WorldWideScience

Sample records for security complex annual

  1. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  2. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  3. 2003 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    Energy Technology Data Exchange (ETDEWEB)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Illness and Injury Prevention Programs

    2007-05-23

    Annual Illness and Injury Surveillance Program report for 2003 for Y-12. The U.S. Department of Energy’s (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The IISP monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  4. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. ... Department of Mathematics and Statistics, Arizona State University, Tempe, Arizona 85287, USA; Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil ...

  5. Transit safety & security statistics & analysis 2002 annual report (formerly SAMIS)

    Science.gov (United States)

    2004-12-01

    The Transit Safety & Security Statistics & Analysis 2002 Annual Report (formerly SAMIS) is a compilation and analysis of mass transit accident, casualty, and crime statistics reported under the Federal Transit Administrations (FTAs) National Tr...

  6. Transit safety & security statistics & analysis 2003 annual report (formerly SAMIS)

    Science.gov (United States)

    2005-12-01

    The Transit Safety & Security Statistics & Analysis 2003 Annual Report (formerly SAMIS) is a compilation and analysis of mass transit accident, casualty, and crime statistics reported under the Federal Transit Administrations (FTAs) National Tr...

  7. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  8. Calendar Year 2007 Resource Conservation and Recovery Act Annual Monitoring Report for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee - RCRA Post-Closure Permit Nos. TNHW-113, TNHW-116, and TNHW-128

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental

    2008-02-01

    This report contains groundwater quality monitoring data obtained during calendar year (CY) 2007 at the following hazardous waste treatment, storage, and disposal (TSD) units located at the US Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee; this S-3 Site, Oil Landfarm, Bear Creek Burial Grounds/Walk-In Pits (BCBG/WIP), Eastern S-3 Site Plume, Chestnut Ridge Security Pits (CRSP), Chestnut Ridge Sediment Disposal Baste (CRSDB), few Hollow Quarry (KHQ), and East Chestnut Ridge Waste Pile (ECRWP). Hit monitoring data were obtained in accordance with the applicable Resource Conservation and Recovery Act of 1976 (RCRA) hazardous waste post-closure permit (PCP). The Tennessee Department of Environment and Conservation (TDEC) - Division of Solid Waste Management issued the PCPs to define the requirements for RCRA post-closure inspection, maintenance, and groundwater monitoring at the specified TSD units located within the Bear Creek Hydrogeologic Regime (PCP no. TNHW-116), Upper East Fork Poplar Creek Hydrogeologic Regime (PCP no. TNHW-113), and Chestnut Ridge Hydrogeologic Regime (PCP no. TNHW-128). Each PCP requires the Submittal of an annual RCRA groundwater monitoring report containing the groundwater sampling information and analytical results obtained at each applicable TSD unit during the preceding CY, along with an evaluation of groundwater low rates and directions and the analytical results for specified RCRA groundwater target compounds; this report is the RCRA annual groundwater monitoring report for CY 2007. The RCRA post-closure groundwater monitoring requirements specified in the above-referenced PCP for the Chestnut Ridge Regime replace those defined in the previous PCP (permit no. TNHW-088), which expired on September 18, 2005, but remained effective until the TDEC issued the new PCP in September 2006. The new PCP defines site-specific groundwater sampling and analysis requirements for the

  9. 2015 Annual Report on Security Clearance Determinations

    Science.gov (United States)

    2016-06-28

    only have delegated investigative authority over their civilian employee population and therefore, can only report the overall timeliness for that...completed or pending security clearance determinations for government employees and contractors during the preceding fiscal year that have taken longer...Clearance Determinations to Congress. The IAA directs this report to include the number of United States Government (USG) employees who held a

  10. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  11. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  12. Urban security annual report for 1997

    International Nuclear Information System (INIS)

    1998-03-01

    The work during fiscal year 1997 focused in an effort titled ''Urban Security -- A High-Performance Computing Pilot Project.'' During this year a team was engaged representing five Laboratory divisions and a range of expertise including atmospheric and hydrologic modeling, software design, mathematics, geographic information systems (GIS), geology, and urban planning. One major part of the pilot project was to link regional atmospheric modeling with ground water models in order to assess vulnerability of urban water supplies to climate change. Another part of the pilot project was to model the transport of an airborne toxic gas, including effects of buildings on air flow, and to link this to traffic simulations for effective emergency response. Other activities were to establish connections with potential collaborators and funding agencies, as well as highlighting the project through presentations at professional meetings

  13. Securing Digital Audio using Complex Quadratic Map

    Science.gov (United States)

    Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi

    2018-03-01

    In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

  14. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  15. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  16. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  17. Finding practical solutions to complex problems: IDRC's fifth annual ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-15

    Apr 15, 2016 ... English · Français ... Finding practical solutions to complex problems: IDRC's fifth annual ... “IDRC staff share a common goal with the researchers they work with – to find low-cost, down-to-earth solutions to complex problems ...

  18. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  19. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  20. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  1. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  2. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  3. 6th Annual International Conference on ICT: Big Data, Cloud and Security

    CERN Document Server

    2015-01-01

    The Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2015) serves as a platform for industry professionals, academics, researchers, scientists, consultants and policy makers to interact and discuss various issues in big data, cloud computing and IT security.

  4. social security and national insurance trust of ghana annual reports

    African Journals Online (AJOL)

    Global Journal

    company's activities and financial performance. The Social ... Hence, this paper attempts to evaluate the readability of annual reports of SSNIT and establish the ... One of the tenets of effective communication is ... Scheme and to cater for the First Tier of the contributory ..... Corporate. Social Responsibility and Environmental.

  5. Cost estimation of thermal and nuclear power using annual securities report

    International Nuclear Information System (INIS)

    Matsuo, Yuji; Nagatomi, Yu; Murakami, Tomoko

    2011-01-01

    Cost estimation of generation cost derived from various power sources was widely conducted using model plant or annual securities report of electric utilities. Although annual securities report method was subjected to some limitation in methodology itself, useful information was obtained for cost comparison of thermal and nuclear power. Studies on generation cost evaluation of thermal and nuclear power based on this method during past five years showed that nuclear power cost was almost stable 7 Yen/kWh and thermal power cost was varying 9 - 12 Yen/kWh dependent on violent fluctuations of primary energy cost. Nuclear power was expected cost increase due to enhanced safety requirements or damage compensation of accidents as well as decommissioning and back-end cost, which were difficult to evaluate accurately with annual securities report. Further comprehensive and accurate cost estimation should be encouraged including these items. (T. Tanaka)

  6. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  7. Effective software-oriented cryptosystem in complex PC security software

    Directory of Open Access Journals (Sweden)

    A. Moldovyan

    1995-02-01

    Full Text Available To ensure high encryption rate and good data security, an organization of an encipherement program in the form of two modules was proposed. The first module is used for customizing the second one, the latter being the resident of the program, which maintains all application calls about encryption procedures. This approach is shown to be perspective for the elaboration of the cryptosystems with indefinite cryptalgorithm. Several typical software-oriented cryptoschemes are considered. The developed cryptomodules have high encipherement rate (2-10 Mbps for Intel 386 and secure high information protection level Organization of a new computer security software complex COBRA is considered. High enciphering rate and good data protection are provided by the resident cryptomodule using less than 1 kbyte of the main memory and working in dynamic encryption mode.

  8. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  9. 76 FR 1065 - Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2011-01-07

    ...-AA87 Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI... officials at the 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in... 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in downtown Detroit...

  10. 77 FR 76411 - Security Zone; 25th Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2012-12-28

    ...-AA87 Security Zone; 25th Annual North American International Auto Show, Detroit River, Detroit, MI..., visitors, and public officials at the 25th Annual North American International Auto Show (NAIAS), which is... Purpose The 25th Annual North American International Auto Show (NAIAS) will be held at Cobo Hall in...

  11. 77 FR 2453 - Security Zone; 24th Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2012-01-18

    ...-AA87 Security Zone; 24th Annual North American International Auto Show, Detroit River, Detroit, MI..., visitors, and public officials at the 24th Annual North American International Auto Show (NAIAS), which is... The 24th Annual North American International Auto Show (NAIAS) will be held at Cobo Hall in downtown...

  12. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  13. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  14. Analysis of costs-benefits tradeoffs of complex security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.

    1996-01-01

    Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft reg-sign Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels

  15. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  16. 17 CFR 249.803 - Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

    Science.gov (United States)

    2010-04-01

    ... consolidated supplement of a national securities association or an affiliated securities association. 249.803... Registration of and Reporting by National Securities Associations and Affiliated Securities Associations § 249.803 Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

  17. Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2012-01-01

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  18. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  19. The Emerging Architecture of a Regional Security Complex in the ...

    African Journals Online (AJOL)

    2015-03-03

    Mar 3, 2015 ... Council for the Development of Social Science Research in Africa, 2017 .... of International Security Studies by appropriating Regional Security .... collaborative network is also embedded across Saharan and Sahelian Africa, ... (previously located in the city of Baga in Nigeria's Borno State), fell into the.

  20. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  1. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  2. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  3. The Politics of International Terrorism in the Security Complexes in ...

    African Journals Online (AJOL)

    sulaiman.adebowale

    2006-06-13

    Jun 13, 2006 ... International Relations and Security Studies, Department of Political Science and .... porary international relations in the Greater Horn of Africa. ..... In the case .... terrorist organisation, and all its sponsors and supporters as terrorist col- ... every act of violence to the label of terrorist, to the extent that public.

  4. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  5. Tools for an effective annual review of the Security Management Plan.

    Science.gov (United States)

    Daniel, Matthew

    2014-01-01

    A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.

  6. Complexity of food preparation and food security status in low-income young women.

    Science.gov (United States)

    Engler-Stringer, Rachel; Stringer, Bernadette; Haines, Ted

    2011-01-01

    This study was conducted to explore whether preparing more complex meals was associated with higher food security status. This mixed-methods, community-based study involved the use of semistructured interviews to examine the cooking practices of a group of young, low-income women in Montreal. Fifty participants aged 18 to 35 were recruited at 10 locations in five low-income neighbourhoods. Food security status was the main outcome measure and the main exposure variable, "complex food preparation," combined the preparation of three specific food types (soups, sauces, and baked goods) using basic ingredients. Low-income women preparing a variety of meals using basic ingredients at least three times a week were more than twice as likely to be food secure as were women preparing more complex meals less frequently. Women who prepared more complex meals more frequently had higher food security. Whether this means that preparing more complex foods results in greater food security remains unclear, as this was an exploratory study.

  7. Annual Statistical Supplement, 2002

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2002 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  8. Annual Statistical Supplement, 2010

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2010 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  9. Annual Statistical Supplement, 2007

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2007 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  10. Annual Statistical Supplement, 2001

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2001 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  11. Annual Statistical Supplement, 2016

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2016 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  12. Annual Statistical Supplement, 2011

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2011 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  13. Annual Statistical Supplement, 2005

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2005 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  14. Annual Statistical Supplement, 2015

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2015 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  15. Annual Statistical Supplement, 2003

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2003 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  16. Annual Statistical Supplement, 2017

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2017 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  17. Annual Statistical Supplement, 2008

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2008 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  18. Annual Statistical Supplement, 2014

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2014 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  19. Annual Statistical Supplement, 2004

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2004 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  20. Annual Statistical Supplement, 2000

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2000 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  1. Annual Statistical Supplement, 2009

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2009 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  2. Annual Statistical Supplement, 2006

    Data.gov (United States)

    Social Security Administration — The Annual Statistical Supplement, 2006 includes the most comprehensive data available on the Social Security and Supplemental Security Income programs. More than...

  3. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  4. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  5. Defining "The Weakest Link" Comparative Security in Complex Systems of Systems

    NARCIS (Netherlands)

    Pieters, Wolter

    2013-01-01

    Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of "weakest link" often appears.

  6. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    Science.gov (United States)

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  7. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  8. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2016-01-01

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  9. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, Matthew [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-10-25

    Electrorefining (ER) is a major part of efforts at the Y-12 National Security Complex to revolutionize the reprocessing and purification of enriched uranium (EU). Successful implementation of ER could drastically reduce the operational costs and footprint, hazardous materials use, and waste generation.

  10. 1992 annual report on scientific programs: A broad research program on the sciences of complexity

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    In 1992 the Santa Fe Institute hosted more than 100 short- and long-term research visitors who conducted a total of 212 person-months of residential research in complex systems. To date this 1992 work has resulted in more than 50 SFI Working Papers and nearly 150 publications in the scientific literature. The Institute`s book series in the sciences of complexity continues to grow, now numbering more than 20 volumes. The fifth annual complex systems summer school brought nearly 60 graduate students and postdoctoral fellows to Santa Fe for an intensive introduction to the field. Research on complex systems-the focus of work at SFI-involves an extraordinary range of topics normally studied in seemingly disparate fields. Natural systems displaying complex adaptive behavior range upwards from DNA through cells and evolutionary systems to human societies. Research models exhibiting complex behavior include spin glasses, cellular automata, and genetic algorithms. Some of the major questions facing complex systems researchers are: (1) explaining how complexity arises from the nonlinear interaction of simple components; (2) describing the mechanisms underlying high-level aggregate behavior of complex systems (such as the overt behavior of an organism, the flow of energy in an ecology, the GNP of an economy); and (3) creating a theoretical framework to enable predictions about the likely behavior of such systems in various conditions.

  11. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  12. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located

  13. 17 CFR 249.105 - Form 5, annual statement of beneficial ownership of securities.

    Science.gov (United States)

    2010-04-01

    ... information in investigations or litigation involving the federal securities laws or other civil, criminal, or... affecting Form 5, see the List of CFR Sections Affected, which appears in the Finding Aids section of the...

  14. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  15. CLIMATE CHANGE AND ESSENTIAL ANNUAL CROP PRODUCTION. A VIEW FROM FOOD SECURITY IN CHILE

    Directory of Open Access Journals (Sweden)

    CARLOS MÉNDEZ NOTARI

    2017-09-01

    Full Text Available This research has the objective of analyzing whether the public policies that today define the rules for productive development in agriculture can mitigate the effects related to global warming and if these are sufficient to prevent the pressing of climate change over the difficulties already existing in the agricultural sector or, to prevent the emergence of new risk factors or threats that affect the country’s food security. It also seeks to propose some recommendations for the design of public policies to minimize the risks and threats related to the adaptation of agricultural production to climate change and, therefore, to ensure physical, social and economic access to sufficient food and nutritious foods that meet the needs of the national population and mitigate its effects on the multidimensional sphere of the security. In this sense, we try to answer the following question: What challenges does climate change pose to Chilean agriculture in terms of food security?

  16. CONNECT: Linking Energy, Security, and Prosperity in the 21st Century - JISEA 2017 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    2017-03-02

    This report demonstrates 2016 highlights of the Joint Institute for Strategic Energy Analysis' (JISEA's) work. The Annual Report overviews JISEA's research and analysis accomplishments in natural gas and methane emissions; nuclear-renewable hybrid energy systems; the 21st Century Power Partnership; and more.

  17. Environmental surveillance for the INEL radioactive waste management complex. Annual report, 1979

    International Nuclear Information System (INIS)

    Wickham, L.E.; Janke, D.H.

    1980-12-01

    This document is the 1979 annual environmental surveillance report for the Radioactive Waste Management Complex (RWMC) of the Idaho National Engineering Laboratory. Included are tabulated data from and discussions about routine radiological monitoring of atmospheric, hydrologic, geologic, and biotic environments of the RWMC. Also included are discussions of selected nonradiological pollutants (e.g., sodium, etc.). It is concluded that (a) RWMC operations have not adversely affected local, existing environments; (b) environmental conditions within the Transuranic Storage Area are not corrosive enough to adversely affect transuranic waste storage containers, and (c) the addition of lakebed soil to pit, trench, and soil test plot areas has altered the moisture cycle characteristic of RWMC soil

  18. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  19. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  20. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications

    International Nuclear Information System (INIS)

    Mahmoud, Gamal M; Mahmoud, Emad E; Arafa, Ayman A

    2013-01-01

    In this paper we deal with the projective synchronization (PS) of hyperchaotic complex nonlinear systems and its application in secure communications based on passive theory. The unpredictability of the scaling factor in PS can additionally enhance the security of communications. In this paper, a scheme for secure message transmission is proposed, and we try to transmit more than one large or bounded message from the transmitter to the receiver. The new hyperchaotic complex Lorenz system is employed to encrypt these messages. In the transmitter, the original messages are modulated into its parameter. In the receiver, we assume that the parameter of the receiver system is uncertain. The controllers and corresponding parameter update law are constructed to achieve PS between the transmitter and receiver system with an uncertain parameter, and identify the unknown parameter via passive theory. The original messages can be recovered successfully through some simple operations by the estimated parameter. Numerical results have verified the effectiveness and feasibility of the presented method. (paper)

  1. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  2. Mathematical model and coordination algorithms for ensuring complex security of an organization

    Science.gov (United States)

    Novoseltsev, V. I.; Orlova, D. E.; Dubrovin, A. S.; Irkhin, V. P.

    2018-03-01

    The mathematical model of coordination when ensuring complex security of the organization is considered. On the basis of use of a method of casual search three types of algorithms of effective coordination adequate to mismatch level concerning security are developed: a coordination algorithm at domination of instructions of the coordinator; a coordination algorithm at domination of decisions of performers; a coordination algorithm at parity of interests of the coordinator and performers. Assessment of convergence of the algorithms considered above it was made by carrying out a computing experiment. The described algorithms of coordination have property of convergence in the sense stated above. And, the following regularity is revealed: than more simply in the structural relation the algorithm, for the smaller number of iterations is provided to those its convergence.

  3. Annual Performance Assessment of Complex Fenestration Systems in Sunny Climates Using Advanced Computer Simulations

    Directory of Open Access Journals (Sweden)

    Chantal Basurto

    2015-12-01

    Full Text Available Complex Fenestration Systems (CFS are advanced daylighting systems that are placed on the upper part of a window to improve the indoor daylight distribution within rooms. Due to their double function of daylight redirection and solar protection, they are considered as a solution to mitigate the unfavorable effects due to the admission of direct sunlight in buildings located in prevailing sunny climates (risk of glare and overheating. Accordingly, an adequate assessment of their performance should include an annual evaluation of the main aspects relevant to the use of daylight in such regions: the indoor illuminance distribution, thermal comfort, and visual comfort of the occupant’s. Such evaluation is possible with the use of computer simulations combined with the bi-directional scattering distribution function (BSDF data of these systems. This study explores the use of available methods to assess the visible and thermal annual performance of five different CFS using advanced computer simulations. To achieve results, an on-site daylight monitoring was carried out in a building located in a predominantly sunny climate location, and the collected data was used to create and calibrate a virtual model used to carry-out the simulations. The results can be employed to select the CFS, which improves visual and thermal interior environment for the occupants.

  4. Results of complex annual parasitological monitoring in the coastal area of Kola Bay

    Science.gov (United States)

    Kuklin, V. V.; Kuklina, M. M.; Kisova, N. E.; Maslich, M. A.

    2009-12-01

    The results of annual parasitological monitoring in the coastal area near the Abram-mys (Kola Bay, Barents Sea) are presented. The studies were performed in 2006-2007 and included complex examination of the intermediate hosts (mollusks and crustaceans) and definitive hosts (marine fish and birds) of the helminths. The biodiversity of the parasite fauna, seasonal dynamics, and functioning patterns of the parasite systems were investigated. The basic regularities in parasite circulation were assessed in relation to their life cycle strategies and the ecological features of the intermediate and definitive hosts. The factors affecting the success of parasite circulation in the coastal ecosystems were revealed through analysis of parasite biodiversity and abundance dynamics.

  5. Complex Security System for Premises Under Conditions of Large Volume of Passenger Traffic

    Directory of Open Access Journals (Sweden)

    Yakubov Vladimir

    2016-01-01

    Full Text Available Subsystems of the design of a complex security system for premises under conditions of large volume of passenger traffic are considered. These subsystems provide video- and thermal imaging control, radio wave tomography, and gas analysis. Simultaneous application of all examined variants will essentially increase the probability of timely prevention of dangerous situations with the probability of false alarm as low as possible. It is important that finally, this will provide protection of population and will facilitate the work of intelligence services.

  6. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    2015-01-01

    We study the communication complexity of secure function evaluation (SFE). Consider a setting where Alice has a short input χA, Bob has an input χB and we want Bob to learn some function y = f(χA, χB) with large output size. For example, Alice has a small secret decryption key, Bob has a large...... value. Moreover, we show that even in an offline/online protocol, the communication of the online phase must have output-size dependence. This negative result uses an incompressibility argument and it generalizes several recent lower bounds for functional encryption and (reusable) garbled circuits...

  7. 2009 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    Energy Technology Data Exchange (ETDEWEB)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2010-07-09

    The U.S. Department of Energy’s (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  8. 2008 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    Energy Technology Data Exchange (ETDEWEB)

    U.S. Department of Energy, Office of Health, Safety and Security, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-12-11

    The U.S. Department of Energy’s (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  9. 2007 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    Energy Technology Data Exchange (ETDEWEB)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2009-07-01

    The U.S. Department of Energy’s (DOE) commitment to assuring the health and safety of its workers includes the conduct of epidemiologic surveillance activities that provide an early warning system for health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence of workdays, occupational injuries and illnesses, and disabilities and deaths among current workers.

  10. 2010 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    Energy Technology Data Exchange (ETDEWEB)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-08-31

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  11. 2006 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    Energy Technology Data Exchange (ETDEWEB)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2008-04-17

    The U.S. Department of Energy’s (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  12. Central Asia as a Regional Security Complex from the Perspectives of Realism, Liberalism and Constructivism

    Directory of Open Access Journals (Sweden)

    Caroline Putri Pratama

    2013-05-01

    Full Text Available Tulisan ini bertujuan menganalisis kawasan Asia Tengah, dilihat dari perspektif Realisme, Liberalisme dan Konstruktivisme, melalui teori Regional Security Complex oleh Barry Buzan dan Ole Waever. Teori ini hendak menunjukkan keamanan regional berdasarkan interdependensi antar unit dalam kawasan dilihat dari struktur power dan proses sekuritisasi di dalamnya, demikian pola hubungan keamanan dalam kawasan Asia Tengah berusaha dijelaskan dengan elemen-elemen dari ketiga paradigma yang terdapat dalam teori tersebut. Hasil analisis tulisan ini menunjukkan bahwa Asia Tengah dipandang sebagai bentuk insecurity interdependence by external forces dari perspektif Realis, security interdependence by interest dari perspektif Liberalis dan securitization interdependence by understanding of threat/security dari perspektif Konstruktivis. Kompleks keamanan Asia Tengah termasuk dalam tipe kompleks keamanan Great Power, terlihat dari peran besar kekuatan-kekuatan eksternal terutama Rusia dan Cina dalam kawasan tersebut; baik dalam pembentukan pola pertemanan dengan kerjasama, pola permusuhan dengan persaingan dan ketakutan, juga proses sekuritisasi isu separatisme, ekstremisme dan terorisme sebagai ancaman terhadap keamanan regional.Tulisan ini diambil dari tugas karya akhir penulis yang diajukan untuk medapatkan gelar Sarjana Sosial dari Departemen Ilmu Hubungan Internasional, Universitas Indonesia.

  13. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  14. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  15. Development of an industrial complex for ensuring national competitiveness and economic security

    Directory of Open Access Journals (Sweden)

    A. V. Kalach

    2016-01-01

    Full Text Available Living standards depends on the state of the country’s industrial complex. In a message to Russian President Vladimir Putin's Federal Assembly was asked to implement in 2015 a national technological initiative, the development of industries of the new technological order. As a result of the predominance of the industry of the sixth technological order should occur major changes in the structure of production factors and significance. It follows the inevitability of structural changes in the system of economic institutions and mechanisms of economic security and competitiveness of the state achieve the main goal of the state program “The development of industry and increase its competitiveness” is carried out through the following the directions of sub-programs: investment goods (chemical complex development composite materials, industrial biotechnology, power engineering, machine tool industry, agricultural machinery, machinery specialized production, transport engineering; goods (light industry, children;s products industry, the automotive industry; military-industrial complex; infrastructure (development of engineering activities, industrial parks; semi-finished goods and materials (timber industry, metallurgy, industrial development of rare-earth metals. At the current pace of technological and economic development, the 6 th technological structure will come into proliferation phase in 2010–2020, and in the phase of maturity – 40-ies of XXI century. At the same time in 2020–2025 there will be a new scientific-technical and technological revolution, which will become the basis for developing, synthesizing advances in the above basic technologies. In this paper, we proposed as a tool to ensure the economic security of the state to use the acceleration system of technical development of the industrial complex.

  16. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  17. An empirical application of regional security complex theory on eastern partnership region

    Directory of Open Access Journals (Sweden)

    Ludmila STUPARU

    2015-12-01

    Full Text Available Eastern Partnership (EaP is a very dynamic region. If a year ago the EaP was seen as an authentic and vibrant „laboratory” of democracy building, overcoming the remains of the totalitarian state and putting the basis of a free and pluralist society, nowadays the Eastern Partnership is seen as an „out-dated” approach of the EU. However, Eastern Partnership is visible on European political arena and the big powers (USA, Russia and the EU pay attention more and more to the evolution of EaP countries. Moreover, it seems to be a confrontation between Russia and Western powers regarding the political and geopolitical orientation of EaP countries. Kremlin tries actively to stop the efforts of the EaP to close to the EU and on the other side, the EU as well as the USA encourage EaP countries to implement reforms in order to build their democracy. This paper aims to analyse the Eastern Partnership in terms of security complex, trying to argue that Eastern Partnership countries at this phase don’t form a Regional Security Complex and the EU and USA should rethink its approach towards this region.

  18. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  19. Complex agro-ecosystems for food security in a changing climate

    Science.gov (United States)

    Khumairoh, Uma; Groot, Jeroen CJ; Lantinga, Egbert A

    2012-01-01

    Attempts to increase food crop yields by intensifying agricultural systems using high inputs of nonrenewable resources and chemicals frequently lead to de-gradation of natural resources, whereas most technological innovations are not accessible for smallholders that represent the majority of farmers world wide. Alternatively, cocultures consisting of assemblages of plant and animal species can support ecological processes of nutrient cycling and pest control, which may lead to increasing yields and declining susceptibility to extreme weather conditions with increasing complexity of the systems. Here we show that enhancing the complexity of a rice production system by adding combinations of compost, azolla, ducks, and fish resulted in strongly increased grain yields and revenues in a season with extremely adverse weather conditions on East Java, Indonesia. We found that azolla, duck, and fish increased plant nutrient content, tillering and leaf area expansion, and strongly reduced the density of six different pests. In the most complex system comprising all components the highest grain yield was obtained. The net revenues of this system from sales of rice grain, fish, and ducks, after correction for extra costs, were 114% higher than rice cultivation with only compost as fertilizer. These results provide more insight in the agro-ecological processes and demonstrate how complex agricultural systems can contribute to food security in a changing climate. If smallholders can be trained to manage these systems and are supported for initial investments by credits, their livelihoods can be improved while producing in an ecologically benign way. PMID:22957173

  20. A novel sort of adaptive complex synchronizations of two indistinguishable chaotic complex nonlinear models with uncertain parameters and its applications in secure communications

    Science.gov (United States)

    Mahmoud, Emad E.; Abood, Fatimah S.

    In this paper, we will demonstrate the adaptive complex anti-lag synchronization (CALS) of two indistinguishable complex chaotic nonlinear systems with the parameters which are uncertain. The significance of CALS is not advised well in the literature yet. The CALS contains or consolidate two sorts of synchronizations (anti-lag synchronization ALS and lag synchronization LS). The state variable of the master system synchronizes with an alternate state variable of the slave system. Depending on the function of Lyapunov, a plan is orchestrated to achieve CALS of chaotic attractors of complex systems with unverifiable parameters. CALS of two indistinguishable complexes of Lü systems is viewed as, for example, an occasion for affirming the likelihood of the plan exhibited. In physics, we can see complex chaotic systems in numerous different applications, for example, applied sciences or engineering. With a specific end goal to affirm the proposed synchronization plan viability and demonstrate the hypothetical outcomes, we can compute the numerical simulation. The above outcomes will give the hypothetical establishment to the secure communication applications. CALS of complex chaotic systems in which a state variable of the master system synchronizes with an alternate state variable of the slave system is an encouraging sort of synchronization as it contributes excellent security in secure communication. Amid this secure communication, the synchronization between transmitter and collector is shut and message signals are recouped. The encryption and restoration of the signals are simulated numerically.

  1. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  2. A framework for modelling the complexities of food and water security under globalisation

    Science.gov (United States)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  3. A framework for modelling the complexities of food and water security under globalisation

    Directory of Open Access Journals (Sweden)

    B. J. Dermody

    2018-01-01

    Full Text Available We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  4. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  5. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-01

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  6. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  7. 2010 Annual Summary Report for the Area 3 and Area 5 Radioactive Management Sites at the Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2011-03-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Waste Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2010. This annual summary report presents data and conclusions from the FY 2010 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.

  8. 2010 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada

    International Nuclear Information System (INIS)

    2011-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Waste Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2010. This annual summary report presents data and conclusions from the FY 2010 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs.

  9. Recycled Uranium Mass Balance Project Y-12 National Security Complex Site Report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-12-01

    This report has been prepared to summarize the findings of the Y-12 National Security Complex (Y-12 Complex) Mass Balance Project and to support preparation of associated U. S. Department of Energy (DOE) site reports. The project was conducted in support of DOE efforts to assess the potential for health and environmental issues resulting from the presence of transuranic (TRU) elements and fission products in recycled uranium (RU) processed by DOE and its predecessor agencies. The United States government used uranium in fission reactors to produce plutonium and tritium for nuclear weapons production. Because uranium was considered scarce relative to demand when these operations began almost 50 years ago, the spent fuel from U.S. fission reactors was processed to recover uranium for recycling. The estimated mass balance for highly enriched RU, which is of most concern for worker exposure and is the primary focus of this project, is summarized in a table. A discrepancy in the mass balance between receipts and shipments (plus inventory and waste) reflects an inability to precisely distinguish between RU and non-RU shipments and receipts involving the Y-12 Complex and Savannah River. Shipments of fresh fuel (non-RU) and sweetener (also non-RU) were made from the Y-12 Complex to Savannah River along with RU shipments. The only way to distinguish between these RU and non-RU streams using available records is by enrichment level. Shipments of {le}90% enrichment were assumed to be RU. Shipments of >90% enrichment were assumed to be non-RU fresh fuel or sweetener. This methodology using enrichment level to distinguish between RU and non-RU results in good estimates of RU flows that are reasonably consistent with Savannah River estimates. Although this is the best available means of distinguishing RU streams, this method does leave a difference of approximately 17.3 MTU between receipts and shipments. Slightly depleted RU streams received by the Y-12 Complex from ORGDP and

  10. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  11. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Science.gov (United States)

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  12. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  13. Nuclear forensic analysis capabilities and experience at the Oak Ridge Y-12 National Security Complex

    International Nuclear Information System (INIS)

    Hembree, D.M.; Carter, J.A.; Hinton, E.R. Jr.

    2002-01-01

    Full text: The Oak Ridge Y-12 National Security Complex has been involved in the U.S. nuclear weapons program since the program's inception in the 1940's. Known as the U.S. 'Fort Knox of uranium', the site is also a repository of unique expertise and experience related to enriched uranium and other weapons-related materials. Y-12's Analytical Chemistry Organization (ACO) contains a wide range of analytical instrumentation that has demonstrated the ability to provide important forensic information in a short period of time. This rapid response capability is in part due to having all of the analytical instrumentation and expertise contained in one building, within one organization. Rapid-response teams are easily formed to quickly obtain key information. The infrastructure to handle nuclear materials, e.g. chain-of-custody, radiological control, information management, etc. is maintained for normal operations. As a result, the laboratory has demonstrated the capability for rapid response times for nuclear forensic samples. This poster presentation will discuss Y-12's analytical capabilities and the importance of key instruments and highly trained personnel in providing critical information. The laboratory has collaborated with both state and federal law enforcement agencies to analyze non-nuclear forensic evidence. Y-12's participation in two nuclear forensic events, as part of multi-laboratory teams, will be described. (author)

  14. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, M. L. [Y-12 National Security Complex, Oak Ridge, TN (United States); Juarez, C. [Y-12 National Security Complex, Oak Ridge, TN (United States); Krass, A. W. [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-08-14

    Efforts are underway at the Y-12 National Security Complex (Y-12) to modernize the recovery, purification, and consolidation of un-irradiated, highly enriched uranium metal. Successful integration of advanced technology such as Electrorefining (ER) eliminates many of the intermediate chemistry systems and processes that are the current and historical basis of the nuclear fuel cycle at Y-12. The cost of operations, the inventory of hazardous chemicals, and the volume of waste are significantly reduced by ER. It also introduces unique material forms and compositions related to the chemistry of chloride salts for further consideration in safety analysis and engineering. The work herein briefly describes recent investigations of nuclear criticality for 235UO2Cl2 (uranyl chloride) and 6LiCl (lithium chloride) in aqueous solution. Of particular interest is the minimum critical mass of highly enriched uranium as a function of the molar ratio of 6Li to 235U. The work herein also briefly describes recent investigations of nuclear criticality for 235U metal reflected by salt mixtures of 6LiCl or 7LiCl (lithium chloride), KCl (potassium chloride), and 235UCl3 or 238UCl3 (uranium tri-chloride). Computational methods for analysis of nuclear criticality safety and published nuclear data are employed in the absence of directly relevant experimental criticality benchmarks.

  15. The complexity of an investment competition dynamical model with imperfect information in a security market

    International Nuclear Information System (INIS)

    Xin Baogui; Ma Junhai; Gao Qin

    2009-01-01

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  16. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  17. Global Complexity: Information, Chaos, and Control at ASIS 1996 Annual Meeting.

    Science.gov (United States)

    Jacob, M. E. L.

    1996-01-01

    Discusses proceedings of the 1996 ASIS (American Society for Information Science) annual meeting in Baltimore (Maryland), including chaos theory; electronic universities; distance education; intellectual property, including information privacy on the Internet; the need for leadership in libraries and information centers; information warfare and…

  18. Secure equality and greater-than tests with sublinear online complexity

    DEFF Research Database (Denmark)

    Lipmaa, Helger; Toft, Tomas

    2013-01-01

    Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required by many MPC applications. We propose two equality tests for ℓ-bit values with O(1) online...

  19. Assessment of the Groundwater Protection Program Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2005-01-01

    The following report contains an assessment of the Y-12 Groundwater Protection Program (GWPP) for the Y-12 National Security Complex at the Oak Ridge Reservation, Tennessee. The GWPP is administered by BWXT Y-12, L.L.C. for the purpose of groundwater surveillance monitoring. After over 20 years of extensive site characterization and delineation efforts, groundwater in the three hydrogeologic areas that comprise the Y-12 Complex requires a long-term monitoring network strategy that will efficiently satisfy surveillance monitoring objectives set forth in DOE Order 450.1. The GWPP assessment consisted of two phases, a qualitative review of the program and a quantitative evaluation of the groundwater monitoring network using the Monitoring and Remediation Optimization System (MAROS) software methodology. The specific objective of the qualitative section of the review of the GWPP was to evaluate the methods of data collection, management, and reporting and the function of the monitoring network for the Y-12 facility using guidance from regulatory and academic sources. The results of the qualitative review are used to suggest modifications to the overall program that would be consistent with achieving objectives for long-term groundwater monitoring. While cost minimization is a consideration in the development of the monitoring program, the primary goal is to provide a comprehensive strategy to provide quality data to support site decision making during facility operations, long-term resource restoration, and property redevelopment. The MAROS software is designed to recommend an improved groundwater monitoring network by applying statistical techniques to existing historic and current site analytical data. The MAROS methodology also considers hydrogeologic factors, regulatory framework, and the location of potential receptors. The software identifies trends and suggests components for an improved monitoring plan by analyzing individual monitoring wells in the current

  20. Coworker External Dosimetry Data for the Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    McCartney KA, Watkins JP, Kerr GD, Tankersley WG

    2009-12-18

    Provides background information on the Y-12 coworker external dosimetry data and includes tables with annual values that may be used in the process of assigning doses for unmonitored years of employment.

  1. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio; Di Falco, Andrea; Fratalocchi, Andrea

    2017-01-01

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very

  2. 1991 Annual report on scientific programs: A broad research program on the sciences of complexity

    Energy Technology Data Exchange (ETDEWEB)

    1991-01-01

    1991 was continued rapid growth for the Santa Fe Institute (SFI) as it broadened its interdisciplinary research into the organization, evolution and operation of complex systems and sought deeply the principles underlying their dynamic behavior. Research on complex systems--the focus of work at SFI--involves an extraordinary range of topics normally studied in seemingly disparate fields. Natural systems displaying complex behavior range upwards from proteins and DNA through cells and evolutionary systems to human societies. Research models exhibiting complexity include nonlinear equations, spin glasses, cellular automata, genetic algorithms, classifier systems, and an array of other computational models. Some of the major questions facing complex systems researchers are: (1) explaining how complexity arises from the nonlinear interaction of simples components, (2) describing the mechanisms underlying high-level aggregate behavior of complex systems (such as the overt behavior of an organism, the flow of energy in an ecology, the GNP of an economy), and (3) creating a theoretical framework to enable predictions about the likely behavior of such systems in various conditions. The importance of understanding such systems in enormous: many of the most serious challenges facing humanity--e.g., environmental sustainability, economic stability, the control of disease--as well as many of the hardest scientific questions--e.g., protein folding, the distinction between self and non-self in the immune system, the nature of intelligence, the origin of life--require deep understanding of complex systems.

  3. 1991 Annual report on scientific programs: A broad research program on the sciences of complexity

    Energy Technology Data Exchange (ETDEWEB)

    1991-12-31

    1991 was continued rapid growth for the Santa Fe Institute (SFI) as it broadened its interdisciplinary research into the organization, evolution and operation of complex systems and sought deeply the principles underlying their dynamic behavior. Research on complex systems--the focus of work at SFI--involves an extraordinary range of topics normally studied in seemingly disparate fields. Natural systems displaying complex behavior range upwards from proteins and DNA through cells and evolutionary systems to human societies. Research models exhibiting complexity include nonlinear equations, spin glasses, cellular automata, genetic algorithms, classifier systems, and an array of other computational models. Some of the major questions facing complex systems researchers are: (1) explaining how complexity arises from the nonlinear interaction of simples components, (2) describing the mechanisms underlying high-level aggregate behavior of complex systems (such as the overt behavior of an organism, the flow of energy in an ecology, the GNP of an economy), and (3) creating a theoretical framework to enable predictions about the likely behavior of such systems in various conditions. The importance of understanding such systems in enormous: many of the most serious challenges facing humanity--e.g., environmental sustainability, economic stability, the control of disease--as well as many of the hardest scientific questions--e.g., protein folding, the distinction between self and non-self in the immune system, the nature of intelligence, the origin of life--require deep understanding of complex systems.

  4. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  5. The system of innovative development of the agroindustrial complex in order to ensure the economic security of the region

    Directory of Open Access Journals (Sweden)

    T. I. Ovchinnikova

    2017-01-01

    Full Text Available The basis for innovative development of the agroindustrial complex is the goals, principles and methods that determine the economic security of the region. The category of “economic security”is often identified with the sustainability, competitiveness and risk-free economy of agricultural and processing enterprises. Ensuring the economically safe functioning of all industries and spheres of regional agribusiness is impossible without interconnection with science and education. The most important principles necessary for the formation in the regional and national agribusinesses of a developed economically secure market of scientific, technical and innovative products for agroindustrial purposes are the following: providing the scientific and research sphere of the agro-industrial complex with highly qualified personnel; ensuring real freedom and independence in the activities of research institutions; the formation of a common interdependent economic space and interest; organization of specialized market structures in the field of research and innovation development; development and application within the regional agro-industrial complex of a scientifically grounded economic mechanism for regulating the functioning and stimulating the development of the market for scientific and technical innovation products. Purposeful development of the civilized market of scientific, technical and innovative products of agro-industrial design with its corresponding structures and organizational-economic mechanism is an objective necessity of functioning of economic security of the national economy. The interests of the economic and food security of the region and the state as a whole need to increase the financing of the agricultural sector and the processing industry to a level that will overcome the investment and innovation crisis caused by sanctions. To this end, we believe it is necessary to finance the innovative investment agrarian fund at the

  6. Dynamic effects of tank waste aging on radionuclide-complexant interactions. 1998 annual progress report

    International Nuclear Information System (INIS)

    Arterburn, J.B.; Chamberlin, R.

    1998-01-01

    'The overall objective of this project is to provide a scientific basis for safely processing complexant-containing high-level tank wastes for disposal. The key goals are to identify a means to prepare realistic complexant-containing tank waste simulants, and to use those simulants to determine the relative importance of organic complexants and their breakdown products on the partitioning of important radionuclides. These goals will be accomplished by artificially aging complexant-containing tank waste simulants using microwave, ultrasound, and photolysis techniques. The simulants will be compared to samples of actual Hanford tank wastes to determine the most realistic aging method, on the basis of the organic fragmentation and the partitioning behavior of the important radionuclides 90 Sr, 99 Tc, and 239 Pu. Also, the authors will use their simulant aging process to investigate the relative effects of chelator degradation products on the partitioning of important radionuclides from the waste. Using NMR-active labels in the chelators, they will use a combinatorial approach of generating multiple chelator fragments in a single experiment and then determining which fragments have a negative effect on the separations chemistry. The successful completion of this goal will specifically identify the most problematic organic fragments in complexant-containing waste and provide the basis for developing successful treatment strategies for these wastes. This report summarizes work carried out at Los Alamos during the first 8 months of a 3-year project.'

  7. Border Cracks: Approaching Border Security From a Complexity Theory and Systems Perspective

    Science.gov (United States)

    2012-12-01

    Immigration and Naturalization Service IRS Internal Revenue Service LFM La Familia Michoacana NAFTA North American Free Trade Agreement NDIC...The judicial system ensures the laws passed, along with the enforcement, are legal and in accordance with the Constitution . Judicial rulings are...and advises governmental agencies on activities suspected of constituting threats to Canada’s national security. Additionally, CSIS conducts

  8. The emerging architecture of a regional security complex in the Lake ...

    African Journals Online (AJOL)

    This article explores the emerging regional security architecture to fight terrorism and insurgency in the Lake Chad Basin (LCB). It diagnoses the evolution of the Lake Chad Basin Commission (LCBC) as a sub-regional organization that unites Chad, Cameroon, Niger and Nigeria. In particular, the article critically investigates ...

  9. Environmental surveillance report for the INEL radioactive waste management complex. Annual report, 1976

    International Nuclear Information System (INIS)

    Dolenc, M.R.; Janke, D.H.

    1977-05-01

    This report describes the environmental surveillance activities during 1976 at the two solid waste facilities of the Idaho National Engineering Laboratory. The monitoring program encompasses periodic and random sampling of air, water, and soil within and adjacent to the Radioactive Waste Management Complex and SL-1 Burial Ground. It was found that operation of the Radioactive Waste Management Complex and SL-1 during 1976 had little radiological impact on the environment and radioactivity levels were shown to be within appropriate guidelines for worker safety

  10. 1993 Annual report on scientific programs: A broad research program on the sciences of complexity

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    This report provides a summary of many of the research projects completed by the Santa Fe Institute (SFI) during 1993. These research efforts continue to focus on two general areas: the study of, and search for, underlying scientific principles governing complex adaptive systems, and the exploration of new theories of computation that incorporate natural mechanisms of adaptation (mutation, genetics, evolution).

  11. Fundamental chemistry, characterization, and separation of technetium complexes in Hanford waste. 1998 annual progress report

    International Nuclear Information System (INIS)

    Ashley, K.R.; Blanchard, D.L. Jr.; Schroeder, N.C.

    1998-01-01

    'The ultimate goal of this proposal is to separate technetium from Hanford tank waste. The recent work has shown that a large portion of the technetium is not pertechnetate (TcO 4 - ) and is not easily oxidized. This has serious repercussions for technetium partitioning schemes because they are designed to separate this chemical form. Rational attempts to oxidize these species to TcO 4 - for processing or to separate the non-pertechnetate species themselves would be facilitated by knowing the identity of these complexes and understanding their fundamental chemistry. Tank characterization work has not yet identified any of the non-pertechnetate species. However, based on the types of ligands available and the redox conditions in the tank, a reasonable speculation can be made about the types of species that may be present. Thus, this proposal will synthesize and characterize the relevant model complexes of Tc(III), Tc(IV), and Tc(V) that may have formed under tank waste conditions. Once synthesized, these complexes will be used as standards for developing and characterizing the non-pertechnetate species in actual waste using instrumental techniques such as capillary electrophoresis electrospray mass spectrometry (CE-MS), x-ray absorbance spectroscopy (EXAFS and XANES), and multi-nuclear NMR (including 99 Tc NMR). The authors study the redox chemistry of the technetium complexes so that more efficient and selective oxidative methods can be used to bring these species to TcO 4 - for processing purposes. They will also study their ligand substitution chemistry which could be used to develop separation methods for non-pertechnetate species. Understanding the fundamental chemistry of these technetium complexes will enable technetium to be efficiently removed from the Hanford tank waste and help DOE to fulfill its remediation mission. This report summarizes the first 8 months of a 3-year project.'

  12. Nuclear power and the global challenges of energy security, 6 September 2007, London, England, World Nuclear Association Annual Symposium

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    In the Atoms for Peace speech given by US President Eisenhower in 1953 - the speech that paved the way for the creation of the IAEA - he declared that a special purpose of Atoms for Peace would be 'to provide abundant electrical energy in the power-starved areas of the world'. That vision has yet to be realized. And it should not be taken to mean that nuclear power is the solution for all countries, or for all developing countries. But I would reiterate what I said at the outset - that the global challenges of security and development are interlinked, and that addressing the energy security needs of all countries will be a key to progress on both fronts. It is incumbent upon us to see to it that nuclear power will fulfil its potential in addressing these challenges

  13. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  14. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  15. Causes and consequences of complex population dynamics in an annual plant, Cardamine pensylvanica

    Energy Technology Data Exchange (ETDEWEB)

    Crone, E.E.

    1995-11-08

    The relative importance of density-dependent and density-independent factors in determining the population dynamics of plants has been widely debated with little resolution. In this thesis, the author explores the effects of density-dependent population regulation on population dynamics in Cardamine pensylvanica, an annual plant. In the first chapter, she shows that experimental populations of C. pensylvanica cycled from high to low density in controlled constant-environment conditions. These cycles could not be explained by external environmental changes or simple models of direct density dependence (N{sub t+1} = f[N{sub t}]), but they could be explained by delayed density dependence (N{sub t+1} = f[N{sub t}, N{sub t+1}]). In the second chapter, she shows that the difference in the stability properties of population growth models with and without delayed density dependence is due to the presence of Hopf as well as slip bifurcations from stable to chaotic population dynamics. She also measures delayed density dependence due to effects of parental density on offspring quality in C. pensylvanica and shows that this is large enough to be the cause of the population dynamics observed in C. pensylvanica. In the third chapter, the author extends her analyses of density-dependent population growth models to include interactions between competing species. In the final chapter, she compares the effects of fixed spatial environmental variation and variation in population size on the evolutionary response of C. pensylvanica populations.

  16. Environmental surveillance for the INEL Radioactive-Waste-Management complex. Annual report 1981

    International Nuclear Information System (INIS)

    Janke, D.H.; Zahn, T.P.

    1982-09-01

    The 1981 environmental surveillance report for the Radioactive Waste Management Complex of the Idaho National Engineering Laboratory contains data and discussions about routine radiological monitoring of the atmospheric, hydrologic, and geologic environments of the RWMC. Additional discussions include results of routine monitoring of two surplus facilities, the Stationary Low-Power Reactor No. 1 Surplus Area and the Organic Moderated Reactor Experiment. Each area has produced localized effects on the environment, but containment is well within the INEL site boundary

  17. Changing Mindsets to Transform Security: Leader Development for an Unpredictable and Complex World

    Science.gov (United States)

    2013-01-01

    referred to a rubber device to secure or tie things together that just happened to be wide. There were no magnetic resonance imaging ( MRI ) machines...and asyn- chronous courses. For example, tablet computers, while not new, have become an educational phenomenon with the iPad, Kindle Fire, Nook...and content of their choosing making the tablet itself a portable personalized learning environment.”18 These de- vices have been enabled through an

  18. Very Low Food Security in US Households Is Predicted by Complex Patterns of Health, Economics, and Service Participation.

    Science.gov (United States)

    Choi, Seul Ki; Fram, Maryah S; Frongillo, Edward A

    2017-10-01

    Background: Very low food security (VLFS) happens at the intersection of nuanced and complex patterns of risk characteristics across multiple domains. Little is known about the idiosyncratic situations that lead households to experience VLFS. Objective: We used classification and regression tree (CART) analysis, which can handle complex combinations of predictors, to identify patterns of characteristics that distinguish VLFS households in the United States from other households. Methods: Data came from 3 surveys, the 2011-2014 National Health Interview Survey (NHIS), the 2005-2012 NHANES, and the 2002-2012 Current Population Survey (CPS), with sample participants aged ≥18 y and households with income Survey participants were stratified into households with children, adult-only households, and older-adult households (NHIS, CPS) or individuals aged 18-64 y and individuals aged ≥65 y (NHANES). Household food security was measured with the use of the 10-item US Adult Food Security Scale. Variables from multiple domains, including sociodemographic characteristics, health, health care, and participation in social welfare and food assistance programs, were considered as predictors. The 3 data sources were analyzed separately with the use of CART analysis. Results: Household experiences of VLFS were associated with different predictors for different types of households and often occurred at the intersection of multiple characteristics spanning unmet medical needs, poor health, disability, limitation, depressive symptoms, low income, and food assistance program participation. These predictors built complex trees with various combinations in different types of households. Conclusions: This study showed that multiple characteristics across multiple domains distinguished VLFS households. Flexible and nonlinear methods focusing on a wide range of risk characteristics should be used to identify VLFS households and to inform policies and programs that can address VLFS

  19. Complexity Science: A Mechanism for Strategic Foresight and Resiliency in National Security Decision-Making.

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, Mark R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hayden, Nancy Kay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Most national policy decisions are complex with a variety of stakeholders, disparate interests and the potential for unintended consequences. While a number of analytical tools exist to help decision makers sort through the mountains of data and myriad of options, decision support teams are increasingly turning to complexity science for improved analysis and better insight into the potential impact of policy decisions. While complexity science has great potential, it has only proven useful in limited case s and when properly applied. In advance of more widespread use, a national - level effort to refine complexity science and more rigorously establish its technical underpinnings is recommended.

  20. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  1. AFTER ACTION REPORT Eleventh Annual Radiation Measurement Cross Calibration Workshop (RMCC XI) Applications to Nuclear Safeguards and Security

    Energy Technology Data Exchange (ETDEWEB)

    Davisson, M L [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kristo, M J [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Fei, E [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-01-04

    The intent of this trip was to initiate discussion with the appropriate Jordanian authorities on US collaboration in their development of a nuclear forensic capability. This required firstly to determine which agency has been legally mandated to receive and analyze nuclear forensic evidence and to review their current state of readiness to assess what assistance the US would need to provide. An additional purpose, was to introduce nuclear forensic analysis by example to the several Middle East and north African country labs present at this annual meeting.

  2. AFTER ACTION REPORT Eleventh Annual Radiation Measurement Cross Calibration Workshop (RMCC XI) Applications to Nuclear Safeguards and Security

    International Nuclear Information System (INIS)

    Davisson, M L; Kristo, M J; Fei, E

    2017-01-01

    The intent of this trip was to initiate discussion with the appropriate Jordanian authorities on US collaboration in their development of a nuclear forensic capability. This required firstly to determine which agency has been legally mandated to receive and analyze nuclear forensic evidence and to review their current state of readiness to assess what assistance the US would need to provide. An additional purpose, was to introduce nuclear forensic analysis by example to the several Middle East and north African country labs present at this annual meeting.

  3. Soil Degradation, Land Scarcity and Food Security: Reviewing a Complex Challenge

    Directory of Open Access Journals (Sweden)

    Tiziano Gomiero

    2016-03-01

    Full Text Available Soil health, along with water supply, is the most valuable resource for humans, as human life depends on the soil’s generosity. Soil degradation, therefore, poses a threat to food security, as it reduces yield, forces farmers to use more inputs, and may eventually lead to soil abandonment. Unfortunately, the importance of preserving soil health appears to be overlooked by policy makers. In this paper, I first briefly introduce the present situation concerning agricultural production, natural resources, soil degradation, land use and the challenge ahead, to show how these issues are strictly interwoven. Then, I define soil degradation and present a review of its typologies and estimates at a global level. I discuss the importance of preserving soil capital, and its relationship to human civilization and food security. Trends concerning the availability of arable agricultural land, different scenarios, and their limitations, are analyzed and discussed. The possible relation between an increase in a country’s GNP, population and future availability of arable land is also analyzed, using the World Bank’s database. I argue that because of the many sources of uncertainty in the data, and the high risks at stake, a precautionary approach should be adopted when drawing scenarios. The paper ends with a discussion on the key role of preserving soil organic matter, and the need to adopt more sustainable agricultural practices. I also argue that both our relation with nature and natural resources and our lifestyle need to be reconsidered.

  4. Underground Test Area Calendar Year 2014 Annual Sampling Analysis Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States)

    2016-12-01

    This report presents the analytical data for the 2014 fiscal year (FY) and calendar year (CY) (October 1, 2013, through December 31, 2014), and an evaluation of the data to ensure that the Sampling Plan’s objectives are met. In addition to samples collected and analyzed for the Sampling Plan, some NNSS wells are monitored by NNSA/NFO to demonstrate compliance with State-issued water discharge permits; with protection of groundwater from ongoing radiological waste disposal activities (compliance wells); and to demonstrate that the onsite drinking water supply is below SDWA maximum contaminant levels (MCLs) (public water system [PWS] wells). While not all sampled locations are required by the Sampling Plan, these samples are relevant to its objectives and are therefore presented herein for completeness purposes. Special investigations that took place in 2014 that are relevant to the Sampling Plan are also presented. This is the first annual report released to support Sampling Plan implementation.

  5. Underground Test Area Calendar Year 2014 Annual Sampling Analysis Report Nevada National Security Site, Nevada, Revision 0

    International Nuclear Information System (INIS)

    Farnham, Irene

    2016-01-01

    This report presents the analytical data for the 2014 fiscal year (FY) and calendar year (CY) (October 1, 2013, through December 31, 2014), and an evaluation of the data to ensure that the Sampling Plan's objectives are met. In addition to samples collected and analyzed for the Sampling Plan, some NNSS wells are monitored by NNSA/NFO to demonstrate compliance with State-issued water discharge permits; with protection of groundwater from ongoing radiological waste disposal activities (compliance wells); and to demonstrate that the onsite drinking water supply is below SDWA maximum contaminant levels (MCLs) (public water system [PWS] wells). While not all sampled locations are required by the Sampling Plan, these samples are relevant to its objectives and are therefore presented herein for completeness purposes. Special investigations that took place in 2014 that are relevant to the Sampling Plan are also presented. This is the first annual report released to support Sampling Plan implementation.

  6. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  7. Y-12 National Security Complex Emergency Management Hazards Assessment (EMHA) Process; FINAL

    International Nuclear Information System (INIS)

    Bailiff, E.F.; Bolling, J.D.

    2001-01-01

    This document establishes requirements and standard methods for the development and maintenance of the Emergency Management Hazards Assessment (EMHA) process used by the lead and all event contractors at the Y-12 Complex for emergency planning and preparedness. The EMHA process provides the technical basis for the Y-12 emergency management program. The instructions provided in this document include methods and requirements for performing the following emergency management activities at Y-12: (1) hazards identification; (2) hazards survey, and (3) hazards assessment

  8. Methods for Calculating Frequency of Maintenance of Complex Information Security System Based on Dynamics of Its Reliability

    Science.gov (United States)

    Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.

    2017-11-01

    This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.

  9. IAEA Director General reviews state of the world's nuclear security, safety and technology at annual IAEA General Conference

    International Nuclear Information System (INIS)

    2002-01-01

    The IAEA has been unable to draw any conclusion or provide any assurance regarding Iraq's compliance with its obligations under the Security Council resolutions, it will therefore be important for the Agency to resolve, upon re-commencement of inspections, the key issue of whether the situation regarding Iraq's nuclear activities and capabilities has changed in any material way since December 1998. Regarding the status of IAEA's Safeguards Agreement with the Democratic People's Republic of Korea (DPRK) the Agency continues to be unable to verify that the DPRK has declared all the nuclear material that is subject to Agency safeguards measures under its NPT safeguards agreement. The work required to verify the correctness and completeness of the DPRK's initial declaration could take three or four years. On the issue of nuclear non-proliferation, the universalization, consolidation and strengthening of the non-proliferation regime, including concrete steps to reduce the number of and dependence on nuclear weapons, are more important than ever for the continuing sustainability and credibility of the regime. Only 27 countries had brought into force Additional Protocols agreements with the Agency, which gives the Agency increased authority to provide assurances that countries were using their nuclear actives for peaceful civilian purposes only. All countries are urged to do so. An expanded effort was needed including threat assessments to protect nuclear facilities against attack, sabotage or theft. The focus of these efforts must be expanded to cover other nuclear facilities, including research installations that also have nuclear and other radioactive material. A significant short-term priority is to bring radioactive sources under appropriate control, whether in use, storage, orphaned or in transport. Concerning global nuclear safety, it is satisfying to note that nuclear safety continues to improve at power plants worldwide. The future of nuclear power, depends on

  10. Safety Analysis Report for Packaging, Y-12 National Security Complex, Model ES-3100 Package with Bulk HEU Contents

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, James [Y-12 National Security Complex, Oak Ridge, TN (United States); Goins, Monty [Y-12 National Security Complex, Oak Ridge, TN (United States); Paul, Pran [Y-12 National Security Complex, Oak Ridge, TN (United States); Wilkinson, Alan [Y-12 National Security Complex, Oak Ridge, TN (United States); Wilson, David [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2015-09-03

    This safety analysis report for packaging (SARP) presents the results of the safety analysis prepared in support of the Consolidated Nuclear Security, LLC (CNS) request for licensing of the Model ES-3100 package with bulk highly enriched uranium (HEU) contents and issuance of a Type B(U) Fissile Material Certificate of Compliance. This SARP, published in the format specified in the Nuclear Regulatory Commission (NRC) Regulatory Guide 7.9 and using information provided in UCID-21218 and NRC Regulatory Guide 7.10, demonstrates that the Y-12 National Security Complex (Y-12) ES-3100 package with bulk HEU contents meets the established NRC regulations for packaging, preparation for shipment, and transportation of radioactive materials given in Title 10, Part 71, of the Code of Federal Regulations (CFR) [10 CFR 71] as well as U.S. Department of Transportation (DOT) regulations for packaging and shipment of hazardous materials given in Title 49 CFR. To protect the health and safety of the public, shipments of adioactive materials are made in packaging that is designed, fabricated, assembled, tested, procured, used, maintained, and repaired in accordance with the provisions cited above. Safety requirements addressed by the regulations that must be met when transporting radioactive materials are containment of radioactive materials, radiation shielding, and assurance of nuclear subcriticality.

  11. The global security perspective on the effects of executive cognitive function on complex behavioral screening intervention and HIV/AIDS.

    Science.gov (United States)

    Kim, Suk-Hee

    2010-11-01

    The purpose of this quantitative study is to understand the global security perspective on the effects of executive cognitive function (ECF) on Complex Behavioral Screening Intervention and HIV/AIDS. The HIV/AIDS pandemic is as much a social, political, economic, and cultural problem as a biomedical one. HIV/AIDS is associated centrally with the collapse not just of communities and families but potentially of states, with some of the largest public health interventions ever and enormous questions about governance, a huge population of orphans, and deep questions about intergenerational relations and cultural transmission. This study also is to develop a screening instrument that improves quality of life for individuals with executive cognitive impairments and behavior problems in our communities and the global society.

  12. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    Science.gov (United States)

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  13. 2016 Annual Reuse Report for the Idaho National Laboratory Site’s Advanced Test Reactor Complex Cold Waste Ponds

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Michael George [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-02-01

    This report describes conditions and information, as required by the state of Idaho, Department of Environmental Quality Reuse Permit I-161-02, for the Advanced Test Reactor Complex Cold Waste Ponds located at Idaho National Laboratory from November 1, 2015–October 31, 2016. The effective date of Reuse Permit I-161-02 is November 20, 2014 with an expiration date of November 19, 2019. This report contains the following information: • Facility and system description • Permit required effluent monitoring data and loading rates • Permit required groundwater monitoring data • Status of compliance activities • Issues • Discussion of the facility’s environmental impacts. During the 2016 permit year, 180.99 million gallons of wastewater were discharged to the Cold Waste Ponds. This is well below the maximum annual permit limit of 375 million gallons. As shown by the groundwater sampling data, sulfate and total dissolved solids concentrations are highest in well USGS-065, which is the closest downgradient well to the Cold Waste Ponds. Sulfate and total dissolved solids concentrations decrease rapidly as the distance downgradient from the Cold Waste Ponds increases. Although concentrations of sulfate and total dissolved solids are significantly higher in well USGS-065 than in the other monitoring wells, both parameters remained below the Ground Water Quality Rule Secondary Constituent Standards in well USGS-065. The facility was in compliance with the Reuse Permit during the 2016 permit year.

  14. 2016 Annual Reuse Report for the Idaho National Laboratory Site's Advanced Test Reactor Complex Cold Waste Ponds

    International Nuclear Information System (INIS)

    Lewis, Michael George

    2017-01-01

    This report describes conditions and information, as required by the state of Idaho, Department of Environmental Quality Reuse Permit I-161-02, for the Advanced Test Reactor Complex Cold Waste Ponds located at Idaho National Laboratory from November 1, 2015-October 31, 2016. The effective date of Reuse Permit I-161-02 is November 20, 2014 with an expiration date of November 19, 2019. This report contains the following information: · Facility and system description · Permit required effluent monitoring data and loading rates · Permit required groundwater monitoring data · Status of compliance activities · Issues · Discussion of the facility's environmental impacts. During the 2016 permit year, 180.99 million gallons of wastewater were discharged to the Cold Waste Ponds. This is well below the maximum annual permit limit of 375 million gallons. As shown by the groundwater sampling data, sulfate and total dissolved solids concentrations are highest in well USGS-065, which is the closest downgradient well to the Cold Waste Ponds. Sulfate and total dissolved solids concentrations decrease rapidly as the distance downgradient from the Cold Waste Ponds increases. Although concentrations of sulfate and total dissolved solids are significantly higher in well USGS-065 than in the other monitoring wells, both parameters remained below the Ground Water Quality Rule Secondary Constituent Standards in well USGS-065. The facility was in compliance with the Reuse Permit during the 2016 permit year.

  15. 2011 Annual Industrial Wastewater Reuse Report for the Idaho National Laboratory Site's Advanced Test Reactor Complex Cold Waste Pond

    International Nuclear Information System (INIS)

    Lewis, Mike

    2012-01-01

    This report describes conditions, as required by the state of Idaho Industrial Wastewater Reuse Permit (LA 000161 01, Modification B), for the wastewater land application site at the Idaho National Laboratory Site's Advanced Test Reactor Complex Cold Waste Pond from November 1, 2010 through October 31, 2011. The report contains the following information: Facility and system description Permit required effluent monitoring data and loading rates Groundwater monitoring data Status of compliance activities Noncompliance and other issues Discussion of the facility's environmental impacts During the 2011 permit year, approximately 166 million gallons of wastewater were discharged to the Cold Waste Pond. This is well below the maximum annual permit limit of 375 million gallons. As shown by the groundwater sampling data, sulfate and total dissolved solids concentrations are highest near the Cold Waste Pond and decrease rapidly as the distance from the Cold Waste Pond increases. Although concentrations of sulfate and total dissolved solids are elevated near the Cold Waste Pond, both parameters were below the Ground Water Quality Rule Secondary Constituent Standards in the down gradient monitoring wells.

  16. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  17. Technology Evaluation for the Big Spring Water Treatment System at the Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Bechtel Jacobs Company LLC

    2002-01-01

    The Y-12 National Security Complex (Y-12 Complex) is an active manufacturing and developmental engineering facility that is located on the U.S. Department of Energy (DOE) Oak Ridge Reservation. Building 9201-2 was one of the first process buildings constructed at the Y-12 Complex. Construction involved relocating and straightening of the Upper East Fork Poplar Creek (UEFPC) channel, adding large quantities of fill material to level areas along the creek, and pumping of concrete into sinkholes and solution cavities present within the limestone bedrock. Flow from a large natural spring designated as ''Big Spring'' on the original 1943 Stone and Webster Building 9201-2 Field Sketch FS6003 was captured and directed to UEFPC through a drainpipe designated Outfall 51. The building was used from 1953 to 1955 for pilot plant operations for an industrial process that involved the use of large quantities of elemental mercury. Past operations at the Y-12 Complex led to the release of mercury to the environment. Significant environmental media at the site were contaminated by accidental releases of mercury from the building process facilities piping and sumps associated with Y-12 Complex mercury handling facilities. Releases to the soil surrounding the buildings have resulted in significant levels of mercury in these areas of contamination, which is ultimately transported to UEFPC, its streambed, and off-site. Bechtel Jacobs Company LLC (BJC) is the DOE-Oak Ridge Operations prime contractor responsible for conducting environmental restoration activities at the Y-12 Complex. In order to mitigate the mercury being released to UEFPC, the Big Spring Water Treatment System will be designed and constructed as a Comprehensive Environmental Response, Compensation, and Liability Act action. This facility will treat the combined flow from Big Spring feeding Outfall 51 and the inflow now being processed at the East End Mercury Treatment System (EEMTS). Both discharge to UEFPC adjacent to

  18. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  19. Annual pollen traps reveal the complexity of climatic control on pollen productivity in Europe and the Caucasus

    Czech Academy of Sciences Publication Activity Database

    van der Knaap, W. O.; van Leeuwen, J. F. N.; Svitavská-Svobodová, Helena; Pidek, I. A.; Kavavadze, E.; Chichinadze, M.; Giesecke, T.; Kaszewski, B. M.; Oberli, F.; Kalnina, L.; Pardoe, H. S.; Tinner, W.; Ammann, B.

    2010-01-01

    Roč. 19, č. 4 (2010), s. 285-307 ISSN 0939-6314 R&D Projects: GA AV ČR IAAX00130801; GA AV ČR IAAX00050801 Institutional research plan: CEZ:AV0Z60050516 Keywords : annual pollen monitoring * influx * climate Subject RIV: EF - Botanics Impact factor: 1.656, year: 2010

  20. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  1. Successful Characterization and Remedial Contour of Highly Contaminated Mercury Soil at the Y-12 National Security Complex - 13593

    Energy Technology Data Exchange (ETDEWEB)

    White, Aaron; Rigas, Michael [U.S. Department of Energy Oak Ridge Operations, Oak Ridge, TN 37830 (United States); Birchfield, Joseph W. III [1528 Paxton Drive Knoxville, TN 37918 (United States)

    2013-07-01

    An area known as the 81-10 pad within the footprint of the Y-12 National Security Complex, suspected to be heavily contaminated with mercury, was slated for characterization in support of a Federal Facilities Agreement (FFA) milestone to be accomplished by September 30, 2012. A full remedial design report (RDR) required the soil in Exposure Unit -9 (EU-9) to be fully characterized for a number of contaminates of concern including mercury. The goal of this characterization effort was to determine what soil, if any, would need to be removed for the protection of industrial workers and impacts to the surface and ground water. Funding for this project was made available using buy-back scope under the American Recovery and Reinvestment Act (ARRA). The EU-9 soil unit involved 3 different classifications which were determined as follows: Class 1: Known to have been impacted, contamination is likely; Class 2: Suspected to have been impacted, contamination is unknown; Class 3: Area not known to have been impacted, contamination unlikely. Due to various sampling and analysis events since the 1980's, significant mercury contamination was expected under the concrete pad of an area known as 81-10. Mercury contamination outside of the boundary of this pad within the EU-9 footprint was not known and therefore an original planned estimate of 1,461 cubic meters of material were expected to be heavily contaminated with mercury requiring removal, treatment and disposal. Through the use of a highly effective nature and extent sampling and analysis design that involved a hybrid of statistically-based and judgmental sampling, the actual remedial contour requiring removal was approximately 717 cubic meters, roughly 12% of the original estimate. This characterization approach was executed in full compliance with the Record of Decision (ROD) [1] documents that were agreed upon by the U.S. Department of Energy, Environmental Protection Agency and Tennessee Department of Environment and

  2. Calendar Year 2008 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2009-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2008 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2008 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2008 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2008 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  3. DYNAMICS OF DEVELOPMENT OF FINANCIAL SAFETY OF THE ENTERPRISE AS A COMPLEX ECONOMIC SECURITY OF THE STATE

    Directory of Open Access Journals (Sweden)

    Tetiana Ganushchak

    2017-09-01

    Full Text Available The purpose of the paper is to the performance of the evaluation of the financial safety of the enterprise. To achieve the stated aim it has been necessary to solve the following tasks: to use the approaches as to the evaluation of the financial safety of the enterprise, to introduce the analysis system of the financial safety of the enterprise, to consider the structural logical scheme of the analysis procedure of the financial safety of the enterprise, to give the description of the integral indicator of the financial safety of the enterprise; to evaluate and compare companies in the paltry industry according to the level of their financial safety. Methodology. Methodologial basis of the research are the scientific methods, such as : method of logical generalization, dialectical method of recognition of the economic phenomena – to give the definitions of «economic security of the enterprise», «financial security of the enterprise», grouping method, analysis which were used to estimate indicator position of the financial security of the poultry company, graph method which was applied to compare integral estimation of the enterprise;methods of synthesis, deduction, induction, method of the expert estimation to calculate and implement integral marker of the financial security of the poultry company;method of the correlation analysis which was used to identify weight coefficients of the all sided figures of the solvency , business activity, profitability, financial steadiness, pay ability. The priority in methods using was defined by the particular tasks and goals. Results of the research showned into a wide set of the ways of financial enterprise safety as a component of economic security of the state. There is an evaluation of enterprise financial safety on the basis of calculations of integral indicator, including combined indices of profitability (unprofitability, pay ability or the lack of that, business activity (fading, financial

  4. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  5. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  6. Calendar Year 2005 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2006-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2005 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2005 monitoring data were obtained from groundwater and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge south of Y-12. The CY 2005 monitoring data were obtained under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT) and several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Data contained in this report meet applicable requirements of DOE Order 450.1 (Environmental Protection Program) regarding evaluation of groundwater and surface water quality in areas: (1) which are, or could be, affected by operations at Y-12 (surveillance monitoring); and (2) where contaminants from Y-12 are most likely to migrate beyond the boundaries of the ORR (exit pathway/perimeter monitoring). However, detailed analysis, evaluation, and interpretation of the CY 2005 monitoring data is deferred to the ''Y-12 Groundwater Protection Program Groundwater Monitoring Data Compendium'' (BWXT 2006). For each monitoring well, spring, and surface water sampling station included in this report, the GWPP Compendium provides: (1) pertinent well installation and construction information; (2) a complete sampling history, including

  7. Calendar Year 2010 Groundwater Monitoring Report, U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2011-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2010 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2010 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2010 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2010 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  8. Calendar Year 2007 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2008-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2007 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2007 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2007 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT), and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). In December 2007, the BWXT corporate name was changed to Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12), which is applied to personnel and organizations throughout CY 2007 for this report. Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2007 monitoring results fulfill requirements of

  9. Calendar Year 2004 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2005-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2004 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2004 monitoring data were obtained from groundwater and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge south of Y-12. The CY 2004 monitoring data were obtained under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT) and several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Data contained in this report meet applicable requirements of DOE Order 450.1 (Environmental Protection Program) regarding evaluation of groundwater and surface water quality in areas: (1) which are, or could be, affected by operations at Y-12 (surveillance monitoring); and (2) where contaminants from Y-12 are most likely to migrate beyond the boundaries of the ORR (exit pathway/perimeter monitoring). However, detailed analysis, evaluation, and interpretation of the CY 2004 monitoring data is deferred to the Y-12 Groundwater Protection Program Groundwater Monitoring Data Compendium (BWXT 2005). For each monitoring well, spring, and surface water sampling station included in this report, the GWPP Compendium provides: (1) pertinent well installation and construction information; (2) a complete sampling history, including sampling methods and

  10. Calendar Year 2011 Groundwater Monitoring Report, U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC,

    2012-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2011 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2011 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. This report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and known extent of groundwater contamination. The CY 2011 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by the DOE Environmental Management (EM) contractor responsible for environmental cleanup on the ORR. In August 2011, URS | CH2M Oak Ridge LLC (UCOR) replaced Bechtel Jacobs Company LLC (BJC) as the DOE EM contractor. For this report, BJC/UCOR will be referenced as the managing contractor for CY 2011. Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC/UCOR (i.e., coordinating sample collection and sharing data) ensures

  11. Synthesis and characterization of templated ion exchange resins for the selective complexation of actinide ions. 1998 annual progress report

    International Nuclear Information System (INIS)

    Murray, G.M.; Uy, O.M.

    1998-01-01

    'The purpose of this research is to develop polymeric extractants for the selective complexation of uranyl ions (and subsequently other actinyl and actinide ions) from aqueous solutions (lakes, streams, waste tanks and body fluids). Selectivity for a specific actinide ion is obtained by providing polymers with cavities lined with complexing ligands so arranged as to match the charge, coordination number, coordination geometry, and size of the actinide metal ion. These cavity-containing polymers will be produced using a specific actinide ion (or surrogate) as a template around which monomeric complexing ligands will be polymerized. The polymers will provide useful sequestering agents for removing actinide ions from wastes and will form the basis for a variety of analytical techniques for actinide determinations.'

  12. Exploring the Utilization of Complex Algal Communities to Address Algal Pond Crash and Increase Annual Biomass Production for Algal Biofuels

    Energy Technology Data Exchange (ETDEWEB)

    Hamilton, Cyd E. [Dept. of Energy (DOE), Washington DC (United States).

    2014-03-25

    This white paper briefly reviews the research literature exploring complex algal communities as a means of increasing algal biomass production via increased tolerance, resilience, and resistance to a variety of abiotic and biotic perturbations occurring within harvesting timescales. This paper identifies what data are available and whether more research utilizing complex communities is needed to explore the potential of complex algal community stability (CACS) approach as a plausible means to increase biomass yields regardless of ecological context and resulting in decreased algal-based fuel prices by reducing operations costs. By reviewing the literature for what we do and do not know, in terms of CACS methodologies, this report will provide guidance for future research addressing pond crash phenomena.

  13. Model of a Nuclear Security Naval Agency for radiation control of the Industrial Complex of of Submarine Construction and Maintenance Ship with Nuclear Propulsion

    International Nuclear Information System (INIS)

    Lins Junior, Amilton de Sousa

    2017-01-01

    Due to the construction, by Brazilian Navy, of a Submarine Construction and Maintenance Ship with Nuclear Propulsion, where, among other activities, the commissioning and exchange of the fuel elements of the reactor in the future Nuclear Submarine, and of a Naval Base where the Nuclear Submarine and the Conventional Submarines, it is necessary the establishment of a Nuclear Security Naval Agency to monitor activities involving ionizing radiation sources and nuclear materials aimed at the radiological protection of exposed occupationally individuals (IOE), the general public and the environment. It should be noted that nuclear and radioactive material will be present only in a part of the yard called Radiological Complex. Therefore, the development of a structure for the control of the Radiological Complex is fundamental, considering that the future licensing process will be unprecedented in Brazil and will face several difficulties. This work presents a model of a structure for the radiological control of the industrial complex for the construction and maintenance of the submarine with nuclear propulsion, as well as the fundamental concepts of the activities, such as inspection, regulations and authorizations, to be carried out by the various component sectors of the Nuclear Security Naval Agency. (author)

  14. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  15. 2015 Annual Reuse Report for the Idaho National Laboratory Site’s Advanced Test Reactor Complex Cold Waste Ponds

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Michael George [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-02-01

    This report describes conditions and information, as required by the state of Idaho, Department of Environmental Quality Reuse Permit I-161-02, for the Advanced Test Reactor Complex Cold Waste Ponds located at Idaho National Laboratory from November 1, 2014–October 31, 2015. The effective date of Reuse Permit I-161-02 is November 20, 2014 with an expiration date of November 19, 2019.

  16. 2015 Annual Reuse Report for the Idaho National Laboratory Site's Advanced Test Reactor Complex Cold Waste Ponds

    International Nuclear Information System (INIS)

    Lewis, Michael George

    2016-01-01

    This report describes conditions and information, as required by the state of Idaho, Department of Environmental Quality Reuse Permit I-161-02, for the Advanced Test Reactor Complex Cold Waste Ponds located at Idaho National Laboratory from November 1, 2014-October 31, 2015. The effective date of Reuse Permit I-161-02 is November 20, 2014 with an expiration date of November 19, 2019.

  17. An AIE-active boron-difluoride complex: multi-stimuli-responsive fluorescence and application in data security protection.

    Science.gov (United States)

    Zhu, Xiaolin; Liu, Rui; Li, Yuhao; Huang, Hai; Wang, Qiang; Wang, Danfeng; Zhu, Xuan; Liu, Shishen; Zhu, Hongjun

    2014-11-04

    A novel AIE-active boron-difluoride complex (PTZ) was synthesized which exhibits multi-stimuli responsive characteristics. Its colours and emissions can be switched by mechanical grinding, organic solvent vapours and acid/base vapours. This complex can be utilized in data encryption and decryption based on the protonation-deprotonation effect.

  18. Calendar Year 2009 Groundwater Monitoring Report, U.S. Department of Energy, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC

    2010-12-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2009 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2009 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2009 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock & Wilcox Technical Services Y-12, LLC (B&W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2009 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the groundwater and

  19. Calendar Year 2006 Groundwater Monitoring Report, U.S Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    N/A

    2007-09-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2006 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2006 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12 (Figure A.1). The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2006 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by BWXT Y-12, L.L.C. (BWXT), and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., preparing SAPs, coordinating sample collection, and sharing data) ensures that the CY 2006 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the groundwater and

  20. Calendar Year 2009 Groundwater Monitoring Report, U.S. Department of Energy, Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2010-01-01

    This report contains the groundwater and surface water monitoring data that were obtained during calendar year (CY) 2009 at the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) on the DOE Oak Ridge Reservation (ORR) in Oak Ridge, Tennessee. The CY 2009 monitoring data were obtained from wells, springs, and surface water sampling locations in three hydrogeologic regimes at Y-12. The Bear Creek Hydrogeologic Regime (Bear Creek Regime) encompasses a section of Bear Creek Valley (BCV) between the west end of Y-12 and the west end of the Bear Creek Watershed (directions are in reference to the Y-12 grid system). The Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime) encompasses the Y-12 industrial facilities and support structures in BCV. The Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime) encompasses a section of Chestnut Ridge directly south of Y-12. Section 2 of this report provides background information pertinent to groundwater and surface water quality monitoring in each hydrogeologic regime, including the topography and bedrock geology, surface water drainage, groundwater system, and extent of groundwater contamination. The CY 2009 groundwater and surface water monitoring data in this report were obtained from sampling and analysis activities implemented under the Y-12 Groundwater Protection Program (GWPP) managed by Babcock and Wilcox Technical Services Y-12, LLC (B and W Y-12) and from sampling and analysis activities implemented under several monitoring programs managed by Bechtel Jacobs Company LLC (BJC). Cooperative implementation of the monitoring programs directed by the Y-12 GWPP and BJC (i.e., coordinating sample collection and sharing data) ensures that the CY 2009 monitoring results fulfill requirements of all the applicable monitoring drivers with no duplication of sampling and analysis efforts. Section 3 of this report contains a summary of information regarding the

  1. Enhanced sludge processing of HLW: Hydrothermal oxidation of chromium, technetium, and complexants by nitrate. 1998 annual progress report

    International Nuclear Information System (INIS)

    Buelow, S.J.; Robinson, J.M.

    1998-01-01

    'The objective of this project is to develop the scientific basis for hydrothermal separation of chromium from High Level Waste (HLW) sludges. The worked is aimed at attaining a fundamental understanding of chromium speciation, oxidation/reduction and dissolution kinetics, reaction mechanisms, and transport properties under hydrothermal conditions in both simple and complex salt solutions that will ultimately lead to an efficient chromium leaching process. This report summarizes the research over the first 1.5 years of a 3 year project. The authors have examined the dissolution of chromium hydroxide using different oxidants as a function of temperature and alkalinity. The results and possible applications to HLW sludges are discussed'

  2. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  3. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    International Nuclear Information System (INIS)

    2011-01-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  4. Subsurface Investigations Program at the radioactive waste management complex of the Idaho National Engineering Laboratory. Annual progress report, FY-1985

    International Nuclear Information System (INIS)

    Hubbell, J.M.; Hull, L.C.; Humphrey, T.G.; Russell, B.F.; Pittman, J.R.; Cannon, K.M.

    1985-12-01

    This report describes work conducted in FY-85 in support of the Subsurface Investigation Program at the Radioactive Waste Management Complex of the Idaho National Engineering Laboratory. The work is part of a continuing effort to define and predict radionuclide migration from buried waste. The Subsurface Investigation Program is a cooperative study conducted by EG and G Idaho and the US Geological Survey, INEL Office. EG and G is responsible for the shallow drilling, solution chemistry, and net downward flux portions of this program, while the US Geological Survey is responsible for the weighing lysimeters and test trench. Data collection was initiated by drilling, sampling, and instrumenting shallow wells, continuing the installation of test trenches, and modifying the two weighing lysimeters. Twenty-one shallow auger holes were around the Radioactive Waste Management Complex (RWMC) to evaluate radionuclide content in the surficial sediments, to determine the geologic and hydrologic characteristics of the surficial sediments, and to provide as monitoring sites for moisture in these sediments. Eighteen porous cup lysimeters were installed in 12 auger holes to collect soil water samples from the surficial sediments. Fourteen auger holes were instrumented with tensiometers, gypsum blocks and/or psychrometers at various depths throughout the RWMC. Readings from these instruments are taken on a monthly basis

  5. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  6. The center for plant and microbial complex carbohydrates at the University of Georgia Complex Carbohydrate Research Center. Annual report, September 15, 1990--December 31, 1991

    Energy Technology Data Exchange (ETDEWEB)

    Albersheim, P.; Darvill, A.

    1991-08-01

    Research from the Complex Carbohydrates Research Center at the University of Georgia is presented. Topics include: Structural determination of soybean isoflavones which specifically induce Bradyrhizobium japonicum nodD1 but not the nodYABCSUIJ operon; structural analysis of the lipopolysaccharides (LPSs) from symbiotic mutants of Bradyrhizobium japonicum; structural characterization of lipooligosaccharides from Bradyrhizobium japonicum that are required for the specific nodulation of soybean; structural characterization of the LPSs from R. Leguminosarum biovar phaseoli, the symbiont of bean; characterization of bacteroid-specific LPS epitopes in R. leguminosarum biovar viciae; analysis of the surface polysaccharides of Rhizobium meliloti mutants whose lipopolysaccharides and extracellular polysaccharides can have the same function in symbiosis; characterization of a polysaccharide produced by certain Bradyrhizobium japonicum strains within soybean nodules; structural analysis of a streptococcal adhesin polysaccharide receptor; conformational studies of xyloglucan, the role of the fucosylated side chain in surface-specific cellulose-xyloglucan interactions; the structure of an acylated glucosamine oligosaccharide signal molecule (nod factor) involved in the symbiosis of Rhizobium leguminosarum biovar viciae with its host Vicia sativa; investigating membrane responses induced by oligogalacturonides in cultured cells; the polygalacturonase inhibitor protein; characterization of the self-incompatability glycoproteins from Petunia hybrida; investigation of the cell wall polysaccharide structures of Arabidopsis thaliana; and the glucan inhibition of virus infection of tabacco.

  7. Annual progress report 1981

    International Nuclear Information System (INIS)

    1982-01-01

    This annual progress report of the CEA Protection and Nuclear Safety Institut outlines a brief description of the progress made in each section of the Institut. Research activities of the Protection department include, radiation effects on man, radioecology and environment radioprotection techniques. Research activities of the Nuclear Safety department include, reactor safety analysis, fuel cycle facilities safety analysis, safety research programs. The third section deals with nuclear material security including security of facilities, security of nuclear material transport and monitoring of nuclear material management [fr

  8. 1985. Annual progress report

    International Nuclear Information System (INIS)

    1986-01-01

    This annual progress report of the CEA Protection and Nuclear Safety Institut outlines a description of the progress made in each sections of the Institut Research activities of the different departments include: reactor safety analysis, fuel cycle facilities analysis; and associated safety research programs (criticality, sites, transport ...), radioecology and environmental radioprotection techniques; data acquisition on radioactive waste storage sites; radiation effects on man, studies on radioprotection techniques; nuclear material security including security of facilities, security of nuclear material transport, and monitoring of nuclear material management; nuclear facility decommissioning; and finally the public information [fr

  9. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  10. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  11. Subsurface Investigations Program at the Radioactive Waste Management Complex of the Idaho National Engineering Laboratory: Annual progress report, FY-1987

    International Nuclear Information System (INIS)

    Laney, P.T.; Minkin, S.C.; Baca, R.G.; McElroy, D.L.; Hubbell, J.M.; Hull, L.C.; Russell, B.F.; Stormberg, G.J.; Pittman, J.T.

    1988-04-01

    The Subsurface Investigations Program is obtaining program objectives of a field calibration of a model to predict long-term radionuclide migration and measurement of the actual migration to date. Three deep boreholes were drilled at the Radioactive Waste Management Complex (RWMC) to collect sample material for evaluation of radionuclide content in the interbeds, to determine geologic and hydrologic characteristics of the sediments, and to provide monitoring sites for moisture movement in these sediments. Suction lysimeters and heat dissipation sensors were installed in two deep boreholes to collect moisture data. Data from the moisture sensing instruments installed at the RWMC continued to be collected during FY-1987. Because of the large volume of collected data, the RWMC Data Management System was developed and implemented to facilitate the storage, retrieval, and manipulation of the database. Work on the Computer Model Development task focused on a detailed review of previous vadose zone modeling studies at INEL, acquisition and installation of a suite of computer models for unsaturated flow and contaminant transport, and preliminary applications of computer models using site-specific data. Computer models installed on the INEL CRAY computer for modeling transport through the subsurface pathway include SEMTRA, FEMTRA, TRACR3D, MAGNUM, and CHAINT. In addition to the major computer models, eight other codes, referred to as support codes and models, have been acquired and implemented. 27 refs., 70 figs., 22 tabs

  12. 2010 Annual Industrial Wastewater Reuse Report for the Idaho National Laboratory Site's Advanced Test Reactor Complex Cold Waste Pond

    International Nuclear Information System (INIS)

    Lewis, Mike

    2011-01-01

    This report describes conditions, as required by the state of Idaho Industrial Wastewater Reuse Permit (LA 000161 01, Modification B), for the wastewater land application site at the Idaho National Laboratory Site's Advanced Test Reactor Complex Cold Waste Pond from November 1, 2009 through October 31, 2010. The report contains the following information: (1) Facility and system description; (2) Permit required effluent monitoring data and loading rates; (3) Groundwater monitoring data; (4) Status of compliance activities; and (5) Discussion of the facility's environmental impacts. During the 2010 permit year, approximately 164 million gallons of wastewater were discharged to the Cold Waste Pond. As shown by the groundwater sampling data, sulfate and total dissolved solids concentrations are highest near the Cold Waste Pond and decrease rapidly as the distance from the Cold Waste Pond increases. Although concentrations of sulfate and total dissolved solids are elevated near the Cold Waste Pond, both parameters were below the Ground Water Quality Rule Secondary Constituent Standards in the down gradient monitoring wells.

  13. RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, P. M.

    2013-02-21

    This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. 2013 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada; Review of the Performance Assessments and Composite Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Shott, Gregory [NSTec

    2014-03-01

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2013. This annual summary report presents data and conclusions from the FY 2013 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2013 include the following: • Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2013 • Evaluation of new or revised waste streams by special analysis • Development of version 4.115 of the Area 5 RWMS GoldSim PA/CA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2013 review of operations

  16. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  17. Survey Report For The Characterization Of The Five Tanks Located Near The Old Salvage Yard At The Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Rollow, Kathy

    2012-01-01

    This summary report presents analytical results, radiological survey data, and other data/information for disposition planning of the five tanks located west of the Old Salvage Yard (OSY) at the Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. Field personnel from Oak Ridge Associated Universities (ORAU) and URS-CH2M Oak Ridge LLC completed data collection in May 2012 per the project-specific plan (PSP) (ORAU 2012). Deviations from the PSP are addressed in the body of this report. Characterization activities included three data collection modes: visual inspection, radiological survey, and volumetric sampling/analysis. This report includes the final validated dataset and updates associated with the Tank 2 residues originally thought to be a biological bloom (e.g., slime mold) but ultimately identified as iron sulfate crystals

  18. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  19. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  20. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  1. Historic American engineering record. Nevada national security site, Bren Tower Complex. Written historical and descriptive data and field records

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, Susan R. [Desert Research Institute, Las Vegas, NV (United States); Goldenberg, Nancy [Carey & Co Inc., San Francisco, CA (United States)

    2013-08-01

    The BREN (Bare Reactor Experiment, Nevada) Tower Complex is significant for its role in the history of nuclear testing, radiation dosimetry studies, and early field testing of the Strategic Missile Defense System designs. At the time it was built in 1962, the 1,527 ft (465 m) BREN Tower was the tallest structure west of the Mississippi River and exceeded the height of the Empire State Building by 55 ft (17 m). It remains the tallest ever erected specifically for scientific purposes and was designed and built to facilitate the experimental dosimetry studies necessary for the development of accurate radiation dose rates for the survivors of Hiroshima and Nagasaki. The tower was a key component of the Atomic Bomb Casualty Commission’s (ABCC) mission to predict the health effects of radiation exposure. Moved to its current location in 1966, the crucial dosimetry studies continued with Operation HENRE (High Energy Neutron Reactions Experiment). These experiments and the data they generated became the basis for a dosimetry system called the Tentative 1965 Dose or more commonly the T65D model. Used to estimate radiation doses received by individuals, the T65D model was applied until the mid-1980s when it was replaced by a new dosimetry system known as DS86 based on the Monte Carlo method of dose rate calculation. However, the BREN Tower data are still used for verification of the validity of the DS86 model. In addition to its importance in radiation heath effects research, the BREN Tower Complex is also significant for its role in the Brilliant Pebbles research project, a major component of the Strategic Defense Initiative popularly known as the “Star Wars” Initiative. Instigated under the Reagan Administration, the program’s purpose was to develop a system to shield the United States and allies from a ballistic missile attack. The centerpiece of the Strategic Defense System was space-based, kinetic-kill vehicles. In 1991, BREN Tower was used for the tether tests

  2. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  3. CHDS Holds Second Annual Education Summit

    OpenAIRE

    Center for Homeland Defense and Security

    2008-01-01

    Center for Homeland Defense and Security, PRESS RELEASES On March 18-19, CHDS, along with the Homeland Security and Defense Education Consortium, the U.S. Department of Homeland Security, and the University of Maryland held the Second Annual Homeland Defense...

  4. CEA Annual report 2007

    International Nuclear Information System (INIS)

    2007-01-01

    The CEA, a prominent player in research development and innovation, is active in three main domains: energy, health care and information technology, defense and security. This annual report presents the CEA activities for the year 2007 in these three main areas: science and technology working for nuclear deterrence and global security, the energies without greenhouse effect gases emission against the climatic change, researches in the information sciences and technologies for a better communication and health. The CEA safety, organization, communication and international relations are also presented. (A.L.B.)

  5. Total - annual report 2005

    International Nuclear Information System (INIS)

    2006-01-01

    This annual report presents the activities and results of TOTAL S.A., french society on oil and gas. It deals with statistics, the managers, key information on financial data and risk factors, information on the Company, unresolved Staff Comments, employees, major Shareholders, consolidated statements, markets, security, financial risks, defaults dividend arrearages and delinquencies, controls and procedures, code of ethics and financial statements. (A.L.B.)

  6. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  7. Security and computer forensics in web engineering education

    OpenAIRE

    Glisson, W.; Welland, R.; Glisson, L.M.

    2010-01-01

    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security shou...

  8. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  9. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    a theory and numerical support to place the cascading phenomenon in the context .... for a given degree distribution, and self- and repeated links are forbidden. ..... Now we present numerical verification of our main result concerning the effect ...

  10. Citizenship and Immigration Services Ombudsman 2015 Annual Report

    Data.gov (United States)

    Department of Homeland Security — By statute, the Office of the Citizenship and Immigration Services Ombudsman submits an Annual Report to Congress by June 30 of each year. The Ombudsman’s Annual...

  11. 2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    International Nuclear Information System (INIS)

    2012-01-01

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of

  12. 2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-03-20

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of

  13. CEA - Annual report 2006

    International Nuclear Information System (INIS)

    2006-01-01

    The CEA, a prominent player in research development and innovation, is active in 3 main areas: energy, health care and information technology and defense and security. This annual report presents the CEA activity for the year 2006 in these three main areas: Science and technology working for nuclear deterrence and global security (the simulation programs, the nuclear warheads, the nuclear propulsion, the decommissioning, the fighting against nuclear proliferation and monitoring international treaties, the global security); health and information technology (micro and nano technologies and systems); energy from nuclear fission and fusion and other technologies that do not emit greenhouse gases (progress for the nuclear industry, sustainable management of radioactive materials and waste, nuclear systems of the future, new energy technologies). (A.L.B.)

  14. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  15. 2012 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    Energy Technology Data Exchange (ETDEWEB)

    Shott, G. [National Security Technologies, LLC

    2013-03-18

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2012. This annual summary report presents data and conclusions from the FY 2012 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2012 include the following: Release of a special analysis for the Area 3 RWMS assessing the continuing validity of the PA and CA; Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2012; Evaluation of new or revised waste streams by special analysis; and Development of version 4.114 of the Area 5 RWMS GoldSim PA model. The Area 3 RWMS has been in inactive status since

  16. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  17. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  18. Rand National Security Division Annual Report 2006

    Science.gov (United States)

    2007-01-01

    Infrastructure and development will depend on the ability of the intervening authorities and the host government to control inflation and finance ...Partner, Perkins Coie LLP Eugene Rosenfeld President, ForestLane Group Lenny Sands President & CEO, Alchemy Worldwide, LLC Michael J. Shockro

  19. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  20. Selections from the ABC 2013 Annual Convention, New Orleans, Louisiana: A Gumbo of Favorite Assignments: Global, Communicating Complex Information, Short-Message Packaging

    Science.gov (United States)

    Whalen, D. Joel

    2014-01-01

    This article, the first of a two-part series, catalogs teaching innovations presented at the 2013 Association for Business Communication (ABC) Annual Convention, New Orleans. They were presented during the My Favorite Assignment session. The 11 Favorite Assignments featured here offer the reader a variety of learning experiences including…

  1. Presentation at Innoventure Annual Competition

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-03-31

    This report documents the components of the workshop presented at the recent annual competition for the Innoventure program. The goal of the workshop was to focus on the delivery of science, technology, engineering, and math (STEM) concepts in a hands-on experiential learning format to increase interest in national security careers at NNSA, most of which are in the STEM fields. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant.

  2. Analytical and Numerical Study of the Projective Synchronization of the Chaotic Complex Nonlinear Systems with Uncertain Parameters and Its Applications in Secure Communication

    Directory of Open Access Journals (Sweden)

    Kholod M. Abualnaja

    2014-01-01

    to demonstrate the effectiveness of the proposed synchronization scheme and verify the theoretical results. The above results will provide theoretical foundation for the secure communication applications based on the proposed scheme.

  3. Successful Characterization Strategies for the Active High Risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164

    Energy Technology Data Exchange (ETDEWEB)

    Birchfield, Joseph W. III [Link Technologies (United States); Albrecht, Linda [Alliant Corporation (United States)

    2012-07-01

    Building 9201-5 (Alpha 5) was completed in May 1944 and served as a production facility for National Nuclear Security Administration (NNSA) Y-12 Weapons Plant. During the Manhattan Project, it functioned as a uranium enrichment facility. The facility was renovated and altered over the years, converting the calutrons to support other missions. Alpha 5 consists of 4 floors and a basement measuring approximately 600,000 square feet. The facility contains various pieces of equipment remaining from legacy operations. A significant amount (approximately 200,000 kgs) of mercury (Hg) has been spilled in the facility over the operational history of the building. To further complicate matters, beryllium (Be) contamination in 9201-5 is found throughout approximately sixty percent of the facility. Concentrations varying from very low (< 0.2 micrograms (μg)/100 cm{sup 2}) to areas where concentrations are relatively high, approximately 600 μg/100 cm{sup 2}, in regulated beryllium areas. The primary site related contaminants (SRCs) for the waste in this facility are enriched uranium, depleted uranium, beryllium and mercury. This facility represents the highest environmental risk for DOE-ORO EM and NNSA at Y-12 and must be quickly addressed to minimize impacts to future Y-12 missions, as well as human health and the environment. As part of the American Recovery and Reinvestment Act (ARRA), approximately 700,000 cubic feet of legacy material was removed in 2010 and 2011. In addition, characterization of the 9201-5 facility was scheduled in the winter and spring of 2011. This activity was initiated in January 2011 and was completed in July 2011. Heavy schedule pressure was further complicated by the fact that this building has active utility, security and process systems. Given these complex variables, a unique, out of the box characterization strategy was forged in an effort to bound radiological and chemical contaminants, as well as providing the appropriate level of quality to

  4. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  5. National Security Challenges: Insights from Social, Neurobiological, and Complexity Sciences. Topical Strategic Multi-Layer Assessment (SMA) and U.S. Army ERDC Multi-Agency/Multi-Disciplinary White Papers in Support of National Security Challenges

    Science.gov (United States)

    2012-07-01

    framing” organization (Treverton & Gabbard , 2008), in that the issues DF elucidates cannot be “solved” definitively. DF does not National Security...at http://www.austhinkconsulting.com/ and http://timvangelder.com/. Treverton, Gregory & Gabbard , C. Bryan. (2008). Assessing the Tradecraft of

  6. Tender for printing annual report

    Indian Academy of Sciences (India)

    Technology, Govt. of India, needs book “Annual Report” to be printed as per below mentioned specification .Eligible vendors (as ... any one of the documents asked is not enclosed, the quotation will not be considered. ... The EMD of selected bidder(s) will be kept as security deposit till ... contract by telephonically or E-Mail.

  7. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  8. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  9. CEA 2009 annual report

    International Nuclear Information System (INIS)

    2010-01-01

    After an indication of several key figures about the activity of the CEA (Centre d'Etudes Atomiques) and its relationship with the academic as well as the industrial field, in France and worldwide, this 2009 annual report presents its various research programs in the field of defence and of global security: basic research (nuclear weapons and propulsion, struggle against proliferation and terrorism) and applied research (nuclear deterrence, national and international security). Then, it presents the programs in the field of de-carbonated energy: basic research (in material science and in life sciences) and applied research (fission energy, fusion energy, new energy technologies). A last group of research programs deals with information and health technologies and concerns life and material sciences, micro- and nano-technologies, software technologies. Interaction with other research institutions and bodies is also evoked. A brief scientific assessment is proposed. Finally, the different structures building the CEA are presented

  10. 75 FR 70625 - Annual Funding Notice for Defined Benefit Plans

    Science.gov (United States)

    2010-11-18

    ... model funding notices. Much of the guidance in FAB 2009-01 has been incorporated into the proposed... Annual Funding Notice for Defined Benefit Plans AGENCY: Employee Benefits Security Administration, Labor... implement the annual funding notice requirement in the Employee Retirement Income Security Act of 1974...

  11. Annual Report 2011

    International Nuclear Information System (INIS)

    2011-01-01

    The PNRI Annual Report summarizes the institute's yearly progress in nuclear research and development projects, services, regulations, technology transfers and information dissemination on the peaceful applications of nuclear science and technology. The establishment and future operation of the Technetium 99m Generator Facility and the Electron Beam Facility will enhance the institute's capabilities. The PNRI has made great strides in agricultural and environmental research, helping to improve crop growth and water resource management. It served more clients availing of irradiation and other services, and was vigilant in monitoring incidents in the Southeast Asian region to preserve national nuclear safety and security

  12. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  13. Annual report 2006

    International Nuclear Information System (INIS)

    2006-01-01

    The CEA, a public technological research organization is active in three main areas: energy, health care and information technology and defense and security. Excellence in fundamental research underpins its activities. This annual report presents its activities in three main axis. The defense and security axis where science and technology are working for nuclear deterrence and global security, presents the simulation program, the resources available to the scientific community, the nuclear warheads, the nuclear propulsion, the decommissioning of the Rhone Valley facilities, the fighting against nuclear proliferation and monitoring international treaties and the global security. The second axis deals with energy from nuclear fission and fusion and other technologies that do not emit greenhouse gases: progress for the nuclear industry, coherent set of tools for nuclear research and development, sustainable management of radioactive wastes and materials, nuclear systems of the future and new energy technologies. The third axis is devoted to major breakthroughs in information, communication and health science and technology. The report provides also the 2006 financial report, the CEA organizational structure and the support programs. (A.L.B.)

  14. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  15. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2006-01-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  16. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  17. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  18. CMS Annual Report 2004

    International Nuclear Information System (INIS)

    de la Rubia, T D; Shang, S P; Rennie, G; Fluss, M; Westbrook, C

    2005-01-01

    Glance at the articles in this report, and you will sense the transformation that is reshaping the landscape of materials science and chemistry. This transformation is bridging the gaps among chemistry, materials science, and biology--ushering in a wealth of innovative technologies with broad scientific impact. The emergence of this intersection is reinvigorating our strategic investment into areas that build on our strength of interdisciplinary science. It is at the intersection that we position our strategic vision into a future where we will provide radical materials innovations and solutions to our national-security programs and other sponsors. Our 2004 Annual Report describes how our successes and breakthroughs follow a path set forward by our strategic plan and four organizing research themes, each with key scientific accomplishments by our staff and collaborators. We have organized this report into two major sections: research themes and our dynamic teams. The research-theme sections focus on achievements arising from earlier investments while addressing future challenges. The dynamic teams section illustrates the directorate's organizational structure of divisions, centers, and institutes that support a team environment across disciplinary and institutional boundaries. The research presented in this annual report gives substantive examples of how we are proceeding in each of these four theme areas and how they are aligned with our national-security mission. By maintaining an organizational structure that offers an environment of collaborative problem-solving opportunities, we are able to nurture the discoveries and breakthroughs required for future successes

  19. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  20. 17 CFR 210.8-02 - Annual financial statements.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Annual financial statements... AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE... ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Article 8 Financial Statements of...

  1. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  2. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  3. 2016 Annual Industrial Wastewater Reuse Report for the Idaho National Laboratory Site’s Materials and Fuels Complex Industrial Waste Ditch and Industrial Waste Pond

    Energy Technology Data Exchange (ETDEWEB)

    Cafferty, Kara Grace [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-02-01

    This report describes conditions, as required by the state of Idaho Industrial Wastewater Reuse Permit (WRU-I-0160-01, Modification 1, formerly LA 000160 01), for the wastewater reuse site at the Idaho National Laboratory Site’s Materials and Fuels Complex Industrial Waste Ditch and Industrial Waste Pond from November 1, 2015, through October 31, 2016.

  4. 2016 Annual Industrial Wastewater Reuse Report for the Idaho National Laboratory Site's Materials and Fuels Complex Industrial Waste Ditch and Industrial Waste Pond

    International Nuclear Information System (INIS)

    Cafferty, Kara Grace

    2017-01-01

    This report describes conditions, as required by the state of Idaho Industrial Wastewater Reuse Permit (WRU-I-0160-01, Modification 1, formerly LA 000160 01), for the wastewater reuse site at the Idaho National Laboratory Site's Materials and Fuels Complex Industrial Waste Ditch and Industrial Waste Pond from November 1, 2015, through October 31, 2016.

  5. Proceedings and Presentations from the 2015 Homeland Security Education Summit

    OpenAIRE

    2015-01-01

    Proceedings: 9th Annual Homeland Defense and Security Education Summit The 9th Annual Homeland Defense and Security Education Summit was held on September 25-26, 2015 at the Hyatt Regency Hotel in Orlando Florida. The theme of the event was Evolving Homeland Security…

  6. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  7. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  8. Regulator Interface Strategies Implemented at the Y-12 National Security Complex Old Salvage Yard Soils Remediation Project, Oak Ridge, TN - 12162

    Energy Technology Data Exchange (ETDEWEB)

    Albrecht, Linda [Alliant Corporation (United States); Wilkerson, Laura; Skinner, Ralph [US DOE-ORO EM (United States); Birchfield, Joseph W. III [Link Technologies (United States)

    2012-07-01

    The Oak Ridge Y-12 National Security Complex housed an area known as the Old Salvage Yard (OSY) that was approximately 7 acres. The OSY was used as an area for the accumulation, processing and storage of scrap metal and equipment from Y-12 operations extending from 1968 until 2009. Areas in the northern sections of OSY also have been used for the storage of used oils containing solvents and the accumulation and recycling or de-heading and crushing of 55-gal metal drums. Scrap metal operations historically involved the accumulation, sorting, storage, public sale or disposal of scrap metal and equipment. Non-containerised storage of scrap metal was routine until 1995 when scrap metal received at OSY was placed in B-24 and B-25 boxes. Under the American Recovery and Reinvestment Act (ARRA), approximately 26,759 cubic meters of scrap metal and debris were removed and disposed at both on and off-site disposal facilities including the on-site, Oak Ridge Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) landfill in 2010 and 2011. This removal action was performed in accordance with a CERCLA Record of Decision (ROD) and a close working relationship with both the U.S. Environmental Protection Agency (EPA) Region IV and Tennessee Department of Environment and Conservation (TDEC). Due to efficiencies and the excellent cooperative relationship forged with EPA Region IV and TDEC for Y-12 ARRA Cleanup Projects, a surplus of funding was available for additional remediation work that was completed in fiscal year (FY) 2011. The underlying OSY soils were targeted for characterization and potential remediation. To expedite these important activities, the U.S. Department of Energy Oak Ridge Environmental Management partnered with the regulators during detailed planning sessions through a variety of means to quickly and efficiently characterize and pinpoint areas requiring remediation according to previous ROD commitments. Data Quality Objectives (DQOs

  9. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  10. Security matters : privacy in voting and fairness in digital exchange

    NARCIS (Netherlands)

    Jonker, H.L.

    2009-01-01

    Security matters. In the real world, there are various basic mechanisms that provide security. The digital counterparts of these basic mechanisms have been studied and are now well understood. Understanding of more complex security notions has yet to mature. This thesis studies two complex security

  11. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  12. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  13. 2005 Annual Report

    International Nuclear Information System (INIS)

    Chrzanowski, P; Walter, K

    2006-01-01

    As the cover of our ''2005 Annual Report'' highlights, Lawrence Livermore National Laboratory joined the international science community in celebrating the World Year of Physics in 2005, with special events and science outreach and education programs. Einstein's remarkable discoveries in 1905 provided an opportunity to reflect on how physics has changed the world during the last century and on the promise of future beneficial discoveries. For half of the past century, Lawrence Livermore, which was established to meet an urgent national security need, has been contributing to the advancement of science and technology in a very special way. Co-founder Ernest O. Lawrence was the leading proponent in his generation of large-scale, multidisciplinary science and technology teams. That's Livermore's distinctive heritage and our continuing approach as a national laboratory managed and operated by the University of California for the Department of Energy's National Nuclear Security Administration (DOE/NNSA). We focus on important problems that affect our nation's security and seek breakthrough advances in science and technology to achieve mission goals. An event in 2005 exemplifies our focus on science and technology advances in support of mission goals. In October, distinguished visitors came to Livermore to celebrate the tenth anniversary of the Accelerated Strategic Computing Initiative (now called the Advanced Simulation and Computing Program, or ASC). ASC was launched in 1995 by DOE/NNSA to achieve a million-fold increase in computing power in a decade. The goal was motivated by the need to simulate the three-dimensional performance of a nuclear weapon in sufficient resolution and with the appropriately detailed physics models included. This mission-driven goal is a key part of fulfilling Livermore's foremost responsibility to ensure that the nuclear weapons in the nation's smaller 21st-century stockpile remain safe, reliable, and secure

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  16. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  17. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  18. NERSC 2001 Annual Report; ANNUAL

    International Nuclear Information System (INIS)

    Hules, John

    2001-01-01

    The National Energy Research Scientific Computing Center (NERSC) is the primary computational resource for scientific research funded by the DOE Office of Science. The Annual Report for FY2001 includes a summary of recent computational science conducted on NERSC systems (with abstracts of significant and representative projects); information about NERSC's current systems and services; descriptions of Berkeley Lab's current research and development projects in applied mathematics, computer science, and computational science; and a brief summary of NERSC's Strategic Plan for 2002-2005

  19. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  20. Studies on the power output of a MADE AE-30 operating on complex terrain. Annual Energy Production estimation and Multivariable analysis. A case of multi-stall effect

    Energy Technology Data Exchange (ETDEWEB)

    Cuerva, A.

    1996-12-01

    The main need of the EWTS-II Sub-project IV group is to have a suitable data-base which allows it to reach proper conclusions on the characteristics of power performance of wind turbines in complex terrain. With this aim, this document presents an analysis on the power output of the MADE AE-30 Wind turbine operating at Tarifa (also data from flat terrain are enclosed as a reference). An application of the bin method and AEP estimation for energy production method, in the two last issues a directional analysis and an study for two different turbulence intensity ranges are enclosed. Finally the Stepwise multirregression method is applied on the measurements to identify the stored parameters that have influence on the power output. A brief description of multi stall effect is enclosed. (Author)

  1. Studies on the power output of a MADEAE-30 operating on complex terrain. Annual Energy Production estimation and Multivariable analysis. A case of multi-stall effect

    International Nuclear Information System (INIS)

    Cuerva, A.

    1996-01-01

    The main need of the EWTS-II Sub-project IV group is to have a suitable data-base which allows it to reach proper conclusions on the characteristics of power performance of wind turbines in complex terrain. With this aim, this document presents an analysis on the power output of the MADE AE-30 Wind turbine operating at Tarifa (also data from flat terrain are enclosed as a reference). An application of the bin method and AEP estimation for energy production method. In the two last issues a directional analysis and an study for two different turbulence intensity ranges are enclosed. Finally the STEPWISE multirregression method is applied on the measurements to identify the stored parameters that have influence on the power output. A brief description of multi stall effect is enclosed. (Author) 7 refs

  2. 2011 Annual Industrial Wastewater Reuse Report for the Idaho National Laboratory Site's Materials and Fuels Complex Industrial Waste Ditch and Industrial Waste Pond

    Energy Technology Data Exchange (ETDEWEB)

    David Frederick

    2012-02-01

    This report describes conditions, as required by the state of Idaho Industrial Wastewater Reuse Permit (LA-000160-01), for the wastewater reuse site at the Idaho National Laboratory Site's Materials and Fuels Complex Industrial Waste Ditch and Industrial Waste Pond from November 1, 2010 through October 31, 2011. The report contains the following information: (1) Facility and system description; (2) Permit required effluent monitoring data and loading rates; (3) Groundwater monitoring data; (4) Status of special compliance conditions; and (5) Discussion of the facility's environmental impacts. During the 2011 reporting year, an estimated 6.99 million gallons of wastewater were discharged to the Industrial Waste Ditch and Pond which is well below the permit limit of 13 million gallons per year. Using the dissolved iron data, the concentrations of all permit-required analytes in the samples from the down gradient monitoring wells were below the Ground Water Quality Rule Primary and Secondary Constituent Standards.

  3. 4th Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014.

  4. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  5. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  6. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  7. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  8. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  9. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  10. Annual report 2001

    International Nuclear Information System (INIS)

    2002-07-01

    Article VI.J of the Agency's Statute requires the Board of Governors to submit 'an annual report to the General Conference concerning the affairs of the Agency and any projects approved by the Agency'. This report covers the period 1 January to 31 December 2001. The report outlines the IAEA activities in the following fields: nuclear power, nuclear fuel cycle and waste management technology, comparative assessment for sustainable energy development; food and agriculture, human health, marine environment and water resources, applications of physical and chemical sciences, nuclear safety, radiation safety, radioactive waste safety, co-ordination of safety activities, safeguards, security of material, verification in Iraq pursuant to UNSC resolutions, management of technical co-operation for development, policy-making, management and support

  11. How to secure a wireless sensor network

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2005-01-01

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the

  12. Investigation of novel electrode materials for electrochemically based remediation of high and low-level mixed wastes in the DOE complex. 1997 annual progress report

    International Nuclear Information System (INIS)

    Anderson, M.A.; Lewis, N.S.

    1997-01-01

    'This work is focused on the preparation of novel electrode materials for the degradation of toxic wastes in the DOE complex. One of the goals of this work is to characterize whether it is possible to use controlled doping of TiO 2 with species such as Nb in order to create new electrode materials that will facilitate the destruction of undesirable organics and inorganics, without light and instead only with an applied potential, in the waste tanks at the DOE sites. In the first part of this project, the authors have therefore spent an extensive amount of effort characterizing, as a baseline, the chemical and electrochemical behavior of TiO 2 itself, so that they can make robust comparisons to the behavior of the Nb-doped systems in subsequent work on this project. The preparation of these electrode films is being performed by Marc Anderson at Wisconsin, who is preparing a number of different stoichiometries, grain sizes, etc. for investigation of their electrochemical properties by the Lewis group at Caltech. First they report on the progress of the electrode preparation work, and then they describe progress on the electrochemical work.'

  13. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  14. 78 FR 47829 - Notice of Open Meetings To Prepare 2013 Annual Report to Congress

    Science.gov (United States)

    2013-08-06

    ... ``regarding the national security implications and impact of the bilateral trade and economic relationship.... security interests, including a military and security year in review, cyber activities and maritime... U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Notice of Open Meetings To Prepare 2013 Annual...

  15. Information security management handbook, v.7

    CERN Document Server

    O'Hanley, Richard

    2013-01-01

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2(R) CISSP Common Body of Knowledge (CBK(R)), this volume features 27 new chapters on topics

  16. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  17. Annual report

    International Nuclear Information System (INIS)

    1986-01-01

    This is the thirty-ninth annual report of the Atomic Energy Control Board. The period covered by this report is the year ending March 31, 1986. The Atomic Energy Control Board (AECB) was established in 1946, by the Atomic Energy Control Act (AEC Act), (Revised Statues of Canada (R.S.C.) 1970 cA19). It is a departmental corporation (Schedule B) within the meaning and purpose of the Financial Administration Act. The AECB controls the development, application and use of atomic energy in Canada, and participates on behalf of Canada in international measures of control. The AECB is also repsonsible for the administration of the Nuclear Liability Act, (R.S.C. 1970 c29 1st Supp) as amended, including the designation of nuclear installations and the prescription of basic insurance to be carried by the operators of such nuclear installations. The AECB reports to Parliament through a designated Minister, currently the Minister of Energy, Mines and Resources

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  20. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  1. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  2. USCIS FY 2009 Annual Report: H-1B Petitions

    Data.gov (United States)

    Department of Homeland Security — The American Competitiveness and Workforce Improvement Act (ACWIA), Public Law 105-277, Division C, imposes annual reporting requirements on U.S. Citizenship and...

  3. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  4. Annual Report

    Indian Academy of Sciences (India)

    suppressed HPGe detectors has given a boost to develop multidetector array in our ... solitons are the most elegant and complex structures produced by nature in the .... development, vaccines, male infertility, Indian epidemiological profile, ...... biodiversity but also the total gene pool of the Himalayan region against any.

  5. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  7. CEA 2005 annual report

    International Nuclear Information System (INIS)

    2006-01-01

    This document is the 2005 activity report of the French atomic energy commission (CEA). The CEA is a main actor of nuclear research, development and innovation and is involved in three main domains: energy, defense/security, and information/health technologies thanks to high quality research works. With a manpower of 15000 researchers and collaborators with internationally acknowledged competences, the CEA is a driving force of industrial innovation and develops partnerships with French and European industries. It also warrants the perenniality of nuclear dissuasion. This report presents these different aspects of the CEA activities: 1 - defense-security: simulation program, opening to the scientific community, nuclear warheads, nuclear propulsion, cleansing of Rhone valley facilities, permanent monitoring of treaties respect, fight against terrorism; 2 - energy: optimization of the industrial park, advances in long lived radioactive wastes management, future nuclear systems, cleansing and dismantling integration, European nuclear energy research, new energy technologies; 3 - information and health technologies: major challenge of micro- and nano-technologies, key role of software technologies and complex systems; 4 - big research facilities opened to the scientific and industrial communities; 5 - scientific status: scientific evaluation process, prices and honors; 6 - programs support: revisited strategic control, confirmed simplification, active employment and training policy, teaching and training, technological valorization, international relations, communication, continuous quality approach, mastery of facilities safety, security, environmental control, a key-year for information systems. A financial report is attached to the document. (J.S.)

  8. Lawrence Livermore National Laboratory 2007 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Chrzanowski, P; Walter, K

    2008-04-25

    started with a view toward the potential threat of terrorist use of biological weapons. As featured in our annual report, activities in this area have grown to many important projects contributing to homeland security and disease prevention and control. At times transformation happens in large steps. Such was the case when nuclear testing stopped in the early 1990s. As one of the nation's nuclear weapon design laboratories, Livermore embarked on the Stockpile Stewardship Program. The objectives are to ensure the safety, security, and reliability of the nation's nuclear weapons stockpile and to develop a science-based, thorough understanding of the performance of nuclear weapons. The ultimate goal is to sustain confidence in an aging stockpile without nuclear testing. Now is another time of major change for the Laboratory as the nation is resizing its nuclear deterrent and NNSA begins taking steps to transform the nuclear weapons complex to meet 21st-century national security needs. As you will notice in the opening commentary to each section of this report, the Laboratory's senior management team is a mixture of new and familiar faces. LLNS drew the best talent from its parent organizations--Bechtel National, UC, Babcock & Wilcox, the Washington Group Division of URS, and Battelle--to lead the Laboratory. We are honored to take on the responsibility and see a future with great opportunities for Livermore to apply its exceptional science and technology to important national problems. We will work with NNSA to build on the successful Stockpile Stewardship Program and transform the nation's nuclear weapons complex to become smaller, safer, more secure, and more cost effective. Our annual report highlights progress in many relevant areas. Laboratory scientists are using astonishing computational capabilities--including BlueGene/L, the world's fastest supercomputer with a revolutionary architecture and over 200,000 processors--to gain key insights

  9. [SaskEnergy, Inc.]. Annual report, 1997

    International Nuclear Information System (INIS)

    1998-01-01

    Annual report of SaskEnergy Inc., a Crown corporation established in 1992 to provide a secure supply of natural gas to over 293,000 customers. The report provides an overview of the year's activities; a corporate profile; financial and operating highlights; details on distribution, transmission and storage; corporate and social responsibility; and the future outlook. Financial statements are included

  10. [SaskEnergy, Inc.]. Annual report 1998

    International Nuclear Information System (INIS)

    1999-01-01

    Annual report of SaskEnergy Inc., a Crown corporation established in 1992 to provide a secure supply of natural gas to over 293,000 customers. The report provides an overview of the year's activities; a corporate profile; financial and operating highlights; details on distribution, transmission and storage; corporate and social responsibility; and the future outlook. Financial statements are included

  11. Quarterly, Bi-annual and Annual Reports

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Quarterly, Bi-annual and Annual Reports are periodic reports issued for public release. For the deep set fishery these reports are issued quarterly and anually....

  12. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  13. INFORMATION SECURITY MANAGEMENT IN ORGANIZATIONS

    OpenAIRE

    Ndungu , Maryanne; Kandel, Sushila

    2015-01-01

    In today's globally interconnected economy, information security has become one of the most complex issues of concern at the world's leading organizations. The capital value of information is significantly increasing and forming a large part of the shareholder value due to increased dependence on information. Organizations that want to achieve competitive advantage amongst other goals have information security at the centre of their concerns. It is now evident that information is a busin...

  14. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  15. Media rights and media security

    Science.gov (United States)

    Baugher, Mark

    2005-03-01

    Digital Rights Management (DRM) systems typically do not treat rights management as a security problem. DRM uses cryptographic techniques but not security relationships. Instead, DRM systems use "tamper-resistant mechanisms" to discourage unauthorized access to rights-managed content. Although proven ineffective in practice, tamper-resistant mechanisms penalize legitimate customers with added complexity and costs that arise from tamper-resisting data or program code. This paper explores how a security relationship between provider and consumer might be more effective for managing rights to content works on two-way networks.

  16. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  17. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  18. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  19. The Oak Ridge Reservation Annual Site Environmental Report, 2007

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Joan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Thompson, Sharon [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Page, David [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2008-09-30

    The Oak Ridge Reservation (ORR) consists of three major government-owned, contractor-operated facilities: the Y-12 National Security Complex, Oak Ridge National Laboratory, and East Tennessee Technology Park. The ORR was established in the early 1940s as part of the Manhattan Project, a secret undertaking that produced materials for the first atomic bombs. The reservation’s role has evolved over the years, and it continues to adapt to meet the changing defense, energy, and research needs of the United States. Both the work carried out for the war effort and subsequent research, development, and production activities have involved, and continue to involve, the use of radiological and hazardous materials. The Oak Ridge Reservation Annual Site Environmental Report and supporting data are available at Http://www.ornl.gov/sci/env_rpt or from the project director.

  20. 20 CFR 422.114 - Annual wage reporting process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Annual wage reporting process. 422.114 Section 422.114 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General... employer's magnetic media wage reports have no social security numbers or incorrect employee names or...

  1. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  3. 1998 Annual Study Report. Standardization for securing interoperability between optical disk systems; 1998 nendo seika hokokusho. Hikari disk system no sogo un'yosei kakuho no tame no hyojunka

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This R and D program is aimed at securing interoperability between optical disk systems, based on the logical formats, to propose the draft international standards. For the volume/file structures proposed by ISO/IEC 13346, the universal disk format (UDF) proposed by the Optical Storage Technology Association (OSTA) is taken as the target file system, to improve the conformance test environments and develop the standards for advanced interoperability. The 1998 R and D themes include development of the UDF conformance testing tools for avoiding the interoperability-related problems involved in the UDF, which are actually observed, and investigations on the UAF specifications and preparation of the UAF-related standard evaluation systems for preparation of the draft standards for the Universal Accessible Filesystem (UAF), planned to be conducted in and after the next fiscal year, which allows, e.g., network seamless application of a variety of the future optical disks. (NEDO)

  4. JAEA Takasaki annual report 2006

    International Nuclear Information System (INIS)

    Tanaka, Shigeru

    2008-03-01

    JAEA Takasaki annual report 2006 describes research and development activities performed from April 1, 2006 to March 31, 2007 with Takasaki Ion Accelerators for Advanced Radiation Application (TIARA, four ion accelerators), and electron/gamma-ray irradiation facilities (an electron accelerator and three 60 Co gamma-ray irradiation facilities) at Takasaki Advanced Radiation Research Institute, Japan Atomic Energy Agency (JAEA Takasaki). These activities are classified into four research fields: 1) space, nuclear and energy engineering, 2) environmental conservation and resource security, 3) biotechnology and medical application, and 4) advanced materials, analysis and novel technology. This annual report contains 186 reports consisting of 178 research papers and 8 status reports on operation/maintenance of the irradiation facilities described above, and a list of publications, related press-releases, TV programs, patents, and the type of research collaborations as Appendices. (author)

  5. JAEA Takasaki annual report 2005

    International Nuclear Information System (INIS)

    Ohara, Yoshihiro

    2007-02-01

    JAEA Takasaki annual report 2005 describes research and development activities performed from April 1, 2005 to March 31, 2006 with Takasaki Ion Accelerators for Advanced Radiation Application (TIARA, four ion accelerators), and those in a recent few years with electron/gamma-ray irradiation facilities (an electron accelerator and three 60 Co gamma-ray irradiation facilities) at Takasaki Advanced Radiation Research Institute, Japan Atomic Energy Agency (JAEA Takasaki). These activities are classified into four research fields: 1) nuclear and energy engineering, 2) environmental conservation and resource security, 3) biotechnology and medical application, 4) advanced materials, analysis and novel technology. This annual report contains 182 reports consisting of 174 research papers and 8 status reports on operation/maintenance of above irradiation facilities, and a list of publications, related press-releases, IV programs, patents, and the type of research collaborations as Appendices. (author)

  6. JAEA Takasaki annual report 2009

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Shigeru [Japan Atomic Energy Agency, Takasaki Advanced Radiation Research Inst., Takasaki, Gunma (Japan)

    2011-01-15

    JAEA Takasaki annual report 2009 describes research and development activities performed from April 1, 2009 to March 31, 2010 with Takasaki Ion Accelerators for Advanced Radiation Application (TIARA, four ion accelerators), and electron/gamma-ray irradiation facilities (an electron accelerator and three {sup 60}Co gamma-ray irradiation facilities) at Takasaki Advanced Radiation Research Institute, Japan Atomic Energy Agency (JAEA Takasaki). These activities are classified into four research fields: 1) space, nuclear and energy engineering, 2) environmental conservation and resource security, 3) biotechnology and medical application, and 4) advanced materials, analysis and novel technology. This annual report contains 165 reports consisting of 157 research papers and 8 status reports on operation/maintenance of the irradiation facilities described above, and a list of publications, patents, related press-releases, TV programs, and the type of research collaborations as Appendices. (author)

  7. JAEA Takasaki annual report 2009

    International Nuclear Information System (INIS)

    Tanaka, Shigeru

    2011-01-01

    JAEA Takasaki annual report 2009 describes research and development activities performed from April 1, 2009 to March 31, 2010 with Takasaki Ion Accelerators for Advanced Radiation Application (TIARA, four ion accelerators), and electron/gamma-ray irradiation facilities (an electron accelerator and three 60 Co gamma-ray irradiation facilities) at Takasaki Advanced Radiation Research Institute, Japan Atomic Energy Agency (JAEA Takasaki). These activities are classified into four research fields: 1) space, nuclear and energy engineering, 2) environmental conservation and resource security, 3) biotechnology and medical application, and 4) advanced materials, analysis and novel technology. This annual report contains 165 reports consisting of 157 research papers and 8 status reports on operation/maintenance of the irradiation facilities described above, and a list of publications, patents, related press-releases, TV programs, and the type of research collaborations as Appendices. (author)

  8. JAEA Takasaki annual report 2007

    International Nuclear Information System (INIS)

    Tanaka, Shigeru

    2008-11-01

    JAEA Takasaki annual report 2007 describes research and development activities performed from April 1, 2007 to March 31, 2008 with Takasaki Ion Accelerators for Advanced Radiation Application (TIARA, four ion accelerators), and electron/gamma-ray irradiation facilities (an electron accelerator and three 60 Co gamma-ray irradiation facilities) at Takasaki Advanced Radiation Research Institute, Japan Atomic Energy Agency (JAEA Takasaki). These activities are classified into four research fields: 1) space, nuclear and energy engineering, 2) environment conservation and resource security, 3) biotechnology and medical application, and 4) advanced materials, analysis and novel technology. This annual report contains 174 reports consisting of 166 research papers and 8 status reports on operation/maintenance of the irradiation facilities described above, and a list of publications, related press-releases, TV programs, patents, and the type of research collaborations as Appendices. (author)

  9. JAEA Takasaki annual report 2008

    International Nuclear Information System (INIS)

    Tanaka, Shigeru

    2009-12-01

    JAEA Takasaki annual report 2008 describes research and development activities performed from April 1, 2008 to March 31, 2009 with Takasaki Ion Accelerators for Advanced Radiation Application (TIARA, four ion accelerators), and electron/gamma-ray irradiation facilities (an electron accelerator and three 60 Co gamma-ray irradiation facilities) at Takasaki Advanced Radiation Research Institute, Japan Atomic Energy Agency (JAEA Takasaki). These activities are classified into four research fields: 1) space, nuclear and energy engineering, 2) environmental conservation and resource security, 3) biotechnology and medical application, and 4) advanced materials, analysis and novel technology. This annual report contains 161 reports consisting of 153 research papers and 8 status reports on operation/maintenance of the irradiation facilities described above, and a list of publications, related press-releases, TV programs, patents, and the type of research collaborations as Appendices. (author)

  10. Annual report 1992-93

    International Nuclear Information System (INIS)

    1993-01-01

    This is the forty-sixth annual report of the Atomic Energy Control Board (AECB). The mission of the AECB is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. This is accomplished by controlling the development, application and use of nuclear energy in Canada, and by participating on behalf of Canada in international measure of control. The AECB achieves regulatory control of nuclear facilities and nuclear materials through a comprehensive licensing system. This control also extends to the import and export of nuclear materials and it involves Canadian participation in the activities of the International Atomic Energy Agency as well as compliance with the requirements of Treaty on the Non-Proliferation of Nuclear Weapons. The control covers both domestic and international security of nuclear materials and technology

  11. Annual report 1993-94

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-12-31

    This is the forty-seventh annual report of the Atomic Energy Control Board (AECB). The mission of the AECB is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. This is accomplished by controlling the development, application and use of nuclear energy in Canada, and by participating on behalf of Canada in international measure of control. The AECB achieves regulatory control of nuclear facilities and nuclear materials through a comprehensive licensing system. This control also extends to the import and export of nuclear materials and it involves Canadian participation in the activities of the International Atomic Energy Agency as well as compliance with the requirements of Treaty on the Non-Proliferation of Nuclear Weapons. The control covers both domestic and international security of nuclear materials and technology.

  12. Annual report 1992-93

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-12-31

    This is the forty-sixth annual report of the Atomic Energy Control Board (AECB). The mission of the AECB is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. This is accomplished by controlling the development, application and use of nuclear energy in Canada, and by participating on behalf of Canada in international measure of control. The AECB achieves regulatory control of nuclear facilities and nuclear materials through a comprehensive licensing system. This control also extends to the import and export of nuclear materials and it involves Canadian participation in the activities of the International Atomic Energy Agency as well as compliance with the requirements of Treaty on the Non-Proliferation of Nuclear Weapons. The control covers both domestic and international security of nuclear materials and technology.

  13. Annual report, 1991-1992

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    This is the forty-fifth annual report of the Atomic Energy Control Board (AECB). The mission of the AECB is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. This is accomplished by controlling the development, application and use of nuclear energy in Canada, and by participating on behalf of Canada in international measure of control. The AECB achieves regulatory control of nuclear facilities and nuclear materials through a comprehensive licensing system. This control also extends to the import and export of nuclear materials and it involves Canadian participation in the activities of the International Atomic Energy Agency as well as compliance with the requirements of Treaty on the Non-Proliferation of Nuclear Weapons. The control covers both domestic and international security of nuclear materials and technology.

  14. Annual report 1993-94

    International Nuclear Information System (INIS)

    1994-01-01

    This is the forty-seventh annual report of the Atomic Energy Control Board (AECB). The mission of the AECB is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. This is accomplished by controlling the development, application and use of nuclear energy in Canada, and by participating on behalf of Canada in international measure of control. The AECB achieves regulatory control of nuclear facilities and nuclear materials through a comprehensive licensing system. This control also extends to the import and export of nuclear materials and it involves Canadian participation in the activities of the International Atomic Energy Agency as well as compliance with the requirements of Treaty on the Non-Proliferation of Nuclear Weapons. The control covers both domestic and international security of nuclear materials and technology

  15. Annual report, 1991-1992

    International Nuclear Information System (INIS)

    1992-01-01

    This is the forty-fifth annual report of the Atomic Energy Control Board (AECB). The mission of the AECB is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. This is accomplished by controlling the development, application and use of nuclear energy in Canada, and by participating on behalf of Canada in international measure of control. The AECB achieves regulatory control of nuclear facilities and nuclear materials through a comprehensive licensing system. This control also extends to the import and export of nuclear materials and it involves Canadian participation in the activities of the International Atomic Energy Agency as well as compliance with the requirements of Treaty on the Non-Proliferation of Nuclear Weapons. The control covers both domestic and international security of nuclear materials and technology

  16. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  17. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  18. Annual report to Congress

    International Nuclear Information System (INIS)

    1986-01-01

    This report covers the activities of the Department from the publication of the 1985 Annual Report to Congress through 1986. Activities of all elements of the Department except the Federal Energy Regulatory Commission are included herein. During this period, activities for the Environmental Survey of facilities were finalized, the onsite studies by DOE Survey teams were inaugurated, and Technical Safety Appraisals of our nuclear facilities were performed. The Strategic Petroleum Reserve surpassed the 500-million-barrel milestone, and a successful market test of the Reserve's drawdown and distribution capability and sale of one million barrels of oil were completed. Particular attention was directed toward coal research and acid rain-related technologies. Work continued in petroleum and unconventional natural gas recovery. The focus in conservation research and development, as well as renewable activities, was to assist the private sector by expanding the technology base. DOE-supported research in high energy and nuclear physics continued. The Department supported basis scientific research in the fields of materials, nuclear and applied mathematical science, engineering and geosciences, biological science, advanced energy projects and magnetic fusion energy; and research on the effects of energy systems on biological and environmental processes and on the use of nuclear materials in medical diagnosis and treatment continued. Internationally, we continued efforts in the International Atomic Energy Agency. The Department's responsibilities for national security included weapons research, development, and testing, as well as the improvement of safeguards and security at production facilities. The Department also continued to pursue a variety of activities to dispose of high-level radioactive waste and spent nuclear fuel

  19. Annual report 2005

    International Nuclear Information System (INIS)

    2006-01-01

    The Annual Report reviews the results of the Agency's programme according to the three 'pillars' of technology, safety and verification. The main part of the report, starting on page 13, generally follows the programme structure as it applied in 2005. The introductory chapter, 'The Year in Review', seeks to provide a thematic analysis, based on the three pillars, of the Agency's activities within the overall context of notable developments during the year. Information on specific issues can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review and Technical Cooperation Report. For the convenience of readers, these documents are available on the CD-ROM attached to the inside back cover of this report. Additional information covering various aspects of the Agency's programme is also provided on the attached CD-ROM, and is also available on the Agency?s iaea.org web site (http://www.iaea.org/Worldatom/Documents/Anrep/Anrep2005/). All sums of money are expressed in United States dollars. The designations employed and the presentation of material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat concerning the legal status of any country or territory or of its authorities, or concerning the delimitation of its frontiers. The topics covered in the chapter related to Technology are: Nuclear Power; Nuclear Fuel Cycle and Materials Technologies; Capacity Building and Nuclear Knowledge Maintenance for Sustainable Energy Development; Nuclear Science; Food and Agriculture; Human Health; Water Resources; Protection of the Marine and Terrestrial Environment; Physical and Chemical Applications. Topics related to Safety and Security discussed in this report are: Safety of Nuclear Installations; Radiation and Transport Safety; Management of Radioactive Waste; Nuclear Security. Topics related to Verification are Safeguards and Verification in Iraq Pursuant to UNSC Resolutions. A separate

  20. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  1. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  2. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  3. IRSN annual report 2011

    International Nuclear Information System (INIS)

    2012-01-01

    IRSN, a public authority with industrial and commercial activities, was set up under Article 5 of French Act No. 2001-398 of May 9, 2001, enacted through Order No. 2002-254 of February 22, 2002. This Order was amended on April 7, 2007. The Institute is placed under the joint authority of the Ministries of Defense, the Environment, Industry, Research, and Health. It is the nation's public service expert in nuclear and radiation risks, and its activities cover all the related scientific and technical issues. Its areas of specialization include the environment and radiological emergency response, human radiation protection in both a medical and professional capacity, and in both normal and post-accident situations, the prevention of major accidents, nuclear reactor safety, as well as safety in plants and laboratories, transport and waste treatment, and nuclear defense expertise. IRSN interacts with all parties concerned by these risks (public authorities, in particular nuclear safety and security authorities, local authorities, companies, research organizations, stakeholders' associations, etc.) to contribute to public policy issues relating to nuclear safety, human and environmental protection against ionizing radiation, and the protection of nuclear materials, facilities, and transport against the risk of malicious acts. This document is the 2011 annual report of IRSN. It presents the Organization, Progress and main activities in 2011, Transparency and communications policy, safety and radiation protection culture of IRSN. The main activities in 2011 are presented in details: 1 - Safety: Safety of existing facilities: Monitoring reactors, Monitoring fuel cycle facilities and experimental reactors, Containment and fire, Natural hazards, Fuels, Accidents, About defense; Conducting assessments of future facilities: Future waste repositories, Reactors of the future; 2 - Security and non-proliferation: Protection against malicious act; Activities of the advisory

  4. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  5. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  6. Security of supply in Ireland 2006

    International Nuclear Information System (INIS)

    Bazilian, Morgan; O'Leary, Fergal; O Gallachoir, Brian; Howley, Martin

    2006-12-01

    This is the second annual report on the title theme from SEI. Since SEI's initial security of supply publication there has been considerable attention paid to the security of supply aspects of energy policy worldwide. This reports updates and refines the metrics used to consider security of supply in Ireland. It also presents new analysis in three areas; the development of a supply/demand index, use of mean variance portfolio analysis for the electricity sector and a high oil price energy forecast scenario

  7. Measuring the Return on Investment of Nuclear Security Training: The Case of the WINS Academy Professional Society

    International Nuclear Information System (INIS)

    Battistella, B.; Howsley, R.; Johnson, D.

    2015-01-01

    The challenges inherent in managing nuclear and radiological materials are complex and growing; ensuring that such materials remain secure requires competent management supported by ongoing training. The nuclear industry is increasingly becoming aware of the need for nuclear security: numerous dedicated training centres have been established worldwide and the IAEA holds approximately 60 international nuclear security training events annually. International training programmes have been conducted in various fields over decades but assessing their value and having the assurance that these training have had a sustainable impact remain difficult. In the field of nuclear security training, no assessment is being made of the degree to which the investment made is making a difference in building sustainable capacity and capability. This paper aims to discuss a methodology to assess the return on investment of nuclear security training. WINS has established a new professional society called the WINS Academy Alumni, for those individuals who have achieved certification through the WINS Academy. This platform proposes a structure, based on established competency frameworks, through which to measure the return on investment and performance improvement of nuclear security training. The objectives of the WINS Academy society are to stay engaged with certified Alumni, track their continued professional development progress, provide them with additional opportunities, and encourage their continued security competence through recertification. We envision that these certified practitioners will in turn promote certification and continual professional development among their peers to help build a network of security-trained professionals that will lead to meaningful and sustainable changes to security culture worldwide. In the long run (5–10 years), we envision that this group will be at the forefront of new professional requirements for nuclear security competence, with

  8. IRSN annual report 2010

    International Nuclear Information System (INIS)

    2010-01-01

    IRSN, a public authority with industrial and commercial activities, was set up under Article 5 of French Act No. 2001-398 of May 9, 2001, enacted through Order No. 2002-254 of February 22, 2002. This Order was amended on April 7, 2007. The Institute is placed under the joint authority of the Ministries of Defense, the Environment, Industry, Research, and Health. It is the nation's public service expert in nuclear and radiation risks, and its activities cover all the related scientific and technical issues. Its areas of specialization include the environment and radiological emergency response, human radiation protection in both a medical and professional capacity, and in both normal and post-accident situations, the prevention of major accidents, nuclear reactor safety, as well as safety in plants and laboratories, transport and waste treatment, and nuclear defense expertise. IRSN interacts with all parties concerned by these risks (public authorities, in particular nuclear safety and security authorities, local authorities, companies, research organizations, stakeholders' associations, etc.) to contribute to public policy issues relating to nuclear safety, human and environmental protection against ionizing radiation, and the protection of nuclear materials, facilities, and transport against the risk of malicious acts. In this annual activity reports, IRSN presents the scientific and technical challenges that defines the Contract of Objectives (COB) signed between the Government and IRSN

  9. 2007 LDRD ANNUAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-16

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. The LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.

  10. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  11. Trace detection of organic compounds in complex sample matrixes by single photon ionization ion trap mass spectrometry: real-time detection of security-relevant compounds and online analysis of the coffee-roasting process.

    Science.gov (United States)

    Schramm, Elisabeth; Kürten, Andreas; Hölzer, Jasper; Mitschke, Stefan; Mühlberger, Fabian; Sklorz, Martin; Wieser, Jochen; Ulrich, Andreas; Pütz, Michael; Schulte-Ladbeck, Rasmus; Schultze, Rainer; Curtius, Joachim; Borrmann, Stephan; Zimmermann, Ralf

    2009-06-01

    An in-house-built ion trap mass spectrometer combined with a soft ionization source has been set up and tested. As ionization source, an electron beam pumped vacuum UV (VUV) excimer lamp (EBEL) was used for single-photon ionization. It was shown that soft ionization allows the reduction of fragmentation of the target analytes and the suppression of most matrix components. Therefore, the combination of photon ionization with the tandem mass spectrometry (MS/MS) capability of an ion trap yields a powerful tool for molecular ion peak detection and identification of organic trace compounds in complex matrixes. This setup was successfully tested for two different applications. The first one is the detection of security-relevant substances like explosives, narcotics, and chemical warfare agents. One test substance from each of these groups was chosen and detected successfully with single photon ionization ion trap mass spectrometry (SPI-ITMS) MS/MS measurements. Additionally, first tests were performed, demonstrating that this method is not influenced by matrix compounds. The second field of application is the detection of process gases. Here, exhaust gas from coffee roasting was analyzed in real time, and some of its compounds were identified using MS/MS studies.

  12. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  13. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  14. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  15. 29 CFR 70.54 - Employee Benefits Security Administration.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Employee Benefits Security Administration. 70.54 Section 70... Records and Filings § 70.54 Employee Benefits Security Administration. (a) The annual financial reports (Form 5500) and attachments/schedules as filed by employee benefit plans under the Employee Retirement...

  16. Management of Information Security in Financial Accounting

    OpenAIRE

    Aurel Serb; Constantin Baron; Nicoleta Magdalena Iacob; Costinela-Luminita Defta

    2014-01-01

    Security issues in financial accounting are complex, and the risks are often difficult to stipulate, even for experts. The issues presented in this article try to be formed in a contribution to the consolidation of problems in the field of risk, and former vulnerabilities in cyber security in financial accounting. The use of an information security management system became a requirement for organizations because on the states began adopting mandatory data protection legislation and informatio...

  17. Keystone Business Models for Network Security Processors

    OpenAIRE

    Arthur Low; Steven Muegge

    2013-01-01

    Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor...

  18. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  19. Complexity, Global Politics, and National Security

    Science.gov (United States)

    1997-01-01

    fiddling while Rome burns." Companies like IKEA , the Body Shop, Dell Computer, and Swatch are "shackled neither by convention nor by respect for...members of that staff suffered from three defects: • They seemed largely disconnected from the rest of the company . • No one could understand what they... company , ROLM Corporation, with three other colleagues, all with similar backgrounds which included almost no management experience or business education

  20. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  1. Security challenges for virtualization in cloud

    International Nuclear Information System (INIS)

    Tayab, A.

    2015-01-01

    Virtualization is a model that is vastly growing in IT industry. Virtualization provides more than one logical resource in one single physical machine. Infrastructure use cloud services and on behalf of virtualization, cloud computing is also a rapidly growing model of IT industry. Cloud provider and cloud user, both remain ignorant of each other's security. Since virtualization and cloud computing are rapidly expanding and becoming more and more complex in infrastructure, more security is required to protect them from potential attacks and security threats. Virtualization provides various benefits in terms of hardware utilization, resources protection, remote access and other resources. This paper intends to discuss the common exploits of security uses in the virtualized environment and focuses on the security threats from the attacker's perspective. This paper discuss the major areas of virtualized model environment and also address the security concerns. And finally presents a solution for secure valorization in IT infrastructure and to protect inter communication of virtual machines. (author)

  2. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  3. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  4. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  5. Secure Web Developers Needed!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    You’re about to launch a new website? Cool!! With today’s web programming languages like PHP, Java, Python or Perl, complex websites can be created, easily fulfilling all your use cases. But hold on. Did you ever think about how easily this can be abused? Attackers today are already using automatic tools which can quickly and easily find and exploit vulnerable web applications.   Web applications often suffer from security vulnerabilities, i.e. design flaws or programming bugs that remained undetected during the whole software development cycle. In production these vulnerabilities become security holes, providing an opportunity for exploitation, and can pose immense security risks (and there is no reason to believe that CERN is immune to this). The costs associated with eliminating these bugs could be loosely described by the "1:10:100 rule", i.e. the relative costs for fixing are 1:10:100 for fixing them in the programming:testing:production phases. Thus, the...

  6. The secure reactors

    International Nuclear Information System (INIS)

    Hannerz, K.

    1987-01-01

    The principle of Process Inherent Ultimate Safety (PIUS) is a new approach to Light Water Reactor (LWR) safety that could represent a solution to the present problems of public distrust, regulatory maze and plant design complexity plaguing the nuclear industry in many countries. A unique thermohydraulic design of the primary system ensures core integrity, and thereby gurarantees freedom from significant releases of radioactive matter, in all credible emergencies. This is accomplished entirely without reliance on potentially failure prone engineered safety systems and with immunity to operator mistskes. The potential for human fallibility to cause accidents is thereby drastically reduced in an easily understood way. Plant design can be greatly simplified because redundant, diverse safety systems are no longer needed. The paper briefly describes the PIUS design principle and the two SECURE reactor designs based on it, i.e. SECURE-H for district heating and process steam and SECURE-P (usually known simply as PIUS) for electric power generation. Demonstration of simulated system over-all thermohydraulic function and transient response in a large electrically heated test loop is described and results from some component development work is given. (author)

  7. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. Hash functions and information theoretic security

    DEFF Research Database (Denmark)

    Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid

    2009-01-01

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic...

  10. Proceedings of the 9 annual conference of the Mexican association for the energy economy. The energy security; 7. Conferencia anual de la asociacion mexicana para la economia energetica. seguridad energetica

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    The Asociacion Mexicana para la Economia Energetica (Mexican Association for the Energy Economy) summoned by the ninth occasion to its annual congress under the subject Power Assurance with the objective of analyzing the Power Assurance of Mexico in terms of general accessibility to power resources, of reliable and total availability of these, and their acceptability in relation to the environment; analysis from which recommendations of power policy will be derived. Six panels were constituted around the following analysis points: The geopolitical surroundings, certainties and uncertainties - where the irruption of new Asian demanding countries is analyzed, the uncertain continuity of provisions in Europe and the new power Latin American nationalism as tension centers and new areas of stressfulness are also analyzed -, energy Balances and markets in the American continent - focused on the type of anticipated evolution of the availability of oil and natural gas in Mexico along with its processing capacity -, Assurance of raw materials for the electrical generation - in direct relation with the present and future availability of own conventional resources, the characteristics and behavior of energy international markets of primary energy sources and of the access to technologies such as nuclear power stations-. Assurance of raw materials for the transport and the industry - focused on the resolution of the bottle necks that sometimes its availability is put under -. The energy assurance and the medium and long term development - knowing that the energy sector in Mexico is co-dependent and the decision making with respect to its financing must be based on realities and not in fantasies -, Policies for the power assurance - where a summary is presented, conclusions and recommendations of energy policy; the medium and long term attention requires to be initiated now. [Spanish] La Asociacion Mexicana para la Economia Energetica convoco por novena ocasion a su congreso

  11. CY2017 Annual Closure Monitoring Report for Corrective Action Unit 98, Frenchman Flat, Underground Test Area, Nevada National Security Site, Nevada: (January 2017–December 2017), Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Rehfeldt, Ken; Haight, Brian

    2018-05-01

    Corrective Action Unit (CAU) 98: Frenchman Flat on the Nevada National Security Site was the location of 10 underground nuclear tests. CAU 98 underwent a series of investigations and actions in accordance with the Federal Facility Agreement and Consent Order to assess contamination of groundwater by radionuclides from the tests. A Closure Report completed that process in 2016 and called for long-term monitoring, use restrictions (URs), and institutional controls to protect the public and environment from potential exposure to contaminated groundwater. Three types of monitoring are performed for CAU 98: water quality, water level, and institutional control. These are monitored to determine whether the URs remain protective of human health and the environment, and to ensure that the regulatory boundary objectives are being met. Monitoring data will be used in the future, once multiple years of data are available, to evaluate consistency with the groundwater flow and contaminant transport models because the contaminant boundaries calculated with the models are the primary basis of the UR boundaries.

    Six wells were sampled for water-quality monitoring in 2017. Contaminants of concern were detected only in the two source/plume wells already known to contain contamination as a result of a radionuclide migration experiment. The 86,000-picocuries-per-liter (pCi/L) tritium concentration in one of the wells is about 12 percent higher than measured in 2016 but is over an order of magnitude less than the peak value measured in the well in 1980. The concentration in the other source/plume well is lower than measured in 2016.

    The water-level monitoring network includes 16 wells. Depth to water measured in 2017 is generally consistent with recent measurements for most wells. Water-level declines differing from long-term trends were observed in four wells. Three of these (WW-4, WW-4A, and WW-5B) are water-supply wells that experienced increases in pumping during

  12. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  13. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  14. Security Data Warehouse Application

    Science.gov (United States)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  15. Annual report for 2004

    International Nuclear Information System (INIS)

    2005-01-01

    Article VI.J of the IAEA's Statute requires the Board of Governors to submit 'an annual report to the General Conference concerning the affairs of the Agency and any projects approved by the Agency'. This report covers the period 1 January to 31 December 2004. The Annual Report reviews the results of the Agency's programme according to the three pillars of technology, safety and verification. The main part of the report generally follows the programme structure as it applied in 2004. The introductory chapter, 'The Agency and the World in 2004', seeks to provide a thematic analysis, based on the three pillars, of the Agency's activities within the overall context of notable developments during the year. Information on specific issues can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review and Technical Cooperation Report. For the convenience of readers, these documents are available on the CD-ROM attached to this report. Additional information covering various aspects of the Agency's programme is also provided on the attached CD-ROM, and is also available on the Agency's iaea.org web site (http://www.iaea.org/Worldatom/Documents/Anrep/Anrep2004/). The Board of Governors oversees the ongoing operations of the Agency. It comprises 35 Member States and generally meets five times a year or more frequently if required for specific situations. Among its functions, the Board adopts the Agency's programme for the incoming biennium and makes recommendations on the Agency's budget to the General Conference. In 2004, the Board considered the Nuclear Technology Review 2004 and various activities related to nuclear science, technology and applications. This included authorizing the implementation of the Programme of Action for Cancer Therapy (PACT). In the area of safety and security, it considered the Nuclear Safety Review for the Year 2003 and related activities. It approved four Action Plans on various safety related activities and

  16. Annual report for 2004

    International Nuclear Information System (INIS)

    2005-01-01

    Article VI.J of the IAEA's Statute requires the Board of Governors to submit 'an annual report to the General Conference concerning the aff airs of the Agency and any projects approved by the Agency'. This report covers the period 1 January to 31 December 2004. The Annual Report reviews the results of the Agency's programme according to the three pillars of technology, safety and verification. The main part of the report generally follows the programme structure as it applied in 2004. The introductory chapter, 'The Agency and the World in 2004', seeks to provide a thematic analysis, based on the three pillars, of the Agency's activities within the overall context of notable developments during the year. Information on specific issues can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review and Technical Cooperation Report. For the convenience of readers, these documents are available on the CD-ROM attached to this report. Additional information covering various aspects of the Agency's programme is also provided on the attached CD-ROM, and is also available on the Agency's iaea.org web site (http://www.iaea.org/Worldatom/Documents/Anrep/Anrep2004/). The Board of Governors oversees the ongoing operations of the Agency. It comprises 35 Member States and generally meets five times a year or more frequently if required for specific situations. Among its functions, the Board adopts the Agency's programme for the incoming biennium and makes recommendations on the Agency's budget to the General Conference. In 2004, the Board considered the Nuclear Technology Review 2004 and various activities related to nuclear science, technology and applications. This included authorizing the implementation of the Programme of Action for Cancer Therapy (PACT). In the area of safety and security, it considered the Nuclear Safety Review for the Year 2003 and related activities. It approved four Action Plans on various safety related activities

  17. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  18. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee; FINAL

    International Nuclear Information System (INIS)

    None

    2001-01-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 in the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime). The East Fork Regime encompasses many confirmed and potential sources of groundwater and surface water contamination associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee. Prepared under the auspices of the Y-12 Groundwater Protection Program (GWPP), this report addresses applicable provisions of DOE Order 5400.1 (General Environmental Protection Program) that require: (1) an evaluation of the quantity and quality of groundwater and surface water in areas that are, or could be, affected by Y-12 operations, (2) an evaluation of groundwater and surface water quality in areas where contaminants from Y-12 operations are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) are presented in Appendix A. Brief data summary tables referenced in each section are contained within the text; supplemental information and extensive data tables are provided in Appendix B

  19. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Bear Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-09-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 in the Bear Creek Hydrogeologic Regime (Bear Creek Regime). The Bear Creek Regime encompasses many confirmed and potential sources of groundwater and surface water contamination associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee (Figure A.1). Prepared by the Y-12 Groundwater Protection Program (GWPP), this report addresses applicable provisions of DOE Order 5400.1 (General Environmental Protection Program) that require: (1) an evaluation of the quantity and quality of groundwater and surface water in areas that are, or could be, affected by Y-12 operations, (2) an evaluation of groundwater and surface water quality in areas where contaminants from Y-12 operations are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) are presented in Appendix A. Brief data summary tables referenced in each section are contained within the sections. Supplemental information and extensive data tables are provided in Appendix B.

  20. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  1. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  2. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  3. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  4. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  5. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  6. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  7. 2003 annual report

    International Nuclear Information System (INIS)

    2004-01-01

    This document is the 2003 annual report of the French general direction of energy and raw materials (DGEMP) of the Ministry of economy, finances and industry. It presents the main highlights of the year 2003: national facts: energy situation of France, the summer 2003 heat wave and the climatic change, the prevention of power outages, the electricity prices and the opening of markets, the new natural gas transportation tariffs, the specificity of power generation and distribution and the economy of hydrocarbons in overseas territories, the petroleum market, the impact of the Iraq crisis, the closing down of coal mines, the safety and environmental improvements of La Hague and Marcoule nuclear facilities, the start-up of ANDRA's Aube plant for the storage of low level radioactive wastes; international facts: the revival of French-Russian exchanges, China: the new actor of the international scene, Alcan's takeover bid of Pechiney and the birth of the first aluminium world group, the revival of the 2003 Euro-Mediterranean energy partnership, the French-Algerian energy relationship, IEA's ministerial conference of April 28-29, the international action in the domain of nuclear safety and security, the world nuclear revival; energy policy trends: from the debate to the energy trend law for a sustainable energy policy, the development of renewable energies: which power generation, the stakes of the energy policy on the climatic changes, hydrogen as tomorrow's energy vector, the reference costs of power generation, a simpler and more efficient energy statistics tool, DGEMP's energy observatory prospects and scenarios for 2030 and 2050, the voluntaristic dams safety policy, the new technological challenges of the petroleum industry, the new Manosque-Berre pond pipeline for the supply of strategic stockpiles, the French office of geological and mining researches (BRGM) and its activities towards the public, tomorrow's uranium industry, ITER and the nuclear fusion stake. (J.S.)

  8. Annual report 2003

    International Nuclear Information System (INIS)

    2004-01-01

    The Annual Report reviews the results of the Agency's programme according to the three 'pillars' of technology, safety and verification. The main part of the report, starting on page 9, generally follows the programme structure as it applied in 2003. The introductory chapter, seeks to provide a thematic analysis, based on the three pillars, of the Agency's activities within the overall context of notable developments during the year. Additional information on specific issues can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review and Technical Co-operation Report. This material is also available on the Agency's WorldAtom web site (http://www.iaea.org/Worldatom/Documents/Anrep/Anrep2003/). All sums of money are expressed in United States dollars. The designations employed and the presentation of material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat concerning the legal status of any country or territory or of its authorities, or concerning the delimitation of its frontiers. The topics covered in the chapter related to Technology are: Nuclear Power; Nuclear Fuel Cycle and Material Technologies; Analysis for Sustainable Energy Development; Nuclear Science; Food and Agriculture; Human Health; Water Resources; Protection of the Marine and Terrestrial Environments; Physical and Chemical Applications. Topics related to safety discussed in this report are: Safety of Nuclear Installations; Radiation Safety; Management of Radioactive Waste; Security of Material. Topics related to Verification are Safeguards and Verification in Iraq Pursuant to UNSC Resolutions. A separate chapter is devoted to Management of Technical Cooperation for Development

  9. Annual report 2003

    International Nuclear Information System (INIS)

    2004-01-01

    The Annual Report reviews the results of the Agency's programme according to the three 'pillars' of technology, safety and verification. The main part of the report, starting on page 9, generally follows the programme structure as it applied in 2003. The introductory chapter, seeks to provide a thematic analysis, based on the three pillars, of the Agency's activities within the overall context of notable developments during the year. Additional information on specific issues can be found in the latest editions of the Agency's Nuclear Safety Review, Nuclear Technology Review and Technical Co-operation Report. This material is also available on the Agency's WorldAtom web site http://www.iaea.org/Worldatom/Documents/Anrep/Anrep2003/). All sums of money are expressed in United States dollars. The designations employed and the presentation of material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat concerning the legal status of any country or territory or of its authorities, or concerning the delimitation of its frontiers. The topics covered in the chapter related to Technology are: Nuclear Power; Nuclear Fuel Cycle and Material Technologies; Analysis for Sustainable Energy Development; Nuclear Science; Food and Agriculture; Human Health; Water Resources; Protection of the Marine and Terrestrial Environments; Physical and Chemical Applications. Topics related to safety discussed in this report are: Safety of Nuclear Installations; Radiation Safety; Management of Radioactive Waste; Security of Material. Topics related to Verification are Safeguards and Verification in Iraq Pursuant to UNSC Resolutions. A separate chapter is devoted to Management of Technical Cooperation for Development

  10. Dama annual modulation from electron recoils

    OpenAIRE

    Foot, R.

    2018-01-01

    Plasma dark matter, which arises in dissipative dark matter models, can give rise to large annual modulation signals from keV electron recoils. Previous work has argued that the DAMA annual modulation signal might be explained in such a scenario. Detailed predictions are difficult due to the inherent complexities involved in modelling the halo plasma interactions with Earth bound dark matter. Here, we consider a simplified phenomenological model for the dark matter density and temperature nea...

  11. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  12. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  13. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  14. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  15. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  16. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  17. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  18. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  19. 12 CFR 1204.9 - Does FHFA collect and use Social Security numbers?

    Science.gov (United States)

    2010-01-01

    ... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA collect and use Social Security numbers? FHFA collects Social Security numbers only when it is necessary and authorized. At least annually, the Privacy... of refusing to provide their Social Security numbers, unless the collection is authorized either by a...

  20. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  1. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  2. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  3. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  4. Oak Ridge Reservation annual site environmental report for 2008

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2009-09-01

    The Oak Ridge Reservation (ORR) consists of three major government-owned, contractor-operated facilities: the Y-12 National Security Complex, Oak Ridge National Laboratory, and East Tennessee Technology Park. The ORR was established in the early 1940s as part of the Manhattan Project, a secret undertaking that produced materials for the first atomic bombs. The reservation’s role has evolved over the years, and it continues to adapt to meet the changing defense, energy, and research needs of the United States. Both the work carried out for the war effort and subsequent research, development, and production activities have involved, and continue to involve, the use of radiological and hazardous materials. The Oak Ridge Reservation Annual Site Environmental Report and supporting data are available at http://www.ornl.gov/sci/env_rpt or from the project director. This document is prepared annually to summarize environmental activities, primarily environmental monitoring activities, on the Oak Ridge Reservation (ORR) and within the ORR surroundings. The document fulfills the requirement of Department of Energy (DOE) Order 231.1A, Environment, Safety and Health Reporting, for an annual summary of environmental data to characterize environmental performance. The environmental monitoring criteria are described in DOE Order 450.1A, Environmental Protection Program. The results summarized in this report are based on data collected prior to and through 2008. This report is not intended to provide the results of all sampling on the ORR. Additional data collected for other site and regulatory purposes, such as environmental restoration/remedial investigation reports, waste management characterization sampling data, and environmental permit compliance data, are presented in other documents that have been prepared in accordance with applicable DOE guidance and/or laws and are referenced herein as appropriate. Corrections to the report for the previous year are found in Appendix

  5. LDRD FY2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kline, K. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2005-02-28

    The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’s success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle

  6. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  7. Network Security Validation Using Game Theory

    Science.gov (United States)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  8. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  9. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  10. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  11. Methodology for evaluation of economic security of industrial enterprises

    OpenAIRE

    Kopytko Marta Ivanovna

    2014-01-01

    This paper investigates the features of evaluation of ensuring economic security of industrial enterprises and the algorithm of complex evaluation of the economic security of industrial enterprises over time and the system of criteria and their limit values ​​and the dynamics of change to determine the level of economic security industrial enterprise in terms of its components.

  12. 17 CFR 259.5s - Form U5S, for annual reports filed under section 5(c) of the Act.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form U5S, for annual reports filed under section 5(c) of the Act. 259.5s Section 259.5s Commodity and Securities Exchanges SECURITIES... 1935 Forms for Registration and Annual Supplements § 259.5s Form U5S, for annual reports filed under...

  13. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  14. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  15. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  16. LLNL NESHAPs 2014 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bertoldo, N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gallegos, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wegrecki, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-07-01

    Lawrence Livermore National Security, LLC operates facilities at Lawrence Livermore National Laboratory (LLNL) where radionuclides are handled and stored. These facilities are subject to the U.S. Environmental Protection Agency (EPA) National Emission Standards for Hazardous Air Pollutants (NESHAPs) in Code of Federal Regulations (CFR) Title 40, Part 61, Subpart H, which regulates radionuclide emissions to air from Department of Energy (DOE) facilities. Specifically, NESHAPs limits the emission of radionuclides to the ambient air to levels resulting in an annual effective dose equivalent of 10 mrem (100 μSv) to any member of the public. Using measured and calculated emissions, and building-specific and common parameters, LLNL personnel applied the EPA-approved computer code, CAP88-PC, Version 4.0.1.17, to calculate the dose to the maximally exposed individual member of the public for the Livermore Site and Site 300.

  17. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    Science.gov (United States)

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  18. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  19. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  20. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  1. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  2. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  3. Neuroscience, ethics, and national security: the state of the art.

    Directory of Open Access Journals (Sweden)

    Michael N Tennison

    Full Text Available National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  4. Neuroscience, ethics, and national security: the state of the art.

    Science.gov (United States)

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  5. Between security and military identities: The case of Israeli security experts

    NARCIS (Netherlands)

    Grassiani, E.

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis

  6. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  8. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  9. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  10. 9th Annual Systems Engineering Conference: Volume 4 Thursday

    Science.gov (United States)

    2006-10-26

    ISO /IEC 27000 series – Information Security Management System (ISMS) – ISO /IEC 17799:2005 – Code of Practice for Information Security Management...October 2006, Track 2 Standards Organizations Supporting Assurance ISO IEC JTC1TC176 SC1 SC22 Terminology Software Engineering Language, OS SC7...Information Assurance IEEE CS ISO IEC IEEE CS NIST FISMA Projects U.S. Gov’t DoD MIL-STDsPolicy Memos OMG Knowledge Discovery Models OMG 259th Annual

  11. Efficient Secure Multiparty Subset Computation

    Directory of Open Access Journals (Sweden)

    Sufang Zhou

    2017-01-01

    Full Text Available Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problem can only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.

  12. On the Road to Holistic Decision Making in Adaptive Security

    Directory of Open Access Journals (Sweden)

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  13. Annual report 1973

    International Nuclear Information System (INIS)

    1973-01-01

    The GKSS scientific annual report summarizes the problems and results of the research and development projects of 1973. In contrast to earlier annual reports, a comprehensive description of the research facilities is not included. The annual report was extended by the paragraph 'Financial Report 1973' in the chapter 'Development of Geesthacht Research Centre'. The financial report gives a survey of the financial transactions and the major operations of the year under review. (orig./AK) [de

  14. Annual Report 2011-2012 (RAND National Security Research Division)

    Science.gov (United States)

    2012-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...research team included a former CEO of the Australian Defence Science and Technology Organisation , as well as former officials from U .S . subma- rine

  15. social security and national insurance trust of ghana annual reports

    African Journals Online (AJOL)

    Global Journal

    www.globaljournalseries.com; Info@globaljournalseries.com ... researcher recommends that authors of the report use plain language to ... likelihood of investor resource misallocation with ... SSNIT, one would expect published accounts to.

  16. NUKEM annual report 1981

    International Nuclear Information System (INIS)

    The annual report of this important undertaking in the German nuclear industry informs about its structure, holdings and activities in 1981. The report of the management is followed by remarks on the annual statement of accounts (annual balance, profit-loss accounting) and the report of the Supervisory Board. In the annex the annual balance of NUKEM GmbH/HOBEG mbH as per December 31, 1981, and the profit-loss accounting of NUKEM GmbH/HOBEG mbH for the business year 1981 are presented. (UA) [de

  17. SRNL LDRD ANNUAL REPORT 2008

    Energy Technology Data Exchange (ETDEWEB)

    French, T

    2008-12-29

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level of participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.

  18. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  19. 1999 Annual report

    International Nuclear Information System (INIS)

    2000-01-01

    The year 1999 was a very challenging one for Ryan Energy Technologies Inc. In the wake of the industry slowdown the Company removed from service 12 'measurement while drilling/logging while drilling' (MWD/LWD) systems or 40 per cent of its MWD/LWD equipment. Staff was reduced correspondingly, resulting in a proportional improvement in cost structures. Despite the financially challenging first three quarters of 1999, Ryan entered the year 2000 with a strong balance sheet. It was able to complete an equity offering of $ 7.5 million in gross proceeds to fund the expansion of its electromagnetic (EM) communication and data management equipment fleet, and to provide a source of cash for possible acquisitions. With the turnaround of oil prices Ryan returned to service its MWD/LWD systems in the fourth quarter of 1999, and rehired a significant number of its previous staff. Revenues in the fourth quarter increased by 95 per cent and the company returned to profitability. Consolidated revenues for the year ending December 31, 1999 decreased to $ 27.3 million from $ 43.9 million in 1998. Consolidated net losses amounted to $ 3.4 million compared to net earnings of $ 2.0 million in 1998. Despite hard times, the Company was able to manufacture four additional EM systems, bringing EM job capacity to seven. The Company also completed the acquisition of the directional drilling assets of Whipstock Systems Inc of Calgary . Ryan secured its first MWD/LWD job contract in Venezuela in the third quarter; since then it also shipped a second unit to Venezuela to meet rising demand for the company;' services. Ryan also began drilling a multi-well pilot program in Abu Dhabi in late 1999. Two of these wells have been successfully completed to date, and a third well is in the planning stages. Upon finishing this program, Ryan Energy Technologies will be eligible for multi-year contracts with the Abu Dhabi National Oil Company, an important step in establishing a Middle East presence in the

  20. Nonimmigrant Admissions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Nonimmigrants are foreign nationals granted temporary admission into the United States. The major purposes for which nonimmigrant admission may be authorized include...

  1. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  2. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  3. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  4. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  5. DHS Office for Civil Rights and Civil Liberties FY 2012 Annual Report to Congress

    Data.gov (United States)

    Department of Homeland Security — This Annual Report details CRCL's priorities and activities in FY2012. CRCL’s activities focused on alignment with the Department’s missions: Preventing Terrorism...

  6. DHS Office for Civil Rights and Civil Liberties FY 2011 Annual Report to Congress

    Data.gov (United States)

    Department of Homeland Security — This Annual Report details CRCL's priorities and activities in FY2011. CRCL’s activities focused on alignment with the Department’s missions: Preventing Terrorism...

  7. DHS Office for Civil Rights and Civil Liberties FY 2013 Annual Report to Congress

    Data.gov (United States)

    Department of Homeland Security — This Annual Report details CRCL's priorities and activities in FY2013. CRCL’s activities focused on alignment with the Department’s missions: Preventing Terrorism...

  8. CSIR Annual report 1965

    CSIR Research Space (South Africa)

    CSIR

    1965-01-01

    Full Text Available stream_source_info Annual Report_ 1965.pdf.txt stream_content_type text/plain stream_size 48 Content-Encoding ISO-8859-1 stream_name Annual Report_ 1965.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  9. CSIR Annual report 1992

    CSIR Research Space (South Africa)

    CSIR

    1992-01-01

    Full Text Available stream_source_info Annual Report_ 1992.pdf.txt stream_content_type text/plain stream_size 39 Content-Encoding ISO-8859-1 stream_name Annual Report_ 1992.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  10. CSIR Annual report 1979

    CSIR Research Space (South Africa)

    CSIR

    1979-01-01

    Full Text Available stream_source_info CSIR Annual report_1979.pdf.txt stream_content_type text/plain stream_size 86 Content-Encoding ISO-8859-1 stream_name CSIR Annual report_1979.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  11. CSIR Annual report 1976

    CSIR Research Space (South Africa)

    CSIR

    1976-01-01

    Full Text Available stream_source_info Annual Report_1976.pdf.txt stream_content_type text/plain stream_size 75 Content-Encoding ISO-8859-1 stream_name Annual Report_1976.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  12. CSIR Annual report 1978

    CSIR Research Space (South Africa)

    CSIR

    1978-01-01

    Full Text Available stream_source_info Annual Report_1978.pdf.txt stream_content_type text/plain stream_size 78 Content-Encoding ISO-8859-1 stream_name Annual Report_1978.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  13. CSIR Annual report 1991

    CSIR Research Space (South Africa)

    CSIR

    1991-01-01

    Full Text Available stream_source_info Annual Report_ 1991.pdf.txt stream_content_type text/plain stream_size 40 Content-Encoding ISO-8859-1 stream_name Annual Report_ 1991.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  14. Annual Partnership Report, 2016

    Science.gov (United States)

    Wyoming Community College Commission, 2016

    2016-01-01

    The "Annual Partnership Report" catalogs partnerships that Wyoming community colleges established and maintained for each fiscal year. This partnership report fulfills statutory reporting requirement W.S. 21-18-202(e)(iv) which mandates the development of annual reports to the legislature on the outcomes of partnerships between colleges…

  15. Annual Report 1997

    Energy Technology Data Exchange (ETDEWEB)

    Golnik, N.; Mika, J.R.; Wieteska, K. [eds.

    1998-12-31

    This Annual Report of the Institute of Atomic Energy describes the results of the research works carried out at the Institute at 1997. As in the preceding years the authors of the individual scientific reports published in this Annual Report are fully responsible for their content and layout. The Report contains the information on other activities of the Institute as well. (author)

  16. Annual Energy Review, 2008

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-06-01

    The Annual Energy Review (AER) is the Energy Information Administration's (EIA) primary report of annual historical energy statistics. For many series, data begin with the year 1949. Included are statistics on total energy production, consumption, trade, and energy prices; overviews of petroleum, natural gas, coal, electricity, nuclear energy, renewable energy, and international energy; financial and environment indicators; and data unit conversions.

  17. Natural gas annual 1991

    International Nuclear Information System (INIS)

    1993-01-01

    The Natural Gas Annual 1991 provides information on the supply and disposition of natural gas to a wide audience including industry, consumers Federal and State agencies, and education institutions. This report, the Natural Gas Annual 1991 Supplement: Company Profiles, presents a detailed profile of selected companies

  18. Annual Report 2001

    International Nuclear Information System (INIS)

    Swiboda, G.

    2002-01-01

    This Annual Report of the Institute of Atomic Energy describes the results of the research works carried out at the Institute at 2001. As in the preceding years the authors of the individual scientific reports published in this Annual Report are fully responsible for their content and layout. The Report contains the information on other activities of the Institute as well. (author)

  19. Annual report to Congress

    International Nuclear Information System (INIS)

    1987-01-01

    This is the ninth Annual Report to Congress of the United States Department of Energy. It covers the activities of all elements of the Department except the independent Federal Regulatory Commission, which issues its own annual report. 88 refs., 43 tabs

  20. Annual Report 1997

    International Nuclear Information System (INIS)

    Golnik, N.; Mika, J.R.; Wieteska, K.

    1998-01-01

    This Annual Report of the Institute of Atomic Energy describes the results of the research works carried out at the Institute at 1997. As in the preceding years the authors of the individual scientific reports published in this Annual Report are fully responsible for their content and layout. The Report contains the information on other activities of the Institute as well. (author)

  1. Annual Report 1997

    Energy Technology Data Exchange (ETDEWEB)

    Golnik, N; Mika, J R; Wieteska, K [eds.

    1999-12-31

    This Annual Report of the Institute of Atomic Energy describes the results of the research works carried out at the Institute at 1997. As in the preceding years the authors of the individual scientific reports published in this Annual Report are fully responsible for their content and layout. The Report contains the information on other activities of the Institute as well. (author)

  2. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  3. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  4. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  5. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  6. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  7. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  8. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  9. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  10. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  11. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  12. 1999 Annual report

    International Nuclear Information System (INIS)

    2000-01-01

    The Petroleum Services Association of Canada (PSAC) is the national organization representing some 200 Canadian oilfield service, supply and manufacturing companies. The membership of PSAC includes companies which are active in cementing and simulation services, data and information systems, drilling, drilling fluids, and completion equipment and services, pipe and drill bit manufacturing, pipeline and oilfield construction, safety and environmental services, well testing, wireline and perforating services, and many others. During 1999, PSAC continued to provide focused advocacy services related to the complex volume of regulatory issues that member companies face on a daily basis, including transportation issues, workers compensation, hours of work, occupational health and safety and industry recommended practices. Much of the PSAC's work is done through a series of committees. This annual report provides details of the activities and achievements of the committees, and the various activities sponsored by the PSAC during 1999, e. g. the Saskatchewan Petroleum Awareness Week, the Oilfield Transportation Conference and Exhibition (April) and the Oilfield Services Investment Symposium (June). The PSAC also published the 1998 Well Cost Study, the 1999 Petroleum Industry Drilling Activity Forecast, the 1999 Compensation Survey, a generic emergency response plan ready for customization by individual companies, minimum safety guidelines for drilling fluids and safety procedures for drill stem testing. It also developed a Master Service Agreement, that can be used between the operator and supply sides of the industry and various forms for the transportation of dangerous goods. As part of its services, the PSAC also maintains a website which includes a wealth of information on all aspects of the oil and natural gas industry; it received over 10,000 visitors each month during 1999. An audited financial statement is also included

  13. Accelerated secure GUI for virtualized mobile handsets

    OpenAIRE

    Danisevskis, Janis

    2017-01-01

    Mobile handsets, especially so-called smartphones, have become an indispensable commodity in day-to-day life. However, their growing versatility came at the cost of ever-increasing complexity, and this raises severe security concerns. This has come to be especially problematic for corporate IT infrastructures, because it is increasingly hard to reconcile personal user expectations with corporate security demands. A particular manifestation of this quandary is the bring-your-own-device (BYOD) ...

  14. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  15. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  16. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  17. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  18. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  19. CTBTO Annual Report 2001

    International Nuclear Information System (INIS)

    2002-04-01

    On 10 September 2001, the Comprehensive Nuclear-Test-Ban Treaty saw the fifth anniversary of its adoption. This is the annual report of the Provisional Technical Secretariat (PTS) of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization for the same year, which shows significant additional progress made in establishing the verification regime in all its aspects. Since the adoption of the Treaty, the international community has attached a high priority to it and invested significant personnel, financial and technological resources to support it. The intensive work by the staff of the PTS and the cooperation of people working for the Treaty all over the world have brought tangible results. During 2001, considerable achievements were made in the establishment of the International Monitoring System (IMS), which consists of a network of 321 seismic, hydroacoustic, infrasound and radionuclide stations and 16 radionuclide laboratories situated in some ninety countries around the world. By the end of the year 84% of the site surveys for the stations had been completed. Altogether 122 stations in all four technologies have been incorporated into the verification system and 104 additional stations are under construction or in the stage of contract negotiation. The build-up of the International Data Centre (IDC), which is responsible for processing, analysing and reporting on the data received from IMS stations, is proceeding according to a seven phase Progressive Commissioning Plan. In 2001 the IDC completed Phase 4, Initial Testing, and began preparations for full scale testing. The third and last package of the IDC applications software coming from the prototype IDC was installed and entered into operational use, allowing IMS data and high quality IDC products to be provided continuously to the 387 currently authorized users from 53 States Signatories. The installation of the Global Communications Infrastructure - a worldwide, secure

  20. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t passive security the corruption threshold is t 

  1. LDRD Annual Report FY2006

    International Nuclear Information System (INIS)

    Sketchley, J A; Kotta, P; De Yoreo, J; Jackson, K; van Bibber, K

    2007-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest

  2. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  3. Nonproliferation Graduate Fellowship Program, Annual Report, Class of 2012

    Energy Technology Data Exchange (ETDEWEB)

    McMakin, Andrea H.

    2013-09-23

    This 32-pp annual report/brochure describes the accomplishments of the Class of 2012 of the Nonproliferation Graduate Fellowship Program (the last class of this program), which PNNL administers for the National Nuclear Security Administration. The time period covers Sept 2011 through June 2013.

  4. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  5. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  6. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  7. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  8. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  9. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  10. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  11. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  12. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  13. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  14. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  15. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  16. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  17. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  18. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  19. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  20. 17 CFR 248.5 - Annual privacy notice to customers required.

    Science.gov (United States)

    2010-04-01

    ... customers required. 248.5 Section 248.5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Safeguarding Personal Information Privacy and Opt Out Notices § 248.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and conspicuous notice to customers that accurately...

  1. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Science.gov (United States)

    2010-04-01

    ... internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES... Company Rules § 240.17Ad-13 Annual study and evaluation of internal accounting control. (a) Accountant's... accountant concerning the transfer agent's system of internal accounting control and related procedures for...

  2. 75 FR 29884 - Implementation of Changes from the 2009 Annual Review of the Entity List

    Science.gov (United States)

    2010-05-28

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 744 [Docket No. 100311137-0138...: Bureau of Industry and Security, Commerce. ACTION: Final Rule. SUMMARY: This rule amends the Export..., Ireland or Taiwan were not included in the 2009 annual review because they were added to the Entity List...

  3. Yearly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016 Onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from federal...

  4. Yearly Data for Spoken Language Preferences of Supplemental Security Income (Blind & Disabled) (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  5. Yearly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2011-Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year 2011...

  6. Yearly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  7. Yearly Data for Asian & Pacific Islander Language Preferences of Supplemental Security Income Aged Applicants (2016 Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for API language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year...

  8. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  9. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  11. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  12. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  13. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  14. NIRE annual report 1999

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-07-01

    The National Institute for Resources and Environment (NIRE) has a R & D concept of 'ecotechnology' that aims to protect the environment from degradation whilst promoting sustainable development. This annual report presents summaries of 32 recent research efforts.

  15. ASIST 2002 annual meeting

    CERN Multimedia

    Peek, R

    2003-01-01

    Review of discussions and presentations at the American Society for Information Science and Technology 2002 annual meeting. Topics covered included new models of scholarly publishing and the development of the semantic web (1 page).

  16. SIS - Annual Catch Limit

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Annual Catch Limit (ACL) dataset within the Species Information System (SIS) contains information and data related to management reference points and catch data.

  17. IKO Annual Report 1976

    International Nuclear Information System (INIS)

    1977-01-01

    The IKO Annual Report of 1976 relates their progress in different projects and project fields. The fields covered include electron scattering, pion and muon physics, theory, radio- and nuclear chemistry, technical department, MEA, nuclear reactions and nuclear spectroscopy

  18. Annual Adjustment Factors

    Data.gov (United States)

    Department of Housing and Urban Development — The Department of Housing and Urban Development establishes the rent adjustment factors - called Annual Adjustment Factors (AAFs) - on the basis of Consumer Price...

  19. 2002 Annual report: synthesis

    International Nuclear Information System (INIS)

    2003-01-01

    This synthesis of the Annual Report 2002 presents information of the main activities on the scope of the radiation protection and nuclear safety of the Nuclear Regulatory Authority (ARN) of the Argentina during 2002

  20. Annual report 1980

    International Nuclear Information System (INIS)

    1981-01-01

    This annual report contains a description of the named institute, the research programm, reports from the scientific establishments, a description of different cooperations, and a list of scientific publications. (HSI) [de