality Assurance in Higher Education

    OpenAIRE

    Nurdin, Nurdin

    2009-01-01

    Kualitas telah menjadi isu kritis dalam persaingan modern dewasa ini, dan hal itu telah menjadi beban tugas bagi para manager menengah. Dalam tataran abstrak kualitas telah didefinisikan oleh dua pakar penting bidang kualitas yaitu Joseph Juran dan Edward Deming. Mereka berdua telah berhasil menjadikan kualitas sebagai mindset yang berkembang terus dalam kajian managemen, khususnya managemen kualitas. Ouality assurance dalam dunia pendidikan adalah suatu keniscayaan seiring dengan terjadinya ...

  11. Quality Assurance In Radioactivity Measurements

    International Nuclear Information System (INIS)

    Riekstina, D.; Veveris, O.; Smilskalne, G.

    2007-01-01

    The credibility of obtained results is ensured by the quality assurance and control. The main requisitions involved in the quality assurance of the laboratory according to the requirements of LVS EN ISO/IEC 17025:2005 are: 1) the use of calibrated equipment only; 2) the regular and long-time use of reference materials in the control of equipment; 3) the estimation of uncertainty sources and determination of uncertainties within the given interval of credibility; 4) the validation and verification. The very important requirement is regular participation in the interlaboratory intercomparison exercises that makes it possible to estimate and find possible error sources and carry out the corrective actions. The measurements of the radioactivity of Cs-137, Co-60, H-3, the natural radioactive nuclides as well as other radionuclides in different environmental (soil, precipitation, different types of water, needles, et al.) samples, and in various radioactive polluted objects are carried out in the Laboratory of Radiation physics. The quality assurance system was implemented in our laboratory in 2000. Since 1999 laboratory is regular participant in the interlaboratory intercomparison exercises, organized by the RISO National Laboratory (Denmark) and IAEA (Vienna). The paper shows the laboratory's system of quality assurance and its implementation. We have the internal quality audit program that takes into account the requirements of LVS EN ISO/IEC 17025: 2005, but the main attention is paid to the intercomparison of the results of analyses of laboratories, their evaluation and interpretation. Only credible and justified results can be the basis for further use in any field, thus making it possible to make legitimate decisions. (Authors)

  12. Quality assurance of ageing components

    International Nuclear Information System (INIS)

    Novak, W.

    1992-01-01

    Comprehensive and permanent quality assurance on existing plants places very high requirements on measurement and evaluation technology. The necessary preconditions are often not met, however. By means of stocktaking using an external data registration and evaluation system may provide the basis for the assessment of the object and the existing power station instrumentation. After defining the desired scope and standards for the evaluation process, a specific solution may be produced. 5 figs

  13. DOE'S remedial action assurance program

    International Nuclear Information System (INIS)

    Welty, C.G. Jr.; Needels, T.S.; Denham, D.H.

    1984-10-01

    The formulation and initial implementation of DOE's Assurance Program for Remedial Action are described. It was initiated in FY 84 and is expected to be further implemented in FY 85 as the activities of DOE's Remedial Action programs continue to expand. Further APRA implementation will include additional document reviews, site inspections, and program office appraisals with emphasis on Uranium Mill Tailings Remedial Action Program and Surplus Facilities Management Program

  14. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Science.gov (United States)

    2010-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Information assurance...

  15. Learning Outcomes--A Useful Tool in Quality Assurance? Views from Academic Staff

    Science.gov (United States)

    Aamodt, Per Olaf; Frølich, Nicoline; Stensaker, Bjørn

    2018-01-01

    While the establishment of quality assurance has been seen for decades as the most significant instrument to secure and enhance the quality of teaching and learning in higher education, the concept of developing more specific learning outcomes has in recent years attracted much interest, not least due to the creation of national qualification…

  16. Quality assurance in tube manufacture

    International Nuclear Information System (INIS)

    Depken, H.

    1976-01-01

    Reliability in service essential for many high-technology products fabricated today. This is particularly the case within the nuclear industry. Here defective materials or components may have diastrous consequences to the safety of human beings and the environment. A new concept - Quality Assurance - originates from this industry. The concept implies that all contractors, fabricators and material manufactures involved must prove that the quality control system used, fulfits particular requirements at all manufacturing, inspection and testing stages. These requirement are laid down in two standards issued by the U.S. Atomic Energy Commission and the American Society of Mechanical Engineers. These standards are discussed in the paper. As a manufacturer of steel products for nuclear applications Sandvik has been forced to establish a quality assurance system according to these principles. The Sandvik approach is briefly described with regard to organisation and other major quality assurance activities. Further the education and training of operators and technicians is touched upon. Finally some viewpoints regarding audits performed by customers of steel manufacturers are expressed. (author)

  17. Quality Assurance for Clinical Trials

    Science.gov (United States)

    Ibbott, Geoffrey S.; Haworth, Annette; Followill, David S.

    2013-01-01

    Cooperative groups, of which the Radiation Therapy Oncology Group is one example, conduct national clinical trials that often involve the use of radiation therapy. In preparation for such a trial, the cooperative group prepares a protocol to define the goals of the trial, the rationale for its design, and the details of the treatment procedure to be followed. The Radiological Physics Center (RPC) is one of several quality assurance (QA) offices that is charged with assuring that participating institutions deliver doses that are clinically consistent and comparable. The RPC does this by conducting a variety of independent audits and credentialing processes. The RPC has compiled data showing that credentialing can help institutions comply with the requirements of a cooperative group clinical protocol. Phantom irradiations have been demonstrated to exercise an institution’s procedures for planning and delivering advanced external beam techniques (1–3). Similarly, RPC data indicate that a rapid review of patient treatment records or planning procedures can improve compliance with clinical trials (4). The experiences of the RPC are presented as examples of the contributions that a national clinical trials QA center can make to cooperative group trials. These experiences illustrate the critical need for comprehensive QA to assure that clinical trials are successful and cost-effective. The RPC is supported by grants CA 10953 and CA 81647 from the National Cancer Institute, NIH, DHHS. PMID:24392352

  18. Quality Assurance Requirements and Description

    International Nuclear Information System (INIS)

    Ram Murthy

    2002-01-01

    The Quality Assurance Requirements and Description (QARD) is the principal Quality Assurance (QA) document for the Civilian Radioactive Waste Management Program (Program). It establishes the minimum requirements for the QA program [INTRODUCTION :1p2s (NOT A REQUIREMENT)]. The QARD contains regulatory requirements and program commitments necessary for the development of an effective QA program [INTRODUCTION :1p3s (NOT A REQUIREMENT)]. Implementing documents must be based on, and be consistent with the QARD. The QARD applies to the following: (1) Acceptance of spent nuclear fuel and high-level waste. (2) Transport of spent nuclear fuel and high-level waste. (3) Storage of spent nuclear fuel through receipt of storage cask certification or a facility operating license. (4) Monitored Geologic Repository, including the site characterization activities [Exploratory Studies Facility (ESF) and surface based testing], through receipt of an operating license. (5) High-level waste form development through qualification, production, and acceptance. (6) Characterization of DOE spent nuclear fuel, and conditioning through acceptance of DOE spent nuclear fuel. Section 2.0, Quality Assurance Program, defines in greater detail criteria for determining work subject to the QARD

  19. Quality assurance and quality control

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    The practice of nuclear diagnostic imaging requires an appropriate quality assurance program to attain high standards of efficiency and reliability. The International Atomic Energy Agency defines the term quality assurance as ''the closeness with which the outcome of a given procedure approaches some ideal, free from all errors and artifacts.'' The term quality control is used in reference to the specific measures taken to ensure that one particular aspect of the procedure is satisfactory. Therefore, quality assurance is a hospital-wide concept that should involve all aspects of clinical practice. Quality control is concerned with the submission of requests for procedures; the scheduling of patients; the preparation and dispensing of radiopharmaceuticals; the protection of patients, staff, and the general public against radiation hazards and accidents caused by radioactive materials or by faulty equipment; the setting up, use, and maintenance of electronic instruments; the methodology of the actual procedures; the analysis and interpretation of data; the reporting of results; and, finally, the keeping of records. The chapter discusses each of these areas

  20. AP Index

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Planetary Amplitude index - Bartels 1951. The a-index ranges from 0 to 400 and represents a K-value converted to a linear scale in gammas (nanoTeslas)--a scale that...

  1. Practical aspects of quality assurance in nuclear power plants in Japan

    International Nuclear Information System (INIS)

    Inoue, Kunio

    1980-01-01

    Based on the occurrence of accidents caused by inappropriateness in quality assurance in nuclear power plants, the nuclear power plant quality assurance investigation committee was organized in January, 1980, to examine comprehensively what the quality assurance should be from designing through operating stages of the equipments and systems of nuclear power stations, in order to prevent the recurrence of such accidents, to secure the safety and to improve the reliability. The committee established three subcommittees: the first is in charge of the investigation of quality assurance system based on the analyses of accidents, failures or abnormal events, the second in charge of the investigation of quality assurance system in nuclear industries, and the third in charge of the investigation by comparing domestic legal control and the organization for implementing inspection with those of foreign countries. In nuclear power plants in Japan, approximately 20 accidents or failures have occurred every year in the last 3 or 4 years. Many of them seem to be caused by quality assurance problems such as the misuse of materials or the inadequacy in machining. In addition, to this paper the tables showing the general quality assurance activity in, and the present status of permission, approval and inspection for Japanese nuclear power plants are attached. (Wakatsuki, Y.)

  2. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  3. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  4. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  5. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  6. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  7. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  8. Conducting an information security audit

    Directory of Open Access Journals (Sweden)

    Prof. Ph.D . Gheorghe Popescu

    2008-05-01

    Full Text Available The rapid and dramatic advances in information technology (IT in recent years have withoutquestion generated tremendous benefits. At the same time, information technology has created significant,nunprecedented risks to government and to entities operations. So, computer security has become muchmore important as all levels of government and entities utilize information systems security measures toavoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitiveinformation. Obviously, uses of computer security become essential in minimizing the risk of malicious attacksfrom individuals and groups, considering that there are many current computer systems with onlylimited security precautions in place.As we already know financial audits are the most common examinations that a business manager en-counters.This is a familiar area for most executives: they know that financial auditors are going to examine the financial records and how those records are used. They may even be familiar with physical securityaudits. However, they are unlikely to be acquainted with information security audits; that is an audit ofhow the confidentiality, availability and integrity of an organization’s information are assured. Any way,if not, they should be, especially that an information security audit is one of the best ways to determine thesecurity of an organization’s information without incurring the cost and other associated damages of a securityincident.

  9. Draft secure medical database standard.

    Science.gov (United States)

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  10. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  11. Preparing Information Systems (IS) Graduates to Meet the Challenges of Global IT Security: Some Suggestions

    Science.gov (United States)

    Sauls, Jeff; Gudigantala, Naveen

    2013-01-01

    Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…

  12. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  13. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  14. AA Index

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The geomagnetic aa index provides a long climatology of global geomagnetic activity using 2 antipodal observatories at Greenwich and Melbourne- IAGA Bulletin 37,...

  15. Walkability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Walkability Index dataset characterizes every Census 2010 block group in the U.S. based on its relative walkability. Walkability depends upon characteristics of...

  16. Diversity Index

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — This map service summarizes racial and ethnic diversity in the United States in 2012.The Diversity Index shows the likelihood that two persons chosen at random from...

  17. AUTHOR INDEX

    Indian Academy of Sciences (India)

    a granitic terrain of southern India using factor analysis and GIS. 1059. Radhakrishna M see Dev Sheena V .... Landslide susceptibility analysis using Probabilistic. Certainty Factor ... index via entropy-difference analysis. 687. Yidana Sandow ...

  18. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  19. Intelligent indexing

    International Nuclear Information System (INIS)

    Farkas, J.

    1992-01-01

    In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space ι 2 to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs

  20. Intelligent indexing

    Energy Technology Data Exchange (ETDEWEB)

    Farkas, J

    1993-12-31

    In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space {iota}{sup 2} to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs.

  1. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  2. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  3. Digital radiography for quality assurance

    International Nuclear Information System (INIS)

    Thiele, H.; Friemel, H.J.

    2001-01-01

    The digital radiographic system AMICA-401 is described. It is a mobile system originally developed for wall thickness and diameter measurements of insulated and non-insulated pipes which is also suited for quality assurance in fabrication and maintenance. Its advantages are immediate evaluation of images, very short exposure times with reduced radiation loads, and an efficient integrated image processing software. Further, no chemical substances are required for film processing. The system can be used both in mobile and in stationary applications. Practical examples are presented and discussed. (orig.) [de

  4. Quality assurance of nuclear fuel

    International Nuclear Information System (INIS)

    1994-01-01

    The guide presents the quality assurance requirements to be completed with in the procurement, design, manufacture, transport, handling and operation of the nuclear fuel. The guide also applies to the procurement of the control rods and the shield elements to be placed in the reactor. The guide is mainly aimed for the licensee responsible for the procurement and operation of fuel, for the fuel designer and manufacturer and for other organizations whose activities affect fuel quality, the safety of fuel transport, storage and operation. (2 refs.)

  5. Performance assurance for IT systems

    CERN Document Server

    King, Brian

    2004-01-01

    INDIVIDUAL AREAS OF INTERESTPreparing for the ChallengeAbstractIntroductionIn the BeginningThe Need to Address New ApplicationsDefinition of PerformanceThe Required SkillsPerformance Assurance Within a Project LifecycleSummaryCaveat Emptor (Let the Buyer Beware)AbstractSoftware Product LifecycleHardware Product LifecycleMarketingTechnical Reviews of ProductsLies, Damned Lies and BenchmarksAbstractIntroductionIndustry BenchmarksVendor BenchmarksIndependent BenchmarkingIn-House Benchmarking""Tricks of the Trade""Using Benchmarks Non-Functional Requirements and SolutionsAbstractIntroductionThe Pr

  6. Quality assurance in digital radiography

    International Nuclear Information System (INIS)

    Busch, H.P.; Lehmann, K.J.

    1989-01-01

    At present, there is no standard way of evaluating performance characteristics of digital radiography systems. Continuous measurements of performance parameters are necessary in order to obtain images of high quality. Parameters of quality assurance in digital radiography, which can be evaluated with simple, quick methods, are spatial resolution, low-contrast detectability, dynamic range and exposure dose. Spatial resolution was determined by a lead bar pattern, whereas the other parameters were measured by commercially available phantoms. Performance measurements of 10 digital subtraction angiography (DSA) units and one digital radiography system for unsubtracted digital radiography were assessed. From these results, recommendations for performance parameter levels will be discussed. (author)

  7. Development and oversight of ethical health promotion quality assurance and evaluation activities involving human participants.

    Science.gov (United States)

    Sainsbury, Peter

    2015-12-01

    This paper considers the role of ethics and ethics review processes in the development of health promotion quality assurance and evaluation activities involving human participants. The Australian National Health and Medical Research Council (NHMRC) National Statement on Ethical Conduct in Human Research and associated documents provide the framework for the ethical conduct and independent review of research (including quality assurance and evaluation) involving humans in Australia. Identifying the level of risk to which participants may be exposed by participation in quality assurance and evaluation activities is essential for health promotion workers undertaking such activities. Organisations can establish processes other than review by a Human Research Ethics Committee for negligible and low risk research activities. Health promotion quality assurance and evaluation activities often involve negligible and low risk to participants. Seven triggers that indicate the need for ethics review of quality assurance and evaluation activities and a procedural checklist for developing ethical quality assurance and evaluation activities are provided. Health promotion workers should be familiar with the NHMRC's National Statement on Ethical Conduct in Human Research. When ethical considerations underpin the planning and conduct of all quality assurance and evaluation from the very beginning, the activity is the better for it, independent 'ethics approval' can mostly be secured without much trouble and workers' frustration levels are reduced. So what? Health promotion quality assurance and evaluation activities must be ethically justified. Health promotion workers should be familiar with the NHMRC's National Statement on Ethical Conduct in Human Research and should use it when developing health promotion quality assurance and evaluation activities.

  8. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  9. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  10. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  11. Information Assurance and Forensic Readiness

    Science.gov (United States)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  12. The Chronicle Index of For-Profit Higher Education

    Science.gov (United States)

    Blumenstyk, Goldie

    2007-01-01

    This Index tracks the performance of eight publicly traded higher-education companies. The index was developed for The Chronicle by the Center for Research in Security Prices at the University of Chicago's Graduate School of Business.

  13. Quality assurance of the bentonite material

    International Nuclear Information System (INIS)

    Ahonen, L.; Korkeakoski, P.; Tiljander, M.; Kivikoski, H.; Laaksonen, R.

    2008-05-01

    This report describes a quality assurance chain for the bentonite material acquisition for a nuclear waste disposal repository. Chemical, mineralogical and geotechnical methods, which may be applied in quality control of bentonite are shortly reviewed. As a case study, many of the presented control studies were performed for six different bentonite samples. Chemical analysis is a very reliable research method to control material homogeneity, because the accuracy and repeatability of the study method is extremely good. Accurate mineralogical study of bentonite is a complicated task. X-ray diffractometry is the best method to identify smectite minerals, but quantitative analysis of smectite content remains uncertain. To obtain a better quantitative analysis, development of techniques based on automatic image analysis of SEM images is proposed. General characteristics of bentonite can be obtained by rapid indicator tests, which can be done on the place of reception. These tests are methylene blue test giving information on the cation exchange capacity, swelling index and determination of water absorption. Different methods were used in the determination of cation exchange capacity (CEC) of bentonite. The results indicated differences both between methodologies and between replicate determinations for the same material and method. Additional work should be done to improve the reliability and reproducibility of the methodology. Bentonite contains water in different modes. Thus, different determination methods are used in bentonite studies and they give somewhat dissimilar results. Clay research use frequently the so-called consistency tests (liquid limit, plastic limit and plasticity index). This study method does, however, not seem to be very practical in quality control of bentonite. Therefore, only the determination of liquid limit with fall-cone method is recommended for quality control. (orig.)

  14. Virginia ESI: INDEX (Index Polygons)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains vector polygons representing the boundaries of all hardcopy cartographic products produced as part of the Environmental Sensitivity Index...

  15. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  16. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  17. Quality assurance considerations in nuclear waste management

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1982-01-01

    Proper use of quality assurance will provide the basis for an effective management control system for nuclear waste management programs. Control is essential for achieving successful programs free from costly losses and failures and for assuring the public and regulators that the environment and health and safety are being protected. The essence of quality assurance is the conscientious use of planned and systematic actions, based on selecting and applying appropriate requirements from an established quality assurance standard. Developing a quality assurance program consists of using knowledge of the technical and managerial aspects of a project to identify and evaluate risks of loss and failure and then to select appropriate quality assurance requirements that will minimize the risks. Those requirements are integrated into the project planning documents and are carried out as specific actions during the life of the project

  18. Organizing safety: conditions for successful information assurance programs.

    Science.gov (United States)

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  19. Quality assurance for gamma knives

    International Nuclear Information System (INIS)

    Jones, E.D.; Banks, W.W.; Fischer, L.E.

    1995-09-01

    This report describes and summarizes the results of a quality assurance (QA) study of the Gamma Knife, a nuclear medical device used for the gamma irradiation of intracranial lesions. Focus was on the physical aspects of QA and did not address issues that are essentially medical, such as patient selection or prescription of dose. A risk-based QA assessment approach was used. Sample programs for quality control and assurance are included. The use of the Gamma Knife was found to conform to existing standards and guidelines concerning radiation safety and quality control of external beam therapies (shielding, safety reviews, radiation surveys, interlock systems, exposure monitoring, good medical physics practices, etc.) and to be compliant with NRC teletherapy regulations. There are, however, current practices for the Gamma Knife not covered by existing, formalized regulations, standards, or guidelines. These practices have been adopted by Gamma Knife users and continue to be developed with further experience. Some of these have appeared in publications or presentations and are slowly finding their way into recommendations of professional organizations

  20. The challenge of Quality Assurance

    International Nuclear Information System (INIS)

    Simon, R.; Price, M.S.T.; Krischer, W.

    1985-01-01

    The safe terminal containment of hazardous wastes cannot only rely upon the geographic remoteness and the arid climates of the repository sites. Radioactive and permanently toxic chemical wastes must by prevented from returning to the human environment by natural and engineered barriers. The long-term integrity of these barriers and the safety of waste emplacement operation will be controlled by systematic actions under the common objective of Quality Assurance (QA). The following paper presents the aims of QA in the design and production of waste packages. It lists the most relevant acceptance criteria and regulatory requirements, investigates the institutional and technical problems of carrying out Quality Assurance and presents suggestions for establishing suitable organizational structures and technical programmes to provide adequate confidence in the safe nature and the performance of waste packages. In view of the technical difficulties of verifying the compliance of industrially produced waste forms with the acceptance criteria, the CEC has laid emphasis on the development of appropriate test methods in its last R and D programme. First results of the work are reviewed in the context of international progress in this field

  1. Quality assurance for gamma knives

    Energy Technology Data Exchange (ETDEWEB)

    Jones, E.D.; Banks, W.W.; Fischer, L.E. [Lawrence Livermore National Lab., CA (United States)

    1995-09-01

    This report describes and summarizes the results of a quality assurance (QA) study of the Gamma Knife, a nuclear medical device used for the gamma irradiation of intracranial lesions. Focus was on the physical aspects of QA and did not address issues that are essentially medical, such as patient selection or prescription of dose. A risk-based QA assessment approach was used. Sample programs for quality control and assurance are included. The use of the Gamma Knife was found to conform to existing standards and guidelines concerning radiation safety and quality control of external beam therapies (shielding, safety reviews, radiation surveys, interlock systems, exposure monitoring, good medical physics practices, etc.) and to be compliant with NRC teletherapy regulations. There are, however, current practices for the Gamma Knife not covered by existing, formalized regulations, standards, or guidelines. These practices have been adopted by Gamma Knife users and continue to be developed with further experience. Some of these have appeared in publications or presentations and are slowly finding their way into recommendations of professional organizations.

  2. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  3. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  4. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  5. Quality assurance techniques for activation analysis

    International Nuclear Information System (INIS)

    Becker, D.A.

    1984-01-01

    The principles and techniques of quality assurance are applied to the measurement method of activation analysis. Quality assurance is defined to include quality control and quality assessment. Plans for quality assurance include consideration of: personnel; facilities; analytical design; sampling and sample preparation; the measurement process; standards; and documentation. Activation analysis concerns include: irradiation; chemical separation; counting/detection; data collection, and analysis; and calibration. Types of standards discussed include calibration materials and quality assessment materials

  6. GSFC Safety and Mission Assurance Organization

    Science.gov (United States)

    Kelly, Michael P.

    2010-01-01

    This viewgraph presentation reviews NASA Goddard Space Flight Center's approach to safety and mission assurance. The contents include: 1) NASA GSFC Background; 2) Safety and Mission Assurance Directorate; 3) The Role of SMA-D and the Technical Authority; 4) GSFC Mission assurance Requirements; 5) GSFC Systems Review Office (SRO); 6) GSFC Supply Chain Management Program; and 7) GSFC ISO9001/AS9100 Status Brief.

  7. Quality assurance and nuclear power plant safety

    International Nuclear Information System (INIS)

    Mullan, J.V.

    1983-01-01

    Quality assurance in the nuclear industry was born in the late 1960s. Atomic Energy Control Board staff began its regulatory practice on quality assurance during that period. In this presentation the author traces the circumstances that first led to the establishment of Canadian nuclear power plant quality assurance programmes, summarizes progress over the last decade and a half, and outlines the current regulatory approach and what has been learned so far

  8. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  9. Software quality assurance - seven years experience

    International Nuclear Information System (INIS)

    Malsbury, J.A.

    1987-01-01

    This paper describes seven years experience with software quality assurance at PPPL. It covers the early attempts of 1980 and 1981 to establish software quality assurance; the first attempt of 1982 to develop a complete software quality assurance plan; the significant modifications of this plan in 1985; and the future. In addition, the paper describes the role of the Quality Assurance organization within each plan. The scope of this paper is limited to discussions of the software development procedures used in the seven year period. Other software quality topics, such as configuration control or problem identification and resolution, are not discussed

  10. Quality assurance program for nuclear power plants

    International Nuclear Information System (INIS)

    Gamon, T.H.

    1976-02-01

    The Topical Report presented establishes and provides the basis for the Brown and Root Quality Assurance Program for Nuclear Power Plants from which the Brown and Root Quality Assurance Manual is prepared and implemented. The Quality Assurance Program is implemented by the Brown and Root Power Division during the design, procurement, and construction phases of nuclear power plants. The Brown and Root Quality Assurance Program conforms to the requirements of Nuclear Regulatory Commission Regulation 10 CFR 50, Appendix B; to approved industry standards such as ANSI N45.2 and ''Daughter Standards''; or to equivalent alternatives as indicated in the appropriate sections of the report

  11. Quality assurance program for nuclear power plants

    International Nuclear Information System (INIS)

    Gamon, T.H.

    1976-06-01

    This topical report establishes and provides the basis for the Brown and Root Quality Assurance Program for Nuclear Power Plants from which the Brown and Root Quality Assurance Manual is prepared and implemented. The Quality Assurance Program is implemented by the Brown and Root Power Division during the design, procurement, and construction phases of nuclear power plants. The Brown and Root Quality Assurance Program conforms to the requirements of Nuclear Regulatory Commission Regulation 10 CFR 50, Appendix B; to approved industry standards such as ANSI N45.2 and ''Daughter Standards''; or to equivalent alternatives as indicated in the appropriate sections of this report

  12. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  13. Indexing mechanisms

    International Nuclear Information System (INIS)

    Wood, A.G.; Parker, G.E.; Berry, R.

    1976-01-01

    It is stated that the indexing mechanism described can be used in a nuclear reactor fuel element inspection rig. It comprises a tubular body adapted to house a canister containing a number of fuel elements located longtitudinally, and has two chucks spaced apart for displacing the fuel elements longitudinally in a stepwise manner, together with a plunger mechanism for displacing them successively into the chucks. A measuring unit is located between the chucks for measuring the diameter of the fuel elements at intervals about their circumferences, and a secondary indexing mechanism is provided for rotating the measuring unit in a stepwise manner. (U.K.)

  14. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  15. Workshop on measurement quality assurance for ionizing radiation: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Heath, J.A.; Swinth, K.L. [comps.

    1993-12-31

    This workshop was held to review the status of secondary level calibration accreditation programs, review related measurement accreditation programs, document lessons learned, and to present changes in programs due to new national priorities involving radioactivity measurements. Contents include: fundamentals of measurement quality assurance (MQA), standards for MQA programs; perspectives and policies; complete MQA programs; future MQA programs; QA/QC programs--radioactivity; QA/QC programs--dosimetry; laboratory procedures for QA/QC; in-house control of reference dosimetry laboratories; in-house controls of radioactivity laboratories; and poster session. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  16. Workshop on measurement quality assurance for ionizing radiation: Proceedings

    International Nuclear Information System (INIS)

    Heath, J.A.; Swinth, K.L.

    1993-01-01

    This workshop was held to review the status of secondary level calibration accreditation programs, review related measurement accreditation programs, document lessons learned, and to present changes in programs due to new national priorities involving radioactivity measurements. Contents include: fundamentals of measurement quality assurance (MQA), standards for MQA programs; perspectives and policies; complete MQA programs; future MQA programs; QA/QC programs--radioactivity; QA/QC programs--dosimetry; laboratory procedures for QA/QC; in-house control of reference dosimetry laboratories; in-house controls of radioactivity laboratories; and poster session. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database

  17. 18 CFR 3a.91 - Data index system.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Data index system. 3a..., DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Data Index System § 3a.91 Data index system. A data index system shall be established for Top Secret, Secret, and Confidential information in...

  18. Author Index

    Indian Academy of Sciences (India)

    user1

    Astr. (2012) 33, 419–420. Author Index. 419. AGGARWAL SUNNY. Photoionization Cross-Section of Chlorine-like Iron, 291. AMBASTHA ASHOK see Das, A. C., 1. ARAKIDA HIDEYOSHI. Effect of Inhomogeneity of the Universe on a Gravitationally. Bound Local System: A No-Go Result for Explaining the Secular Increase in.

  19. AUTHOR INDEX

    Indian Academy of Sciences (India)

    automorphic solutions to fractional order abstract integro-differential equations. 323. Afrouzi G A see Ala Samira ... 521. Agarwal Praveen. Certain fractional integral operators and the generalized multi-index Mittag- ... of positive solutions for sys- tems of second order multi-point bound- ary value problems on time scales 353.

  20. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  1. Nuclear power plants - Quality assurance

    International Nuclear Information System (INIS)

    1980-01-01

    This International Standard defines principles for the establishment and implementation of quality assurance programmes during all phases of design, procurement, fabrication, construction, commissioning, operation, maintenance and decommissioning of structures, systems and components of nuclear power plants. These principles apply to activities affecting the quality of items, such as designing, purchasing, fabricating, handling, shipping, storing, cleaning, erecting, installing, testing, commissioning, operating, inspecting, maintaining, repairing, refuelling and modifying and eventually decommissioning. The manner in which the principles described in this document will be implemented in different organizations involved in a specific nuclear power project will depend on regulatory and contractual requirements, the form of management applied to a nuclear power project, and the nature and scope of the work to be performed by different organizations

  2. Grid Technology and Quality Assurance

    International Nuclear Information System (INIS)

    Rippa, A.; Manieri, A.; Begin, M.E.; Di Meglio, A.

    2007-01-01

    Grid is one of the potential architectures of the coming years to support both the research and the commercial environment. Quality assurance techniques need both to adapt to these new architectures and exploit them to improve its effectiveness. Software quality is a key issue in the Digital Era: Industries as well as Public Administrations devote time to check and verify the quality of ICT products and services supplied. The definition of automatic measurement of quality metrics is a key point for implementing effective QA methods. In this paper we propose a quality certification model, named Grid-based Quality Certification Model (GQCM), that uses automatically calculable metrics to asses the quality of software applications; this model has been developed within the ETICS SSA4 activities and exploit grid technology for full automation of metrics calculation. It is however designed to be generic enough such that it can be implemented using any automatic build and test tool. (Author)

  3. Quality assurance and product quality

    International Nuclear Information System (INIS)

    Lacroix, D.; Bastiani, P. de

    2004-01-01

    The basic quality assurance requirements have to be completed by means that are oriented towards the quality of products; in COGEMA LOGISTICS our approach is based on four principles: 1) an integrated management system: Quality, health and safety, environment 2) an organization based on the responsibility of all actors, trust and transparency 3) a methodical approach to continuously improve the methods that are employed to achieve quality: -process management -corrective and preventive actions -self assessments and various surveys 4) but at the same time strong procedures for control and monitoring of all activities: -technical and quality audits (external and internal) -at source inspections -engineering activities inspections This performance-based approach is necessary to guaranty the effectiveness of the traditional formal QA means

  4. Quality assurance in radionuclide laboratories

    International Nuclear Information System (INIS)

    Otto, R.; Voelkle, H.; Wershofen, H.; Wilhelm, C.

    2003-01-01

    The authors are members of an ad-hoc working group preparing a contribution to the procedures manual (''Loseblattsammlung'') dealing with quality assurance and quality control in radionuclide laboratories. The Loseblattsammlung is edited by the working group ''Environmental Monitoring'' of the German-Swiss Radiological Protection Association. The intention of the manual under preparation is not to give a procedure on how to establish a quality management system allowing for an accreditation in accordance with the international standard DIN EN ISO/IEC 17025:2000 04 (''ISO 17025'') [1] but to compile routine quality control procedures necessary for reliable measurements and to give tips to the practitioner on how to keep both the extent and the frequency of procedures on a reasonable level. A short version of the Loseblatt is presented here. (orig.)

  5. Mammography quality assurance in Morocco

    International Nuclear Information System (INIS)

    Zaoui, F.; Talsmat, K.; Lalaoui, K.

    2001-01-01

    The 'Centre National de l'Energie, des Sciences et des Techniques Nucleaires' (CNESTEN) realised, from February 1999 to March 2000, a quality control of 41 mammography facilities in Morocco. The protocol and standards adopted for achieving the control of elements constituting the mammography chain are those elaborated by GIM and Qualix association. Statistics and conformities results are presented. The program was performed in order to demonstrate to the practitioners in mammography field, the utility and necessity to have a national quality assurance policy. The main objective of CNESTEN is to be accredited by the Moroccan government as a reference laboratory in quality control and dose evaluation in medical imaging and radiotherapy. To achieve this goal the CNESTEN has set up Medical Physic Unit well trained and equipped with the necessary instruments. (author)

  6. Quality assurance and statistical control

    DEFF Research Database (Denmark)

    Heydorn, K.

    1991-01-01

    In scientific research laboratories it is rarely possible to use quality assurance schemes, developed for large-scale analysis. Instead methods have been developed to control the quality of modest numbers of analytical results by relying on statistical control: Analysis of precision serves...... to detect analytical errors by comparing the a priori precision of the analytical results with the actual variability observed among replicates or duplicates. The method relies on the chi-square distribution to detect excess variability and is quite sensitive even for 5-10 results. Interference control...... serves to detect analytical bias by comparing results obtained by two different analytical methods, each relying on a different detection principle and therefore exhibiting different influence from matrix elements; only 5-10 sets of results are required to establish whether a regression line passes...

  7. Is quality assurance really necessary

    International Nuclear Information System (INIS)

    Elwen, L.

    1983-01-01

    The modern concept of quality assurance began to take root in the 50's in Japan. In the rest of the world the demand for quality of products and services might well have arisen through the demise of the craftsman, concurrent with a change in emphasis from quality and workmanship towards economy and output. In the beginning this metamorphosis had its virtues, when rationalisation of production methods benefited both producer and consumer. However, the increasing pressure on production in virtually all sectors of commerce and industry inevitably lead to a trend towards cutting corners, a philosophy not conducive to increasing the standards of quality. The shortage of skilled manpower began to make itself felt at about the same time. The civil construction industry did not remain unscathed

  8. Is quality assurance really necessary

    Energy Technology Data Exchange (ETDEWEB)

    Elwen, L

    1983-03-01

    The modern concept of quality assurance began to take root in the 50's in Japan. In the rest of the world the demand for quality of products and services might well have arisen through the demise of the craftsman, concurrent with a change in emphasis from quality and workmanship towards economy and output. In the beginning this metamorphosis had its virtues, when rationalisation of production methods benefited both producer and consumer. However, the increasing pressure on production in virtually all sectors of commerce and industry inevitably lead to a trend towards cutting corners, a philosophy not conducive to increasing the standards of quality. The shortage of skilled manpower began to make itself felt at about the same time. The civil construction industry did not remain unscathed.

  9. Islay development flow assurance challenges

    Energy Technology Data Exchange (ETDEWEB)

    Helingoe, Mark; Greder, Hugues

    2010-07-01

    The Islay field is located in the Northern North Sea UK sector in the vicinity of the Alwyn Platforms. This gas condensate Brent structure is planned to be developed subsea with first gas in 2011. The main development challenge for this HPHT field comes from the early expected formation water production which is the source of major hydrate related flow assurance issues. As continuous inhibition is not feasible, Total has progressed a development scenario based on seabed conditioning prior to pipe laying so that water can be collected and temporarily inhibited at specific low points after a shut-down. It is also intended to heat trace the pipeline as a back-up solution to avoid hydrate formation. Heat tracing has so far never been implemented in Subsea developments. The Islay pilot could open the path to a new hydrate management philosophy for future developments. (Author)

  10. Quality assurance and quality control

    International Nuclear Information System (INIS)

    Kaden, W.

    1986-01-01

    General preconditions and methods for QA work in the nuclear field are analysed. The application of general QA principles to actual situations is illustrated by examples in the fields of engineering and of the manufacturing of mechanical and electrical components. All QA measures must be fitted to the complexity and relevance of the work steps, which are under consideration. The key to good product quality is the control of working processes. The term 'controlled process' is discussed in detail and examples of feed back systems are given. The main QA measures for the operation of nuclear power plants include the establishment of a Quality Assurance Program, training and qualification of personnel, procurement control, inspection and tests, reviews and audits. These activities are discussed. (orig.)

  11. Statistical methods for quality assurance

    International Nuclear Information System (INIS)

    Rinne, H.; Mittag, H.J.

    1989-01-01

    This is the first German-language textbook on quality assurance and the fundamental statistical methods that is suitable for private study. The material for this book has been developed from a course of Hagen Open University and is characterized by a particularly careful didactical design which is achieved and supported by numerous illustrations and photographs, more than 100 exercises with complete problem solutions, many fully displayed calculation examples, surveys fostering a comprehensive approach, bibliography with comments. The textbook has an eye to practice and applications, and great care has been taken by the authors to avoid abstraction wherever appropriate, to explain the proper conditions of application of the testing methods described, and to give guidance for suitable interpretation of results. The testing methods explained also include latest developments and research results in order to foster their adoption in practice. (orig.) [de

  12. Basic principles of quality assurance

    International Nuclear Information System (INIS)

    Stauffer, M.

    1977-01-01

    After a brief review of the origin of the 'quality concept' and the historical development of quality assurance, questions such as 'what is QA' and 'why is QA so important in nuclear technology' as well as definitions and main requirements of relevant QA codes and standards are presented and discussed. By means of a project realization schematic, tasks, duties, responsibilities, and possible QA organigrammes as well as QA programme and manual requirements are explained and compared. From a QA point of view, it is shown that no basic difference exists between design and production or construction control activities. Special emphasis is layed upon active owner's participation in the implementation of QA programmes for NPP and the advantages offered are described and illustrated by typical examples. (RW) [de

  13. Nuclear security standard: Argentina approach

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Rodriguez, Carlos E.; Menossi, Sergio A.; Serdeiro, Nelida H.

    2007-01-01

    Argentina has a comprehensive regulatory system designed to assure the security and safety of radioactive sources, which has been in place for more than fifty years. In 1989 the Radiation Protection and Nuclear Safety branch of the National Atomic Energy Commission created the 'Council of Physical Protection of Nuclear Materials and Installations' (CAPFMIN). This Council published in 1992 a Physical Protection Standard based on a deep and careful analysis of INFCIRC 225/Rev.2 including topics like 'sabotage scenario'. Since then, the world's scenario has changed, and some concepts like 'design basis threat', 'detection, delay and response', 'performance approach and prescriptive approach', have been applied to the design of physical protection systems in facilities other than nuclear installations. In Argentina, radioactive sources are widely used in medical and industrial applications with more than 1,600 facilities controlled by the Nuclear Regulatory Authority (in spanish ARN). During 2005, measures like 'access control', 'timely detection of intruder', 'background checks', and 'security plan', were required by ARN for implementation in facilities with radioactive sources. To 'close the cycle' the next step is to produce a regulatory standard based on the operational experience acquired during 2005. ARN has developed a set of criteria for including them in a new standard on security of radioactive materials. Besides, a specific Regulatory Guide is being prepared to help licensees of facilities in design a security system and to fulfill the 'Design of Security System Questionnaire'. The present paper describes the proposed Standard on Security of Radioactive Sources and the draft of the Nuclear Security Regulatory Guidance, based on our regulatory experience and the latest international recommendations. (author)

  14. The myth of secure computing.

    Science.gov (United States)

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  15. Quality Assurance for Essential Climate Variables

    Science.gov (United States)

    Folkert Boersma, K.; Muller, Jan-Peter

    2015-04-01

    Satellite data are of central interest to the QA4ECV project. Satellites have revolutionized the Earth's observation system of climate change and air quality over the past three decades, providing continuous data for the entire Earth. However, many users of these data are lost in the fog as to the quality of these satellite data. Because of this, the European Union expressed in its 2013 FP7 Space Research Call a need for reliable, traceable, and understandable quality information on satellite data records that could serve as a blueprint contribution to a future Copernicus Climate Change Service. The potential of satellite data to benefit climate change and air quality services is too great to be ignored. QA4ECV therefore bridges the gap between end-users of satellite data and the satellite data products. We are developing an internationally acceptable Quality Assurance (QA) framework that provides understandable and traceable quality information for satellite data used in climate and air quality services. Such a framework should deliver the historically linked long-term data sets that users need, in a format that they can readily use. QA4ECV has approached more than 150 users and suppliers of satellite data to collect their needs and expectations. The project will use their response as a guideline for developing user-friendly tools to obtain information on the completeness, accuracy, and fitness-for-purpose of the satellite datasets. QA4ECV collaborates with 4 joint FP7 Space projects in reaching out to scientists, policy makers, and other end-users of satellite data to improve understanding of the special challenges -and also opportunities- of working with satellite data for climate and air quality purposes. As a demonstration of its capacity, QA4ECV will generate multi-decadal climate data records for 3 atmospheric ECV precursors (nitrogen dioxide, formaldehyde, and carbon monoxide) and 3 land ECVs (albedo, leaf area index and absorbed photosynthetically active

  16. Hungary Higher Education Quality Assurance System

    Directory of Open Access Journals (Sweden)

    Che Ru-shan

    2013-07-01

    Full Text Available Higher education quality assurance system has drawn much attention since 1980s. Most countries are committed to build the higher education quality assurance system to meet international standards. Under such an international trend, Hungary also actively promotes higher education reform, and established Hungarian Accreditation Committee and in order to ensure the quality of higher education.

  17. 22 CFR 141.4 - Assurances required.

    Science.gov (United States)

    2010-04-01

    ... of the United States for the desegregation of such school or school system, and provides an assurance... other participants. Any such assurance shall include provisions which give the United States a right to... system which the responsible official of the Department of Health, Education, and Welfare determines is...

  18. 40 CFR 194.22 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... General Requirements § 194.22 Quality assurance. (a)(1) As soon as practicable after April 9, 1996, the Department shall adhere to a quality assurance program that implements the requirements of ASME NQA-1-1989... elicitation used to support applications for certification or re-certification of compliance; (vi) Design of...

  19. Quality assurance plan, Westinghouse Water Reactor Divisions

    Energy Technology Data Exchange (ETDEWEB)

    1976-03-01

    The Quality Assurance Program used by Westinghouse Nuclear Energy Systems Water Reactor Divisions is described. The purpose of the program is to assure that the design, materials, and workmanship on Nuclear Steam Supply System (NSSS) equipment meet applicable safety requirements, fulfill the requirements of the contracts with the applicants, and satisfy the applicable codes, standards, and regulatory requirements.

  20. Elements of quality assurance in environmental surveillance

    International Nuclear Information System (INIS)

    Johnson, L.J.

    1975-01-01

    Qualities of an environmental surveillance program requiring control or assurance are reviewed. Requirements of accuracy, reproducibility, sensitivity, acceptability, and time and cost effectiveness are qualities discussed. The controls applicable to sample collection, handling, chemical analysis, measurement and data presentation are identified and discussed as they pertain to environmental monitoring. Quality assurance program recommendations for developing and reporting environmental surveillance data are provided

  1. 44 CFR 19.115 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 19.115 Assurance required. (a) General. Either at the... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Assurance required. 19.115 Section 19.115 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF...

  2. Quality assurance for image-guided radiotherapy

    International Nuclear Information System (INIS)

    Marinello, Ginette

    2008-01-01

    The topics discussed include, among others, the following: Quality assurance program; Image guided radiotherapy; Commissioning and quality assurance; Check of agreement between visual and displayed scales; quality controls: electronic portal imaging device (EPID), MV-kV and kV-kV, cone-beam CT (CBCT), patient doses. (P.A.)

  3. Quality assurance manual: Volume 2, Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department. (LSP)

  4. Commissioning quality assurance at Pickering NGS

    International Nuclear Information System (INIS)

    Wieckowski, J.T.

    1983-05-01

    Ontario Hydro decided in 1978 to implement a formal quality assurance program applicable to commissioning and operation of nuclear generating stations. Pickering NGS is the first station to have the commissioning quality assurance (CQA) program applied to it. This paper outlines the scope, implementation, and evaluation of the CQA program as applied to Pickering Unit 5

  5. 30 CFR 7.7 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 7.7 Section 7.7 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR TESTING, EVALUATION, AND APPROVAL OF MINING PRODUCTS TESTING BY APPLICANT OR THIRD PARTY General § 7.7 Quality assurance. Applicants granted...

  6. Ontario's Quality Assurance Framework: A Critical Response

    Science.gov (United States)

    Heap, James

    2013-01-01

    Ontario's Quality Assurance Framework (QAF) is reviewed and found not to meet all five criteria proposed for a strong quality assurance system focused on student learning. The QAF requires a statement of student learning outcomes and a method and means of assessing those outcomes, but it does not require that data on achievement of intended…

  7. [Quality assurance in human genetic testing].

    Science.gov (United States)

    Stuhrmann-Spangenberg, Manfred

    2015-02-01

    Advances in technical developments of genetic diagnostics for more than 50 years, as well as the fact that human genetic testing is usually performed only once in a lifetime, with additional impact for blood relatives, are determining the extraordinary importance of quality assurance in human genetic testing. Abidance of laws, directives, and guidelines plays a major role. This article aims to present the major laws, directives, and guidelines with respect to quality assurance of human genetic testing, paying careful attention to internal and external quality assurance. The information on quality assurance of human genetic testing was obtained through a web-based search of the web pages that are referred to in this article. Further information was retrieved from publications in the German Society of Human Genetics and through a PubMed-search using term quality + assurance + genetic + diagnostics. The most important laws, directives, and guidelines for quality assurance of human genetic testing are the gene diagnostics law (GenDG), the directive of the Federal Medical Council for quality control of clinical laboratory analysis (RiliBÄK), and the S2K guideline for human genetic diagnostics and counselling. In addition, voluntary accreditation under DIN EN ISO 15189:2013 offers a most recommended contribution towards quality assurance of human genetic testing. Legal restraints on quality assurance of human genetic testing as mentioned in § 5 GenDG are fulfilled once RiliBÄK requirements are followed.

  8. 48 CFR 2453.246 - Quality Assurance.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Quality Assurance. 2453.246 Section 2453.246 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT CLAUSES AND FORMS FORMS Prescription of Forms 2453.246 Quality Assurance. ...

  9. 30 CFR 15.8 - Quality assurance.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Quality assurance. 15.8 Section 15.8 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR TESTING, EVALUATION, AND APPROVAL OF... § 15.8 Quality assurance. (a) Applicants granted an approval or an extension of approval under this...

  10. Quality Assurance in Chinese Higher Education

    Science.gov (United States)

    Li, Yuan

    2010-01-01

    Quality assurance has been integrated into the fabric of higher education in China, with the issue of quality in higher education--how to evaluate it and how to enhance it--now taking centre stage in Chinese higher education. In the past decade, the development of quality assurance in Chinese higher education has covered a broad spectrum of…

  11. Quality assurance in nuclear power plant

    International Nuclear Information System (INIS)

    Magalhaes, M.T. de

    1981-01-01

    The factors related to the licensing procedures of a nuclear power plant (quality assurance and safety analysis) are presented and discussed. The consequences of inadequate attitudes towards these factors are shown and suggestions to assure the safety of nuclear power plants in Brazil are presented. (E.G.) [pt

  12. Tool Use Within NASA Software Quality Assurance

    Science.gov (United States)

    Shigeta, Denise; Port, Dan; Nikora, Allen P.; Wilf, Joel

    2013-01-01

    As space mission software systems become larger and more complex, it is increasingly important for the software assurance effort to have the ability to effectively assess both the artifacts produced during software system development and the development process itself. Conceptually, assurance is a straightforward idea - it is the result of activities carried out by an organization independent of the software developers to better inform project management of potential technical and programmatic risks, and thus increase management's confidence in the decisions they ultimately make. In practice, effective assurance for large, complex systems often entails assessing large, complex software artifacts (e.g., requirements specifications, architectural descriptions) as well as substantial amounts of unstructured information (e.g., anomaly reports resulting from testing activities during development). In such an environment, assurance engineers can benefit greatly from appropriate tool support. In order to do so, an assurance organization will need accurate and timely information on the tool support available for various types of assurance activities. In this paper, we investigate the current use of tool support for assurance organizations within NASA, and describe on-going work at JPL for providing assurance organizations with the information about tools they need to use them effectively.

  13. 22 CFR 146.115 - Assurance required.

    Science.gov (United States)

    2010-04-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 146.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  14. 45 CFR 86.4 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... SEX IN EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 86.4 Assurance required. (a) General. Every application for Federal financial assistance for any education... Director of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  15. 49 CFR 25.115 - Assurance required.

    Science.gov (United States)

    2010-10-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 25.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  16. 40 CFR 5.115 - Assurance required.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 5.115 Assurance... that applications for Federal financial assistance or awards of Federal financial assistance contain... official of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  17. 28 CFR 54.115 - Assurance required.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 54.115 Assurance... that applications for Federal financial assistance or awards of Federal financial assistance contain... official of such assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance...

  18. 10 CFR 1042.115 - Assurance required.

    Science.gov (United States)

    2010-01-01

    ... ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 1042.115 Assurance required. (a) General... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  19. 22 CFR 229.115 - Assurance required.

    Science.gov (United States)

    2010-04-01

    ... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Introduction § 229.115 Assurance required. (a... applications for Federal financial assistance or awards of Federal financial assistance contain, be accompanied... assurance. (b) Duration of obligation. (1) In the case of Federal financial assistance extended to provide...

  20. 45 CFR 605.5 - Assurances required.

    Science.gov (United States)

    2010-10-01

    ... ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE General Provisions § 605.5 Assurances required. (a) Assurances. Recipients of Federal financial assistance to which... purpose for which Federal financial assistance is extended or for another purpose involving the provision...

  1. Quality Assurance in Sub-Saharan Africa

    Science.gov (United States)

    Materu, Peter; Righetti, Petra

    2010-01-01

    This article assesses the status and practice of higher education quality assurance in sub-Saharan Africa, focusing on degree-granting tertiary institutions. A main finding is that structured national-level quality assurance processes in African higher education are a very recent phenomenon and that most countries face major capacity constraints.…

  2. Quality assurance - not only for engineers

    International Nuclear Information System (INIS)

    Treffner, F.W.

    1984-01-01

    The actual purpose of quality assurance is the definition of effective processes, ways and means of planning, fabricating and obtaining the required characteristics determining the quality of components, subsystems and their fabrication techniques at any place and any time. Service companies can contribute quality assurance, quality control and documentation work do cost-benefit analyses and act as expert consultants. (orig.) [de

  3. Flow assurance studies for CO2 transport

    NARCIS (Netherlands)

    Veltin, J.; Belfroid, S.P.C.

    2013-01-01

    In order to compensate for the relative lack of experience of the CCTS community, Flow Assurance studies of new CO2 pipelines and networks are a very important step toward reliable operation. This report details a typical approach for Flow Assurance study of CO2 transport pipeline. Considerations to

  4. Disarmament and security in Africa

    International Nuclear Information System (INIS)

    1991-01-01

    This publication contains 11 selected papers presented at the seminars on African Disarmament and Security, which were held in Cairo, Egypt, from 20 to 23 march 1989 and from 6 to 10 May 1990. Seven of these papers were indexed separately for INIS

  5. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  6. Reinforcing Quality Assurance in Romanian Higher Education

    Directory of Open Access Journals (Sweden)

    Ana-Maria Dima

    2010-07-01

    Full Text Available Since 1993, the quality assurance system in Romania has gained considerable experience. This experience was recently recognized in 2008 by the ENQA: European Association for Quality Assurance in Higher Education through the admission of ARACIS as a full member of EQAR: the European Quality Assurance Register. The Board of ENQA agreed to grant ARACIS’s full membership of ENQA for five years from 2 June 2009. This article explores the benefits of membership for the Romanian Agency for Quality Assurance in Higher Education – ARACIS, comparing to other regional and global quality assurance agencies networks. The common features and differences between ARACIS and other European agencies are questioned through the frameworks of ENQA and INQAAHE as a case study.

  7. Regulatory viewpoint on nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    Tripp, L.E.

    1976-01-01

    Considerations of the importance of fuel quality and performance to nuclear safety, ''as low reasonably achievable'' release of radioactive materials in reactor effluents, and past fuel performance problems demonstrate the need for strong regulatory input, review and inspection of nuclear fuel quality assurance programs at all levels. Such a regulatory program is being applied in the United States of America by the US Nuclear Regulatory Commission. Quality assurance requirements are contained within government regulations. Guidance on acceptable methods of implementing portions of the quality assurance program is contained within Regulatory Guides and other NRC documents. Fuel supplier quality assurance program descriptions are reviewed as a part of the reactor licensing process. Inspections of reactor licensee control of their fuel vendors as well as direct inspections of fuel vendor quality assurance programs are conducted on a regularly scheduled basis. (author)

  8. Quality assurance program plan for Building 324

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides an overview of the quality assurance program for Building 324. This plan supersedes the PNNL Nuclear Facilities Quality Management System Description, PNL-NF-QMSD, Revision 2, dated March 1996. The program applies to the facility safety structures, systems, and components and to activities that could affect safety structures, systems, and components. Adherence to the quality assurance program ensures the following: US Department of Energy missions and objectives are effectively accomplished; Products and services are safe, reliable, and meet or exceed the requirements and expectations of the user; Hazards to the public, to Hanford Site and facility workers, and to the environment are minimized. The format of this Quality Assurance Program Plan is structured to parallel that of 10 CFR 83 0.120, Quality Assurance Requirements

  9. Training, Quality Assurance Factors, and Tools Investigation: a Work Report and Suggestions on Software Quality Assurance

    Science.gov (United States)

    Lee, Pen-Nan

    1991-01-01

    Previously, several research tasks have been conducted, some observations were obtained, and several possible suggestions have been contemplated involving software quality assurance engineering at NASA Johnson. These research tasks are briefly described. Also, a brief discussion is given on the role of software quality assurance in software engineering along with some observations and suggestions. A brief discussion on a training program for software quality assurance engineers is provided. A list of assurance factors as well as quality factors are also included. Finally, a process model which can be used for searching and collecting software quality assurance tools is presented.

  10. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  11. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  12. DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

    Directory of Open Access Journals (Sweden)

    Hussam Alddin Shihab Ahmed

    2016-02-01

    Full Text Available Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

  13. Implementation of an assurance system guarantee quality in the hospital radiotherapy department of Lenin Holguin, Cuba

    International Nuclear Information System (INIS)

    Gonzalez Lopez, Nadia; Perez Velasquez, Reytel; Sol Zamora

    2009-01-01

    By the need to develop a simple and effective method of reducing radiation accidents in the present work has as objective the implementation through a manual system assurance quality assurance department of radiotherapy based on ISO 9000 and 14000 , besides the IAEA TECDOC-1151. The Quality Manual is divided into four sessions: general, procedures for the realization of security testing, mechanical and dosimetric the Co-60 machine, procedures for the planning of treatments in gynecology locations, SNC, rectum and breast cancer and those relating to the search and / or simulation of the first patient treatment, all discussed and approved by the Quality Assurance Committee. We conclude that this document is essential in obtaining an increasing quality in conventional radiation treatments, plus must be a reference material in the training of technologists, doctors and medical physicist and the documentary basis for the conformation of the warranty program quality of radiation therapy 3D-CRT. (author)

  14. Quality Assurance Program Plan for the Waste Sampling and Characterization Facility

    International Nuclear Information System (INIS)

    Grabbe, R.R.

    1995-01-01

    The objective of this Quality Assurance Plan is to provide quality assurance (QA) guidance, implementation of regulatory QA requirements, and quality control (QC) specifications for analytical service. This document follows the Department of Energy (DOE)-issued Hanford Analytical Services Quality Assurance Plan (HASQAP) and additional federal [10 US Code of Federal Regulations (CFR) 830.120] QA requirements that HASQAP does not cover. This document describes how the laboratory implements QA requirements to meet the federal or state requirements, provides what are the default QC specifications, and/or identifies the procedural information that governs how the laboratory operates. In addition, this document meets the objectives of the Quality Assurance Program provided in the WHC-CM-4-2, Section 2.1. This document also covers QA elements that are required in the Guidelines and Specifications for Preparing Quality Assurance Program Plans (QAPPs), (QAMS-004), and Interim Guidelines and Specifications for Preparing Quality Assurance Product Plans (QAMS-005) from the Environmental Protection Agency (EPA). A QA Index is provided in the Appendix A

  15. National Program of Quality Assurance in Radiotherapy in Cuba

    International Nuclear Information System (INIS)

    Alonso Samper, J. L.; Dominguez Hung, L.; Morales Lopez, J. L.; Alfonso Laguardia, R.; Garcia Yip, F.

    2001-01-01

    It tries on the establishment of a Quality Assurance Nacional System, a Quality Assurance Committee implemented in Cuba, and a Quality Auditory National Program implemented in Cuba to control and assure radiotherapy quality

  16. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  17. Improving patient safety through quality assurance.

    Science.gov (United States)

    Raab, Stephen S

    2006-05-01

    Anatomic pathology laboratories use several quality assurance tools to detect errors and to improve patient safety. To review some of the anatomic pathology laboratory patient safety quality assurance practices. Different standards and measures in anatomic pathology quality assurance and patient safety were reviewed. Frequency of anatomic pathology laboratory error, variability in the use of specific quality assurance practices, and use of data for error reduction initiatives. Anatomic pathology error frequencies vary according to the detection method used. Based on secondary review, a College of American Pathologists Q-Probes study showed that the mean laboratory error frequency was 6.7%. A College of American Pathologists Q-Tracks study measuring frozen section discrepancy found that laboratories improved the longer they monitored and shared data. There is a lack of standardization across laboratories even for governmentally mandated quality assurance practices, such as cytologic-histologic correlation. The National Institutes of Health funded a consortium of laboratories to benchmark laboratory error frequencies, perform root cause analysis, and design error reduction initiatives, using quality assurance data. Based on the cytologic-histologic correlation process, these laboratories found an aggregate nongynecologic error frequency of 10.8%. Based on gynecologic error data, the laboratory at my institution used Toyota production system processes to lower gynecologic error frequencies and to improve Papanicolaou test metrics. Laboratory quality assurance practices have been used to track error rates, and laboratories are starting to use these data for error reduction initiatives.

  18. Quality assurance in biomarker measurement.

    Science.gov (United States)

    Aitio, A; Apostoli, P

    1995-05-01

    Quality assurance (QA) concerns the validity of all the analytical processes (from collection of the samples to interpretation of the results). It is not an abstract concept but must be adapted to the different situations such as the different exposure levels, the different analytical methods, and the context of use (risk assessment procedures, research, routine determinations). The main requirements in QA programmes regard the control of all the known sources of preanalytical and analytical variations, while the instruments with which adequate QA can be implemented are the certified materials and the quality control programmes (quality manual, internal and external quality controls). Another important concept in QA is that measurements must be placed a different metrological levels: at the highest there are the methods (definitive, reference) to be used for assessing accuracy of routine methods. QA programmes should enable a grading of biomarkers (from experimental only to full evaluated) and of the laboratories in order to identify the significance of the test and to assess the level at which a laboratory could operate.

  19. Metrics for building performance assurance

    Energy Technology Data Exchange (ETDEWEB)

    Koles, G.; Hitchcock, R.; Sherman, M.

    1996-07-01

    This report documents part of the work performed in phase I of a Laboratory Directors Research and Development (LDRD) funded project entitled Building Performance Assurances (BPA). The focus of the BPA effort is to transform the way buildings are built and operated in order to improve building performance by facilitating or providing tools, infrastructure, and information. The efforts described herein focus on the development of metrics with which to evaluate building performance and for which information and optimization tools need to be developed. The classes of building performance metrics reviewed are (1) Building Services (2) First Costs, (3) Operating Costs, (4) Maintenance Costs, and (5) Energy and Environmental Factors. The first category defines the direct benefits associated with buildings; the next three are different kinds of costs associated with providing those benefits; the last category includes concerns that are broader than direct costs and benefits to the building owner and building occupants. The level of detail of the various issues reflect the current state of knowledge in those scientific areas and the ability of the to determine that state of knowledge, rather than directly reflecting the importance of these issues; it intentionally does not specifically focus on energy issues. The report describes work in progress and is intended as a resource and can be used to indicate the areas needing more investigation. Other reports on BPA activities are also available.

  20. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  1. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  2. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  3. Quality management and quality assurance contracts

    International Nuclear Information System (INIS)

    Teichler, M.

    1991-01-01

    Quality assurance contracts belong to the most important instruments of quality management systems. As a result of such contracts, quality control is to be done not only by the buyer, but is made a task to be fulfilled by the manufacturer. The author of the article shows that quality assurance contracts do change the contractual relationship between supplier and buyer, but have no effect on economic and practical conditions. This is so because quality assurance contracts apply only to warranty claims, which play a subordinate role in the legal relationship between producer and buyer, or producer and consumer, as compared to the claims for damages arising out of the contracts. (orig.) [de

  4. Westinghouse Water Reactor Divisions quality assurance plan

    International Nuclear Information System (INIS)

    1977-09-01

    The Quality Assurance Program used by Westinghouse Water Reactor Divisions is described. The purpose of the program is to assure that the design, materials, and workmanship on Nuclear Steam Supply System (NSSS) equipment meet applicable safety requirements, fulfill the requirements of the contracts with the applicants, and satisfy the applicable codes, standards, and regulatory requirements. This program satisfies the NRC Quality Assurance Criteria, 10CFR50 Appendix B, to the extent that these criteria apply to safety related NSSS equipment. Also, it follows the regulatory position provided in NRC regulatory guides and the requirements of ANSI Standard N45.2.12 as identified in this Topical Report

  5. Tritium systems test assembly quality assurance program

    International Nuclear Information System (INIS)

    Kerstiens, F.L.; Wilhelm, R.C.

    1986-07-01

    A quality assurance program should establish the planned and systematic actions necessary to provide adequate confidence that fusion facilities and their subsystems will perform satisfactorily in service. The Tritium Systems Test Assembly (TSTA) Quality Assurance Program has been designed to assure that the designs, tests, data, and interpretive reports developed at TSTA are valid, accurate, and consistent with formally specified procedures and reviews. The quality consideration in all TSTA activities is directed toward the early detection of quality problems, coupled with timely and positive disposition and corrective action

  6. Quality assurance - the key to the future

    Energy Technology Data Exchange (ETDEWEB)

    Rix, C [British Coal Corporation, London (UK)

    1992-05-01

    Quality assurance seeks to achieve diligence and attention to detail, which can have substantial effects including reduced costs and improved performance, as well as greater customer satisfaction. British Coal has a policy of quality assurance to BS5750 at all collieries and despatch points, to help maintain its competitive position, to respond to customer requirements, and to continue the drive for reduced costs. A pilot exercise was undertaken at Maltby and Kellingley collieries, and at Oxcroft and Gwaun-cae-Gurwen opencast despatch points, in order to gain sufficient experience to allow rapid implementation of quality assurance at all sites.

  7. Guidelines for comprehensive quality assurance in brachytherapy

    International Nuclear Information System (INIS)

    Goldson, A.L.; Nibhanupudy, J.R.

    1984-01-01

    Brachytherapy treatment techniques can provide significant improvement in local control and overall survival, but only when quality assurance can be guaranteed. To establish brachytherapy quality assurance, basic requirements for three predetermined subdivisions of clinical institutions will be forwarded. These are: (1) centers having minimum requirements to provide brachytherapy, (2) intermediate centers such as regional or community hospitals, and (3) optimal centers such as university hospital and cancer centers. This presentation will highlight personnel needs, equipment requirements, academic activities, clinical experience with these systems and proposed quality assurance guidelines

  8. Commissioning quality assurance for nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1986-09-01

    This standard contains the requirements for the quality assurance program applicable to the commissioning phase of a nuclear power plant. This standard embodies the relevant quality assurance requirements of CSA Standard CAN3-N286.0, and is the governing Standard for commissioning quality assurance activities in the event of any conflicting requirements. This Standard applies to the commissioning of safety-related equipment, systems, and structures as identified by the owner. It may be applied to other equipment, systems, and structures at the discretion of the owner. 1 fig.

  9. A Quality Assurance Program for decommissioning

    International Nuclear Information System (INIS)

    Briggs, P.M.

    1986-01-01

    Defining the Quality Assurance Program for the US Department of Energy Shippingport Station Decommissioning Project (SSDP) was a unique opportunity because this is the first full-sized commercial nuclear power plant to be decommissioned. General Electric Company defined a Quality Assurance Program that provided adequate control, yet was stripped down to the essentials. The Program is designed to provide a flexible degree of monitoring of subcontractor work, built around a core of radiation safety monitoring, detailed planning, inspection and auditing, and operated with a minimum of dedicated personnel. This paper will concentrate on the traditional quality assurance activities, leaving radiation and environmental monitoring for other presentations

  10. SWiFT Software Quality Assurance Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Jonathan Charles [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-01

    This document describes the software development practice areas and processes which contribute to the ability of SWiFT software developers to provide quality software. These processes are designed to satisfy the requirements set forth by the Sandia Software Quality Assurance Program (SSQAP). APPROVALS SWiFT Software Quality Assurance Plan (SAND2016-0765) approved by: Department Manager SWiFT Site Lead Dave Minster (6121) Date Jonathan White (6121) Date SWiFT Controls Engineer Jonathan Berg (6121) Date CHANGE HISTORY Issue Date Originator(s) Description A 2016/01/27 Jon Berg (06121) Initial release of the SWiFT Software Quality Assurance Plan

  11. Quality assurance organization of the plant owner

    International Nuclear Information System (INIS)

    Staebler, K.

    1980-01-01

    It is not the primary task of the plant owner to assure the quality during erection. It is, however, his responsibility to check the quality assurance system established by the plant, the supplier and the subcontractor. In the lecture, it is shown that the plant owners do this control in the best efficient way. The special consideration of the plant owner in deciding questions of quality assurance is demonstrated by special examples. The meaning of basic safety for the plant owner is presented. (orig./RW)

  12. Commissioning quality assurance for nuclear power plants

    International Nuclear Information System (INIS)

    1986-09-01

    This standard contains the requirements for the quality assurance program applicable to the commissioning phase of a nuclear power plant. This standard embodies the relevant quality assurance requirements of CSA Standard CAN3-N286.0, and is the governing Standard for commissioning quality assurance activities in the event of any conflicting requirements. This Standard applies to the commissioning of safety-related equipment, systems, and structures as identified by the owner. It may be applied to other equipment, systems, and structures at the discretion of the owner. 1 fig

  13. Quality assurance and demolition: 2006 symposium

    International Nuclear Information System (INIS)

    Thierfeldt, S.

    2006-01-01

    The '2006 Symposium: Quality Assurance and Demolition' jointly organized by compra GmbH and Brenk Systemplanung GmbH this year again focused on quality assurance and the demolition of nuclear facilities as its main topics. The papers presented ranged from issues of clearance and disposal to demolition technologies and status reports about specific demolition projects. The sixteen presentations at the '2006 Symposium: Quality Assurance and Demolition' offered an interesting and very topical cross section of decommissioning and demolition of nuclear facilities in Germany. In 2007, the conference about similar main topics will again be held at the Schloss Bensberg Grand Hotel. (orig.)

  14. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  15. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  17. Cloud Security Audit for Migration and Continuous Monitoring

    OpenAIRE

    Ismail, Umar Mukhtar; Islam, Shareeful; Mouratidis, Haralambos

    2015-01-01

    Security assurance in cloud computing is one of the main barriers for wider cloud adoption. Potential cloud computing consumers like to know whether the controls in cloud environments can adequately protect critical assets migrated into the cloud. We present a cloud security audit approach to enable users' evaluate cloud service provider offerings before migration, as well as monitoring of events after migration. Our approach entails a set of concepts such as actor, goals, monitoring, conditi...

  18. Food security and productivity among urban farmers in Kaduna ...

    African Journals Online (AJOL)

    This study to investigated food security and productivity among urban farmers' in Kaduna State Two-stage sampling procedure was used to select 213 respondents for the study. Interview schedule was used to collect data. Data were analysed using descriptive statistics (food security index, food insecurity/ surplus gap index ...

  19. Implementation of External Quality Assurance Trials for Immunohistochemically Determined Breast Cancer Biomarkers in Germany

    OpenAIRE

    von Wasielewski, Reinhard; Krusche, Claudia A.; Rüschoff, Joseph; Fisseler-Eckhoff, Anette; Kreipe, Hans

    2008-01-01

    Besides typing and grading of breast cancer, Pathologists are involved in the determination of biomarkers, such as steroid hormone receptors and HER2, which are of utmost importance in adjuvant therapy. There have been concerns with regard to security and reproducibility of the biomarker assays done on tissue sections applying either immunohistochemistry or in-situ hybridisation. In order to assure the quality of these biomarker assays, a number of measures are required, among them external p...

  20. Quality assurance in tissue banking

    International Nuclear Information System (INIS)

    Von Versen, R.; Mnig, H. J.; Bettin, D.

    1999-01-01

    Today the different kinds of human allografts have the full acceptance for the clinical application for the treatment of a very wide range of indications in many medical disciplines. An essential aspect of this acceptance of these allografts is the complete biological safety, first of all the exclusion of virus contaminations. The German Institute for Cell and Tissue Replacement (DIZG) is functioning as a national tissue bank cooperating with more than 300 hospitals in Germany and Austria. Its profile is determined by the processing of tissue allografts like cortical and cancellous bone, fascia lata, tendon as well as skin, skin substitutes and cultured autologous and allogenic kerytinocytes. DIZG is licensed by the German Federal Institute for Pharmaceuticals and Medical Products and the country health authorities. To ensure that the allografts fulfill the highest quality requirements a controlled and certified quality management system has been established. In accordance with the Good Manufacturing Practice all procedures are perform-ned on the basis of validated methods. All non-vital allografts are sterilized by a chemical sterilisation method with peracetic acid (PAA) that is validated by the Robert Koch Institute, an independent governmental institution, for the inactivation of bacteria, fungi and viruses. The used test viruses are Pseudorabies V, Polio V, Bovine Virusdiarrhoe V, Parvo V, Hepatitis A V, HIV). The DIZG quality management system (QMS) is based on ISO 9001 which is required for institutions that are involved in processing, research and education and is certified by an international auditing body. With this presentation the validation design shall be introduced and the responsibility of regional and national tissue banks for internal and external quality control and quality assurance shall be discussed

  1. 17 CFR 41.21 - Requirements for underlying securities.

    Science.gov (United States)

    2010-04-01

    ... underlying security is: (i) Common stock, (ii) Such other equity security as the Commission and the SEC jointly deem appropriate, or (iii) A note, bond, debenture, or evidence of indebtedness; and (3) The... Exchange Act of 1934; (3) The securities in the index are: (i) Common stock, (ii) Such other equity...

  2. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  3. Quality assurance program plan for 324 Building B-Cell safety cleanout project (BCCP)

    International Nuclear Information System (INIS)

    Tanke, J.M.

    1997-01-01

    This Quality Assurance Program Plan (QAPP) provides information on how the Quality Assurance Program is implemented for the 324 Building B-Cell Safety Cleanout Project (BCCP). This QAPP is responsive to the Westinghouse Hanford Company Quality Assurance Program and Implementation Plan, WHC-SP-1131, for 10 CFR 830.120, Nuclear Safety Management, Quality Assurance Requirements; and DOE Order 5700.6C, Quality Assurance. This QAPP supersedes PNNL PNL-MA-70 QAP Quality Assurance Plan No. WTC-050 Rev. 2, issue date May 3, 1996. This QAPP has been developed specifically for the BCCP. It applies to those items and tasks which affect the completion of activities identified in the work breakdown structure of the Project Management Plan (PMP). These activities include all aspects of decontaminating B-Cell and project related operations within the 324 Building as it relates to the specific activities of this project. General facility activities (i.e. 324 Building Operations) are covered in the Building 324 QAPP. In addition, this QAPP supports the related quality assurance activities addressed in CM-2-14, Hazardous Material Packaging and Shipping, and HSRCM-1, Hanford Site Radiological Control Manual, The 324 Building is currently transitioning from being a Pacific Northwest National Laboratory (PNNL) managed facility to a B and W Hanford Company (BWHC) managed facility. During this transition process existing, PNNL procedures and documents will be utilized until replaced by BWHC procedures and documents. These documents conform to the requirements found in PNL-MA-70, Quality Assurance Manual and PNL-MA-8 1, Hazardous Materials Shipping Manual. The Quality Assurance Program Index (QAPI) contained in Table 1 provides a matrix which shows how project activities relate to 10 CFR 83 0.120 and 5700.6C criteria. Quality Assurance program requirements will be addressed separate from the requirements specified in this document. Other Hanford Site organizations/companies may be

  4. Manpower requirements for quality assurance during operation

    International Nuclear Information System (INIS)

    Pratt, J.M.; Sollenberger, L.G.

    1982-01-01

    As a result of the Three Mile Island accident and the findings presented in various investigatory reports, some fundamental changes are taking place in the role and scope of quality assurance. Recent changes to United States national codes, guides and standards are analysed in order to identify the principles involved. This analysis shows that the scope of the programme is being extended beyond the equipment designated 'nuclear safety related' and greater emphasis is being placed upon the independent verification of the satisfactory performance of activities affecting safety. Such fundamental changes could lead to a significant increase in the number of quality assurance personnel required to support an operating nuclear power plant. The evolving quality assurance organization at Three Mile Island is used to illustrate how these fundamental changes could affect the quality assurance organization and manpower requirements. (author)

  5. Assuring bridge safety and serviceability in Europe

    Science.gov (United States)

    2010-08-01

    U.S. engineers need advanced tools and protocols to better assess and assure safety and serviceability of bridges. The Federal Highway Administration, American Association of State Highway and Transportation Officials, and National Cooperative Highwa...

  6. Quality assurance terms and definitions - approved 1973

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    Standards for certain terms and their definitions that are important to the uniform understanding of the intent of required quality assurance practices for the construction of nuclear power plants are presented

  7. Evaluation of financial assurance alternatives of licensees

    Energy Technology Data Exchange (ETDEWEB)

    Douglas, J N

    1995-09-01

    The Uranium and Thorium Mining Regulations of the Atomic Energy Control Act require that applicants/licensees indicate to the AECB what financial assurance plans they have made to fund the decommissioning plan they propose to put in place. We have determined through our own business knowledge from other projects, as well as information provided by contacts in the banking, accounting, legal, investment and insurance communities, what financial assurance plans might be available. We have tabulated these alternatives, included explanations of how each might be implemented, and recorded advantages and disadvantages of each alternative to both the AECB and the applicant/licensee. In addition we have ranked the alternatives in order of most suitable to least suitable, from the AECB`s perspective. Although these financial assurance mechanisms have been tabulated with a view to decommissioning of a uranium mine, they could be used in other licence or business arrangements that require financial assurance. (author). 3 tabs., 1 fig.

  8. Maintenance quality assurance peer exchange 2.

    Science.gov (United States)

    2009-04-01

    This report documents a comprehensive study of twenty three maintenance quality assurance : (MQA) programs throughout the United States and Canada. The policies and standards of : each program were synthesized to create a general assessment on the co...

  9. Design quality assurance for nuclear power plants

    International Nuclear Information System (INIS)

    1986-07-01

    This Standard contains the requirements for the quality assurance program applicable to the design phase of a nuclear plant, and is applicable to the design of safety-related equipment, systems, and structures, as identified by the owner. 1 fig

  10. Quality Assurance Project Plan Development Tool

    Science.gov (United States)

    This tool contains information designed to assist in developing a Quality Assurance (QA) Project Plan that meets EPA requirements for projects that involve surface or groundwater monitoring and/or the collection and analysis of water samples.

  11. Quality Assurance Planning for Region 9

    Science.gov (United States)

    The ultimate success of an environmental program or project depends on the quality of the environmental data collected and used in decision-making. EPA has developed guidances to help state and tribal governments develop Quality Assurance Program Plans.

  12. Achieving quality assurance in the Indian programme

    International Nuclear Information System (INIS)

    Challappa, S.; Alekal, R.S.; Murthy, G.S.K.; Palaniappan, M.

    1984-01-01

    Much of the equipment for India's diverse nuclear programme has come from the central workshops of the Bhabha Atomic Research Centre near Bombay. Engineers from the central workshops describe how quality assurance has been put into practice. (author)

  13. Design quality assurance for nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1986-07-01

    This Standard contains the requirements for the quality assurance program applicable to the design phase of a nuclear plant, and is applicable to the design of safety-related equipment, systems, and structures, as identified by the owner. 1 fig.

  14. A conceptual competitive intelligence quality assurance model

    Directory of Open Access Journals (Sweden)

    Tshilidzi Eric Nenzhelele

    2015-12-01

    Full Text Available Competitive Intelligence (CI improves the quality of product and service, decision-making and it improves quality of life. However, it has been established that decision makers are not happy about the quality of CI. This is because enterprises fail in quality assurance of CI. It has been concluded that most enterprises are clueless concerning CI quality assurance. Studies that previously attempted to resolve CI quality problem were limited in scope and focused too much on the quality of information than the overall CI quality. The purpose of this study is to propose a conceptual CI quality assurance model which will help in quality assurance of CI. The research was qualitative in nature and used content analysis.

  15. Healthy Family 2009: Assuring Healthy Aging

    Science.gov (United States)

    ... Navigation Bar Home Current Issue Past Issues Healthy Family 2009 Assuring Healthy Aging Past Issues / Winter 2009 ... for steady, modest loss. Seek emotional support from family and friends. Expect setbacks; forgive yourself. Make physical ...

  16. Internal quality assurance reviews: challenges and processes ...

    African Journals Online (AJOL)

    Internal quality assurance reviews: challenges and processes – Walter Sisulu University\\'s Business, Management Sciences and Law Faculty. ... This article examines some of the challenges and processes followed by six of the departments ...

  17. Evaluation of financial assurance alternatives of licensees

    International Nuclear Information System (INIS)

    Douglas, J.N.

    1995-09-01

    The Uranium and Thorium Mining Regulations of the Atomic Energy Control Act require that applicants/licensees indicate to the AECB what financial assurance plans they have made to fund the decommissioning plan they propose to put in place. We have determined through our own business knowledge from other projects, as well as information provided by contacts in the banking, accounting, legal, investment and insurance communities, what financial assurance plans might be available. We have tabulated these alternatives, included explanations of how each might be implemented, and recorded advantages and disadvantages of each alternative to both the AECB and the applicant/licensee. In addition we have ranked the alternatives in order of most suitable to least suitable, from the AECB's perspective. Although these financial assurance mechanisms have been tabulated with a view to decommissioning of a uranium mine, they could be used in other licence or business arrangements that require financial assurance. (author). 3 tabs., 1 fig

  18. References on EPA Quality Assurance Project Plans

    Science.gov (United States)

    Provides requirements for the conduct of quality management practices, including quality assurance (QA) and quality control (QC) activities, for all environmental data collection and environmental technology programs performed by or for this Agency.

  19. Quality assurance for fittings considering nuclear technology

    International Nuclear Information System (INIS)

    Kilian, H.J.

    1987-01-01

    Negative experience made during World War II led to the idea of quality assurance being born in the United States. Thoroughly misunderstood, it came to be incorporated in European mechanical engineering. Quality assurance there was initially considered to be a new term for the oganizational combination of all parts of an enterprise dealing with testing. German manufacturers of heavy-duty and safety fittings represented in the international market were compelled at a relatively early date to properly understand and realize a quality assurance programme. But the multi-fariousness of specifications to be applied and great number of the most different parts made eminent demands on the suitability and variability of the products developed. On the basis of 18 quality criteria the article describes the structure of 'quality' and what its consequences are for an effective quality assurance system - suited for all kinds of specifications. (orig.) [de

  20. Customers’ Perception regarding Assurance of Bancassurance Channel

    Directory of Open Access Journals (Sweden)

    Choudhury Mousumi

    2016-12-01

    Full Text Available Bancassurance has evolved as a strong distribution channel in India. Bancassurance means that the insurance company and the bank come together to offer insurance products from the counter of the banks to the bank’s customer. The present study attempts to analyse customers’ perception regarding assurance of bancassurance channel in providing insurance-related services. The study also tries to find out the impact of various demographic variables on customers’ perception regarding assurance of bancassurance channel. The study finds that customers consider bancassurance channel having high assurance in providing insurance services. It is also found in the study that there is no significant association between the demographic variables considered in the study and customers’ perception regarding assurance of bancassurance channel.

  1. Assurance on sustainability reporting : An auditor's view

    NARCIS (Netherlands)

    Wallage, Philip

    2000-01-01

    This article discusses initial experiences with a new assurance service: the verification of sustainability reports providing assertions regarding financial, environmental, and social issues. For illustration purposes, references to the verification of The Shell Report 2000 are made. Because of the

  2. Linear accelerator quality assurance using EPIQA software

    International Nuclear Information System (INIS)

    Bozhikov, S.; Sokerov, H.; Tonev, A.; Ivanova, K.

    2012-01-01

    Unlike treatment with static fields, using a dynamic multileaf collimator (dMLC), there are significant dosimetric issues which must be assessed before dynamic therapy can be implemented. The advanced techniques require some additional commissioning and quality assurance tests. The results of standard quality assurance (QA) machine tests and commissioning tests for volume modulated arc therapy (VMAT) using electronic portal image device (EPID) and 'EPIQA' software are presented. (authors)

  3. Quality assurance in the nuclear test program

    International Nuclear Information System (INIS)

    Shearer, J.N.

    1979-01-01

    In February 1979 Test Program laid the ground work for a new quality assurance structure. The new approach was based on the findings and recommendations of the Ad Hoc QA Program Review panel, which are summarized in this report. The new structure places the responsibility for quality assurance in the hands of the line organizations, both in the programmatic and functional elements of the LLL matrix

  4. On incentives for assurance of petroleum supply

    International Nuclear Information System (INIS)

    Osmundsen, Petter; Aven, Terje; Tomasgard, Asgeir

    2010-01-01

    Assurance of supply is a crucial objective for producers and consumers of oil and gas. A basic requirement to meet this objective is that producers and transmitters have sufficient economic incentives and capabilities to assure a desired degree of supply. The topic of this paper is to evaluate these incentives from a broad perspective. We examine economic trade-offs inherent in a delay of production, including reputational issues, as well as contract incentives for gas sellers, drilling companies, and oil service companies.

  5. Good manufacturing practice - quality assurance programs

    International Nuclear Information System (INIS)

    Masefield, John; Thompson, Steven

    1986-01-01

    The concept of good manufacturing practice (GMP) in the medical device industry requires the use of controlled methods and equipment in performing each step in the device manufacturing process. Quality assurance programs are used to maintain compliance with GMP requirements by prescribing the operating and control procedures to be used. The specific elements of a quality assurance program for the radiation sterilization of medical devices are described. (author)

  6. Quality assurance and organizational effectiveness in hospitals.

    OpenAIRE

    Hetherington, R W

    1982-01-01

    The purpose of this paper is to explore some aspects of a general theoretical model within which research on the organizational impacts of quality assurance programs in hospitals may be examined. Quality assurance is conceptualized as an organizational control mechanism, operating primarily through increased formalization of structures and specification of procedures. Organizational effectiveness is discussed from the perspective of the problem-solving theory of organizations, wherein effecti...

  7. Quality assurance programme for isotope diagnostic laboratories

    International Nuclear Information System (INIS)

    Krasznai, Istvan

    1987-01-01

    Quality assurance systems are suggested to be introduced in laboratories, in accordance with the recommendations of IAEA and WHO, taking local circumstances into consideration. It is emphasized that a quantitative enhancement of work must not endanger its quality; diagnostic information must be undistorted, reproducible, and gathered with the minimum of radiation burden. National authorities are requested to strengthen their supervision. Recommendations for quality assurance methods are given for medical isotope diagnostic laboratories. (author)

  8. Dose Assurance in Radiation Processing Plants

    DEFF Research Database (Denmark)

    Miller, Arne; Chadwick, K.H.; Nam, J.W.

    1983-01-01

    Radiation processing relies to a large extent on dosimetry as control of proper operation. This applies in particular to radiation sterilization of medical products and food treatment, but also during development of any other process. The assurance that proper dosimetry is performed...... at the radiation processing plant can be obtained through the mediation of an international organization, and the IAEA is now implementing a dose assurance service for industrial radiation processing....

  9. Quality assurance program for isotopic power systems

    Energy Technology Data Exchange (ETDEWEB)

    Hannigan, R.L.; Harnar, R.R.

    1982-12-01

    This report summarizes the Sandia National Laboratories Quality Assurance Program that applies to non-weapon (reimbursable) Radioisotopic Thermoelectric Generators. The program has been implemented over the past 16 years on power supplies used in various space and terrestrial systems. The quality assurance (QA) activity of the program is in support of the Department of Energy, Office of Space Nuclear Projects. Basic elements of the program are described in the report and examples of program decumentation are presented.

  10. Quality assurance program for isotopic power systems

    International Nuclear Information System (INIS)

    Hannigan, R.L.; Harnar, R.R.

    1982-12-01

    This report summarizes the Sandia National Laboratories Quality Assurance Program that applies to non-weapon (reimbursable) Radioisotopic Thermoelectric Generators. The program has been implemented over the past 16 years on power supplies used in various space and terrestrial systems. The quality assurance (QA) activity of the program is in support of the Department of Energy, Office of Space Nuclear Projects. Basic elements of the program are described in the report and examples of program decumentation are presented

  11. MEMS Reliability Assurance Activities at JPL

    Science.gov (United States)

    Kayali, S.; Lawton, R.; Stark, B.

    2000-01-01

    An overview of Microelectromechanical Systems (MEMS) reliability assurance and qualification activities at JPL is presented along with the a discussion of characterization of MEMS structures implemented on single crystal silicon, polycrystalline silicon, CMOS, and LIGA processes. Additionally, common failure modes and mechanisms affecting MEMS structures, including radiation effects, are discussed. Common reliability and qualification practices contained in the MEMS Reliability Assurance Guideline are also presented.

  12. Work Done For the Safety and Assurance Directorate

    Science.gov (United States)

    Struhar, Paul T., Jr.

    2004-01-01

    The Safety and Assurance Directorate (SAAD) has a vision. The vision is to be an essential part of NASA Glenn's journey to excellence. SAAD is in charge of leading safety, security, and quality and is important to our customers. When it comes to programmatic and technical decision making and implementation, SAAD provides clear safety, reliability, maintainable, quality assurance and security. I worked on a couple different things during my internship with Sandra Hardy. I did a lot of logistics for meeting and trips. I helped run the budget for the SAAD directorate. I also worked with Rich Miller for one week and we took water samples and ran tests. We also calibrated the different equipment. There is a lot more to meetings than people see. I did one for a retirement party. I had to get work orders and set up the facilities where the event is going to take place. I also set up a trip to Plum Brook Station. I had to order vans and talk with the people up there to see when a good time was. I also had to make invitations and coordinate everything. I also help Sandy run the numbers in the budget. We use excel to do this, which makes it a lot easier. things. He is in the environmental safety office. I learned how to collaborate the equipment using alpha and beta sources. I went out with him and we took water samples and tested them for conductivity and chlorine. I have learned a lot in the short time I've been here. It has been a great experience and I have has the pleasure of meeting and working with great people.

  13. Prototype international quality assurance program

    International Nuclear Information System (INIS)

    Broadway, J.A.; Chambless, D.A.; Sapozhnikov, Yu.A.; Kalmykov, S.N.

    1998-01-01

    The international community presently lacks the ability to determine the quality and credibility of environmental measurements that is required to make sound decisions in matters related to international security, public health, and investment-related considerations. The ultimate goal of the work described in this article is to develop a credible information base including measurement capability for determination of environmental contamination and the potential for proliferation of material components of chemical or nuclear weapons. This study compared the accuracy obtained by six Russian and six U.S. laboratories for samples representative of classes of trace metals, dioxing-furans, and radioactive substances. The results obtained in this work indicate that current estimates for laboratory accuracy are likely overly optimistic. The weaknesses discovered by this prototype U.S. - Russia study also exist within the broader international community of laboratories. Further work is proposed to address the urgent need for the international community to improve performance evaluations for analytical measurements. (author)

  14. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  15. Software Quality Assurance activities of ITER CODAC

    Energy Technology Data Exchange (ETDEWEB)

    Pande, Sopan, E-mail: sopan.pande@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul Lez Durance (France); DiMaio, Franck; Kim, Changseung; Kim, Joohan; Klotz, Wolf-Dieter; Makijarvi, Petri; Stepanov, Denis; Wallander, Anders [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul Lez Durance (France)

    2013-10-15

    Highlights: ► Comprehensive and consistent software engineering and quality assurance of CODAC. ► Applicable to all CODAC software projects executed by ITER DAs and contractors. ► Configurable plans for cost effective application of SQA processes. ► CODAC software plans SQAP, SVVP, SDP, and SCMP. ► CODAC software processes based on IEEE 12207-2008. -- Abstract: Software as an integral part of the plant system I and C is crucial in the manufacturing and integrated operation of ITER plant systems. Software Quality Assurance is necessary to ensure the development and maintenance of consistently high quality I and C software throughout the lifetime of ITER. CODAC decided to follow IEEE 12207-2008 software lifecycle processes for Software Engineering and Software Quality Assurance. Software Development Plan, Software Configuration Management Plan and Software Verification and Validation Plan are the mainstay of Software Quality Assurance which is documented in the Software Quality Assurance Plan. This paper describes the Software Quality Assurance (SQA) activities performed by CODAC. The SQA includes development and maintenance of above plans, processes and resources. With the help of Verification and Validation Teams they gather evidence of process conformance and product conformance, and record process data for quality audits and perform process improvements.

  16. Software Quality Assurance activities of ITER CODAC

    International Nuclear Information System (INIS)

    Pande, Sopan; DiMaio, Franck; Kim, Changseung; Kim, Joohan; Klotz, Wolf-Dieter; Makijarvi, Petri; Stepanov, Denis; Wallander, Anders

    2013-01-01

    Highlights: ► Comprehensive and consistent software engineering and quality assurance of CODAC. ► Applicable to all CODAC software projects executed by ITER DAs and contractors. ► Configurable plans for cost effective application of SQA processes. ► CODAC software plans SQAP, SVVP, SDP, and SCMP. ► CODAC software processes based on IEEE 12207-2008. -- Abstract: Software as an integral part of the plant system I and C is crucial in the manufacturing and integrated operation of ITER plant systems. Software Quality Assurance is necessary to ensure the development and maintenance of consistently high quality I and C software throughout the lifetime of ITER. CODAC decided to follow IEEE 12207-2008 software lifecycle processes for Software Engineering and Software Quality Assurance. Software Development Plan, Software Configuration Management Plan and Software Verification and Validation Plan are the mainstay of Software Quality Assurance which is documented in the Software Quality Assurance Plan. This paper describes the Software Quality Assurance (SQA) activities performed by CODAC. The SQA includes development and maintenance of above plans, processes and resources. With the help of Verification and Validation Teams they gather evidence of process conformance and product conformance, and record process data for quality audits and perform process improvements

  17. Teaching Hands-On Linux Host Computer Security

    Science.gov (United States)

    Shumba, Rose

    2006-01-01

    In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…

  18. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  19. 3D Digital Legos for Teaching Security Protocols

    Science.gov (United States)

    Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao

    2011-01-01

    We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…

  20. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security