NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security
Energy Technology Data Exchange (ETDEWEB)
Kotta, P R; Sketchley, J A
2008-08-20
The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon
Energy Technology Data Exchange (ETDEWEB)
Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others
1996-03-01
This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.
Energy Technology Data Exchange (ETDEWEB)
Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.
1997-11-01
This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.
Culturing Security System of Chemical Laboratory in Indonesia
Directory of Open Access Journals (Sweden)
Eka Dian Pusfitasari
2017-04-01
Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.
Laboratory Directed Research and Development FY2011 Annual Report
International Nuclear Information System (INIS)
Craig, W.; Sketchley, J.; Kotta, P.
2012-01-01
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundational science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial
Laboratory-Directed Research and Development 2016 Summary Annual Report
International Nuclear Information System (INIS)
Pillai, Rekha Sukamar; Jacobson, Julie Ann
2017-01-01
The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclear Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world's energy future and secure our critical infrastructure. Operating since 1949, INL is the nation's leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL's research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy, enable clean
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Privacy and security of patient data in the pathology laboratory
Directory of Open Access Journals (Sweden)
Ioan C Cucoranu
2013-01-01
Full Text Available Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI. In the United States, the Health Insurance Portability and Accountability Act (HIPAA govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Laboratory Directed Research and Development FY2011 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Craig, W; Sketchley, J; Kotta, P
2012-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundational science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High
Laboratory-Directed Research and Development 2016 Summary Annual Report
Energy Technology Data Exchange (ETDEWEB)
Pillai, Rekha Sukamar [Idaho National Lab. (INL), Idaho Falls, ID (United States); Jacobson, Julie Ann [Idaho National Lab. (INL), Idaho Falls, ID (United States)
2017-01-01
The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclear Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world’s energy future and secure our critical infrastructure. Operating since 1949, INL is the nation’s leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL’s research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy
Applying the National Industrial Security Program (NISP) in the laboratory environment
International Nuclear Information System (INIS)
Bruckner, D.G.
1995-01-01
With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders
Laboratory Directed Research and Development FY2008 Annual Report
International Nuclear Information System (INIS)
Kammeraad, J.E.; Jackson, K.J.; Sketchley, J.A.; Kotta, P.R.
2009-01-01
The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities
Laboratory directed research and development annual report: 2005
International Nuclear Information System (INIS)
2006-01-01
This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 2005 for Sandia National Laboratories. In addition to a programmatic and financial overview, the report includes progress reports from 410 individual R and D projects in 19 categories. The categories and subheadings are: Science, Technology and Engineering (Advanced Components and Certification Engineering; Advanced Manufacturing; Biotechnology; Chemical and Earth Sciences; Computational and Information Sciences; Electronics and Photonics; Engineering Sciences; Materials Science and Technology; Pulsed Power Sciences and High Energy Density Sciences; Science and Technology Strategic Objectives); Mission Technologies (Energy and Infrastructure Assurance; Homeland Security; Military Technologies and Applications; Nonproliferation and Assessments; Grand Challanges); and Corporate Objectives (Advanced Concepts; Seniors' Council; University Collaborations)
Laboratory Directed Research and Development Program FY2011
Energy Technology Data Exchange (ETDEWEB)
none, none
2012-04-27
Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2011 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). Going forward in FY 2012, the LDRD program also supports the Goals codified in the new DOE Strategic Plan of May, 2011. The LDRD program also supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Brief summares of projects and accomplishments for the period for each division are included.
Laboratory Directed Research and Development FY2008 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Kammeraad, J E; Jackson, K J; Sketchley, J A; Kotta, P R
2009-03-24
The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with
49 CFR 1548.19 - Security Directives and Information Circulars.
2010-10-01
... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... aviation, TSA issues a Security Directive setting forth mandatory measures. (1) Each indirect air carrier... Security Directive that TSA issues to it, within the time prescribed in the Security Directive for...
1996 Laboratory directed research and development annual report
Energy Technology Data Exchange (ETDEWEB)
Meyers, C.E.; Harvey, C.L.; Lopez-Andreas, L.M.; Chavez, D.L.; Whiddon, C.P. [comp.
1997-04-01
This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 1996. In addition to a programmatic and financial overview, the report includes progress reports from 259 individual R&D projects in seventeen categories. The general areas of research include: engineered processes and materials; computational and information sciences; microelectronics and photonics; engineering sciences; pulsed power; advanced manufacturing technologies; biomedical engineering; energy and environmental science and technology; advanced information technologies; counterproliferation; advanced transportation; national security technology; electronics technologies; idea exploration and exploitation; production; and science at the interfaces - engineering with atoms.
Scientific Openness and National Security at the National Laboratories
McTague, John
2000-04-01
The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.
Cloud-Based Virtual Laboratory for Network Security Education
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek
2014-01-01
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Digitizing and Securing Archived Laboratory Notebooks
Caporizzo, Marilyn
2008-01-01
The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…
Laboratory Directed Research and Development Program FY 2008 Annual Report
Energy Technology Data Exchange (ETDEWEB)
editor, Todd C Hansen
2009-02-23
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under
Laboratory Directed Research and Development Program FY 2008 Annual Report
International Nuclear Information System (INIS)
Hansen, Todd C.
2009-01-01
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the
Laboratory Directed Research and Development LDRD-FY-2011
Energy Technology Data Exchange (ETDEWEB)
Dena Tomchak
2012-03-01
This report provides a summary of the research conducted at the Idaho National Laboratory (INL) during Fiscal Year (FY) 2011. This report demonstrates the types of cutting edge research the INL is performing to help ensure the nation's energy security. The research conducted under this program is aligned with our strategic direction, benefits the Department of Energy (DOE) and is in compliance with DOE order 413.2B. This report summarizes the diverse research and development portfolio with emphasis on the DOE Office of Nuclear Energy (DOE-NE) mission, encompassing both advanced nuclear science and technology and underlying technologies.
49 CFR 1544.305 - Security Directives and Information Circulars.
2010-10-01
... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...
Energy Technology Data Exchange (ETDEWEB)
FOX, K.J.
2006-12-31
Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's total annual budget has averaged about $460 million. There are about 2,500 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, ''Laboratory Directed Research and Development,'' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy National Nuclear Security Administration Laboratories dated June 13, 2006. In accordance this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2006.
OpenLabs Security Laboratory - The Online Security Experiment Platform
Johan Zackrisson; Charlie Svahnberg
2008-01-01
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with hostile software, this is even more important as the experiment can affect the environment in adverse ways. In a normal campus laboratory, isolation can be achieved by network separation. For an online environment, where remote control is essential, separation and isolation are still needed, and therefore the securit...
Directions for Web and E-Commerce Applications Security
Thuraisingham, Bhavani; Clifton, Chris; Gupta, Amar; Bertino, Elisa; Ferrari, Elena
2003-01-01
This paper provides directions for web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and ecommerce applications are discussed.
33 CFR 104.145 - Maritime Security (MARSEC) Directive.
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...
33 CFR 105.145 - Maritime Security (MARSEC) Directive.
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...
Laboratory Directed Research and Development FY2010 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Jackson, K J
2011-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has at its core a primary national security mission - to ensure the safety, security, and reliability of the nation's nuclear weapons stockpile without nuclear testing, and to prevent and counter the spread and use of weapons of mass destruction: nuclear, chemical, and biological. The Laboratory uses the scientific and engineering expertise and facilities developed for its primary mission to pursue advanced technologies to meet other important national security needs - homeland defense, military operations, and missile defense, for example - that evolve in response to emerging threats. For broader national needs, LLNL executes programs in energy security, climate change and long-term energy needs, environmental assessment and management, bioscience and technology to improve human health, and for breakthroughs in fundamental science and technology. With this multidisciplinary expertise, the Laboratory serves as a science and technology resource to the U.S. government and as a partner with industry and academia. This annual report discusses the following topics: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; (6) Engineering and Manufacturing Processes; (7) Materials Science and Technology; Mathematics and Computing Science; (8) Nuclear Science and Engineering; and (9) Physics.
33 CFR 106.140 - Maritime Security (MARSEC) Directive.
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...
LABORATORY DIRECTED RESEARCH AND DEVELOPMENT PROGRAM ASSESSMENT FOR FY 2006.
Energy Technology Data Exchange (ETDEWEB)
FOX,K.J.
2006-01-01
Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's total annual budget has averaged about $460 million. There are about 2,500 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, ''Laboratory Directed Research and Development,'' April 19,2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy National Nuclear Security Administration Laboratories dated June 13,2006. The goals and' objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new
Laboratory Directed Research and Development Program Assessment for FY 2007
Energy Technology Data Exchange (ETDEWEB)
Newman,L.; Fox, K.J.
2007-12-31
Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2007 spending was $515 million. There are approximately 2,600 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development', April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which
31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.
2010-07-01
... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...
Laboratory Directed Research and Development Program FY 2005 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Sjoreen, Terrence P [ORNL
2006-04-01
The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2A, 'Laboratory Directed Research and Development' (January 8, 2001), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report describes all ORNL LDRD research activities supported during FY 2005 and includes final reports for completed projects and shorter progress reports for projects that were active, but not completed, during this period. The FY 2005 ORNL LDRD Self-Assessment (ORNL/PPA-2006/2) provides financial data about the FY 2005 projects and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching national security mission, which encompasses science, energy resources, environmental quality, and national nuclear security. As a national resource, the Laboratory also applies its capabilities and skills to the specific needs of other federal agencies and customers through the DOE Work For Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at
Laboratory Directed Research and Development Program FY 2004 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Sjoreen, Terrence P [ORNL
2005-04-01
The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2A, 'Laboratory Directed Research and Development' (January 8, 2001), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report describes all ORNL LDRD research activities supported during FY 2004 and includes final reports for completed projects and shorter progress reports for projects that were active, but not completed, during this period. The FY 2004 ORNL LDRD Self-Assessment (ORNL/PPA-2005/2) provides financial data about the FY 2004 projects and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching national security mission, which encompasses science, energy resources, environmental quality, and national nuclear security. As a national resource, the Laboratory also applies its capabilities and skills to the specific needs of other federal agencies and customers through the DOE Work For Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at
Energy Technology Data Exchange (ETDEWEB)
(Office of The Director)
2012-04-25
As a national laboratory Argonne concentrates on scientific and technological challenges that can only be addressed through a sustained, interdisciplinary focus at a national scale. Argonne's eight major initiatives, as enumerated in its strategic plan, are Hard X-ray Sciences, Leadership Computing, Materials and Molecular Design and Discovery, Energy Storage, Alternative Energy and Efficiency, Nuclear Energy, Biological and Environmental Systems, and National Security. The purposes of Argonne's Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel technical concepts, enhance the Laboratory's research and development (R and D) capabilities, and pursue its strategic goals. projects are selected from proposals for creative and innovative R and D studies that require advance exploration before they are considered to be sufficiently developed to obtain support through normal programmatic channels. Among the aims of the projects supported by the LDRD Program are the following: establishment of engineering proof of principle, assessment of design feasibility for prospective facilities, development of instrumentation or computational methods or systems, and discoveries in fundamental science and exploratory development.
Energy Technology Data Exchange (ETDEWEB)
(Office of The Director)
2012-04-25
As a national laboratory Argonne concentrates on scientific and technological challenges that can only be addressed through a sustained, interdisciplinary focus at a national scale. Argonne's eight major initiatives, as enumerated in its strategic plan, are Hard X-ray Sciences, Leadership Computing, Materials and Molecular Design and Discovery, Energy Storage, Alternative Energy and Efficiency, Nuclear Energy, Biological and Environmental Systems, and National Security. The purposes of Argonne's Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel technical concepts, enhance the Laboratory's research and development (R and D) capabilities, and pursue its strategic goals. projects are selected from proposals for creative and innovative R and D studies that require advance exploration before they are considered to be sufficiently developed to obtain support through normal programmatic channels. Among the aims of the projects supported by the LDRD Program are the following: establishment of engineering proof of principle, assessment of design feasibility for prospective facilities, development of instrumentation or computational methods or systems, and discoveries in fundamental science and exploratory development.
Culturing Security System of Chemical Laboratory in Indonesia
Pusfitasari, Eka Dian
2017-01-01
Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and...
Quantum Secure Direct Communication Using W State
International Nuclear Information System (INIS)
Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng
2008-01-01
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure
Laboratory Directed Research and Development Program Activities for FY 2008.
Energy Technology Data Exchange (ETDEWEB)
Looney,J.P.; Fox, K.
2009-04-01
Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that maintains a primary mission focus the physical sciences, energy sciences, and life sciences, with additional expertise in environmental sciences, energy technologies, and national security. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal year 2008 budget was $531.6 million. There are about 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Developlnent at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. Accordingly, this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2008. BNL expended $12 million during Fiscal Year 2008 in support of 69 projects. The program has two categories, the annual Open Call LDRDs and Strategic LDRDs, which combine to meet the overall objectives of the LDRD Program. Proposals are solicited annually for review and approval concurrent with the next fiscal year, October 1. For the open call for proposals, an LDRD Selection Committee, comprised of the Associate Laboratory Directors (ALDs) for the Scientific Directorates, an equal number of scientists recommended by the Brookhaven Council, plus the Assistant Laboratory Director for Policy and Strategic Planning, review the proposals submitted in response to the solicitation. The Open Can LDRD category emphasizes innovative research concepts
Multiparty-controlled quantum secure direct communication
International Nuclear Information System (INIS)
Xiu, X.-M.; Dong, L.; Gao, Y.-J.; Chi, F.
2007-01-01
A theoretical scheme of a multiparty-controlled quantum secure direct communication is proposed. The supervisor prepares a communication network with Einstein-Podolsky-Rosen pairs and auxiliary particles. After passing a security test of the communication network, a supervisor tells the users the network is secure and they can communicate. If the controllers allow the communicators to communicate, the controllers should perform measurements and inform the communicators of the outcomes. The communicators then begin to communicate after they perform a security test of the quantum channel and verify that it is secure. The recipient can decrypt the secret message in a classical message from the sender depending on the protocol. Any two users in the network can communicate through the above processes under the control of the supervisor and the controllers
Murray, P K
1998-08-01
The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.
Quantum Secure Direct Communication Based on Authentication
International Nuclear Information System (INIS)
Min-Jie, Wang; Wei, Pan
2008-01-01
We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken. (general)
Laboratory Directed Research and Development Program Assessment for FY 2008
Energy Technology Data Exchange (ETDEWEB)
Looney, J P; Fox, K J
2008-03-31
Brookhaven National Laboratory (BNL) is a multidisciplinary Laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2008 spending was $531.6 million. There are approximately 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. To be a premier scientific Laboratory, BNL must continuously foster groundbreaking scientific research and renew its research agenda. The competition for LDRD funds stimulates Laboratory scientists to think in new and creative ways, which becomes a major factor in achieving and maintaining research excellence and a means to address National needs within the overall mission of the DOE and BNL. By fostering high-risk, exploratory research, the LDRD program helps
75 FR 1566 - National Industrial Security Program Directive No. 1
2010-01-12
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...
Quantum secure direct communication with high-dimension quantum superdense coding
International Nuclear Information System (INIS)
Wang Chuan; Li Yansong; Liu Xiaoshu; Deng Fuguo; Long Guilu
2005-01-01
A protocol for quantum secure direct communication with quantum superdense coding is proposed. It combines the ideas of block transmission, the ping-pong quantum secure direct communication protocol, and quantum superdense coding. It has the advantage of being secure and of high source capacity
Design, implementation and security of a typical educational laboratory computer network
Directory of Open Access Journals (Sweden)
Martin Pokorný
2013-01-01
Full Text Available Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts, and four essential security rules are stipulated (enforceable end host security, controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments, which protect the rest of the laboratory infrastructure as well as the outer university network and the Internet. The main part of the paper is dedicated to a design and implementation of these usability and security rules. We present a physical diagram of a typical laboratory network based on multiple circuits connecting end hosts to different networks, and a layout of rack devices. After that, a topological diagram of the network is described which is based on different VLANs and port-based access control using the IEEE 802.1x/EAP-TLS/RADIUS authentication to achieve defined level of network access. In the second part of the paper, the latest innovation of our network is presented that covers a transition to the system virtualization at the end host devices – inspiration came from a similar solution deployed at the Department of Telecommunications at Brno University of Technology. This improvement enables a greater flexibility in the end hosts maintenance and a simultaneous network access to the educational devices as well as to the Internet. In the end, a vision of a
Laboratory Directed Research and Development Program Activities for FY 2007.
Energy Technology Data Exchange (ETDEWEB)
Newman,L.
2007-12-31
Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal year 2007 budget was $515 million. There are about 2,600 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development', April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. In accordance this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2007. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. We explicitly indicate that research conducted under the LDRD Program should be highly innovative, and an element of high risk as to success is acceptable. In the solicitation for new proposals for Fiscal Year 2007 we especially requested innovative new projects in
31 CFR 357.20 - Securities account in Legacy Treasury Direct ®.
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Securities account in Legacy Treasury Direct ®. 357.20 Section 357.20 Money and Finance: Treasury Regulations Relating to Money and Finance... Securities System (Legacy Treasury Direct) § 357.20 Securities account in Legacy Treasury Direct ®. (a...
Laboratory Directed Research and Development Program FY2004
Energy Technology Data Exchange (ETDEWEB)
Hansen, Todd C.
2005-03-22
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Goals that are codified in DOE's September 2003 Strategic Plan, with a primary focus on Advancing Scientific Understanding. For that goal, the Fiscal Year (FY) 2004 LDRD projects support every one of the eight strategies described in the plan. In addition, LDRD efforts support the goals of Investing in America's Energy Future (six of the fourteen strategies), Resolving the Environmental Legacy (four of the eight strategies), and Meeting National Security Challenges (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD supports Office of Science strategic plans, including the 20 year Scientific Facilities Plan and the draft Office of Science Strategic Plan. The research also
Maximally efficient protocols for direct secure quantum communication
Energy Technology Data Exchange (ETDEWEB)
Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)
2012-10-01
Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.
Laboratory Directed Research ampersand Development Program
International Nuclear Information System (INIS)
Ogeka, G.J.; Romano, A.J.
1993-12-01
At Brookhaven National Laboratory the Laboratory Directed Research and Development (LDRD) Program is a discretionary research and development tool critical in maintaining the scientific excellence and vitality of the laboratory. It is also a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor in achieving and maintaining staff excellence, and a means to address national needs, within the overall mission of the Department of Energy and Brookhaven National Laboratory. This report summarizes research which was funded by this program during fiscal year 1993. The research fell in a number of broad technical and scientific categories: new directions for energy technologies; global change; radiation therapies and imaging; genetic studies; new directions for the development and utilization of BNL facilities; miscellaneous projects. Two million dollars in funding supported 28 projects which were spread throughout all BNL scientific departments
Laboratory directed research and development FY98 annual report; TOPICAL
International Nuclear Information System (INIS)
Al-Ayat, R; Holzrichter, J
1999-01-01
In 1984, Congress and the Department of Energy (DOE) established the Laboratory Directed Research and Development (LDRD) Program to enable the director of a national laboratory to foster and expedite innovative research and development (R and D) in mission areas. The Lawrence Livermore National Laboratory (LLNL) continually examines these mission areas through strategic planning and shapes the LDRD Program to meet its long-term vision. The goal of the LDRD Program is to spur development of new scientific and technical capabilities that enable LLNL to respond to the challenges within its evolving mission areas. In addition, the LDRD Program provides LLNL with the flexibility to nurture and enrich essential scientific and technical competencies and enables the Laboratory to attract the most qualified scientists and engineers. The FY98 LDRD portfolio described in this annual report has been carefully structured to continue the tradition of vigorously supporting DOE and LLNL strategic vision and evolving mission areas. The projects selected for LDRD funding undergo stringent review and selection processes, which emphasize strategic relevance and require technical peer reviews of proposals by external and internal experts. These FY98 projects emphasize the Laboratory's national security needs: stewardship of the U.S. nuclear weapons stockpile, responsibility for the counter- and nonproliferation of weapons of mass destruction, development of high-performance computing, and support of DOE environmental research and waste management programs
FY2007 Laboratory Directed Research and Development Annual Report
Energy Technology Data Exchange (ETDEWEB)
Craig, W W; Sketchley, J A; Kotta, P R
2008-03-20
The Laboratory Directed Research and Development (LDRD) annual report for fiscal year 2007 (FY07) provides a summary of LDRD-funded projects for the fiscal year and consists of two parts: An introduction to the LDRD Program, the LDRD portfolio-management process, program statistics for the year, and highlights of accomplishments for the year. A summary of each project, submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to Department of Energy (DOE)/National Nuclear Security Administration (NNSA) and Lawrence Livermore National Laboratory (LLNL) mission areas, the technical progress achieved in FY07, and a list of publications that resulted from the research in FY07. Summaries are organized in sections by research category (in alphabetical order). Within each research category, the projects are listed in order of their LDRD project category: Strategic Initiative (SI), Exploratory Research (ER), Laboratory-Wide Competition (LW), and Feasibility Study (FS). Within each project category, the individual project summaries appear in order of their project tracking code, a unique identifier that consists of three elements. The first is the fiscal year the project began, the second represents the project category, and the third identifies the serial number of the proposal for that fiscal year.
Laboratory research irradiators with enhanced security features
International Nuclear Information System (INIS)
Srivastava, Piyush
2016-01-01
Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)
Laboratory research irradiators with enhanced security features
International Nuclear Information System (INIS)
Srivastava, Piyush
2014-01-01
Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)
Laboratory Information Management System Chain of Custody: Reliability and Security
Tomlinson, J. J.; Elliott-Smith, W.; Radosta, T.
2006-01-01
A chain of custody (COC) is required in many laboratories that handle forensics, drugs of abuse, environmental, clinical, and DNA testing, as well as other laboratories that want to assure reliability of reported results. Maintaining a dependable COC can be laborious, but with the recent establishment of the criteria for electronic records and signatures by US regulatory agencies, laboratory information management systems (LIMSs) are now being developed to fully automate COCs. The extent of automation and of data reliability can vary, and FDA- and EPA-compliant electronic signatures and system security are rare. PMID:17671623
Quantum Secure Direct Intercommunication with Superdense Coding and Entanglement Swapping
International Nuclear Information System (INIS)
Huang Dazu; Guo Ying; Zeng Guihua
2008-01-01
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making use of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping
Quantum Secure Direct Communication with Quantum Memory.
Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can
2017-06-02
Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.
Energy Technology Data Exchange (ETDEWEB)
Glauthier, T. J. [TJG Energy Associates, LLC, Bloomberg, VA (United States); Cohon, Jared L. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Augustine, Norman R. [U.S. Dept. of Homeland Security, Washington, DC (United States); Austin, Wanda M. [Aerospace Corporation, El Segundo, CA (United States); Elachi, Charles [California Inst. of Technology (CalTech), Pasadena, CA (United States); Fleury, Paul A. [Yale Univ., New Haven, CT (United States); Hockfield, Susan J. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Meserve, Richard A. [Covington and Burling LLP, Washington, DC (United States); Murray, Cherry A. [Harvard Univ., Cambridge, MA (United States)
2015-10-23
The Department of Energy (DOE) laboratories are national assets that have contributed profoundly to the Nation’s security, scientific leadership, and economic competitiveness. In recognition of the continuing and evolving threats to our security and the dramatic increase in global economic and scientific competition, the laboratories are and will continue to be vitally important. Yet, the contributions of the National Laboratories are not inevitable, nor have they realized their full potential. This final report of the Commission to Review the Effectiveness of the National Energy Laboratories recommends ways the laboratories could overcome challenges to more efficiently and effectively accomplish the work for which they are uniquely suited.
Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation
International Nuclear Information System (INIS)
Wang Jian; Zhang Quan; Tang Chaojing
2007-01-01
We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.
Energy Technology Data Exchange (ETDEWEB)
Willis, D. K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
2016-12-01
High performance computing (HPC) has been a defining strength of Lawrence Livermore National Laboratory (LLNL) since its founding. Livermore scientists have designed and used some of the world’s most powerful computers to drive breakthroughs in nearly every mission area. Today, the Laboratory is recognized as a world leader in the application of HPC to complex science, technology, and engineering challenges. Most importantly, HPC has been integral to the National Nuclear Security Administration’s (NNSA’s) Stockpile Stewardship Program—designed to ensure the safety, security, and reliability of our nuclear deterrent without nuclear testing. A critical factor behind Lawrence Livermore’s preeminence in HPC is the ongoing investments made by the Laboratory Directed Research and Development (LDRD) Program in cutting-edge concepts to enable efficient utilization of these powerful machines. Congress established the LDRD Program in 1991 to maintain the technical vitality of the Department of Energy (DOE) national laboratories. Since then, LDRD has been, and continues to be, an essential tool for exploring anticipated needs that lie beyond the planning horizon of our programs and for attracting the next generation of talented visionaries. Through LDRD, Livermore researchers can examine future challenges, propose and explore innovative solutions, and deliver creative approaches to support our missions. The present scientific and technical strengths of the Laboratory are, in large part, a product of past LDRD investments in HPC. Here, we provide seven examples of LDRD projects from the past decade that have played a critical role in building LLNL’s HPC, computer science, mathematics, and data science research capabilities, and describe how they have impacted LLNL’s mission.
Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs
International Nuclear Information System (INIS)
Deng Fuguo; Li Xihan; Li Chunyan; Zhou Ping; Zhou Hongyu
2006-01-01
We discuss the four requirements for a real point-to-point quantum secure direct communication (QSDC) first, and then present two efficient QSDC network schemes with an N ordered Einstein-Podolsky-Rosen pairs. Any one of the authorized users can communicate another one on the network securely and directly
[Security Management in Clinical Laboratory Departments and Facilities: Current Status and Issues].
Ishida, Haku; Nakamura, Junji; Yoshida, Hiroshi; Koike, Masaru; Inoue, Yuji
2014-11-01
We conducted a questionnaire survey regarding the current activities for protecting patients' privacy and the security of information systems (IS) related to the clinical laboratory departments of university hospitals, certified training facilities for clinical laboratories, and general hospitals in Yamaguchi Prefecture. The response rate was 47% from 215 medical institutions, including three commercial clinical laboratory centers. The results showed that there were some differences in management activities among facilities with respect to continuing education, the documentation or regulation of operational management for paper records, electronic information, remaining samples, genetic testing, and laboratory information for secondary use. They were suggested to be caused by differences in functions between university and general hospitals, differences in the scale of hospitals, or whether or not hospitals have received accreditation or ISO 15189. Regarding the IS, although the majority of facilities had sufficiently employed the access control to IS, there was some room for improvement in the management of special cases such as VIPs and patients with HIV infection. Furthermore, there were issues regarding the login method for computers shared by multiple staff, the showing of the names of personnel in charge of reports, and the risks associated with direct connections to systems and the Internet and the use of portable media such as USB memory sticks. These results indicated that further efforts are necessary for each facility to continue self-assessment and make improvements.
Laboratory directed research and development program, FY 1996
Energy Technology Data Exchange (ETDEWEB)
NONE
1997-02-01
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab) Laboratory Directed Research and Development Program FY 1996 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the projects supported and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development (LDRD) program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The Berkeley Lab LDRD program is a critical tool for directing the Laboratory`s forefront scientific research capabilities toward vital, excellent, and emerging scientific challenges. The program provides the resources for Berkeley Lab scientists to make rapid and significant contributions to critical national science and technology problems. The LDRD program also advances the Laboratory`s core competencies, foundations, and scientific capability, and permits exploration of exciting new opportunities. Areas eligible for support include: (1) Work in forefront areas of science and technology that enrich Laboratory research and development capability; (2) Advanced study of new hypotheses, new experiments, and innovative approaches to develop new concepts or knowledge; (3) Experiments directed toward proof of principle for initial hypothesis testing or verification; and (4) Conception and preliminary technical analysis to explore possible instrumentation, experimental facilities, or new devices.
Energy Technology Data Exchange (ETDEWEB)
Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science
2012-06-15
To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)
Laboratory Directed Research and Development Annual Report for 2009
International Nuclear Information System (INIS)
Hughes, Pamela J.
2010-01-01
This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalable synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.
Laboratory Directed Research and Development Annual Report for 2009
Energy Technology Data Exchange (ETDEWEB)
Hughes, Pamela J.
2010-03-31
This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalable synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.
Laboratory Directed Research and Development Program FY 2007 Annual Report
International Nuclear Information System (INIS)
Sjoreen, Terrence P.
2008-01-01
The Oak Ridge National LaboratoryLaboratory Directed Research and Development (LDRD) program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries for all ORNL LDRD research activities supported during FY 2007. The associated FY 2007 ORNL LDRD Self-Assessment (ORNL/PPA-2008/2) provides financial data and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R and D) to support DOE's overarching mission to advance the national, economic, and energy security of the United States and promote scientific and technological innovation in support of that mission. As a national resource, the Laboratory also applies its capabilities and skills to specific needs of other federal agencies and customers through the DOE Work for Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at http://www.ornl.gov/. LDRD is a relatively small but vital DOE program that allows ORNL, as well as other DOE laboratories, to select a limited number of R and D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating exploration of forefront science
Laboratory Directed Research and Development Program FY 2007 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Sjoreen, Terrence P [ORNL
2008-04-01
The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries for all ORNL LDRD research activities supported during FY 2007. The associated FY 2007 ORNL LDRD Self-Assessment (ORNL/PPA-2008/2) provides financial data and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching mission to advance the national, economic, and energy security of the United States and promote scientific and technological innovation in support of that mission. As a national resource, the Laboratory also applies its capabilities and skills to specific needs of other federal agencies and customers through the DOE Work for Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at http://www.ornl.gov/. LDRD is a relatively small but vital DOE program that allows ORNL, as well as other DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating
Chemical Security Analysis Center
Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...
Secure direct communication based on secret transmitting order of particles
International Nuclear Information System (INIS)
Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo
2006-01-01
We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication
Laboratory directed research and development program, FY 1996
International Nuclear Information System (INIS)
1997-02-01
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab) Laboratory Directed Research and Development Program FY 1996 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the projects supported and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development (LDRD) program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The Berkeley Lab LDRD program is a critical tool for directing the Laboratory's forefront scientific research capabilities toward vital, excellent, and emerging scientific challenges. The program provides the resources for Berkeley Lab scientists to make rapid and significant contributions to critical national science and technology problems. The LDRD program also advances the Laboratory's core competencies, foundations, and scientific capability, and permits exploration of exciting new opportunities. Areas eligible for support include: (1) Work in forefront areas of science and technology that enrich Laboratory research and development capability; (2) Advanced study of new hypotheses, new experiments, and innovative approaches to develop new concepts or knowledge; (3) Experiments directed toward proof of principle for initial hypothesis testing or verification; and (4) Conception and preliminary technical analysis to explore possible instrumentation, experimental facilities, or new devices
International Nuclear Information System (INIS)
1995-01-01
The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met
Controlled and secure direct communication using GHZ state and teleportation
International Nuclear Information System (INIS)
Gao, T.
2004-01-01
A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)
Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Multiparty quantum secret sharing of secure direct communication
International Nuclear Information System (INIS)
Zhang Zhanjun
2005-01-01
Based on the two-step protocol [F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68 (2003) 042317], we propose a (n,n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol, the sender's secure direct communication message can be extracted only if all the sharers collaborate. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considerably reduce the realization difficulty in experiment. In contrast to the use of multi-particle GHZ states in the case that the sharer number is larger than 3, the use and identification of Bell states are enough in our two protocols disregarding completely the sharer number, hence, our protocols are more feasible in technique
Directed Security Policies: A Stateful Network Implementation
Directory of Open Access Journals (Sweden)
Cornelius Diekmann
2014-05-01
Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.
Laboratory Directed Research and Development FY-15 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Pillai, Rekha Sukamar [Idaho National Lab. (INL), Idaho Falls, ID (United States)
2016-03-01
The Laboratory Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2015.
Quantum Secure Direct Communication with Five-Qubit Entangled State
International Nuclear Information System (INIS)
Lin Song; Liu Xiao-Fen; Gao Fei
2011-01-01
Recently, a genuine five-qubit entangled state has been achieved by Brown et al.[J. Phys. A 38 (2005) 1119]. Later it was indicated that this state can be used for quantum teleportation and quantum state sharing. Here we build a quantum secure direct communication protocol with this state, and prove that it is secure in ideal conditions. In the protocol, the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver. The receiver then performs projective determinate measurement to decode the secret message directly. Furthermore, this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. (general)
Laboratory directed research and development
Energy Technology Data Exchange (ETDEWEB)
1991-11-15
The purposes of Argonne's Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel concepts, enhance the Laboratory's R D capabilities, and further the development of its strategic initiatives. Among the aims of the projects supported by the Program are establishment of engineering proof-of-principle''; development of an instrumental prototype, method, or system; or discovery in fundamental science. Several of these project are closely associated with major strategic thrusts of the Laboratory as described in Argonne's Five Year Institutional Plan, although the scientific implications of the achieved results extend well beyond Laboratory plans and objectives. The projects supported by the Program are distributed across the major programmatic areas at Argonne. Areas of emphasis are (1) advanced accelerator and detector technology, (2) x-ray techniques in biological and physical sciences, (3) advanced reactor technology, (4) materials science, computational science, biological sciences and environmental sciences. Individual reports summarizing the purpose, approach, and results of projects are presented.
Laboratory Directed Research and Development Program FY98
Energy Technology Data Exchange (ETDEWEB)
Hansen, T. [ed.; Chartock, M.
1999-02-05
The Ernest Orlando Lawrence Berkeley National Laboratory (LBNL or Berkeley Lab) Laboratory Directed Research and Development Program FY 1998 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development (LDRD) program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The LBNL LDRD program is a critical tool for directing the Laboratory's forefront scientific research capabilities toward vital, excellent, and emerging scientific challenges. The program provides the resources for LBNL scientists to make rapid and significant contributions to critical national science and technology problems. The LDRD program also advances LBNL's core competencies, foundations, and scientific capability, and permits exploration of exciting new opportunities. All projects are work in forefront areas of science and technology. Areas eligible for support include the following: Advanced study of hypotheses, concepts, or innovative approaches to scientific or technical problems; Experiments and analyses directed toward ''proof of principle'' or early determination of the utility of new scientific ideas, technical concepts, or devices; and Conception and preliminary technical analyses of experimental facilities or devices.
Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement
International Nuclear Information System (INIS)
Shi Jin; Gong Yanxiao; Xu Ping; Zhu Shining; Zhan Youbang
2011-01-01
We propose two schemes for realizing quantum secure direct communication (QSDC) by using a set of ordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs) as quantum information channels. In the first scheme, the photons from Bob to Alice are transmitted only once. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs single-photon two-DOF Bell bases measurements on her photons. This scheme has better security than former QSDC protocols. In the second scheme, Bob transmits photons to Alice twice. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs two-photon Bell bases measurements on each DOF. The scheme has more information capacity than former QSDC protocols. (general)
Quantum Secure Direct Communication with Authentication Expansion Using Single Photons
International Nuclear Information System (INIS)
Yang Jing; Wang Chuan; Zhang Ru
2010-01-01
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.
Quantum secure direct communication by EPR pairs and entanglement swapping
Gao, T; Yan, F L; 10.1393/ncb/i2004-10090-1
2004-01-01
We present, a quantum secure direct communication scheme achieved by swapping quantum entanglement. In this scheme a set of ordered Einstein-Podolsky-Rosen (HPIl) pairs is used as a quantum information channel for sending secret messages directly. After insuring the safety of the quantum channel, the sender Alice encodes the secret messages directly by applying a series local operations on her particle sequences according to their stipulation. Using three EPR pairs, three bits of secret classical information can be faithfully transmitted from Alice to remote Bob without revealing any information to a potential eavesdropper. By both Alice and Bob's GHZ state measurement results, Bob is able to read out the encoded secret messages directly. The protocol is completely secure if perfect quantum channel is used, because there is not a transmission of the qubits carrying the secret message between Alice and Bob in the public channel.
Deterministic Secure Direct Communication Using Mixed state
Cai, Qing-yu
2003-01-01
We show an improved ping-pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002); quant-ph/0209040]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communication using a single photon resource. And this protocol can be can be carried out with great efficiency and speed using today's technology.
Semi-quantum Secure Direct Communication Scheme Based on Bell States
Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao
2018-06-01
Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.
Laboratory Directed Research and Development Program FY 2006 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Sjoreen, Terrence P [ORNL
2007-04-01
The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the US Departmental of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries all ORNL LDRD research activities supported during FY 2006. The associated FY 2006 ORNL LDRD Self-Assessment (ORNL/PPA-2007/2) provides financial data about the FY 2006 projects and an internal evaluation of the program's management process.
1995 Laboratory-Directed Research and Development Annual report
International Nuclear Information System (INIS)
Cauffman, D.P.; Shoaf, D.L.; Hill, D.A.; Denison, A.B.
1995-01-01
The Laboratory-Directed Research and Development Program (LDRD) is a key component of the discretionary research conducted by Lockheed Idaho Technologies Company (Lockheed Idaho) at the Idaho National Engineering Laboratory (INEL). The threefold purpose and goal of the LDRD program is to maintain the scientific and technical vitality of the INEL, respond to and support new technical opportunities, and enhance the agility and flexibility of the national laboratory and Lockheed Idaho to address the current and future missions of the Department of Energy
1995 Laboratory-Directed Research and Development Annual report
Energy Technology Data Exchange (ETDEWEB)
Cauffman, D.P.; Shoaf, D.L.; Hill, D.A.; Denison, A.B.
1995-12-31
The Laboratory-Directed Research and Development Program (LDRD) is a key component of the discretionary research conducted by Lockheed Idaho Technologies Company (Lockheed Idaho) at the Idaho National Engineering Laboratory (INEL). The threefold purpose and goal of the LDRD program is to maintain the scientific and technical vitality of the INEL, respond to and support new technical opportunities, and enhance the agility and flexibility of the national laboratory and Lockheed Idaho to address the current and future missions of the Department of Energy.
Reply to 'Comment on 'Secure direct communication with a quantum one-time-pad''
International Nuclear Information System (INIS)
Deng Fuguo; Long Guilu
2005-01-01
We reply to the preceding comment which focused on whether there exists a quantum privacy amplification technique for purifying the unknown single-photon states transmitted. In this Reply, we will show that quantum privacy amplification is principally possible, and a specific scheme for direct communication protocol based on single photons has been constructed and will be published elsewhere. Then the secure direct quantum communication is secure against the attack strategy in the preceding comment by using quantum privacy amplification directly
Laboratory-directed research and development
International Nuclear Information System (INIS)
Gerstl, S.A.W.; Caughran, A.B.
1992-05-01
This report summarizes progress from the Laboratory-Directed Research and Development (LDRD) program during fiscal year 1991. In addition to a programmatic and financial overview, the report includes progress reports from 230 individual R ampersand D projects in 9 scientific categories: atomic and molecular physics; biosciences; chemistry; engineering and base technologies; geosciences; space sciences, and astrophysics; materials sciences; mathematics and computational sciences; nuclear and particle physics; and plasmas, fluids, and particle beams
Sandia National Laboratories: About Sandia: History
Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement
International Nuclear Information System (INIS)
Gu Bin; Chen Yulin; Huang Yugai; Fang Xia
2011-01-01
We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)
Laboratory Directed Research and Development Program FY2016 Annual Summary of Completed Projects
Energy Technology Data Exchange (ETDEWEB)
None, None
2017-03-30
ORNL FY 2016 Annual Summary of Laboratory Directed Research and Development Program (LDRD) Completed Projects. The Laboratory Directed Research and Development (LDRD) program at ORNL operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (October 22, 2015), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. The LDRD program funds are obtained through a charge to all Laboratory programs. ORNL reports its status to DOE in March of each year.
Laboratory Directed Research and Development Program
Energy Technology Data Exchange (ETDEWEB)
Ogeka, G.J.
1991-12-01
Today, new ideas and opportunities, fostering the advancement of technology, are occurring at an ever-increasing rate. It, therefore, seems appropriate that a vehicle be available which fosters the development of these new ideas and technologies, promotes the early exploration and exploitation of creative and innovative concepts, and which develops new fundable'' R D projects and programs. At Brookhaven National Laboratory (BNL), one such method is through its Laboratory Directed Research and Development (LDRD) Program. This discretionary research and development tool is critical in maintaining the scientific excellence and vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor achieving and maintaining staff excellence, and a means to address national needs, with the overall mission of the Department of Energy (DOE) and the Brookhaven National Laboratory. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals, and presentations at meetings and forums.
The 1989 progress report: Polytechnic school laboratories' Direction
International Nuclear Information System (INIS)
1989-01-01
The 1989 progress report of the laboratories' Direction of the Polytechnic School (France) is presented. The research activities carried out in each laboratory are summarized. Scientific and technical cooperation, financial and employement aspects are included. The main fields of research are: biochemistry, chemistry, reaction mechanisms, organic synthesis, mechanics of solids, meteorology, irradiated solids, optics, physics, biophysics, lasers, mathematics, econometrics, epistemology, management and computer science [fr
1999 LDRD Laboratory Directed Research and Development
Energy Technology Data Exchange (ETDEWEB)
Rita Spencer; Kyle Wheeler
2000-06-01
This is the FY 1999 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.
ORNLs Laboratory Directed Research and Development Program FY 2010 Annual Report
Energy Technology Data Exchange (ETDEWEB)
None, None
2011-03-01
The Laboratory Directed Research and Development (LDRD) program at Oak Ridge National Laboratory (ORNL) reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries of all ORNL LDRD research activities supported during FY 2010. The associated FY 2010 ORNL LDRD Self-Assessment (ORNL/PPA-2011/2) provides financial data and an internal evaluation of the program’s management process.
ORNLs Laboratory Directed Research and Development Program FY 2009 Annual Report
Energy Technology Data Exchange (ETDEWEB)
None, None
2010-03-01
The Laboratory Directed Research and Development (LDRD) program at Oak Ridge National Laboratory (ORNL) reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries all ORNL LDRD research activities supported during FY 2009. The associated FY 2009 ORNL LDRD Self-Assessment (ORNL/PPA-2010/2) provides financial data and an internal evaluation of the program’s management process.
ORNLs Laboratory Directed Research and Development Program FY 2008 Annual Report
Energy Technology Data Exchange (ETDEWEB)
None, None
2009-03-01
The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries all ORNL LDRD research activities supported during FY 2008. The associated FY 2008 ORNL LDRD Self-Assessment (ORNL/PPA-2008/2) provides financial data and an internal evaluation of the program’s management process.
ORNLs Laboratory Directed Research and Development Program FY 2013 Annual Report
Energy Technology Data Exchange (ETDEWEB)
None, None
2014-03-01
The Laboratory Directed Research and Development (LDRD) program at Oak Ridge National Laboratory (ORNL) reports its status to the US Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries of all ORNL LDRD research activities supported during FY 2013. The associated FY 2013 ORNL LDRD Self-Assessment (ORNL/PPA-2014/2) provides financial data and an internal evaluation of the program’s management process.
ORNLs Laboratory Directed Research and Development Program FY 2012 Annual Report
Energy Technology Data Exchange (ETDEWEB)
None, None
2013-03-01
The Laboratory Directed Research and Development (LDRD) program at Oak Ridge National Laboratory (ORNL) reports its status to the US Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries of all ORNL LDRD research activities supported during FY 2012. The associated FY 2012 ORNL LDRD Self-Assessment (ORNL/PPA-2012/2) provides financial data and an internal evaluation of the program’s management process.
ORNLs Laboratory Directed Research and Development Program FY 2011 Annual Report
Energy Technology Data Exchange (ETDEWEB)
None, None
2012-03-01
The Laboratory Directed Research and Development (LDRD) program at Oak Ridge National Laboratory (ORNL) reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries of all ORNL LDRD research activities supported during FY 2011. The associated FY 2011 ORNL LDRD Self-Assessment (ORNL/PPA-2012/2) provides financial data and an internal evaluation of the program’s management process.
A Chaos-Based Secure Direct-Sequence/Spread-Spectrum Communication System
Directory of Open Access Journals (Sweden)
Nguyen Xuan Quyen
2013-01-01
Full Text Available This paper proposes a chaos-based secure direct-sequence/spread-spectrum (DS/SS communication system which is based on a novel combination of the conventional DS/SS and chaos techniques. In the proposed system, bit duration is varied according to a chaotic behavior but is always equal to a multiple of the fixed chip duration in the communication process. Data bits with variable duration are spectrum-spread by multiplying directly with a pseudonoise (PN sequence and then modulated onto a sinusoidal carrier by means of binary phase-shift keying (BPSK. To recover exactly the data bits, the receiver needs an identical regeneration of not only the PN sequence but also the chaotic behavior, and hence data security is improved significantly. Structure and operation of the proposed system are analyzed in detail. Theoretical evaluation of bit-error rate (BER performance in presence of additive white Gaussian noise (AWGN is provided. Parameter choice for different cases of simulation is also considered. Simulation and theoretical results are shown to verify the reliability and feasibility of the proposed system. Security of the proposed system is also discussed.
Sandia National Laboratories: CRISPR genome-editing technology
Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Sandia National Laboratories: Microsystems Science & Technology Center
Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Curiac, Daniel-Ioan
2016-04-07
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.
Energy Technology Data Exchange (ETDEWEB)
None
1993-12-23
The purposes of Argonne`s Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel concepts, enhance the Laboratory`s R&D capabilities, and further the development of its strategic initiatives. Projects are selected from proposals for creative and innovative R&D studies which are not yet eligible for timely support through normal programmatic channels. Among the aims of the projects supported by the Program are establishment of engineering ``proof-of-principle`` assessment of design feasibility for prospective facilities; development of an instrumental prototype, method, or system; or discovery in fundamental science. Several of these projects are closely associated with major strategic thrusts of the Laboratory as described in Argonne`s Five Year Institutional Plan, although the scientific implications of the achieved results extend well beyond Laboratory plans and objectives. The projects supported by the Program are distributed across the major programmatic areas at Argonne as indicated in the Laboratory LDRD Plan for FY 1993.
Quantum secure direct communication network with superdense coding and decoy photons
International Nuclear Information System (INIS)
Deng Fuguo; Li Xihan; Li Chunyan; Zhou Ping; Zhou Hongyu
2007-01-01
A quantum secure direct communication network scheme is proposed with quantum superdense coding and decoy photons. The servers on a passive optical network prepare and measure the quantum signal, i.e. a sequence of the d-dimensional Bell states. After confirming the security of the photons received from the receiver, the sender codes his secret message on them directly. For preventing a dishonest server from eavesdropping, some decoy photons prepared by measuring one photon in the Bell states are used to replace some original photons. One of the users on the network can communicate to any other one. This scheme has the advantage of high capacity, and it is more convenient than others as only a sequence of photons is transmitted in quantum line
International Nuclear Information System (INIS)
Han Lianfang; Chen Yueming; Yuan Hao
2009-01-01
We propose a deterministic quantum secure direct communication protocol by using dense coding. The two check photon sequences are used to check the securities of the channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthermore, this protocol has the advantage of high capacity and can be realized in the experiment. (general)
Deterministic secure direct communication using GHZ states and swapping quantum entanglement
International Nuclear Information System (INIS)
Gao, T; Yan, F L; Wang, Z X
2005-01-01
We present a deterministic secure direct communication scheme via entanglement swapping, where a set of ordered maximally entangled three-particle states (GHZ states), initially shared by three spatially separated parties, Alice, Bob and Charlie, functions as a quantum information channel. After ensuring the safety of the quantum channel, Alice and Bob apply a series of local operations on their respective particles according to the tripartite stipulation and the secret message they both want to send to Charlie. By three of Alice, Bob and Charlie's Bell measurement results, Charlie is able to infer the secret messages directly. The secret messages are faithfully transmitted from Alice and Bob to Charlie via initially shared pairs of GHZ states without revealing any information to a potential eavesdropper. Since there is no transmission of the qubits carrying the secret message between any two of them in the public channel, it is completely secure for direct secret communication if a perfect quantum channel is used
Toward a direct comparison of field and laboratory goniometer measurements
Dangel, S.; Verstraete, M.; Schopfer, J.; Kneubuehler, M.; Schaepman, M.E.; Itten, K.I.
2005-01-01
Field and laboratory goniometers are widely used in the remote sensing community to assess spectrodirectional reflection properties of selected targets. Even when the same target and goniometer system are used, field and laboratory results cannot directly be compared due to inherent differences,
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
Di Pietro, Roberto; Mancini, Luigi V.; Law, Y.W.; Etalle, Sandro; Havinga, Paul J.M.
In this paper, we present a mechanism for securing group communications in Wireless Sensor Networks (WSN). First, we derive an extension of Logical Key Hierarchy (LKH). Then we merge the extension with directed diffusion. The resulting protocol, LKHW, combines the advantages of both LKH and directed
Energy Technology Data Exchange (ETDEWEB)
Davis, G.; Mansur, D.L.; Ruhter, W.D.; Steele, E.; Strait, R.S.
1994-10-01
This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.
Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States
International Nuclear Information System (INIS)
Gao Fei; Qin Su-Juan; Guo Fen-Zhuo; Wen Qiao-Yan
2011-01-01
The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented. (general)
Laboratory Directed Research and Development FY-10 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Dena Tomchak
2011-03-01
The FY 2010 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support the future DOE missions and national research priorities. LDRD is essential to the INL -- it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enhances technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development.
Laboratory Directed Research and Development Program Assessment for FY 2014
Energy Technology Data Exchange (ETDEWEB)
Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)
2014-03-01
Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy in accordance with DOE Order 413.2B dated April 19, 2006. This report fulfills that requirement.
Laboratory directed research and development 2006 annual report.
Energy Technology Data Exchange (ETDEWEB)
Westrich, Henry Roger
2007-03-01
This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 2006. In addition to a programmatic and financial overview, the report includes progress reports from 430 individual R&D projects in 17 categories.
Laboratory Directed Research and Development annual report, fiscal year 1997
Energy Technology Data Exchange (ETDEWEB)
NONE
1998-03-01
The Department of Energy Order 413.2(a) establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 413.2, LDRD is research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. DOE Order 413.2 requires that each laboratory submit an annual report on its LDRD activities to the cognizant Secretarial Officer through the appropriate Operations Office Manager. The report provided in this document represents Pacific Northwest National Laboratory`s LDRD report for FY 1997.
New directions for African security
Haastrup, Toni; Dijkstra, Hylke
2017-01-01
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the
Laboratory Directed Research and Development FY 2000
International Nuclear Information System (INIS)
Hansen, Todd; Levy, Karin
2001-01-01
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Annual report on Laboratory Directed Research and Development for FY2000
2015 Fermilab Laboratory Directed Research & Development Program Plan
Energy Technology Data Exchange (ETDEWEB)
Wester, W., editor
2015-05-26
Fermilab is executing Laboratory Directed Research and Development (LDRD) as outlined by order DOE O 413.2B in order to enhance and realize the mission of the laboratory in a manner that also supports the laboratory’s strategic objectives and the mission of the Department of Energy. LDRD funds enable scientific creativity, allow for exploration of “high risk, high payoff” research, and allow for the demonstration of new ideas, technical concepts, and devices. LDRD also has an objective of maintaining and enhancing the scientific and technical vitality of Fermilab.
2014 Fermilab Laboratory Directed Research & Development Program Plan
Energy Technology Data Exchange (ETDEWEB)
Wester, W., editor
2016-05-26
Fermilab is executing Laboratory Directed Research and Development (LDRD) as outlined by order DOE O 413.2B in order to enhance and realize the mission of the laboratory in a manner that also supports the laboratory’s strategic objectives and the mission of the Department of Energy. LDRD funds enable scientific creativity, allow for exploration of “high risk, high payoff” research, and allow for the demonstration of new ideas, technical concepts, and devices. LDRD also has an objective of maintaining and enhancing the scientific and technical vitality of Fermilab.
Quantum secure direct communication scheme using a W state and teleportation
International Nuclear Information System (INIS)
Cao Haijing; Song Heshan
2006-01-01
A theoretical scheme for quantum secure direct communication (QSDC) is proposed, where a three-qubit symmetric W state functions as a quantum channel. Two legitimate communicators can transmit their secret information by using quantum teleportation and local measurements
2015 Fermilab Laboratory Directed Research & Development Annual Report
Energy Technology Data Exchange (ETDEWEB)
Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)
2016-05-26
The Fermi National Accelerator Laboratory (FNAL) is conducting a Laboratory Directed Research and Development (LDRD) program. Fiscal year 2015 represents the first full year of LDRD at Fermilab and includes seven projects approved mid-year in FY14 and six projects approved in FY15. One of the seven original projects has been completed just after the beginning of FY15. The implementation of LDRD at Fermilab is captured in the approved Fermilab 2015 LDRD Annual Program Plan. In FY15, the LDRD program represents 0.64% of Laboratory funding. The scope of the LDRD program at Fermilab will be established over the next couple of years where a portfolio of about 20 on-going projects representing approximately between 1% and 1.5% of the Laboratory funding is anticipated. This Annual Report focuses on the status of the current projects and provides an overview of the current status of LDRD at Fermilab.
Energy Technology Data Exchange (ETDEWEB)
Iveson, Steven W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). International Chemical Security Threat Reduction
2014-11-01
Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards are designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.
2016 Fermilab Laboratory Directed Research & Development Program Plan
Energy Technology Data Exchange (ETDEWEB)
Wester, W. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)
2016-05-25
Fermilab is executing Laboratory Directed Research and Development (LDRD) as outlined by order DOE O 413.2B in order to enhance and realize the mission of the laboratory in a manner that also supports the laboratory’s strategic objectives and the mission of the Department of Energy. LDRD funds enable scientific creativity, allow for exploration of “high risk, high payoff” research, and allow for the demonstration of new ideas, technical concepts, and devices. LDRD also has an objective of maintaining and enhancing the scientific and technical vitality of Fermilab. LDRD is able to fund employee-initiated proposals that address the current strategic objectives and better position Fermilab for future mission needs. The request for such funds is made in consideration of the investment needs, affordability, and directives from DOE and Congress. Review procedures of the proposals will insure that those proposals which most address the strategic goals of the DOE and the Laboratory or which best position Fermilab for the future will be recommended to the Laboratory Director who has responsibility for approval. The execution of each approved project will be the responsibility of the Principal Investigator, PI, who will follow existing Laboratory guidelines to ensure compliance with safety, environmental, and quality assurance practices. A Laboratory Director-appointed LDRD Coordinator will work with Committees, Laboratory Management, other Fermilab Staff, and the PI’s to oversee the implementation of policies and procedures of LDRD and provide the management and execution of this Annual Program Plan. FY16 represents third fiscal year in which LDRD has existed at Fermilab. The number of preliminary proposals (117) submitted in response to the LDRD Call for Proposals indicates very strong interest of the program within the Fermilab community. The first two Calls have resulted in thirteen active LDRD projects – and it is expected that between five and seven new
Robust Quantum Secure Direct Communication over Collective Rotating Channel
International Nuclear Information System (INIS)
Qin Sujuan; Gao Fei; Wen Qiaoyan; Zhu Fuchen
2010-01-01
A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique. (general)
Los Alamos National Laboratory A National Science Laboratory
Energy Technology Data Exchange (ETDEWEB)
Chadwick, Mark B. [Los Alamos National Laboratory
2012-07-20
Our mission as a DOE national security science laboratory is to develop and apply science, technology, and engineering solutions that: (1) Ensure the safety, security, and reliability of the US nuclear deterrent; (2) Protect against the nuclear threat; and (3) Solve Energy Security and other emerging national security challenges.
Laboratory Directed Research and Development FY 2000
Energy Technology Data Exchange (ETDEWEB)
Hansen, Todd; Levy, Karin
2001-02-27
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Annual report on Laboratory Directed Research and Development for FY2000.
Laboratory Directed Research and Development Annual Report FY 2017
Energy Technology Data Exchange (ETDEWEB)
Sullivan, Kelly O.
2018-03-30
A national laboratory must establish and maintain an environment in which creativity and innovation are encouraged and supported in order to fulfill its missions and remain viable in the long term. As such, multiprogram laboratories are given discretion to allocate a percentage of their operating budgets to support research and development projects that align to PNNL’s and DOE’s missions and support the missions of other federal agencies, including DHS, DOD, and others. DOE Order 413.2C sets forth DOE’s Laboratory Directed Research and Development (LDRD) policy and guidelines for DOE multiprogram laboratories, and it authorizes the national laboratories to allocate up to 6 percent of their operating budgets to fund the program. LDRD is innovative research and development, selected by the Laboratory Director or his/her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory. The projects supported by LDRD funding all have demonstrable ties to DOE/DHS missions and may also be relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff, which is needed to serve the highest priority DOE mission objectives. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline.
Laboratory Directed Research and Development Annual Report FY 2016
Energy Technology Data Exchange (ETDEWEB)
Sullivan, Kelly O. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
2017-03-30
A national laboratory must establish and maintain an environment in which creativity and innovation are encouraged and supported in order to fulfill its missions and remain viable in the long term. As such, multiprogram laboratories are given discretion to allocate a percentage of their operating budgets to support research and development projects that align to PNNL’s and DOE’s missions and support the missions of other federal agencies, including DHS, DOD, and others. DOE Order 413.2C sets forth DOE’s Laboratory Directed Research and Development (LDRD) policy and guidelines for DOE multiprogram laboratories, and it authorizes the national laboratories to allocate up to 6 percent of their operating budgets to fund the program. LDRD is innovative research and development, selected by the Laboratory Director or his/her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory. The projects supported by LDRD funding all have demonstrable ties to DOE/DHS missions and may also be relevant to the missions of other federal agencies that sponsor work at the Laboratory. The program plays a key role in attracting the best and brightest scientific staff, which is needed to serve the highest priority DOE mission objectives. Individual project reports comprise the bulk of this LDRD report. The Laboratory focuses its LDRD research on scientific assets that often address more than one scientific discipline.
Laboratory Directed Research and Development Program: FY 2015 Annual Report
Energy Technology Data Exchange (ETDEWEB)
SLAC,
2016-04-04
The Department of Energy (DOE) and the SLAC National Accelerator Laboratory (SLAC) encourage innovation, creativity, originality and quality to maintain the Laboratory’s research activities and staff at the forefront of science and technology. To further advance its scientific research capabilities, the Laboratory allocates a portion of its funds for the Laboratory Directed Research and Development (LDRD) program. With DOE guidance, the LDRD program enables SLAC scientists to make rapid and significant contributions that seed new strategies for solving important national science and technology problems. The LDRD program is conducted using existing research facilities.
Three-party quantum secret sharing of secure direct communication based on χ-type entangled states
International Nuclear Information System (INIS)
Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen
2010-01-01
Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)
Children's Emotional Security and Sleep: Longitudinal Relations and Directions of Effects
Keller, Peggy; El-Sheikh, Mona
2011-01-01
Background: We examined longitudinal relations between children's sleep and their emotional security in the mother-child, father-child, and parental marital relationships, with the goal of explicating the direction of association over time. Gender-related effects were also examined. Method: Sleep duration was examined through actigraphy, and sleep…
Cyber/Physical Security Vulnerability Assessment Integration
International Nuclear Information System (INIS)
MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.
2011-01-01
This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.
Smart Grid Integration Laboratory
Energy Technology Data Exchange (ETDEWEB)
Troxell, Wade [Colorado State Univ., Fort Collins, CO (United States)
2011-12-22
The initial federal funding for the Colorado State University Smart Grid Integration Laboratory is through a Congressionally Directed Project (CDP), DE-OE0000070 Smart Grid Integration Laboratory. The original program requested in three one-year increments for staff acquisition, curriculum development, and instrumentation all which will benefit the Laboratory. This report focuses on the initial phase of staff acquisition which was directed and administered by DOE NETL/ West Virginia under Project Officer Tom George. Using this CDP funding, we have developed the leadership and intellectual capacity for the SGIC. This was accomplished by investing (hiring) a core team of Smart Grid Systems engineering faculty focused on education, research, and innovation of a secure and smart grid infrastructure. The Smart Grid Integration Laboratory will be housed with the separately funded Integrid Laboratory as part of CSU's overall Smart Grid Integration Center (SGIC). The period of performance of this grant was 10/1/2009 to 9/30/2011 which included one no cost extension due to time delays in faculty hiring. The Smart Grid Integration Laboratory's focus is to build foundations to help graduate and undergraduates acquire systems engineering knowledge; conduct innovative research; and team externally with grid smart organizations. Using the results of the separately funded Smart Grid Workforce Education Workshop (May 2009) sponsored by the City of Fort Collins, Northern Colorado Clean Energy Cluster, Colorado State University Continuing Education, Spirae, and Siemens has been used to guide the hiring of faculty, program curriculum and education plan. This project develops faculty leaders with the intellectual capacity to inspire its students to become leaders that substantially contribute to the development and maintenance of Smart Grid infrastructure through topics such as: (1) Distributed energy systems modeling and control; (2) Energy and power conversion; (3
Energy Technology Data Exchange (ETDEWEB)
Rice, M.
1991-12-31
On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.
Laboratory Directed Research and Development FY 1998 Progress Report
Energy Technology Data Exchange (ETDEWEB)
John Vigil; Kyle Wheeler
1999-04-01
This is the FY 1998 Progress Report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principle investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic, molecular, optical, and plasma physics, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.
Laboratory directed research and development: FY 1997 progress report
Energy Technology Data Exchange (ETDEWEB)
Vigil, J.; Prono, J. [comps.
1998-05-01
This is the FY 1997 Progress Report for the Laboratory Directed Research and Development (LDRD) program at Los Alamos National Laboratory. It gives an overview of the LDRD program, summarizes work done on individual research projects, relates the projects to major Laboratory program sponsors, and provides an index to the principal investigators. Project summaries are grouped by their LDRD component: Competency Development, Program Development, and Individual Projects. Within each component, they are further grouped into nine technical categories: (1) materials science, (2) chemistry, (3) mathematics and computational science, (4) atomic and molecular physics and plasmas, fluids, and particle beams, (5) engineering science, (6) instrumentation and diagnostics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) bioscience.
Laboratory Directed Research and Development Program. Annual report
Energy Technology Data Exchange (ETDEWEB)
Ogeka, G.J.
1991-12-01
Today, new ideas and opportunities, fostering the advancement of technology, are occurring at an ever-increasing rate. It, therefore, seems appropriate that a vehicle be available which fosters the development of these new ideas and technologies, promotes the early exploration and exploitation of creative and innovative concepts, and which develops new ``fundable`` R&D projects and programs. At Brookhaven National Laboratory (BNL), one such method is through its Laboratory Directed Research and Development (LDRD) Program. This discretionary research and development tool is critical in maintaining the scientific excellence and vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor achieving and maintaining staff excellence, and a means to address national needs, with the overall mission of the Department of Energy (DOE) and the Brookhaven National Laboratory. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals, and presentations at meetings and forums.
2010-07-01
... account in the commercial book-entry system maintained by our agent, and will sell the security on your... will be returned to your TreasuryDirect ® account. (b) Fee. We charge a fee for each security sold on... the proceeds of the sale. If our agent is unable to complete the sale, no fee will be charged. The...
The future of infrastructure security :
Energy Technology Data Exchange (ETDEWEB)
Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.
2013-05-01
Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.
Timely integration of safeguards and security with projects at Los Alamos National Laboratory
International Nuclear Information System (INIS)
Price, R.; Blount, P.M.; Garcia, S.W.; Gonzales, R.L.; Salazar, J.B.; Campbell, C.H.
2004-01-01
The Safeguards and Security (S and S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S and S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S and S professional to oversee, coordinate, facilitate, and communicate among the identified S and S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We
33 CFR 101.405 - Maritime Security (MARSEC) Directives.
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...
Lossless quantum data compression and secure direct communication
Boström, Kim
2004-07-01
This thesis deals with the encoding and transmission of information through a quantum channel. A quantum channel is a quantum mechanical system whose state is manipulated by a sender and read out by a receiver. The individual state of the channel represents the message. The two topics of the thesis comprise 1) the possibility of compressing a message stored in a quantum channel without loss of information and 2) the possibility to communicate a message directly from one party to another in a secure manner, that is, a third party is not able to eavesdrop the message without being detected. The main results of the thesis are the following. A general framework for variable-length quantum codes is worked out. These codes are necessary to make lossless compression possible. Due to the quantum nature of the channel, the encoded messages are in general in a superposition of different lengths. It is found to be impossible to compress a quantum message without loss of information if the message is not apriori known to the sender. In the other case it is shown that lossless quantum data compression is possible and a lower bound on the compression rate is derived. Furthermore, an explicit compression scheme is constructed that works for arbitrarily given source message ensembles. A quantum cryptographic protocol - the “ping-pong protocol” - is presented that realizes the secure direct communication of classical messages through a quantum channel. The security of the protocol against arbitrary eavesdropping attacks is proven for the case of an ideal quantum channel. In contrast to other quantum cryptographic protocols, the ping-pong protocol is deterministic and can thus be used to transmit a random key as well as a composed message. The protocol is perfectly secure for the transmission of a key, and it is quasi-secure for the direct transmission of a message. The latter means that the probability of successful eavesdropping exponentially decreases with the length of the
Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?
Directory of Open Access Journals (Sweden)
Jakniūnaitė Dovilė
2014-12-01
Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.
Laboratory Directed Research and Development FY 2000 Annual Progress Report
Energy Technology Data Exchange (ETDEWEB)
Los Alamos National Laboratory
2001-05-01
This is the FY00 Annual Progress report for the Laboratory Directed Research and Development (LDRD) Program at Los Alamos National Laboratory. It gives an overview of the LDRD Program, summarizes progress on each project conducted during FY00, characterizes the projects according to their relevance to major funding sources, and provides an index to principal investigators. Project summaries are grouped by LDRD component: Directed Research and Exploratory Research. Within each component, they are further grouped into the ten technical categories: (1) atomic, molecular, optical, and plasma physics, fluids, and beams, (2) bioscience, (3) chemistry, (4) computer science and software engineering, (5) engineering science, (6) geoscience, space science, and astrophysics, (7) instrumentation and diagnostics, (8) materials science, (9) mathematics, simulation, and modeling, and (10) nuclear and particle physics.
LABORATORY DIRECTED RESEARCH AND DEVELOPMENT PROGRAM ACTIVITIES FOR FY2002.
Energy Technology Data Exchange (ETDEWEB)
FOX,K.J.
2002-12-31
Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 1 3.2A, ''Laboratory Directed Research and Development,'' January 8, 2001, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 413.2A. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
Di Pietro, Roberto; Mancini, Luigi V.; Law, Y.W.; Etalle, Sandro; Havinga, Paul J.M.; Huang, C.H; Ramanujam, J.
2003-01-01
We present a mechanism for securing group communications in Wireless Sensor Networks (WSN). First, we derive an extension of Logical Key Hierarchy (LKH). Then we merge the extension with Directed Diffusion (DD). The resulting protocol, LKHW, combines the advantages of both LKH and DD. In particular,
Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report
International Nuclear Information System (INIS)
Bender, Howard
2011-01-01
This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.
Laboratory directed research and development program FY 1999
Energy Technology Data Exchange (ETDEWEB)
Hansen, Todd; Levy, Karin
2000-03-08
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. This is the annual report on Laboratory Directed Research and Development (LDRD) program for FY99.
Laboratory Directed Research and Development Program FY 2001
Energy Technology Data Exchange (ETDEWEB)
Hansen, Todd; Levy, Karin
2002-03-15
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. This is the annual report on Laboratory Directed Research and Development (LDRD) program for FY01.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-11-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Energy Technology Data Exchange (ETDEWEB)
Ruhter, W.D.; Strait, R.S.; Mansur, D.L.; Davis, G.
1993-10-01
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the fourth quarter of Fiscal Year 1993 (July through September, 1993). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise. These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in five areas: Safeguards Technology, Safeguard System Studies, Computer Security, DOE Automated Physical Security and DOE Automated Visitor Access Control System. The remainder of this report describes the activities in each of these five areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.
Remote Laboratories Framework : Focus on Reusability and Security in m-Learning Situations
Directory of Open Access Journals (Sweden)
Jeremy Lardon
2009-08-01
Full Text Available Remote laboratories is a spreading concept which allows the remote use of devices through Internet connexion. The paper deals with the providing of a framework which is reusable for many devices, from different end-user media such as phone, computer or TV and acceptable in industry, therefore taking into account multi information systems securities. The problem is addressed through the point of view of m-learning situations which involves the lack of rich user interactions and the fact that the user belongs to external information systems when he interacts with the remote device. The modelisation of the remote device with ontologies, the use of a central application server, message oriented middleware and standard web services (database, authentication are the keys allowing the independence of the framework to the device. The adaptation of the GUI to the end-user device is made through a proxy which refactor the requests and responses according to the capabilities of the end-user device (size of screen, interactions tools. The use of a user-centric model of identities federation allows us to provide an efficient way to reach the goal of transparency to security constraints.
Summary Report for the Radiation Detection for Nuclear Security Summer School 2012
Energy Technology Data Exchange (ETDEWEB)
Runkle, Robert C.; Baciak, James E.; Stave, Jean A.
2012-08-22
The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.
Summary Report for the Radiation Detection for Nuclear Security Summer School 2014
Energy Technology Data Exchange (ETDEWEB)
Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
2014-09-01
Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.
Energy Technology Data Exchange (ETDEWEB)
Erickson, Michael Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
2015-11-10
Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.
Micro-droplet based directed evolution outperforms conventional laboratory evolution
DEFF Research Database (Denmark)
Sjostrom, Staffan L.; Huang, Mingtao; Nielsen, Jens
2014-01-01
We present droplet adaptive laboratory evolution (DrALE), a directed evolution method used to improve industrial enzyme producing microorganisms for e.g. feedstock digestion. DrALE is based linking a desired phenotype to growth rate allowing only desired cells to proliferate. Single cells are con...... a whole-genome mutated library of yeast cells for α-amylase activity....
Orteiza, N; Linder, J E; Rice, W R
2005-09-01
The empirical foundation for sexual conflict theory is the data from many different taxa demonstrating that females are harmed while interacting with males. However, the interpretation of this keystone evidence has been challenged because females may more than counterbalance the direct costs of interacting with males by the indirect benefits of obtaining higher quality genes for their offspring. A quantification of this trade-off is critical to resolve the controversy and is presented here. A multi-generation fitness assay in the Drosophila melanogaster laboratory model system was used to quantify both the direct costs to females due to interactions with males and indirect benefits via sexy sons. We specifically focus on the interactions that occur between males and nonvirgin females. In the laboratory environment of our base population, females mate soon after eclosion and store sufficient sperm for their entire lifetime, yet males persistently court these nonvirgin females and frequently succeed in re-mating them. Females may benefit from these interactions despite direct costs to their lifetime fecundity if re-mating allows them to trade-up to mates of higher genetic quality and thereby secure indirect benefits for their offspring. We found that direct costs of interactions between males and nonvirgin females substantially exceeded indirect benefits through sexy sons. These data, in combination with past studies of the good genes route of indirect benefits, demonstrate that inter-sexual interactions drive sexually antagonistic co-evolution in this model system.
A New Quantum Secure Direct Communication Scheme with Authentication
International Nuclear Information System (INIS)
Dan, Liu; Chang-Xing, Pei; Dong-Xiao, Quan; Nan, Zhao
2010-01-01
A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting
Nevada National Security Site-Directed Research and Development FY 2011 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Howard Bender, comp.
2012-04-25
This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.
Amplifying Security Education in the Laboratory
National Research Council Canada - National Science Library
Irvine, Cynthia
1999-01-01
Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...
Geiger, Ben Baumberg; Garthwaite, Kayleigh; Warren, Jon; Bambra, Clare
2017-08-25
It has been argued that social security disability assessments should directly assess claimants' work capacity, rather than relying on proxies such as on functioning. However, there is little academic discussion of how such assessments could be conducted. The article presents an account of different models of direct disability assessments based on case studies of the Netherlands, Germany, Denmark, Norway, the United States of America, Canada, Australia, and New Zealand, utilising over 150 documents and 40 expert interviews. Three models of direct work disability assessments can be observed: (i) structured assessment, which measures the functional demands of jobs across the national economy and compares these to claimants' functional capacities; (ii) demonstrated assessment, which looks at claimants' actual experiences in the labour market and infers a lack of work capacity from the failure of a concerned rehabilitation attempt; and (iii) expert assessment, based on the judgement of skilled professionals. Direct disability assessment within social security is not just theoretically desirable, but can be implemented in practice. We have shown that there are three distinct ways that this can be done, each with different strengths and weaknesses. Further research is needed to clarify the costs, validity/legitimacy, and consequences of these different models. Implications for rehabilitation It has recently been argued that social security disability assessments should directly assess work capacity rather than simply assessing functioning - but we have no understanding about how this can be done in practice. Based on case studies of nine countries, we show that direct disability assessment can be implemented, and argue that there are three different ways of doing it. These are "demonstrated assessment" (using claimants' experiences in the labour market), "structured assessment" (matching functional requirements to workplace demands), and "expert assessment" (the
Liu, Zhi-Hao; Chen, Han-Wu
2018-02-01
As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.
Idaho National Laboratory Directed Research and Development FY-2009
Energy Technology Data Exchange (ETDEWEB)
2010-03-01
The FY 2009 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support the future DOE missions and national research priorities. LDRD is essential to the INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enhances technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development. Established by Congress in 1991, LDRD proves its benefit each year through new programs, intellectual property, patents, copyrights, publications, national and international awards, and new hires from the universities and industry, which helps refresh the scientific and engineering workforce. The benefits of INL's LDRD research are many as shown in the tables below. Last year, 91 faculty members from various universities contributed to LDRD research, along with 7 post docs and 64 students. Of the total invention disclosures submitted in FY 2009, 7 are attributable to LDRD research. Sixty three refereed journal articles were accepted or published, and 93 invited presentations were attributable to LDRD research conducted in FY 2009. The LDRD Program is administered in accordance with requirements set in DOE Order 413.2B, accompanying contractor requirements, and other DOE and federal requirements invoked through the INL contract. The LDRD Program is implemented in accordance with the annual INL LDRD Program Plan, which is approved by the DOE, Nuclear Energy Program Secretarial Office. This plan outlines the method the laboratory uses to develop its research portfolio, including peer and management reviews, and the use of other INL management systems to ensure quality, financial, safety, security and environmental requirements and risks are
[Laboratory diagnosis of genital herpes--direct immunofluorescence method].
Majewska, Anna; Romejko-Wolniewicz, Ewa; Zareba-Szczudlik, Julia; Kilijańczyk, Marek; Gajewska, Małgorzata; Młynarczyk, Grazyna
2013-07-01
Aim of the study was to determine clinical usefulness of direct immunofluorescence method in the laboratory diagnosis of genital herpes in women. Overall 187 anogenital swabs were collected from 120 women. Using a dacron-tipped applicator 83 swabs were collected from women suspected of genital herpes and 104 from patients with no signs of genital infection. All samples were tested using cell culture (Vero cell line) and then direct immunofluorescence method (DIF) for the identification of antigens of herpes simplex viruses: HSV-1 and HSV-2. Characteristic cytopathic effect (CPE), indicative of alphaherpesvirus infection, was observed in 43.4% of cultures with clinical specimens collected from women with suspected genital herpes and in 29.8% of cultures of clinical specimens taken from patients with no clinical symptoms of genital herpes. Herpes simplex viruses were determined in 73 samples by direct immunofluorescence method after amplification of the virus in cell culture. The DIF test confirmed the diagnosis based on the microscopic CPE observation in 85%. In 15% of samples (taken from pregnant women without clinical signs of infection) we reported positive immunofluorescence in the absence of CPE. The frequency of antigen detection was statistically significantly higher in samples that were positive by culture study (chi-square test with Yates's correction, p genital herpes in swabs taken from the vestibule of the vagina and the vulva. However, there was no statistically significant difference in the frequency of detection of Herpes Simplex Virus antigens in specimens from different parts of the genital tract in both groups of women (chi-square test, p > 0.05). In our study HHV-1 was the main causative agent of genital herpes. The growing worldwide prevalence of genital herpes, challenges with the clinical diagnosis, and availability of effective antiviral therapy are the main reasons for a growing interest in rapid, proper laboratory diagnosis of infected
Future Direction of the Instrumentation and Control System for Security of Nuclear Facilities
International Nuclear Information System (INIS)
Kim, Woo Jin; Kim, Jae Kwang
2014-01-01
Instrumentation and control systems are pervasively used as a vital component in modern industries. Nuclear facilities, such as nuclear power plants (NPPs), originally use I and C systems for plant status monitoring, processes control, and many other purposes. After some events that raised security concerns, application areas of I and C systems have been expanded to physical protection of nuclear material and facilities. As nuclear policies over the world are strengthening security issues, the future direction of roles and technical requirements of security related I and C systems is described: An introduction of I and C systems, especially digitalized I and C systems, to security of nuclear facilities requires many careful considerations, such as system integration, verification and validation (V/V), etc. Institute of Nuclear Nonproliferation and Control (KINAC) established 'International Nuclear Nonproliferation and Security Academy, INSA' in 2014. One of the main achievements of INSA is test-bed implementation for technical criteria development of nuclear facilities' physical protection systems (PPSs) as well as for education and training of those systems. The test bed was modified and improved more suitably from the previous version to modern PPSs including state-of-the-art I and C technologies. KINAC is confident in the new test bed to become a fundamental technical basis of security related I and C systems in near future
Laboratory directed research and development program FY 1997
International Nuclear Information System (INIS)
1998-03-01
This report compiles the annual reports of Laboratory Directed Research and Development projects supported by the Berkeley Lab. Projects are arranged under the following topical sections: (1) Accelerator and fusion research division; (2) Chemical sciences division; (3) Computing Sciences; (4) Earth sciences division; (5) Environmental energy technologies division; (6) life sciences division; (7) Materials sciences division; (8) Nuclear science division; (9) Physics division; (10) Structural biology division; and (11) Cross-divisional. A total of 66 projects are summarized
Laboratory directed research and development program FY 1997
Energy Technology Data Exchange (ETDEWEB)
NONE
1998-03-01
This report compiles the annual reports of Laboratory Directed Research and Development projects supported by the Berkeley Lab. Projects are arranged under the following topical sections: (1) Accelerator and fusion research division; (2) Chemical sciences division; (3) Computing Sciences; (4) Earth sciences division; (5) Environmental energy technologies division; (6) life sciences division; (7) Materials sciences division; (8) Nuclear science division; (9) Physics division; (10) Structural biology division; and (11) Cross-divisional. A total of 66 projects are summarized.
LBNL Laboratory Directed Research and Development Program FY2016
Energy Technology Data Exchange (ETDEWEB)
Ho, D.
2017-03-01
The Berkeley Lab Laboratory Directed Research and Development Program FY2016 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the LDRD program planning and documentation process that includes an annual planning cycle, project selection, implementation and review.
Laboratory directed research and development. FY 1995 progress report
Energy Technology Data Exchange (ETDEWEB)
Vigil, J.; Prono, J. [comps.
1996-03-01
This document presents an overview of Laboratory Directed Research and Development Programs at Los Alamos. The nine technical disciplines in which research is described include materials, engineering and base technologies, plasma, fluids, and particle beams, chemistry, mathematics and computational science, atmic and molecular physics, geoscience, space science, and astrophysics, nuclear and particle physics, and biosciences. Brief descriptions are provided in the above programs.
Amerimehr, Ali; Hadain Dehkordi, Massoud
2018-03-01
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
Energy Technology Data Exchange (ETDEWEB)
Davis, G.; Mansur, D.L.; Ruhter, W.D.; Strauch, M.S.
1997-01-01
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the First Quarter of Fiscal Year 1997 (October through December, 1996). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise. These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in four areas: (1) safeguards technology; (2) safeguards and material accountability; (3) computer security--distributed systems; and (4) physical and personnel security support. The remainder of this report describes the activities in each of these four areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.
Energy Technology Data Exchange (ETDEWEB)
Office of the Director
2010-04-09
I am pleased to submit Argonne National Laboratory's Annual Report on its Laboratory Directed Research and Development (LDRD) activities for fiscal year 2009. Fiscal year 2009 saw a heightened focus by DOE and the nation on the need to develop new sources of energy. Argonne scientists are investigating many different sources of energy, including nuclear, solar, and biofuels, as well as ways to store, use, and transmit energy more safely, cleanly, and efficiently. DOE selected Argonne as the site for two new Energy Frontier Research Centers (EFRCs) - the Institute for Atom-Efficient Chemical Transformations and the Center for Electrical Energy Storage - and funded two other EFRCs to which Argonne is a major partner. The award of at least two of the EFRCs can be directly linked to early LDRD-funded efforts. LDRD has historically seeded important programs and facilities at the lab. Two of these facilities, the Advanced Photon Source and the Center for Nanoscale Materials, are now vital contributors to today's LDRD Program. New and enhanced capabilities, many of which relied on LDRD in their early stages, now help the laboratory pursue its evolving strategic goals. LDRD has, since its inception, been an invaluable resource for positioning the Laboratory to anticipate, and thus be prepared to contribute to, the future science and technology needs of DOE and the nation. During times of change, LDRD becomes all the more vital for facilitating the necessary adjustments while maintaining and enhancing the capabilities of our staff and facilities. Although I am new to the role of Laboratory Director, my immediate prior service as Deputy Laboratory Director for Programs afforded me continuous involvement in the LDRD program and its management. Therefore, I can attest that Argonne's program adhered closely to the requirements of DOE Order 413.2b and associated guidelines governing LDRD. Our LDRD program management continually strives to be more efficient. In
International Nuclear Information System (INIS)
2010-01-01
I am pleased to submit Argonne National Laboratory's Annual Report on its Laboratory Directed Research and Development (LDRD) activities for fiscal year 2009. Fiscal year 2009 saw a heightened focus by DOE and the nation on the need to develop new sources of energy. Argonne scientists are investigating many different sources of energy, including nuclear, solar, and biofuels, as well as ways to store, use, and transmit energy more safely, cleanly, and efficiently. DOE selected Argonne as the site for two new Energy Frontier Research Centers (EFRCs) - the Institute for Atom-Efficient Chemical Transformations and the Center for Electrical Energy Storage - and funded two other EFRCs to which Argonne is a major partner. The award of at least two of the EFRCs can be directly linked to early LDRD-funded efforts. LDRD has historically seeded important programs and facilities at the lab. Two of these facilities, the Advanced Photon Source and the Center for Nanoscale Materials, are now vital contributors to today's LDRD Program. New and enhanced capabilities, many of which relied on LDRD in their early stages, now help the laboratory pursue its evolving strategic goals. LDRD has, since its inception, been an invaluable resource for positioning the Laboratory to anticipate, and thus be prepared to contribute to, the future science and technology needs of DOE and the nation. During times of change, LDRD becomes all the more vital for facilitating the necessary adjustments while maintaining and enhancing the capabilities of our staff and facilities. Although I am new to the role of Laboratory Director, my immediate prior service as Deputy Laboratory Director for Programs afforded me continuous involvement in the LDRD program and its management. Therefore, I can attest that Argonne's program adhered closely to the requirements of DOE Order 413.2b and associated guidelines governing LDRD. Our LDRD program management continually strives to be more efficient. In addition to
International Nuclear Information System (INIS)
Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong
2011-01-01
We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)
Cloud Security: Issues and Research Directions
2014-11-18
4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et
International Nuclear Information System (INIS)
MILLER, MARC M.; YONEK JR., GEORGE A.
2001-01-01
Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access
Laboratory directed research and development. FY 1991 program activities: Summary report
Energy Technology Data Exchange (ETDEWEB)
1991-11-15
The purposes of Argonne`s Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel concepts, enhance the Laboratory`s R&D capabilities, and further the development of its strategic initiatives. Among the aims of the projects supported by the Program are establishment of engineering ``proof-of-principle``; development of an instrumental prototype, method, or system; or discovery in fundamental science. Several of these project are closely associated with major strategic thrusts of the Laboratory as described in Argonne`s Five Year Institutional Plan, although the scientific implications of the achieved results extend well beyond Laboratory plans and objectives. The projects supported by the Program are distributed across the major programmatic areas at Argonne. Areas of emphasis are (1) advanced accelerator and detector technology, (2) x-ray techniques in biological and physical sciences, (3) advanced reactor technology, (4) materials science, computational science, biological sciences and environmental sciences. Individual reports summarizing the purpose, approach, and results of projects are presented.
Gu, Jun; Lin, Po-hua; Hwang, Tzonelih
2018-07-01
Recently, Zou and Qiu (Sci China Phys Mech Astron 57:1696-1702, 2014) proposed a three-step semi-quantum secure direct communication protocol allowing a classical participant who does not have a quantum register to securely send his/her secret message to a quantum participant. However, this study points out that an eavesdropper can use the double C-NOT attack to obtain the secret message. To solve this problem, a modification is proposed.
Federal Laboratory Consortium — For more than 60 years, Sandia has delivered essential science and technology to resolve the nation's most challenging security issues.Sandia National Laboratories...
Energy Technology Data Exchange (ETDEWEB)
Ogeka, G.J.; Romano, A.J.
1993-12-01
At Brookhaven National Laboratory the Laboratory Directed Research and Development (LDRD) Program is a discretionary research and development tool critical in maintaining the scientific excellence and vitality of the laboratory. It is also a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor in achieving and maintaining staff excellence, and a means to address national needs, within the overall mission of the Department of Energy and Brookhaven National Laboratory. This report summarizes research which was funded by this program during fiscal year 1993. The research fell in a number of broad technical and scientific categories: new directions for energy technologies; global change; radiation therapies and imaging; genetic studies; new directions for the development and utilization of BNL facilities; miscellaneous projects. Two million dollars in funding supported 28 projects which were spread throughout all BNL scientific departments.
75 FR 26089 - Securities Held in TreasuryDirect
2010-05-11
... security? A closed book period will be in effect for four business days prior to the date a marketable... advance purchase. Marketable security purchases scheduled before May 15, 2010, to take effect after July 9... period of four business days prior to the date a scheduled marketable security interest and/or maturity...
1997 Laboratory directed research and development. Annual report
Energy Technology Data Exchange (ETDEWEB)
Meyers, C.E.; Harvey, C.L.; Chavez, D.L.; Whiddon, C.P. [comps.
1997-12-31
This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 1997. In addition to a programmatic and financial overview, the report includes progress reports from 218 individual R&D projects in eleven categories. Theses reports are grouped into the following areas: materials science and technology; computer sciences; electronics and photonics; phenomenological modeling and engineering simulation; manufacturing science and technology; life-cycle systems engineering; information systems; precision sensing and analysis; environmental sciences; risk and reliability; national grand challenges; focused technologies; and reserve.
Laboratory directed research and development annual report: Fiscal year 1992
International Nuclear Information System (INIS)
1993-01-01
The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ''research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our ''core competencies.'' Currently, PNL's core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project
A Cyber Security Self-Assessment Method for Nuclear Power Plants
Energy Technology Data Exchange (ETDEWEB)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.
A Cyber Security Self-Assessment Method for Nuclear Power Plants
International Nuclear Information System (INIS)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-01-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process
International Nuclear Information System (INIS)
Mullen, M.
1996-01-01
In April 1994, a new program of cooperation on nuclear materials protection, control, and accounting (MPC and A) was initiated between (1) the US Department of Energy and its laboratories and (2) nuclear institutes and enterprises of the Russian Federation. The program is called the Laboratory-to-Laboratory Nuclear Materials Protection, Control, and Accounting Program (Lab-to-Lab MPC and A Program); it is one of several, complementary US-Russian MPC and A programs. The purpose of the Lab-to-Lab MPC and A Program is to accelerate progress toward a goal that is vital to the national security interests of both countries: reducing the risk of nuclear weapons proliferation by strengthening MPC and A systems. In its first two years, the program has made significant progress and has expanded to include many additional Russian participants. It has also fostered a spirit of mutual understanding, partnership, and respect between US and Russian nuclear specialists, which has paved the way for advances in other MPC and A and nuclear security cooperative efforts. This paper reviews the current status of the program. In addition to summarizing the background and objectives of the program, the paper describes highlights of recent work and outlines future directions for Lab-to-Lab MPC and A cooperation
Security and Emergency Management Division
Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...
A Portable Computer Security Workshop
Wagner, Paul J.; Phillips, Andrew T.
2006-01-01
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
Laboratory Directed Research and Development Program, FY 1992
Energy Technology Data Exchange (ETDEWEB)
1993-01-01
This report is compiled from annual reports submitted by principal investigators following the close of the 1992 fiscal year. It describes the projects supported and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The Divisions that report include: Accelerator and Fusion Research, Chemical Sciences, Earth Sciences, Energy and Environment, Engineering, Environment and Safety and Health, Information and Computing Sciences, Life Sciences, Materials Sciences, Nuclear Science, Physics and Structural Biology.
Laboratory Directed Research and Development Program, FY 1992
International Nuclear Information System (INIS)
1993-01-01
This report is compiled from annual reports submitted by principal investigators following the close of the 1992 fiscal year. It describes the projects supported and summarizes their accomplishments. It constitutes a part of the Laboratory Directed Research and Development program planning and documentation process that includes an annual planning cycle, projection selection, implementation, and review. The Divisions that report include: Accelerator and Fusion Research, Chemical Sciences, Earth Sciences, Energy and Environment, Engineering, Environment and Safety and Health, Information and Computing Sciences, Life Sciences, Materials Sciences, Nuclear Science, Physics and Structural Biology
Nuclear Security Education Program at the Pennsylvania State University
International Nuclear Information System (INIS)
Uenlue, Kenan; Jovanovic, Igor
2015-01-01
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale
Nuclear Security Education Program at the Pennsylvania State University
Energy Technology Data Exchange (ETDEWEB)
Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)
2015-07-01
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale
Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report
International Nuclear Information System (INIS)
Bender, Howard
2012-01-01
This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.
LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DOE - DECEMBER 2001
International Nuclear Information System (INIS)
FOX, K.J.
2001-01-01
Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about$450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2, ''Laboratory Directed Research and Development,'' March 5, 1997, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 4 13.2. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R and D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which becomes a major factor in achieving and maintaining staff excellence
Energy Technology Data Exchange (ETDEWEB)
None
1995-02-25
The purposes of Argonne's Laboratory Directed Research and Development (LDRD) Program are to encourage the development of novel concepts, enhance the Laboratory's R and D capabilities, and further the development of its strategic initiatives. Projects are selected from proposals for creative and innovative R and D studies which are not yet eligible for timely support through normal programmatic channels. Among the aims of the projects supported by the Program are establishment of engineering proof-of-principle; assessment of design feasibility for prospective facilities; development of an instrumental prototype, method, or system; or discovery in fundamental science. Several of these projects are closely associated with major strategic thrusts of the Laboratory as described in Argonne's Five-Year Institutional Plan, although the scientific implications of the achieved results extend well beyond Laboratory plans and objectives. The projects supported by the Program are distributed across the major programmatic areas at Argonne as indicated in the Laboratory's LDRD Plan for FY 1994. Project summaries of research in the following areas are included: (1) Advanced Accelerator and Detector Technology; (2) X-ray Techniques for Research in Biological and Physical Science; (3) Nuclear Technology; (4) Materials Science and Technology; (5) Computational Science and Technology; (6) Biological Sciences; (7) Environmental Sciences: (8) Environmental Control and Waste Management Technology; and (9) Novel Concepts in Other Areas.
LDRD 2012 Annual Report: Laboratory Directed Research and Development Program Activities
Energy Technology Data Exchange (ETDEWEB)
Bookless, William [Brookhaven National Lab. (BNL), Upton, NY (United States)
2012-12-31
Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY2012, as required. In FY2012, the BNL LDRD Program funded 52 projects, 14 of which were new starts, at a total cost of $10,061,292.
LDRD 2014 Annual Report: Laboratory Directed Research and Development Program Activities
Energy Technology Data Exchange (ETDEWEB)
Hatton, Diane [Brookhaven National Lab. (BNL), Upton, NY (United States)
2015-03-01
Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2014, as required. In FY 2014, the BNL LDRD Program funded 40 projects, 8 of which were new starts, at a total cost of $9.6M.
LDRD 2015 Annual Report: Laboratory Directed Research and Development Program Activities
Energy Technology Data Exchange (ETDEWEB)
Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)
2015-12-31
Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2B dated April 19, 2006. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2015, as required. In FY 2015, the BNL LDRD Program funded 43 projects, 12 of which were new starts, at a total cost of $9.5M.
Directory of Open Access Journals (Sweden)
Mina Malekzadeh
2010-01-01
Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.
Laboratory directed research and development annual report: Fiscal year 1992
Energy Technology Data Exchange (ETDEWEB)
1993-01-01
The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ``research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our ``core competencies.`` Currently, PNL`s core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL`s LDRD program and the management process used for the program and project summaries for each LDRD project.
Laboratory directed research and development annual report: Fiscal year 1992
Energy Technology Data Exchange (ETDEWEB)
1993-01-01
The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this order. Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches to research related to our core competencies.'' Currently, PNL's core competencies have been identified as: integrated environmental research; process science and engineering; energy distribution and utilization. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these corecompetencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project.
Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel
2015-01-01
Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. A group at Chatham House developed a draft conceptual framework for safer, more secure, and sustainable laboratory capacity building. The draft generic framework is guided by the phrase "LOCAL - PEOPLE - MAKE SENSE" that represents three major principles: capacity building according to local needs (local) with an emphasis on relationship and trust building (people) and continuous outcome and impact measurement (make sense). This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.
Directory of Open Access Journals (Sweden)
Petra eDickmann
2015-10-01
Full Text Available Background: Laboratory capacity building is characterized by a paradox between endemicity and resources: Countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity and capacities (laboratories, trained staff, adequate regulations. Meanwhile, countries with low endemicity of pathogenic agents often have high containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. Methods: A group at Chatham House developed a draft conceptual framework for safer, more secure and sustainable laboratory capacity building. Results: The draft generic framework is guided by the phrase ‘LOCAL – PEOPLE – MAKE SENSE’ that represents three major principles: capacity building according to local needs (local with an emphasis on relationship and trust-building (people and continuous outcome and impact measurement (make sense. Conclusions: This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.
Laboratory Experiments for Network Security Instruction
Brustoloni, Jose Carlos
2006-01-01
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Mobile robotics research at Sandia National Laboratories
Energy Technology Data Exchange (ETDEWEB)
Morse, W.D.
1998-09-01
Sandia is a National Security Laboratory providing scientific and engineering solutions to meet national needs for both government and industry. As part of this mission, the Intelligent Systems and Robotics Center conducts research and development in robotics and intelligent machine technologies. An overview of Sandia`s mobile robotics research is provided. Recent achievements and future directions in the areas of coordinated mobile manipulation, small smart machines, world modeling, and special application robots are presented.
A direct probe of dark energy interactions with a solar System laboratory
National Aeronautics and Space Administration — We propose a mission concept for direct detection of dark energy interactions with normal matter in a Solar System laboratory. Dark energy is the leading proposal to...
SEED: A Suite of Instructional Laboratories for Computer Security Education
Du, Wenliang; Wang, Ronghua
2008-01-01
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
A Complex Systems Approach to More Resilient Multi-Layered Security Systems
Energy Technology Data Exchange (ETDEWEB)
Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
2016-09-01
In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.
International Nuclear Information System (INIS)
Li Jian; Song Danjie; Guo Xiaojing; Jing Bo
2012-01-01
In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)
LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DOE - DECEMBER 2001.
Energy Technology Data Exchange (ETDEWEB)
FOX,K.J.
2001-12-01
Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2, ''Laboratory Directed Research and Development,'' March 5, 1997, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 4 13.2. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas
International Nuclear Information System (INIS)
Xia, Yan; Song, He-Shan
2007-01-01
We present a controlled quantum secure direct communication protocol that uses a 2-dimensional Greenberger-Horne-Zeilinger (GHZ) entangled state and a 3-dimensional Bell-basis state and employs the high-dimensional quantum superdense coding, local collective unitary operations and entanglement swapping. The proposed protocol is secure and of high source capacity. It can effectively protect the communication against a destroying-travel-qubit-type attack. With this protocol, the information transmission is greatly increased. This protocol can also be modified, so that it can be used in a multi-party control system
Laboratory Directed Research and Development FY 1992
Energy Technology Data Exchange (ETDEWEB)
Struble, G.L.; Middleton, C.; Anderson, S.E.; Baldwin, G.; Cherniak, J.C.; Corey, C.W.; Kirvel, R.D.; McElroy, L.A. [eds.
1992-12-31
The Laboratory Directed Research and Development (LDRD) Program at Lawrence Livermore National Laboratory (LLNL) funds projects that nurture and enrich the core competencies of the Laboratory. The scientific and technical output from the FY 1992 RD Program has been significant. Highlights include (1) Creating the first laser guide star to be coupled with adaptive optics, thus permitting ground-based telescopes to obtain the same resolution as smaller space-based instruments but with more light-gathering power. (2) Significantly improving the limit on the mass of the electron antineutrino so that neutrinos now become a useful tool in diagnosing supernovas and we disproved the existence of a 17-keV neutrino. (3) Developing a new class of organic aerogels that have robust mechanical properties and that have significantly lower thermal conductivity than inorganic aerogels. (4) Developing a new heavy-ion accelerator concept, which may enable us to design heavy-ion experimental systems and use a heavy-ion driver for inertial fusion. (5) Designing and demonstrating a high-power, diode-pumped, solid-state laser concept that will allow us to pursue a variety of research projects, including laser material processing. (6) Demonstrating that high-performance semiconductor arrays can be fabricated more efficiently, which will make this technology available to a broad range of applications such as inertial confinement fusion for civilian power. (7) Developing a new type of fiber channel switch and new fiber channel standards for use in local- and wide-area networks, which will allow scientists and engineers to transfer data at gigabit rates. (8) Developing the nation`s only numerical model for high-technology air filtration systems. Filter designs that use this model will provide safer and cleaner environments in work areas where contamination with particulate hazardous materials is possible.
Laboratory Directed Research and Development FY 1992
International Nuclear Information System (INIS)
Struble, G.L.; Middleton, C.; Anderson, S.E.; Baldwin, G.; Cherniak, J.C.; Corey, C.W.; Kirvel, R.D.; McElroy, L.A.
1992-01-01
The Laboratory Directed Research and Development (LDRD) Program at Lawrence Livermore National Laboratory (LLNL) funds projects that nurture and enrich the core competencies of the Laboratory. The scientific and technical output from the FY 1992 RD Program has been significant. Highlights include (1) Creating the first laser guide star to be coupled with adaptive optics, thus permitting ground-based telescopes to obtain the same resolution as smaller space-based instruments but with more light-gathering power. (2) Significantly improving the limit on the mass of the electron antineutrino so that neutrinos now become a useful tool in diagnosing supernovas and we disproved the existence of a 17-keV neutrino. (3) Developing a new class of organic aerogels that have robust mechanical properties and that have significantly lower thermal conductivity than inorganic aerogels. (4) Developing a new heavy-ion accelerator concept, which may enable us to design heavy-ion experimental systems and use a heavy-ion driver for inertial fusion. (5) Designing and demonstrating a high-power, diode-pumped, solid-state laser concept that will allow us to pursue a variety of research projects, including laser material processing. (6) Demonstrating that high-performance semiconductor arrays can be fabricated more efficiently, which will make this technology available to a broad range of applications such as inertial confinement fusion for civilian power. (7) Developing a new type of fiber channel switch and new fiber channel standards for use in local- and wide-area networks, which will allow scientists and engineers to transfer data at gigabit rates. (8) Developing the nation's only numerical model for high-technology air filtration systems. Filter designs that use this model will provide safer and cleaner environments in work areas where contamination with particulate hazardous materials is possible
The direction of the laboratories
International Nuclear Information System (INIS)
Blanquet, S.
1988-01-01
In the scope of the presentation of the 1988 Polytechnic School (France) research programs, the activities concerning each laboratory, are summarized. Several aspects of the programs are considered: the main projects, the results, the planned researches and the technical means. The personnel of the laboratory, their number in the different categories, the published papers, the patents and the thesis are included [fr
Sandia National Laboratories: Sandia National Laboratories: Missions:
Defense Systems & Assessments: About Us Sandia National Laboratories Exceptional service in ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
Materials capability review Los Alamos National Laboratory, May 3-6, 2010
Energy Technology Data Exchange (ETDEWEB)
Taylor, Antoinette [Los Alamos National Laboratory
2010-01-01
The 2010 'Capability Review' process at LANL significantly differs from the Division reviews of prior years. The Capabilities being reviewed (some 4-8 per year) are deliberately chosen to be crosscutting over the Laboratory, and therefore will include not only several experimental, theoretical and simulation disciplines, but also contributions from multiple line organizations. This approach is consistent with the new Laboratory organizational structure, focusing on agile and integrated capabilities applied to present national security missions, and also nurtured to be available for rapid application to future missions. The overall intent is that the Committee assess the quality of the science, engineering, and technology identified in the agenda, and advise the LANS Board of Governors and Laboratory management. Specifically, the Committees will: (1) Assess the quality of science, technology and engineering within the Capability in the areas defined in the agenda. Identify issues to develop or enhance the core competencies within this capability. (2) Evaluate the integration of this capability across the Laboratory organizations that are listed in the agenda in terms of joint programs, projects, proposals, and/or publications. Describe the integration of this capability in the wider scientific community using the recognition as a leader within the community, ability to set research agendas, and attraction and retention of staff. (3) Assess the quality and relevance of this capability's science, technology and engineering contributions to current and emerging Laboratory programs, including Nuclear Weapons, Threat Reduction/Homeland Security, and Energy Security. (4) Advise the Laboratory Director/Principal Associate Director for Science, Technology and Engineering on the health of the Capability including the current and future (5 year) science, technology and engineering staff needs, mix of research and development activities, program opportunities
Establishing rational networking using the DL04 quantum secure direct communication protocol
Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin
2018-06-01
The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.
Laboratory directed research and development annual report 2004
International Nuclear Information System (INIS)
Not Available
2005-01-01
This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 2004. In addition to a programmatic and financial overview, the report includes progress reports from 352 individual R and D projects in 15 categories. The 15 categories are: (1) Advanced Concepts; (2) Advanced Manufacturing; (3) Biotechnology; (4) Chemical and Earth Sciences; (5) Computational and Information Sciences; (6) Differentiating Technologies; (7) Electronics and Photonics; (8) Emerging Threats; (9) Energy and Critical Infrastructures; (10) Engineering Sciences; (11) Grand Challenges; (12) Materials Science and Technology; (13) Nonproliferation and Materials Control; (14) Pulsed Power and High Energy Density Sciences; and (15) Corporate Objectives
Lawrence Livermore National Laboratory Environmental Report 2012
Energy Technology Data Exchange (ETDEWEB)
Jones, Henry E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Armstrong, Dave [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Blake, Rick G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bertoldo, Nicholas A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Cerruti, Steven J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Fish, Craig [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dibley, Valerie R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Doman, Jennifer L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grayson, Allen R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Heidecker, Kelly R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hollister, Rod K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kumamoto, Gene [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, Donald H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Nelson, Jennifer C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Ottaway, Heather L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Paterson, Lisa E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Revelli, Michael A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rosene, Crystal A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Terrill, Alison A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wegrecki, Anthony M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wilson, Kent R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Woollett, Jim S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
2013-09-19
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security, LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the
Lawrence Livermore National Laboratory Environmental Report 2013
Energy Technology Data Exchange (ETDEWEB)
Jones, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bertoldo, N. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Blake, R. G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Cerruti, S. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dibley, V. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Doman, J. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Fish, C. B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grayson, A. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Heidecker, K. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kumamoto, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, D. H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Montemayor, W. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Ottaway, H. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Paterson, L. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Revelli, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rosene, C. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Terrill, A. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wegrecki, A. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wilson, K. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Woollett, J. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Veseliza, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
2014-10-01
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security, LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the
LDRD 2016 Annual Report: Laboratory Directed Research and Development Program Activities
Energy Technology Data Exchange (ETDEWEB)
Hatton, D. [Brookhaven National Lab. (BNL), Upton, NY (United States)
2017-03-31
Each year, Brookhaven National Laboratory (BNL) is required to provide a program description and overview of its Laboratory Directed Research and Development Program (LDRD) to the Department of Energy (DOE) in accordance with DOE Order 413.2C dated October 22, 2015. This report provides a detailed look at the scientific and technical activities for each of the LDRD projects funded by BNL in FY 2016, as required. In FY 2016, the BNL LDRD Program funded 48 projects, 21 of which were new starts, at a total cost of $11.5M. The investments that BNL makes in its LDRD program support the Laboratory’s strategic goals. BNL has identified four Critical Outcomes that define the Laboratory’s scientific future and that will enable it to realize its overall vision. Two operational Critical Outcomes address essential operational support for that future: renewal of the BNL campus; and safe, efficient laboratory operations.
Clinical Laboratory Fee Schedule
U.S. Department of Health & Human Services — Outpatient clinical laboratory services are paid based on a fee schedule in accordance with Section 1833(h) of the Social Security Act. The clinical laboratory fee...
Power system security enhancement through direct non-disruptive load control
Ramanathan, Badri Narayanan
The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two
Blumenthal, Tyler; Meruga, Jeevan; Stanley May, P; Kellar, Jon; Cross, William; Ankireddy, Krishnamraju; Vunnam, Swathi; Luu, Quocanh N
2012-05-11
Two methods of direct-write printing for producing highly resolved features of a polymer impregnated with luminescent upconversion phosphors for security applications are presented. The printed polymer structures range in shape from features to text. The thin polymer features were deposited by direct-write printing of atomized material as well as by screen-printing techniques. These films contain highly luminescent lanthanide-doped, rare-earth nanocrystals, β-NaYF₄:3%Er, 17%Yb, which are capped with oleic acid. This capping agent allows the nanocrystals to disperse throughout the films for full detailing of printed features. Upconversion of deposited features was obtained using a 980 nm wavelength laser with emission of upconverted light in the visible region at both 540 and 660 nm. Features were deposited onto high bond paper, Kapton®, and glass to demonstrate possible covert and forensic security printing applications, as they are printed in various features and invisible to 'naked-eye' viewing at low concentrations of nanocrystals.
International Nuclear Information System (INIS)
Blumenthal, Tyler; Meruga, Jeevan; Kellar, Jon; Cross, William; Ankireddy, Krishnamraju; Vunnam, Swathi; Stanley May, P; Luu, QuocAnh N
2012-01-01
Two methods of direct-write printing for producing highly resolved features of a polymer impregnated with luminescent upconversion phosphors for security applications are presented. The printed polymer structures range in shape from features to text. The thin polymer features were deposited by direct-write printing of atomized material as well as by screen-printing techniques. These films contain highly luminescent lanthanide-doped, rare-earth nanocrystals, β-NaYF 4 :3%Er, 17%Yb, which are capped with oleic acid. This capping agent allows the nanocrystals to disperse throughout the films for full detailing of printed features. Upconversion of deposited features was obtained using a 980 nm wavelength laser with emission of upconverted light in the visible region at both 540 and 660 nm. Features were deposited onto high bond paper, Kapton ® , and glass to demonstrate possible covert and forensic security printing applications, as they are printed in various features and invisible to ‘naked-eye’ viewing at low concentrations of nanocrystals. (paper)
Blumenthal, Tyler; Meruga, Jeevan; May, P. Stanley; Kellar, Jon; Cross, William; Ankireddy, Krishnamraju; Vunnam, Swathi; Luu, QuocAnh N.
2012-05-01
Two methods of direct-write printing for producing highly resolved features of a polymer impregnated with luminescent upconversion phosphors for security applications are presented. The printed polymer structures range in shape from features to text. The thin polymer features were deposited by direct-write printing of atomized material as well as by screen-printing techniques. These films contain highly luminescent lanthanide-doped, rare-earth nanocrystals, β-NaYF4:3%Er, 17%Yb, which are capped with oleic acid. This capping agent allows the nanocrystals to disperse throughout the films for full detailing of printed features. Upconversion of deposited features was obtained using a 980 nm wavelength laser with emission of upconverted light in the visible region at both 540 and 660 nm. Features were deposited onto high bond paper, Kapton®, and glass to demonstrate possible covert and forensic security printing applications, as they are printed in various features and invisible to ‘naked-eye’ viewing at low concentrations of nanocrystals.
Laboratory directed research and development: Annual report to the Department of Energy
Energy Technology Data Exchange (ETDEWEB)
NONE
1998-12-01
As one of the premier scientific laboratories of the DOE, Brookhaven must continuously foster the development of new ideas and technologies, promote the early exploration and exploitation of creative and innovative concepts, and develop new fundable R and D projects and programs. At Brookhaven National Laboratory one such method is through its Laboratory Directed Research and Development Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is a major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The Project Summaries with their accomplishments are described in this report. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals and presentations at meetings and forums.
Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture
Jurčević, M.; Hegeduš, H.; Golub, M.
2010-01-01
Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.
Laboratory Directed Research and Development annual report, Fiscal year 1993
International Nuclear Information System (INIS)
1994-01-01
The Department of Energy Order DOE 5000.4A establishes DOE's policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ''research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. LDRD includes activities previously defined as ER ampersand D, as well as other discretionary research and development activities not provided for in a DOE program.'' Consistent with the Mission Statement and Strategic Plan provided in PNL's Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our ''core competencies.'' Currently, PNL's core competencies have been identified as integrated environmental research; process technology; energy systems research. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. A significant proportion of PNL's LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. The projects are described in Section 2.0. The projects described in this report represent PNL's investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides an overview of PNL's LDRD program and the management process used for the program and project summaries for each LDRD project
Laboratory Directed Research and Development annual report, Fiscal year 1993
Energy Technology Data Exchange (ETDEWEB)
1994-01-01
The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. As described in 5000.4A, LDRD is ``research and development of a creative and innovative nature which is selected by the Laboratory Director or his or her designee, for the purpose of maintaining the scientific and technological vitality of the Laboratory and to respond to scientific and technological opportunities in conformance with the guidelines in this Order. LDRD includes activities previously defined as ER&D, as well as other discretionary research and development activities not provided for in a DOE program.`` Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our ``core competencies.`` Currently, PNL`s core competencies have been identified as integrated environmental research; process technology; energy systems research. In this report, the individual summaries of Laboratory-level LDRD projects are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. A significant proportion of PNL`s LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. The projects are described in Section 2.0. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. In accordance with DOE guidelines, the report provides an overview of PNL`s LDRD program and the management process used for the program and project summaries for each LDRD project.
Development of human resource capacity building assistance for nuclear security
International Nuclear Information System (INIS)
Nakamura, Yo; Noro, Naoko
2014-01-01
The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)
Database and applications security integrating information security and data management
Thuraisingham, Bhavani
2005-01-01
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging
Truszczyński, M J
1998-08-01
Veterinary laboratories which deal with infectious diseases form three groups according to the tasks for which they are responsible. The first group includes central or national veterinary laboratories, national or international reference laboratories, high-security laboratories, district regional or state veterinary diagnostic laboratories. The major role of these laboratories is to assist national Veterinary Services in diagnosing infectious animal diseases. The second group comprises laboratories that produce veterinary diagnostic kits and those that produce veterinary vaccines. The third group is composed of veterinary research laboratories, which generally concentrate on basic research and do not contribute directly to the diagnosis and control of infectious animal diseases. The author describes the objectives of each of the three groups of laboratories.
Environment | Argonne National Laboratory
Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Environment Laboratory About Safety News Careers Education Community Diversity Directory Energy Environment National Security User Facilities Science Work with Us Environment Atmospheric and Climate Science Ecological
6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.
2010-01-01
...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...
Integrated Safeguards and Security Management Self-Assessment 2004
Energy Technology Data Exchange (ETDEWEB)
Lunford, Dan; Ramsey, Dwayne
2005-04-01
In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of
Employment Security of Nurses: Baseline for a Strategic Human Resource Direction
Directory of Open Access Journals (Sweden)
Dr. Renante A. Egcas
2017-11-01
Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly
A two-step quantum secure direct communication protocol with hyperentanglement
International Nuclear Information System (INIS)
Gu Bin; Zhang Cheng-Yi; Huang Yu-Gai; Fang Xia
2011-01-01
We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol. (general)
Risk-based security cost-benefit analysis: method and example applications - 59381
International Nuclear Information System (INIS)
Wyss, Gregory; Hinton, John; Clem, John; Silva, Consuelo; Duran, Felicia A.
2012-01-01
Document available in abstract form only. Full text of publication follows: Decision makers wish to use risk-based cost-benefit analysis to prioritize security investments. However, understanding security risk requires estimating the likelihood of attack, which is extremely uncertain and depends on unquantifiable psychological factors like dissuasion and deterrence. In addition, the most common performance metric for physical security systems, probability of effectiveness at the design basis threat [P(E)], performs poorly in cost-benefit analysis. It is extremely sensitive to small changes in adversary characteristics when the threat is near a systems breaking point, but very insensitive to those changes under other conditions. This makes it difficult to prioritize investment options on the basis of P(E), especially across multiple targets or facilities. To overcome these obstacles, a Sandia National Laboratories Laboratory Directed Research and Development project has developed a risk-based security cost-benefit analysis method. This approach characterizes targets by how difficult it would be for adversaries to exploit each targets vulnerabilities to induce consequences. Adversaries generally have success criteria (e.g., adequate or desired consequences and thresholds for likelihood of success), and choose among alternative strategies that meet these criteria while considering their degree of difficulty in achieving their successful outcome. Investments reduce security risk as they reduce the severity of consequences available and/or increase the difficulty for an adversary to successfully accomplish their most advantageous attack
Energy Technology Data Exchange (ETDEWEB)
Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)
2011-10-15
Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.
International Nuclear Information System (INIS)
Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.
2011-01-01
Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.
Security controls in a Cullinet database environment
International Nuclear Information System (INIS)
Thompson, R.E.
1988-01-01
Security controls using Cullinet's Integrated Data Management System (IDMS) are examined. IDMS software integrity problems, with emphasis on security package interfaces, are disclosed. Solutions applied at Sandia Laboratories Engineering Information Management computing facilty are presented. An overall IDMS computer security philosophy is reviewed
Yeh, Kenneth B.; Adams, Martin; Stamper, Paul D.; Dasgupta, Debanjana; Hewson, Roger; Buck, Charles D.; Richards, Allen L.; Hay, John
2016-01-01
Strategic laboratory planning in limited resource areas is essential for addressing global health security issues. Establishing a national reference laboratory, especially one with BSL-3 or -4 biocontainment facilities, requires a heavy investment of resources, a multisectoral approach, and commitments from multiple stakeholders. We make the case for donor organizations and recipient partners to develop a comprehensive laboratory operations roadmap that addresses factors such as mission and r...
Directory of Open Access Journals (Sweden)
Raymond SW Tsang
2015-01-01
Full Text Available Treponema pallidum subsp. pallidum and/or its nucleic acid can be detected by various methods such as microscopy, rabbit infectivity test or polymerase chain reaction (PCR tests. The rabbit infectivity test for T. pallidum, although very sensitive, has been discontinued from most laboratories due to ethical issues related to the need for animal inoculation with live T. pallidum, the technically demanding procedure and long turnaround time for results, thus making it impractical for routine diagnostic use. Dark-field and phase-contrast microscopy are still useful at clinic- or hospital-based laboratories for near-bedside detection of T. pallidum in genital, skin or mucous lesions although their availability is decreasing. The lack of reliable and specific anti-T. pallidum antibodies and its inferior sensitivity to PCR may explain why the direct fluorescent antibody test for T. pallidum is not widely available for clinical use. Immunohistochemical staining for T. pallidum also depends on the availability of specific antibodies, and the method is only applicable for histopathological examination of biopsy and autopsy specimens necessitating an invasive specimen collection approach. With recent advances in molecular diagnostics, PCR is considered to be the most reliable, versatile and practical for laboratories to implement. In addition to being an objective and sensitive test for direct detection of Treponema pallidum subsp. pallidum DNA in skin and mucous membrane lesions, the resulting PCR amplicons from selected gene targets can be further characterized for antimicrobial (macrolide susceptibility testing, strain typing and identification of T. pallidum subspecies.
Laboratory directed research and development annual report. Fiscal year 1994
Energy Technology Data Exchange (ETDEWEB)
NONE
1995-02-01
The Department of Energy Order DOE 5000.4A establishes DOE`s policy and guidelines regarding Laboratory Directed Research and Development (LDRD) at its multiprogram laboratories. This report represents Pacific Northwest Laboratory`s (PNL`s) LDRD report for FY 1994. During FY 1994, 161 LDRD projects were selected for support through PNL`s LDRD project selection process. Total funding allocated to these projects was $13.7 million. Consistent with the Mission Statement and Strategic Plan provided in PNL`s Institutional Plan, the LDRD investments are focused on developing new and innovative approaches in research related to our {open_quotes}core competencies.{close_quotes} Currently, PNL`s core competencies have been identified as integrated environmental research; process science and engineering; energy systems development. In this report, the individual summaries of LDRD projects (presented in Section 1.0) are organized according to these core competencies. The largest proportion of Laboratory-level LDRD funds is allocated to the core competency of integrated environmental research. Projects within the three core competency areas were approximately 91.4 % of total LDRD project funding at PNL in FY 1994. A significant proportion of PNL`s LDRD funds are also allocated to projects within the various research centers that are proposed by individual researchers or small research teams. Funding allocated to each of these projects is typically $35K or less. The projects described in this report represent PNL`s investment in its future and are vital to maintaining the ability to develop creative solutions for the scientific and technical challenges faced by DOE and the nation. The report provides an overview of PNL`s LDRD program, the management process used for the program, and project summaries for each LDRD project.
Optical Verification Laboratory Demonstration System for High Security Identification Cards
Javidi, Bahram
1997-01-01
Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the
2010-12-03
... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...
Laboratory-directed research and development: FY 1996 progress report
Energy Technology Data Exchange (ETDEWEB)
Vigil, J.; Prono, J. [comps.
1997-05-01
This report summarizes the FY 1996 goals and accomplishments of Laboratory-Directed Research and Development (LDRD) projects. It gives an overview of the LDRD program, summarizes work done on individual research projects, and provides an index to the projects` principal investigators. Projects are grouped by their LDRD component: Individual Projects, Competency Development, and Program Development. Within each component, they are further divided into nine technical disciplines: (1) materials science, (2) engineering and base technologies, (3) plasmas, fluids, and particle beams, (4) chemistry, (5) mathematics and computational sciences, (6) atomic and molecular physics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) biosciences.
Laboratory-directed research and development: FY 1996 progress report
International Nuclear Information System (INIS)
Vigil, J.; Prono, J.
1997-05-01
This report summarizes the FY 1996 goals and accomplishments of Laboratory-Directed Research and Development (LDRD) projects. It gives an overview of the LDRD program, summarizes work done on individual research projects, and provides an index to the projects' principal investigators. Projects are grouped by their LDRD component: Individual Projects, Competency Development, and Program Development. Within each component, they are further divided into nine technical disciplines: (1) materials science, (2) engineering and base technologies, (3) plasmas, fluids, and particle beams, (4) chemistry, (5) mathematics and computational sciences, (6) atomic and molecular physics, (7) geoscience, space science, and astrophysics, (8) nuclear and particle physics, and (9) biosciences
Sandia National Laboratories: National Security Missions: Defense Systems
; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook
Energy Technology Data Exchange (ETDEWEB)
NONE
1996-04-01
This report covers different materials and chemistry research projects carried out a Lawrence Livermore National Laboratory during 1995 in support of nuclear weapons programs and other programs. There are 16 papers supporting weapons research and 12 papers supporting laboratory directed research.
International Nuclear Information System (INIS)
1996-04-01
This report covers different materials and chemistry research projects carried out a Lawrence Livermore National Laboratory during 1995 in support of nuclear weapons programs and other programs. There are 16 papers supporting weapons research and 12 papers supporting laboratory directed research
Security issues at the Department of Energy and records management
International Nuclear Information System (INIS)
NUSBAUM, ANNA W.
2000-01-01
In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ''the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management
Improvement on Quantum Secure Direct Communication with W State in Noisy Channel
International Nuclear Information System (INIS)
Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng
2009-01-01
An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocol. In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol.
Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....
Energy Technology Data Exchange (ETDEWEB)
FOX,K.J.
2004-12-31
Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $460 million. There are about 2,800 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 4 13.2A, ''Laboratory Directed Research and Development,'' January 8, 2001, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 413.2A. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology
Energy Technology Data Exchange (ETDEWEB)
FOX,K.J.
2003-12-31
Brookhaven National (BNL) Laboratory is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, under contract with the U. S. Department of Energy. BNL's total annual budget has averaged about $450 million. There are about 3,000 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 41 3.2A, ''Laboratory Directed Research and Development,'' January 8, 2001, and the LDRD Annual Report guidance, updated February 12, 1999. The LDRD Program obtains its funds through the Laboratory overhead pool and operates under the authority of DOE Order 413.2A. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology
International Nuclear Information System (INIS)
Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo
2015-01-01
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)
International Nuclear Information System (INIS)
Ginsberg, T.; Tutu, N.K.
1987-01-01
Direct containment heating is the mechanism of severe nuclear reactor accident containment loading that results from transfer of thermal and chemical energy from high-temperature, finely divided, molten core material to the containment atmosphere. The direct heating containment vessel interactions module (DHCVIM) has been developed at Brookhaven National Laboratory to model the mechanisms of containment loading resulting from the direct heating accident sequence. The calculational procedure is being used at present to model the Sandia National Laboratories one-tenth-scale Surtsey direct containment heating experiments. The objective of the code is to provide a test bed for detailed modeling of various aspects of the thermal, chemical, and hydrodynamic interactions that are expected to occur in three regions of a containment building: reactor cavity, intermediate subcompartments, and containment dome. Major emphasis is placed on the description of reactor cavity dynamics. This paper summarizes the modeling principles that are incorporated in DHCVIM and presents a prediction of the Surtsey Test DCH-2 that was made prior to execution of the experiment
Development of security engineering curricula at US universities
Energy Technology Data Exchange (ETDEWEB)
Garcia, M.L.
1998-08-01
The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.
Macro Security Methodology for Conducting Facility Security and Sustainability Assessments
International Nuclear Information System (INIS)
Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.
2007-01-01
Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.
Laboratory Directed Research and Development 1998 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Pam Hughes; Sheila Bennett eds.
1999-07-14
The Laboratory's Directed Research and Development (LDRD) program encourages the advancement of science and the development of major new technical capabilities from which future research and development will grow. Through LDRD funding, Pacific Northwest continually replenishes its inventory of ideas that have the potential to address major national needs. The LDRD program has enabled the Laboratory to bring to bear its scientific and technical capabilities on all of DOE's missions, particularly in the arena of environmental problems. Many of the concepts related to environmental cleanup originally developed with LDRD funds are now receiving programmatic support from DOE, LDRD-funded work in atmospheric sciences is now being applied to DOE's Atmospheric Radiation Measurement Program. We also have used concepts initially explored through LDRD to develop several winning proposals in the Environmental Management Science Program. The success of our LDRD program is founded on good management practices that ensure funding is allocated and projects are conducted in compliance with DOE requirements. We thoroughly evaluate the LDRD proposals based on their scientific and technical merit, as well as their relevance to DOE's programmatic needs. After a proposal is funded, we assess progress annually using external peer reviews. This year, as in years past, the LDRD program has once again proven to be the major enabling vehicle for our staff to formulate new ideas, advance scientific capability, and develop potential applications for DOE's most significant challenges.
Gilliom, Laura R.
1992-01-01
Sandia National Laboratories has identified technology transfer to U.S. industry as a laboratory mission which complements our national security mission and as a key component of the Laboratory's future. A number of technology transfer mechanisms - such as CRADA's, licenses, work-for-others, and consortia - are identified and specific examples are given. Sandia's experience with the Specialty Metals Processing Consortium is highlighted with a focus on the elements which have made it successful. A brief discussion of Sandia's potential interactions with NASA under the Space Exploration Initiative was included as an example of laboratory-to-NASA technology transfer. Viewgraphs are provided.
International Nuclear Information System (INIS)
Yang, Chun-Wei; Hwang, Tzonelih; Tsai, Chia-Wei
2014-01-01
This work proposes controlled quantum secure direct communication (CQSDC) over an ideal channel. Based on the proposed CQSDC, two fault-tolerant CQSDC protocols that are robust under two kinds of collective noises, collective-dephasing noise and collective-rotation noise, respectively, are constructed. Due to the use of quantum entanglement of the Bell state (or logical Bell state) as well as dense coding, the proposed protocols provide easier implementation as well as better qubit efficiency than other CQSDC protocols. Furthermore, the proposed protocols are also free from correlation-elicitation attack and other well-known attacks. (paper)
Laboratory biorisk management biosafety and biosecurity
Salerno, Reynolds M
2015-01-01
Over the past two decades bioscience facilities worldwide have experienced multiple safety and security incidents, including many notable incidents at so-called ""sophisticated facilities"" in North America and Western Europe. This demonstrates that a system based solely on biosafety levels and security regulations may not be sufficient.Setting the stage for a substantively different approach for managing the risks of working with biological agents in laboratories, Laboratory Biorisk Management: Biosafety and Biosecurity introduces the concept of biorisk management-a new paradigm that encompas
76 FR 34761 - Classified National Security Information
2011-06-14
... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states
Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo
2017-12-01
This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.
7 CFR 3560.61 - Loan security.
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Loan security. 3560.61 Section 3560.61 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Direct Loan and Grant Origination § 3560.61 Loan security... collateral. (2) The amount of the loan against the collateral does not exceed its estimated security value...
Federal Laboratory Consortium — The Media And Security Team led by Prof. Min Wu was established in Fall 2001 at University of Maryland, College Park. A number of research and education activities...
Cimino, J J
2012-01-01
The reuse of clinical data for research purposes requires methods for the protection of personal privacy. One general approach is the removal of personal identifiers from the data. A frequent part of this anonymization process is the removal of times and dates, which we refer to as "chrononymization." While this step can make the association with identified data (such as public information or a small sample of patient information) more difficult, it comes at a cost to the usefulness of the data for research. We sought to determine whether removal of dates from common laboratory test panels offers any advantage in protecting such data from re-identification. We obtained a set of results for 5.9 million laboratory panels from the National Institutes of Health's (NIH) Biomedical Translational Research Information System (BTRIS), selected a random set of 20,000 panels from the larger source sets, and then identified all matches between the sets. We found that while removal of dates could hinder the re-identification of a single test result, such removal had almost no effect when entire panels were used. Our results suggest that reliance on chrononymization provides a false sense of security for the protection of laboratory test results. As a result of this study, the NIH has chosen to rely on policy solutions, such as strong data use agreements, rather than removal of dates when reusing clinical data for research purposes.
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Directory of Open Access Journals (Sweden)
Aamir Shahzad
2016-01-01
Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
TCIA Secure Cyber Critical Infrastructure Modernization.
Energy Technology Data Exchange (ETDEWEB)
Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
2017-02-01
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
International Nuclear Information System (INIS)
Wang Tie-Jun; Li Tao; Du Fang-Fang; Deng Fu-Guo
2011-01-01
We present a quantum hyperdense coding protocol with hyperentanglement in polarization and spatial-mode degrees of freedom of photons first and then give the details for a quantum secure direct communication (QSDC) protocol based on this quantum hyperdense coding protocol. This QSDC protocol has the advantage of having a higher capacity than the quantum communication protocols with a qubit system. Compared with the QSDC protocol based on superdense coding with d-dimensional systems, this QSDC protocol is more feasible as the preparation of a high-dimension quantum system is more difficult than that of a two-level quantum system at present. (general)
National Security Whistleblowers
National Research Council Canada - National Science Library
Fisher, Louis
2005-01-01
.... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...
Quantum secure communication models comparison
Directory of Open Access Journals (Sweden)
Georgi Petrov Bebrov
2017-12-01
Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.
Selecting Security Technology Providers
Schneider, Tod
2009-01-01
The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems
Hilker, Michael; Schommer, Christoph
2008-01-01
Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is disting...
Energy Technology Data Exchange (ETDEWEB)
Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.
1996-04-01
LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...
International Nuclear Information System (INIS)
Handin, J.
1980-01-01
Our task is to design mined-repository systems that will adequately secure high-level nuclear waste for at least 10,000 yr and that will be mechanically stable for 50 to 100-yr periods of retrievability during which mistakes could be corrected and a valuable source of energy could be reclaimed, should national policy on the reprocessing of spent fuel ever change. The only credible path for the escape of radionuclides from the repository to the biosphere is through ground-water, and in hard rock, bulk permeability is largely governed by natural and artificial fracture systems. Catastrophic failure of an excavation in hard rock is likely to occur at the weakest links - the discontinuities in the rock mass that is perturbed first by mining and then by radiogenic heating. The laboratory can contribute precise measurements of the pertinent thermomechanical, hydrological and chemical properties and improve our understanding of the fundamental processes through careful experiments under well controlled conditions that simulate the prototype environment. Thus laboratory investigations are necessary, but they are not sufficient, for conventional sample sizes are small relative to natural defects like joints - i.e., the rock mass is not a continuum - and test durations are short compared to those that predictive modeling must take into account. Laboratory investigators can contribute substantially more useful data if they are provided facilities for testing large specimens(say one cubic meter) and for creep testing of all candidate host rocks. Even so, extrapolations of laboratory data to the field in neither space nor time are valid without the firm theoretical foundations yet to be built. Meanwhile in-situ measurements of structure-sensitive physical properties and access to direct observations of rock-mass character will be absolutely necessary
Yeh, Kenneth B; Adams, Martin; Stamper, Paul D; Dasgupta, Debanjana; Hewson, Roger; Buck, Charles D; Richards, Allen L; Hay, John
2016-01-01
Strategic laboratory planning in limited resource areas is essential for addressing global health security issues. Establishing a national reference laboratory, especially one with BSL-3 or -4 biocontainment facilities, requires a heavy investment of resources, a multisectoral approach, and commitments from multiple stakeholders. We make the case for donor organizations and recipient partners to develop a comprehensive laboratory operations roadmap that addresses factors such as mission and roles, engaging national and political support, securing financial support, defining stakeholder involvement, fostering partnerships, and building trust. Successful development occurred with projects in African countries and in Azerbaijan, where strong leadership and a clear management framework have been key to success. A clearly identified and agreed management framework facilitate identifying the responsibility for developing laboratory capabilities and support services, including biosafety and biosecurity, quality assurance, equipment maintenance, supply chain establishment, staff certification and training, retention of human resources, and sustainable operating revenue. These capabilities and support services pose rate-limiting yet necessary challenges. Laboratory capabilities depend on mission and role, as determined by all stakeholders, and demonstrate the need for relevant metrics to monitor the success of the laboratory, including support for internal and external audits. Our analysis concludes that alternative frameworks for success exist for developing and implementing capabilities at regional and national levels in limited resource areas. Thus, achieving a balance for standardizing practices between local procedures and accepted international standards is a prerequisite for integrating new facilities into a country's existing public health infrastructure and into the overall international scientific community.
Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory
Energy Technology Data Exchange (ETDEWEB)
Rich, Bethany M [Los Alamos National Laboratory
2012-04-02
The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrial safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.
Analysis of Vehicle-Based Security Operations
Energy Technology Data Exchange (ETDEWEB)
Carter, Jason M [ORNL; Paul, Nate R [ORNL
2015-01-01
Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications must be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be
Su, X.; Bolzoni, D.; van Eck, Pascal
2006-01-01
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most
Su, X.; Bolzoni, D.; van Eck, Pascal
2007-01-01
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most
Energy Technology Data Exchange (ETDEWEB)
FOX,K.J.
2000-12-31
The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and I exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, ,projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its Laboratory Directed Research and Development Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is a major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The LDRD Annual Report contains summaries of all research activities funded during Fiscal Year 2000. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals and presentations at meetings and forums. All FY 2000 projects are listed and tabulated in the Project Funding Table. Also included in this Annual Report in Appendix A is a summary of the proposed projects for FY 2001. The BNL LDRD budget authority by DOE in FY 2000 was $6 million. The.actual allocation totaled $5.5 million. The following sections in this report contain the management processes, peer
International Nuclear Information System (INIS)
Pind, C.
1987-01-01
The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories
Olsson, I Anna S; Silva, Sandra Pinto da; Townend, David; Sandøe, Peter
2016-05-01
In 1986, European Directive 86/609/EEC, regulating the use of animals in research, was one of the first examples of common legislation to set standards for animal protection across the Member States of the former European Economic Community, now the European Union, with the aim of securing a level European playing field. Starting in 2002, a process of revising European animal experimentation legislation was undertaken, with one of its key aims being to ensure high standards of welfare for laboratory animals across Europe. This resulted in Directive 2010/63/EU, which has regulated this activity in Europe since 2013. Since this is a European Union Directive, transposition into national legislation is a necessary and important part of the implementation of the new legislation. This paper gives an overview of the transposition process followed by an analysis of the potential to reach the different objectives of the directive, particularly with a focus on securing the same high standards of animal protection across member countries. The analysis focuses on three separate issues: (1) minimum standards for laboratory animal housing and care, (2) restrictions on the use of certain animal species, and (3) project review and authorization. © The Author 2016. Published by Oxford University Press on behalf of the Institute for Laboratory Animal Research. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Systems analysis of a security alarm system
International Nuclear Information System (INIS)
Schiff, A.
1975-01-01
When the Lawrence Livermore Laboratory found that its security alarm system was causing more false alarms and maintenance costs than LLL felt was tolerable, a systems analysis was undertaken to determine what should be done about the situation. This report contains an analysis of security alarm systems in general and ends with a review of the existing Security Alarm Control Console (SACC) and recommendations for its improvement, growth and change. (U.S.)
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...
CENTER FOR CYBER SECURITY STUDIES
Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...
Laboratory directed research and development program FY 2003
Energy Technology Data Exchange (ETDEWEB)
Hansen, Todd
2004-03-27
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. In FY03, Berkeley Lab was authorized by DOE to establish a funding ceiling for the LDRD program of $15.0 M, which equates to about 3.2% of Berkeley Lab's FY03 projected operating and capital equipment budgets. This funding level was provided to develop new scientific ideas and opportunities and allow the Berkeley Lab Director an opportunity to initiate new directions. Budget constraints limited available resources, however, so only $10.1 M was expended for operating and $0.6 M for capital equipment (2.4% of actual Berkeley Lab FY03 costs). In FY03, scientists submitted 168 proposals, requesting over $24.2 M in operating funding. Eighty-two projects were funded, with awards ranging from $45 K to $500 K. These projects are summarized in Table 1.
Security Components of Globalization
Directory of Open Access Journals (Sweden)
Florin Iftode
2015-05-01
Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.
Computer security engineering management
International Nuclear Information System (INIS)
McDonald, G.W.
1988-01-01
For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system
Perimeter security for Minnesota correctional facilities
Energy Technology Data Exchange (ETDEWEB)
Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)
1996-12-31
For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.
Science | Argonne National Laboratory
Security Photon Sciences Physical Sciences & Engineering Energy Frontier Research Centers Scientific Publications Researchers Postdocs Exascale Computing Institute for Molecular Engineering at Argonne Work with Us About Safety News Careers Education Community Diversity Directory Argonne National Laboratory
B. Loth; R.P. Karrfalt
2017-01-01
The U.S. Department of Agriculture Forest Service (USDA FS) National Seed Laboratory (NSL) began long term seed storage for genetic conservation, in 2005, for USDA FS units and cooperators. This program requires secure storage of both seeds and the data documenting the identification of the seeds. The Agricultural Research Service (ARS) has provided both of these...
Security of Dependable Systems
DEFF Research Database (Denmark)
Ahmed, Naveed; Jensen, Christian D.
2011-01-01
Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1786.58 Section 1786.58 Agriculture... Discounted Prepayments on RUS Direct/Insured Loans § 1786.58 Security. If, after prepayment of RUS Notes, the... be, will consider request for the accommodation of such liens for the purpose of providing security...
Safety and Security Interface Technology Initiative
International Nuclear Information System (INIS)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
2007-01-01
Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated
CMDS System Integration and IAMD End-to-End Laboratory
Federal Laboratory Consortium — The Cruise Missile Defense Systems (CMDS) Project Office is establishing a secure System Integration Laboratory at the AMRDEC. This lab will contain tactical Signal...
Safeguards training at Pacific Northwest Laboratory
International Nuclear Information System (INIS)
Dickman, D.A.
1988-01-01
In recent years considerable attention has been given to upgrading security education programs at facilities across the country. At Pacific Northwest Laboratory (PNL), a Laboratory-wide Safeguard Awareness Training Program has been established in order to raise the cognizance of the entire staff with regard to safeguards issues and concerns. This aggressive safeguards program involves a strong interface of physical security measure and material control and accountability systems. Within PNL, four distinct audiences were defined and a needs assessment analysis performed for each to determine specific training requirements. The target audiences identified were: material balance area (MBA) custodians, managers of material balance areas, material handlers, and new employees. Five safeguards training courses were created to meet the needs of those audiences. This paper discusses the development of the Safeguards Awareness Program at PNL and its benefits to the Laboratory
International Nuclear Information System (INIS)
Caskey, D.L.
1986-01-01
As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described
The Graduate MIS Security Course: Objectives and Challenges
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew
2009-01-01
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Ultra-secure RF Tags for Safeguards and Security - SBIR Phase II Final Report
Energy Technology Data Exchange (ETDEWEB)
Twogood, Richard E [Dirac Solutions Inc., Pleasanton, CA (United States)
2015-01-27
This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commercially available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for
Cyber Security and Resilient Systems
Energy Technology Data Exchange (ETDEWEB)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the
Cyber Security and Resilient Systems
International Nuclear Information System (INIS)
Anderson, Robert S.
2009-01-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the
Laboratory Information Management System Chain of Custody: Reliability and Security
Tomlinson, J. J.; Elliott-Smith, W.; Radosta, T.
2006-01-01
A chain of custody (COC) is required in many laboratories that handle forensics, drugs of abuse, environmental, clinical, and DNA testing, as well as other laboratories that want to assure reliability of reported results. Maintaining a dependable COC can be laborious, but with the recent establishment of the criteria for electronic records and signatures by US regulatory agencies, laboratory information management systems (LIMSs) are now being developed to fully automate COCs. The extent of a...
Idaho National Laboratory - Nuclear Research Center
International Nuclear Information System (INIS)
Zaidi, M.K.
2005-01-01
Full text: The Idaho National Laboratory is committed to the providing international nuclear leadership for the 21st Century, developing and demonstrating compiling national security technologies, and delivering excellence in science and technology as one of the United States Department of Energy's (DOE) multiprogram national laboratories. INL runs three major programs - Nuclear, Security and Science. nuclear programs covers the Advanced test reactor, Six Generation technology concepts selected for R and D, Targeting tumors - Boron Neutron capture therapy. Homeland security - Homeland Security establishes the Control System Security and Test Center, Critical Infrastructure Test Range evaluates technologies on a scalable basis, INL conducts high performance computing and visualization research and science - INL facility established for Geocentrifuge Research, Idaho Laboratory, a Utah company achieved major milestone in hydrogen research and INL uses extremophile bacteria to ease bleaching's environmental cost. To provide leadership in the education and training, INL has established an Institute of Nuclear Science and Engineering (Inset). The institute will offer a four year degree based on a newly developed curriculum - two year of basic science course work and two years of participation in project planning and development. The students enrolled in this program can continue to get a masters or a doctoral degree. This summer Inset is the host for the training of the first international group selected by the World Nuclear University (WNU) - 75 fellowship holders and their 30 instructors from 40 countries. INL has been assigned to provide future global leadership in the field of nuclear science and technology. Here, at INL, we keep safety first above all things and our logo is 'Nuclear leadership synonymous with safety leadership'
Los Alamos National Laboratory 1995 self assessment report
Energy Technology Data Exchange (ETDEWEB)
NONE
1995-06-30
The Los Alamos National Laboratory (LANL) Safeguards and Security (S and S) Assurance Program (AP) is designed to ensure the adequacy and effectiveness of the LANL S and S program. The Assurance Program provides a mechanism for discovering deficiencies, determining causes, conducting risk assessments, implementing corrective actions, and documenting the assessment process. Selection of organizations for self assessments is based on the criteria established in the LANL S and S Assurance Program. For FY 1995, 12 organizations were selected for self assessments, these organizations are identified fin the schedule at Appendix A. The S and S topical areas selected for review in each organization varied depending on their security interests and included: Program Planning and Management (PPM); Protection Program Operations (PPO); Material Control and Accountability (MC and A); Computer and Communications Security (COMPSEC and COMSEC); Information Security (INFOSEC); Personnel Security (PERSEC); and Operational Security (OPSEC). The objective was to ascertain the effectiveness of S and S programs in each organization, its formality of operations, and its integration with the overall Laboratory S and S program. The goal was to meet both the DOE self-assessment requirements and the UC performance criteria and document the results.
Los Alamos National Laboratory 1995 self assessment report
International Nuclear Information System (INIS)
1995-01-01
The Los Alamos National Laboratory (LANL) Safeguards and Security (S and S) Assurance Program (AP) is designed to ensure the adequacy and effectiveness of the LANL S and S program. The Assurance Program provides a mechanism for discovering deficiencies, determining causes, conducting risk assessments, implementing corrective actions, and documenting the assessment process. Selection of organizations for self assessments is based on the criteria established in the LANL S and S Assurance Program. For FY 1995, 12 organizations were selected for self assessments, these organizations are identified fin the schedule at Appendix A. The S and S topical areas selected for review in each organization varied depending on their security interests and included: Program Planning and Management (PPM); Protection Program Operations (PPO); Material Control and Accountability (MC and A); Computer and Communications Security (COMPSEC and COMSEC); Information Security (INFOSEC); Personnel Security (PERSEC); and Operational Security (OPSEC). The objective was to ascertain the effectiveness of S and S programs in each organization, its formality of operations, and its integration with the overall Laboratory S and S program. The goal was to meet both the DOE self-assessment requirements and the UC performance criteria and document the results
Security alarm communication and display systems development
International Nuclear Information System (INIS)
Waddoups, I.G.
1990-01-01
Sandia National Laboratories (SNL) has, as lead Department of Energy (DOE) physical security laboratory, developed a variety of alarm communication and display systems for DOE and Department of Defense (DOD) facilities. This paper briefly describes some of the systems developed and concludes with a discussion of technology relevant to those currently designing, developing, implementing, or procuring such a system. Development activities and the rapid evolution of computers over the last decade have resulted in a broad variety of capabilities to support most security system communication and display needs. The major task in selecting a system is becoming familiar with these capabilities and finding the best match to a specific need
Global climate change and international security
Energy Technology Data Exchange (ETDEWEB)
Rice, M.
1991-01-01
On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.
Energy Technology Data Exchange (ETDEWEB)
Robert P. Evans
2005-09-01
Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was
75 FR 70814 - Securities Held in Treasury Direct
2010-11-19
... indebtedness.) * * * * * Zero-Percent Certificate of Indebtedness is a one-day, non- interest-bearing security... purchase a zero-percent certificate of indebtedness through one or more of the following four methods: (1... employer or a financial institution, to credit funds on a recurring basis to purchase a payroll zero...
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
46 CFR 188.10-11 - Chemistry laboratory.
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Chemistry laboratory. 188.10-11 Section 188.10-11 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-11 Chemistry laboratory. This term includes...
Energy Technology Data Exchange (ETDEWEB)
Ruthruff, Joseph. R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Armstrong, Robert C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Davis, Benjamin Garry [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Mayo, Jackson R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)
2012-09-01
Formal methods describe a class of system analysis techniques that seek to prove specific properties about analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest from both internal and external customers of Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquely positioned to advance the state-of-the-art with respect to several research and application areas within formal methods. This research project was a one-year effort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research & Development program to investigate the opportunities for formal methods to impact Sandia's present mission areas, more fully understand the needs of the research community in the area of formal methods and where Sandia can contribute, and clarify from those potential research paths those that would best advance the mission-area interests of Sandia. The accomplishments from this project reinforce the utility of formal methods in Sandia, particularly in areas relevant to Cyber Security, and set the stage for continued Sandia investments to ensure this capabilityis utilized and advanced within this laboratory to serve the national interest.
Cyber security issues in online games
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
2013-11-19
... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... Executive Order 13526, Classified National Security Information. In addition, this direct final rule allowed... licensees (or their designees) to conduct classified [[Page 69287
Skinner, E.L.; Watterson, C.A.; Chemerys, J.C.
1983-01-01
Safety, defined as 'freedom from danger, risk, or injury,' is difficult to achieve in a laboratory environment. Inherent dangers, associated with water analysis and research laboratories where hazardous samples, materials, and equipment are used, must be minimized to protect workers, buildings, and equipment. Managers, supervisors, analysts, and laboratory support personnel each have specific responsibilities to reduce hazards by maintaining a safe work environment. General rules of conduct and safety practices that involve personal protection, laboratory practices, chemical handling, compressed gases handling, use of equipment, and overall security must be practiced by everyone at all levels. Routine and extensive inspections of all laboratories must be made regularly by qualified people. Personnel should be trained thoroughly and repetitively. Special hazards that may involve exposure to carcinogens, cryogenics, or radiation must be given special attention, and specific rules and operational procedures must be established to deal with them. Safety data, reference materials, and texts must be kept available if prudent safety is to be practiced and accidents prevented or minimized.
Deterministic secure communication protocol without using entanglement
Cai, Qing-yu
2003-01-01
We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.
Critical Infrastructure Protection- Los Alamos National Laboratory
Energy Technology Data Exchange (ETDEWEB)
Bofman, Ryan K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
2017-02-24
Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.
Genesis of enterprise financial security
Directory of Open Access Journals (Sweden)
Davydenko N. M.
2015-05-01
Full Text Available The article analyzes the scientific approaches to the definition of «financial security of entities», advantages and disadvantages of these approaches are highlighted. The own definition of financial security of entities is given. The composition of elements of enterprise financial security and principles of its provision are defined. Тhe role of individual elements of financial security to ensure high efficiency operation and development of enterprises is significant and has a direct impact on their solvency, liquidity and profitability.
Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
Dunn Cavelty, Myriam
2014-09-01
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.
Addressing software security and mitigations in the life cycle
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2004-01-01
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.
Execution of a self-directed risk assessment methodology to address HIPAA data security requirements
Coleman, Johnathan
2003-05-01
This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.
Aviation security : status of transportation security inspector workforce.
2009-02-06
This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...
Brookhaven National Laboratory Institutional Plan FY2001--FY2005
Energy Technology Data Exchange (ETDEWEB)
Davis, S.
2000-10-01
Brookhaven National Laboratory is a multidisciplinary laboratory in the Department of Energy National Laboratory system and plays a lead role in the DOE Science and Technology mission. The Laboratory also contributes to the DOE missions in Energy Resources, Environmental Quality, and National Security. Brookhaven strives for excellence in its science research and in facility operations and manages its activities with particular sensitivity to environmental and community issues. The Laboratory's programs are aligned continuously with the goals and objectives of the DOE through an Integrated Planning Process. This Institutional Plan summarizes the portfolio of research and capabilities that will assure success in the Laboratory's mission in the future. It also sets forth BNL strategies for our programs and for management of the Laboratory. The Department of Energy national laboratory system provides extensive capabilities in both world class research expertise and unique facilities that cannot exist without federal support. Through these national resources, which are available to researchers from industry, universities, other government agencies and other nations, the Department advances the energy, environmental, economic and national security well being of the US, provides for the international advancement of science, and educates future scientists and engineers.
Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication
International Nuclear Information System (INIS)
Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin
2015-01-01
In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)
Energy Technology Data Exchange (ETDEWEB)
Chase, L.
1997-03-01
This report is the annual progress report for the Chemistry Materials Science Program: Weapons Research and Development and Laboratory Directed Research and Development. Twenty-one projects are described separately by their principal investigators.
International conference on nuclear security: Global directions for the future. Contributed papers
International Nuclear Information System (INIS)
2005-01-01
This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress
International conference on nuclear security: Global directions for the future. Contributed papers
Energy Technology Data Exchange (ETDEWEB)
NONE
2005-07-01
This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress.
Mitigations for Security Vulnerabilities Found in Control System Networks
Energy Technology Data Exchange (ETDEWEB)
Trent D. Nelson
2006-05-01
Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.
Task team approach to safeguards and security designs
International Nuclear Information System (INIS)
Zack, N.R.; Wilkey, D.D.
1991-01-01
In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications
2010-04-01
... institution does not initiate the purchase of the specified securities by the close of the next business day... physical delivery of certificates if the securities are issued in certificated form, or to direct a... business day. (6) A government securities broker or dealer that is a branch or agency of a foreign bank...
Nuclear safety, security and safeguards. An application of an integrated approach
Energy Technology Data Exchange (ETDEWEB)
Chapman, Howard; Edwards, Jeremy; Fitzpatrick, Joshua; Grundy, Colette; Rodger, Robert; Scott, Jonathan [National Nuclear Laboratory, Warrington (United Kingdom)
2018-01-15
National Nuclear Laboratory has recently produced a paper regarding the integrated approach of nuclear safety, security and safeguards. The paper considered the international acknowledgement of the inter-relationships and potential benefits to be gained through improved integration of the nuclear '3S'; Safety, Security and Safeguards. It considered that combining capabilities into one synergistic team can provide improved performance and value. This approach to integration has been adopted, and benefits realised by the National Nuclear Laboratory through creation of a Safety, Security and Safeguards team. In some instances the interface is clear and established, as is the case between safety and security in the areas of Vital Area Identification. In others the interface is developing such as the utilisation of safeguards related techniques such as nuclear material accountancy and control to enhance the security of materials. This paper looks at a practical example of the progress to date in implementing Triple S by a duty holder.
Managing a major security system installation: Practical lessons learned
International Nuclear Information System (INIS)
Roehrig, S.C.
1986-01-01
Sandia National Laboratories has been heavily involved for over a decade in aiding a number of DOE facilities in defining and implementing upgraded security safeguards systems. Because security system definition, design, and installation is still a relatively new field to the commercial world, effective project management must pay special attention to first understanding and then interpreting the unique aspects of a security system for all concerned parties. Experiences from an actual security system installation are used to illustrate some project management approaches which have been found to be effective
Energy Technology Data Exchange (ETDEWEB)
Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program
2016-04-01
This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.
International Nuclear Information System (INIS)
McCrory, R.L.; Meyerhofer, D.D.; Loucks, S.J.; Skupsky, S.; Bahr, R.E.; Betti, R.; Boehly, T.R.; Craxton, R.S.; Collins, T.J.B.; Delettrez, J.A.; Donaldson, W.R.; Epstein, R.; Fletcher, K.A.; Freeman, C.; Frenje, J.A.; Glebov, V.Yu.; Goncharov, V.N.; Harding, D.R.; Jaanimagi, P.A.; Keck, R.L.; Kelly, J.H.; Kessler, T.J.; Kilkenny, J.D.; Knauer, J.P.; Li, C.K.; Lund, L.D.; Marozas, J.A.; McKenty, P.W.; Marshall, F.J.; Morse, S.F.B.; Padalino, S.; Petrasso, R.D.; Radha, P.B.; Regan, S.P.; Roberts, S.; Sangster, T.C.; Seguin, F.H.; Seka, W.; Smalyuk, V.A.; Soures, J.M.; Stoeckl, C.; Thorp, K.A.; Yaakobi, B.; Zuegel, J.D.
2010-01-01
This paper reviews the status of direct-drive inertial confinement fusion (ICF) research at the University of Rochester's Laboratory for Laser Energetics (LLE). LLE's goal is to demonstrate direct-drive ignition on the National Ignition Facility (NIF) by 2014. Baseline 'all-DT' NIF direct-drive ignition target designs have been developed that have a predicted gain of 45 (1-D) at a NIF drive energy of ∼1.6 MJ. Significantly higher gains are calculated for targets that include a DT-wicked foam ablator. This paper also reviews the results of both warm fuel and initial cryogenic-fuel spherical target implosion experiments carried out on the OMEGA UV laser. The results of these experiments and design calculations increase confidence that the NIF direct-drive ICF ignition goal will be achieved.
Going paperless: implementing an electronic laboratory notebook in a bioanalytical laboratory.
Beato, Brian; Pisek, April; White, Jessica; Grever, Timothy; Engel, Brian; Pugh, Michael; Schneider, Michael; Carel, Barbara; Branstrator, Laurel; Shoup, Ronald
2011-07-01
AIT Bioscience, a bioanalytical CRO, implemented a highly configurable, Oracle-based electronic laboratory notebook (ELN) from IDBS called E-WorkBook Suite (EWBS). This ELN provides a high degree of connectivity with other databases, including Watson LIMS. Significant planning and training, along with considerable design effort and template validation for dozens of laboratory workflows were required prior to EWBS being viable for either R&D or regulated work. Once implemented, EWBS greatly reduced the need for traditional quality review upon experiment completion. Numerous real-time error checks occur automatically when conducting EWBS experiments, preventing the majority of laboratory errors by pointing them out while there is still time to correct any issues. Auditing and reviewing EWBS data are very efficient, because all data are forever securely (and even remotely) accessible, provided a reviewer has appropriate credentials. Use of EWBS significantly increases both data quality and laboratory efficiency.
Best Practices for the Security of Radioactive Materials
Energy Technology Data Exchange (ETDEWEB)
Coulter, D.T.; Musolino, S.
2009-05-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices
Best Practices for the Security of Radioactive Materials
International Nuclear Information System (INIS)
Coulter, D.T.; Musolino, S.
2009-01-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass
Safety and Security Interface Technology Initiative
Energy Technology Data Exchange (ETDEWEB)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
2007-05-01
Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security
Enhancing Food Security through Information and Communication ...
International Development Research Centre (IDRC) Digital Library (Canada)
... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
Directed energy deflection laboratory measurements of common space based targets
Brashears, Travis; Lubin, Philip; Hughes, Gary B.; Meinhold, Peter; Batliner, Payton; Motta, Caio; Madajian, Jonathan; Mercer, Whitaker; Knowles, Patrick
2016-09-01
We report on laboratory studies of the effectiveness of directed energy planetary defense as a part of the DE-STAR (Directed Energy System for Targeting of Asteroids and exploRation) program. DE-STAR and DE-STARLITE are directed energy "stand-off" and "stand-on" programs, respectively. These systems consist of a modular array of kilowatt-class lasers powered by photovoltaics, and are capable of heating a spot on the surface of an asteroid to the point of vaporization. Mass ejection, as a plume of evaporated material, creates a reactionary thrust capable of diverting the asteroid's orbit. In a series of papers, we have developed a theoretical basis and described numerical simulations for determining the thrust produced by material evaporating from the surface of an asteroid. In the DESTAR concept, the asteroid itself is used as the deflection "propellant". This study presents results of experiments designed to measure the thrust created by evaporation from a laser directed energy spot. We constructed a vacuum chamber to simulate space conditions, and installed a torsion balance that holds a common space target sample. The sample is illuminated with a fiber array laser with flux levels up to 60 MW/m2 , which allows us to simulate a mission level flux but on a small scale. We use a separate laser as well as a position sensitive centroid detector to readout the angular motion of the torsion balance and can thus determine the thrust. We compare the measured thrust to the models. Our theoretical models indicate a coupling coefficient well in excess of 100 μN/Woptical, though we assume a more conservative value of 80 μN/Woptical and then degrade this with an optical "encircled energy" efficiency of 0.75 to 60 μN/Woptical in our deflection modeling. Our measurements discussed here yield about 45 μN/Wabsorbed as a reasonable lower limit to the thrust per optical watt absorbed. Results vary depending on the material tested and are limited to measurements of 1 axis, so
Lippi, Giuseppe; Favaloro, Emmanuel J; Mattiuzzi, Camilla
2014-10-01
The recent development and marketing of novel direct oral anticoagulants (DOACs) represents a paradigm shift in the management of patients requiring long-term anticoagulation. The advantages of these compounds over traditional therapy with vitamin K antagonists include a reportedly lower risk of severe hemorrhages and the limited need for laboratory measurements. However, there are several scenarios in which testing should be applied. The potential for drug-to-drug interaction is one plausible but currently underrecognized indication for laboratory assessment of the anticoagulant effect of DOACs. In particular, substantial concern has been raised during Phase I studies regarding the potential interaction of these drugs with some antibiotics, especially those that interplay with permeability glycoprotein (P-gp) and cytochrome 3A4 (CYP3A4). A specific electronic search on clinical trials published so far confirms that clarithromycin and rifampicin significantly impair the bioavailability of dabigatran, whereas clarithromycin, erythromycin, fluconazole, and ketoconazole alter the metabolism of rivaroxaban in vivo. Because of their more recent development, no published data were found for apixaban and edoxaban, or for potential interactions of DOACs with other and widely used antibiotics. It is noteworthy, however, that an online resource based on Food and Drug Administration and social media information, reports several hemorrhagic and thrombotic events in patients simultaneously taking dabigatran and some commonly used antibiotics such as amoxicillin, cephalosporin, and metronidazole. According to these reports, the administration of antibiotics in patients undergoing therapy with DOACs would seem to require accurate evaluation as to whether dose adjustments (personalized or antibiotic class driven) of the anticoagulant drug may be advisable. This might be facilitated by direct laboratory assessments of their anticoagulant effect ex vivo. Thieme Medical Publishers
Energy Technology Data Exchange (ETDEWEB)
Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.
2008-08-01
This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).
International Nuclear Information System (INIS)
Chang Yan; Zhang Shi-Bin; Yan Li-Li; Han Gui-Hua
2015-01-01
By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0′〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0′〉. By using the |0′〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping–pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. (paper)
Progress in direct-drive inertial confinement fusion research at the Laboratory for Laser Energetics
International Nuclear Information System (INIS)
McCrory, R.L.
2002-01-01
Significant theoretical and experimental progress towards the validation of direct-drive inertial confinement fusion (ICF) has been recently made at the Laboratory for Laser Energetics (LLE). Direct-drive ICF offers the potential for high-gain implosions and is a leading candidate for an inertial fusion energy power plant. LLE's base-line direct-drive ignition design for NIF is an 'all-DT' design that has a 1-D gain of ∼45. Recent calculations show that targets composed of foam shells, wicked with DT, can potentially achieve 1-D gains of ∼100. LLE experiments are conducted on the OMEGA 60-beam, 30-kJ, UV laser system. Beam smoothing of OMEGA includes 1-THz, 2-D SSD and polarization smoothing. Cryogenic D2 and plastic shell (warm) spherical targets and a comprehensive suite of x-ray, nuclear, charged particle and optical diagnostics are used in these experiments. Future experiments will use cryogenic DT targets. (author)
LANL Safeguards and Security Assurance Program. Revision 6
International Nuclear Information System (INIS)
1995-01-01
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms
Physical security technology base programs for physical security
International Nuclear Information System (INIS)
Jacobs, J.
1986-01-01
Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems
Smart grid security innovative solutions for a modernized grid
Skopik, Florian
2015-01-01
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regi
19 CFR 151.54 - Testing by Customs laboratory.
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Testing by Customs laboratory. 151.54 Section 151.54 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Other Metal-Bearing Materials § 151.54 Testing by Customs laboratory. Samples taken in accordance with...
Urban Security Initiative: Earthquake impacts on the urban ``system of systems``
Energy Technology Data Exchange (ETDEWEB)
Maheshwari, S.; Jones, E.; Rasmussen, S.
1999-06-01
This paper is a discussion of how to address the problems of disasters in a large city, a project titled Urban Security Initiative undertaken by the Los Alamos National Laboratory. The paper first discusses the need to address the problems of disasters in large cities and ten provides a framework that is suitable to address this problem. The paper then provides an overview of the module of the project that deals with assessment of earthquake damage on urban infrastructure in large cities and an internet-based approach for consensus building leading to better coordination in the post-disaster period. Finally, the paper discusses the future direction of the project.
The Remote Security Station (RSS) final report
International Nuclear Information System (INIS)
Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.
1992-10-01
The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions
Laboratory Directed Research and Development Program. FY 1993
Energy Technology Data Exchange (ETDEWEB)
1994-02-01
This report is compiled from annual reports submitted by principal investigators following the close of fiscal year 1993. This report describes the projects supported and summarizes their accomplishments. The program advances the Laboratory`s core competencies, foundations, scientific capability, and permits exploration of exciting new opportunities. Reports are given from the following divisions: Accelerator and Fusion Research, Chemical Sciences, Earth Sciences, Energy and Environment, Engineering, Environment -- Health and Safety, Information and Computing Sciences, Life Sciences, Materials Sciences, Nuclear Science, Physics, and Structural Biology. (GHH)
Nevada National Security Site Environmental Report 2016
Energy Technology Data Exchange (ETDEWEB)
Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)
2017-09-07
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple
When in doubt, seize the day? Security values, prosocial values, and proactivity under ambiguity.
Grant, Adam M; Rothbard, Nancy P
2013-09-01
Researchers have suggested that both ambiguity and values play important roles in shaping employees' proactive behaviors, but have not theoretically or empirically integrated these factors. Drawing on theories of situational strength and values, we propose that ambiguity constitutes a weak situation that strengthens the relationship between the content of employees' values and their proactivity. A field study of 204 employees and their direct supervisors in a water treatment plant provided support for this contingency perspective. Ambiguity moderated the relationship between employees' security and prosocial values and supervisor ratings of proactivity. Under high ambiguity, security values predicted lower proactivity, whereas prosocial values predicted higher proactivity. Under low ambiguity, values were not associated with proactivity. We replicated these findings in a laboratory experiment with 232 participants in which we measured proactivity objectively as initiative taken to correct errors: Participants with strong security values were less proactive, and participants with strong prosocial values were more proactive, but only when performance expectations were ambiguous. We discuss theoretical implications for research on proactivity, values, and ambiguity and uncertainty. PsycINFO Database Record (c) 2013 APA, all rights reserved
Fong, Christine; Brinkley, James F.
2006-01-01
A common challenge among today’s biomedical research labs is managing growing amounts of research data. In order to reduce the time and resource costs of building data management tools, we designed the Customizable Electronic Laboratory Online (CELO) system. CELO automatically creates a generic database and web interface for laboratories that submit a simple web registration form. Laboratories can then use a collection of predefined XML templates to assist with the design of a database schema. Users can immediately utilize the web-based system to query data, manage multimedia files, and securely share data remotely over the internet. PMID:17238541
Yâ12 National Security Complex
Federal Laboratory Consortium — The Yâ12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...
28 CFR 501.2 - National security cases.
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...
Biosafety and biosecurity in veterinary laboratories
Energy Technology Data Exchange (ETDEWEB)
Finley, Melissa R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Astuto-Gribble, Lisa M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brass, Van Hildren [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
2016-08-01
Here, with recent outbreaks of MERS-Cov, Anthrax, Nipah, and Highly Pathogenic Avian Influenza, much emphasis has been placed on rapid identification of infectious agents globally. As a result, laboratories are building capacity, conducting more advanced and sophisticated research, increasing laboratory staff, and establishing collections of dangerous pathogens in an attempt to reduce the impact of infectious disease outbreaks and characterize disease causing agents. With this expansion, the global laboratory community has started to focus on laboratory biosafety and biosecurity to prevent the accidental and/or intent ional release o f these agents. Laboratory biosafety and biosecurity systems are used around the world to help mit igate the risks posed by dangerous pathogens in the laboratory. Veterinary laboratories carry unique responsibilities to workers and communities to safely and securely handle disease causing microorganisms. Many microorganisms studied in veterinary laboratories not only infect animals, but also have the potential to infect humans. This paper will discuss the fundamentals of laboratory biosafety and biosecurity.
Nuclear Security Futures Scenarios
International Nuclear Information System (INIS)
Keller, Elizabeth James Kistin; Warren, Drake Edward; Hayden, Nancy Kay; Passell, Howard D.; Malczynski, Leonard A.; Backus, George A.
2017-01-01
This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.
Nuclear Security Futures Scenarios.
Energy Technology Data Exchange (ETDEWEB)
Keller, Elizabeth James Kistin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hayden, Nancy Kay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Passell, Howard D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
2017-01-01
This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.
Error-Based Accidents and Security Incidents in Nuclear Materials Management
International Nuclear Information System (INIS)
Pond, Daniel J.; Greitzer, Frank L.
2005-01-01
Hazard and risk assessments, along with human error analysis and mitigation techniques, have long been mainstays of effective safety programs. These tools have revealed that worker errors contributing to or resulting in accidents are often the consequence of ineffective system conditions, process features, or individual employee characteristics. At Los Alamos National Laboratory (LANL), security, safety, human error, and organizational analysts determined that the system-induced human errors that make accidents more likely also are contributing to security incidents. A similar set of system conditions has been found to underlie deliberate, non-malevolent deviations from proper security practices - termed breaches - that also can result in a security incident. In fiscal-year (FY) 2002, LANL's Security Division therefore established the ESTHER (Enhanced Security Through Human Error Reduction) program to identify and reduce the influence of the factors that underlie employee errors and breaches and, in turn, security incidents. Recognizing the potential benefits of this program and approach, in FY2004 the Department of Energy (DOE) Office of Security Policy (DOE-SO) funded an expansion of ESTHER implementation to the causal assessment and reporting of security incidents at other DOE sites. This presentation will focus on three applications of error/breach assessment and mitigation techniques. One use is proactive, accomplished through the elimination of contributors to error, whereas two are reactive, implemented in response to accidents or security incidents as well as to near misses, to prevent recurrence. The human performance and safety bases of these techniques will be detailed. Associated tools - including computer-based assessment training and web-based incident reporting modules developed by Pacific Northwest National Laboratory - will be discussed
Security for multi-hop wireless networks
Mahmoud, Mohamed M E A
2014-01-01
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security
75 FR 17305 - National Industrial Security Program Directive No. 1
2010-04-06
... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...
Climatic change and security stakes
International Nuclear Information System (INIS)
Ambrosi, Ph.; Hallegatte, St.
2006-01-01
This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)
Establishing a national biological laboratory safety and security monitoring program.
Blaine, James W
2012-12-01
The growing concern over the potential use of biological agents as weapons and the continuing work of the Biological Weapons Convention has promoted an interest in establishing national biological laboratory biosafety and biosecurity monitoring programs. The challenges and issues that should be considered by governments, or organizations, embarking on the creation of a biological laboratory biosafety and biosecurity monitoring program are discussed in this article. The discussion focuses on the following questions: Is there critical infrastructure support available? What should be the program focus? Who should be monitored? Who should do the monitoring? How extensive should the monitoring be? What standards and requirements should be used? What are the consequences if a laboratory does not meet the requirements or is not willing to comply? Would the program achieve the results intended? What are the program costs? The success of a monitoring program can depend on how the government, or organization, responds to these questions.
Sandia National Laboratories Institutional Plan: FY 1996--2001
Energy Technology Data Exchange (ETDEWEB)
NONE
1995-12-31
Sandia`s Institutional Plan is by necessity a large document. As their missions have grown and diversified over the past decades, the variety of technical and site activities has increased. The programs and activities described here cover an enormous breadth of scientific and technological effort--from the creation of new materials to the development of a Sandia-wide electronic communications system. Today, there are three major themes that greatly influence this work. First, every federally funded institution is being challenged to find ways to become more cost effective, as the US seeks to reduce the deficit and achieve a balanced federal spending plan. Sandia is evaluating its business and operational processes to reduce the overall costs. Second, in response to the Galvin Task Force`s report ``Alternative Futures for the Department of Energy National Laboratories``, Sandia and the Department of Energy are working jointly to reduce the burden of administrative and compliance activities in order to devote more of the total effort to their principal research and development missions. Third, they are reevaluating the match between their missions and the programs they will emphasize in the future. They must demonstrate that Sandia`s roles--in national security, energy security, environmental integrity, and national scientific and technology agenda support--fit their special capabilities and skills and thus ensure their place in these missions for the longer planning horizon. The following areas are covered here: Sandia`s mission; laboratory directives; programmatic activities; technology partnerships and commercialization; Sandia`s resources; and protecting resources and the community.
What the IAEA Laboratories Bring to the World
International Nuclear Information System (INIS)
Amano, Yukiya
2014-01-01
The safeguards laboratories are critical to the IAEA’s work to help prevent the spread of nuclear weapons. The nuclear applications laboratories, located in Vienna, Seibersdorf, near Vienna, and Monaco, help Member States tackle fundamental development issues such as food security, water resource management, human health, and the monitoring and management of environmental radioactivity and pollution
Energy Technology Data Exchange (ETDEWEB)
Ogeka, G.J.; Searing, J.M.
1997-12-01
New ideas and opportunities fostering the advancement of technology are occurring at an ever increasing rate. It, therefore, seems appropriate that a vehicle be available which fosters the development of new ideas and technologies, promotes the early exploration and exploitation of creative and innovative concepts, and develops new fundable R and D projects and programs if BNL is to carry out its primary mission and support the basic Department of Energy activities. At Brookhaven National Laboratory one such method is through its Laboratory Directed Research and Development Program. This discretionary research and development tool is critical in maintaining the scientific excellence and vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals and presentations at meetings and forums.
Energy Technology Data Exchange (ETDEWEB)
NONE
1996-12-01
New ideas and opportunities fostering the advancement of technology are occurring at an ever increasing rate. It, therefore, seems appropriate that a vehicle be available which fosters the development of new ideas and technologies, promotes the early exploration and exploitation of creative and innovative concepts, and develops new fundable R and D projects and programs if BNL is to carry out its primary mission and support the basic Department of Energy activities. At Brookhaven National Laboratory one such method is through its Laboratory Directed Research and Development Program. This discretionary research and development tool is critical in maintaining the scientific excellence and vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals and presentations at meetings and forums.
International Nuclear Information System (INIS)
Ogeka, G.J.; Searing, J.M.
1997-12-01
New ideas and opportunities fostering the advancement of technology are occurring at an ever increasing rate. It, therefore, seems appropriate that a vehicle be available which fosters the development of new ideas and technologies, promotes the early exploration and exploitation of creative and innovative concepts, and develops new fundable R and D projects and programs if BNL is to carry out its primary mission and support the basic Department of Energy activities. At Brookhaven National Laboratory one such method is through its Laboratory Directed Research and Development Program. This discretionary research and development tool is critical in maintaining the scientific excellence and vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community, fostering new science and technology ideas, which is the major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The Project Summaries with their accomplishments described in this report reflect the above. Aside from leading to new fundable or promising programs and producing especially noteworthy research, they have resulted in numerous publications in various professional and scientific journals and presentations at meetings and forums
Energy Technology Data Exchange (ETDEWEB)
NONE
1994-12-01
More than 40 years ago, three laboratories were established to take on scientific responsibility for the nation`s nuclear weapons - Los Alamos, Sandia, and Livermore. This triad of laboratories has provided the state-of-the-art science and technology to create America`s nuclear deterrent and to ensure that the weapons are safe, secure, and to ensure that the weapons are safe, secure, and reliable. These national security laboratories carried out their responsibilities through intense efforts involving almost every field of science, engineering, and technology. Today, they are recognized as three of the world`s premier research and development laboratories. This report sketches the history of the laboratories and their evolution to an integrated three-laboratory system. The characteristics that make them unique are described and some of the major contributions they have made over the years are highlighted.
Security of pipeline facilities
Energy Technology Data Exchange (ETDEWEB)
Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)
2005-07-01
This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.
Data security breaches and privacy in Europe
Wong, Rebecca
2013-01-01
Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems a
Laboratory Directed Research and Development Program
International Nuclear Information System (INIS)
1994-02-01
This report is compiled from annual reports submitted by principal investigators following the close of fiscal year 1993. This report describes the projects supported and summarizes their accomplishments. The program advances the Laboratory's core competencies, foundations, scientific capability, and permits exploration of exciting new opportunities. Reports are given from the following divisions: Accelerator and Fusion Research, Chemical Sciences, Earth Sciences, Energy and Environment, Engineering, Environment -- Health and Safety, Information and Computing Sciences, Life Sciences, Materials Sciences, Nuclear Science, Physics, and Structural Biology
Lawrence Livermore National Laboratory 2007 Annual Report
Energy Technology Data Exchange (ETDEWEB)
Chrzanowski, P; Walter, K
2008-04-25
Lawrence Livermore National Laboratory's many outstanding accomplishments in 2007 are a tribute to a dedicated staff, which is shaping the Laboratory's future as we go through a period of transition and transformation. The achievements highlighted in this annual report illustrate our focus on the important problems that affect our nation's security and global stability, our application of breakthrough science and technology to tackle those problems, and our commitment to safe, secure, and efficient operations. In May 2007, the Department of Energy (DOE) awarded Lawrence Livermore National Security, LLC (LLNS), a new public-private partnership, the contract to manage and operate the Laboratory starting in October. Since its inception in 1952, the Laboratory had been managed by the University of California (UC) for the DOE's National Nuclear Security Administration (NNSA) and predecessor organizations. UC is one of the parent organizations that make up LLNS, and UC's presence in the new management entity will help us carry forward our strong tradition of multidisciplinary science and technology. 'Team science' applied to big problems was pioneered by the Laboratory's co-founder and namesake, Ernest O. Lawrence, and has been our hallmark ever since. Transition began fully a year before DOE's announcement. More than 1,600 activities had to be carried out to transition the Laboratory from management by a not-for-profit to a private entity. People, property, and procedures as well as contracts, formal agreements, and liabilities had to be transferred to LLNS. The pre-transition and transition teams did a superb job, and I thank them for their hard work. Transformation is an ongoing process at Livermore. We continually reinvent ourselves as we seek breakthroughs that impact emerging national needs. An example is our development in the late 1990s of a portable instrument that could rapidly detect DNA signatures, research that
Energy audit and energy security
Directory of Open Access Journals (Sweden)
Beata Agnieszka Kulessa
2013-07-01
Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.
Dhungana, Neha; Morris, Cory; Krasowski, Matthew D
2017-08-01
The aim of this study was to compare the operational impact of using vanadate oxidase versus diazo direct bilirubin assays for an academic medical center patient population. Retrospective study was done over an approximately 3.5 year period. The main automated chemistry instrumentation was a Roche Diagnostics cobas 8000 line. The Roche Direct Bilirubin assay was compared to Diazyme Laboratories Direct Bilirubin Assay and Randox Laboratories Direct Bilirubin assay using manufacturer's guidelines for hemolysis index, lipemia index, and analytical measurement range (AMR). Retrospective data was analyzed for 47,333 serum/plasma specimens that had clinical orders for direct bilirubin. A total of 5943 specimens (12.6%) exceeded the hemolysis index limit for the Roche method compared to only 0.2% and 0.05% of specimens for the Diazyme and Randox methods, respectively. The impact was particularly large on patients less than 2 years old, for which 51.3% of specimens exceeded the hemolysis index for the Roche method. A total of 1671 specimens (3.5%) exceeded the lipemia index limit for the Roche method compared to less than 0.1% for the Randox method. Lastly, 988 (2.1%) of specimens had direct bilirubin concentrations exceeding the upper AMR limit of 10 mg/dL [171 µmol/L] for the Roche assay compared to less than 1% of specimens for the vanadate oxidase methods. Vanadate oxidase direct bilirubin methods offer advantages over diazo methods in terms of less interference by hemolysis and lipemia, as well as wider AMR. The advantages are particularly evident for neonatal and infant populations.
User Interface Program for secure electronic tags
International Nuclear Information System (INIS)
Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.
1995-05-01
This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US
Salas-Zapata, Leonardo; Palacio-Mejía, Lina Sofía; Aracena-Genao, Belkis; Hernández-Ávila, Juan Eugenio; Nieto-López, Emmanuel Salvador
To estimate the direct costs related to hospitalizations for diabetes mellitus and its complications in the Mexican Institute of Social Security METHODS: The hospital care costs of patients with diabetes mellitus using diagnosis-related groups in the IMSS (Mexican Institute of Social Security) and the hospital discharges from the corresponding E10-E14 codes for diabetes mellitus were estimated between 2008-2013. Costs were grouped according to demographic characteristics and main condition, and were estimated in US dollars in 2013. 411,302 diabetes mellitus discharges were recorded, representing a cost of $1,563 million. 52.44% of hospital discharges were men and 77.26% were for type 2 diabetes mellitus. The biggest cost was attributed to peripheral circulatory complications (34.84%) and people from 45-64 years of age (47.1%). Discharges decreased by 3.84% and total costs by 1.75% in the period analysed. The complications that caused the biggest cost variations were ketoacidosis (50.7%), ophthalmic (22.6%) and circulatory (18.81%). Hospital care for diabetes mellitus represents an important financial challenge for the IMSS. The increase in the frequency of hospitalisations in the productive age group, which affects society as a whole, is an even bigger challenge, and suggests the need to strengthen monitoring of diabetics in order to prevent complications that require hospital care. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.
31 CFR 357.25 - Security interests.
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Security interests. 357.25 Section 357.25 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... System (Legacy Treasury Direct) § 357.25 Security interests. (a) General. The Department will not...
[Biological security confronting bioterrorism].
Suárez Fernández, Guillermo
2002-01-01
A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.
The Extended Concept of Security and the Czech Security Practice
Directory of Open Access Journals (Sweden)
Libor Stejskal
2008-12-01
accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.
Securing the United States' power infrastructure
Energy Technology Data Exchange (ETDEWEB)
Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
2015-08-01
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.
48 CFR 204.470-2 - National security exclusion.
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...
Predicting the valley physics of silicon quantum dots directly from a device layout
Gamble, John King; Harvey-Collard, Patrick; Jacobson, N. Tobias; Bacewski, Andrew D.; Nielsen, Erik; Montaño, Inès; Rudolph, Martin; Carroll, Malcolm S.; Muller, Richard P.
Qubits made from electrostatically-defined quantum dots in Si-based systems are excellent candidates for quantum information processing applications. However, the multi-valley structure of silicon's band structure provides additional challenges for the few-electron physics critical to qubit manipulation. Here, we present a theory for valley physics that is predictive, in that we take as input the real physical device geometry and experimental voltage operation schedule, and with minimal approximation compute the resulting valley physics. We present both effective mass theory and atomistic tight-binding calculations for two distinct metal-oxide-semiconductor (MOS) quantum dot systems, directly comparing them to experimental measurements of the valley splitting. We conclude by assessing these detailed simulations' utility for engineering desired valley physics in future devices. Sandia is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the US Department of Energy's National Nuclear Security Administration under Contract No. DE-AC04-94AL85000. The authors gratefully acknowledge support from the Sandia National Laboratories Truman Fellowship Program, which is funded by the Laboratory Directed Research and Development (LDRD) Program.
A scoping review of traditional food security in Alaska.
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-12-01
Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.
Nuclear safeguards and security: we can do better.
Energy Technology Data Exchange (ETDEWEB)
Johnston, R. G. (Roger G.); Warner, Jon S.; Garcia, A. R. E. (Anthony R. E.); Martinez, R. K. (Ronald K.); Lopez, L. N. (Leon N.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Herrera, A. M. (Alicia M.); Bitzer, E. G. (Edward G.), III
2005-01-01
There are a number of practical ways to significantly improve nuclear safeguards and security. These include recognizing and minimizing the insider threat; using adversarial vulnerability assessments to find vulnerabilities and countermeasures; fully appreciating the disparate nature of domestic and international nuclear safeguards; improving tamper detection and tamper-indicating seals; not confusing the inventory and security functions; and recognizing the limitations of GPS tracking, contact memory buttons, and RFID tags. The efficacy of nuclear safeguards depends critically on employing sophisticated security strategies and effective monitoring hardware. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has extensively researched issues associated with nuclear safeguards, especially in the areas of tamper/intrusion detection, transport security, and vulnerability assessments. This paper discusses some of our findings, recommendations, and warnings.
Direct geoelectrical evidence of mass transfer at the laboratory scale
Swanson, Ryan D.; Singha, Kamini; Day-Lewis, Frederick D.; Binley, Andrew; Keating, Kristina; Haggerty, Roy
2012-10-01
Previous field-scale experimental data and numerical modeling suggest that the dual-domain mass transfer (DDMT) of electrolytic tracers has an observable geoelectrical signature. Here we present controlled laboratory experiments confirming the electrical signature of DDMT and demonstrate the use of time-lapse electrical measurements in conjunction with concentration measurements to estimate the parameters controlling DDMT, i.e., the mobile and immobile porosity and rate at which solute exchanges between mobile and immobile domains. We conducted column tracer tests on unconsolidated quartz sand and a material with a high secondary porosity: the zeolite clinoptilolite. During NaCl tracer tests we collected nearly colocated bulk direct-current electrical conductivity (σb) and fluid conductivity (σf) measurements. Our results for the zeolite show (1) extensive tailing and (2) a hysteretic relation between σf and σb, thus providing evidence of mass transfer not observed within the quartz sand. To identify best-fit parameters and evaluate parameter sensitivity, we performed over 2700 simulations of σf, varying the immobile and mobile domain and mass transfer rate. We emphasized the fit to late-time tailing by minimizing the Box-Cox power transformed root-mean square error between the observed and simulated σf. Low-field proton nuclear magnetic resonance (NMR) measurements provide an independent quantification of the volumes of the mobile and immobile domains. The best-fit parameters based on σf match the NMR measurements of the immobile and mobile domain porosities and provide the first direct electrical evidence for DDMT. Our results underscore the potential of using electrical measurements for DDMT parameter inference.
Reconsidering relations between nuclear energy and security concepts
International Nuclear Information System (INIS)
Irie, Kazutomo
2004-01-01
Relations between nuclear energy and security concepts can be clarified through investigation into the multivocal nature of security concepts. While military uses of nuclear energy significantly influence national security, peaceful uses of nuclear energy contribute energy security, which is an expanded concept of national security. Military and peaceful uses of nuclear energy have reciprocal actions, thus influencing national security and energy security, respectively. Nuclear security, which means security of nuclear systems themselves, recently attracts the attention of the international society. Nuclear security directly influences national security issues. On the other hand, along with nuclear safety, nuclear security becomes a prerequisite for energy security through peaceful uses of nuclear energy. In investigating into relations between nuclear energy and security concepts, the difficulty of translating the English word of 'nuclear security' into Japanese as well as other languages is found. (author)
Renewable Energy Laboratory Development for Biofuels Advanced Combustion Studies
Energy Technology Data Exchange (ETDEWEB)
Soloiu, Valentin A. [Georgia Southern Univ., Statesboro, GA (United States)
2012-03-31
The research advanced fundamental science and applied engineering for increasing the efficiency of internal combustion engines and meeting emissions regulations with biofuels. The project developed a laboratory with new experiments and allowed investigation of new fuels and their combustion and emissions. This project supports a sustainable domestic biofuels and automotive industry creating economic opportunities across the nation, reducing the dependence on foreign oil, and enhancing U.S. energy security. The one year period of research developed fundamental knowledge and applied technology in advanced combustion, emissions and biofuels formulation to increase vehicle's efficiency. Biofuels combustion was investigated in a Compression Ignition Direct Injection (DI) to develop idling strategies with biofuels and an Indirect Diesel Injection (IDI) intended for auxiliary power unit.
The ideal laboratory information system.
Sepulveda, Jorge L; Young, Donald S
2013-08-01
Laboratory information systems (LIS) are critical components of the operation of clinical laboratories. However, the functionalities of LIS have lagged significantly behind the capacities of current hardware and software technologies, while the complexity of the information produced by clinical laboratories has been increasing over time and will soon undergo rapid expansion with the use of new, high-throughput and high-dimensionality laboratory tests. In the broadest sense, LIS are essential to manage the flow of information between health care providers, patients, and laboratories and should be designed to optimize not only laboratory operations but also personalized clinical care. To list suggestions for designing LIS with the goal of optimizing the operation of clinical laboratories while improving clinical care by intelligent management of laboratory information. Literature review, interviews with laboratory users, and personal experience and opinion. Laboratory information systems can improve laboratory operations and improve patient care. Specific suggestions for improving the function of LIS are listed under the following sections: (1) Information Security, (2) Test Ordering, (3) Specimen Collection, Accessioning, and Processing, (4) Analytic Phase, (5) Result Entry and Validation, (6) Result Reporting, (7) Notification Management, (8) Data Mining and Cross-sectional Reports, (9) Method Validation, (10) Quality Management, (11) Administrative and Financial Issues, and (12) Other Operational Issues.
Managing Security Risks in an Industrial Investment – Analysis Directions
Directory of Open Access Journals (Sweden)
Stefan Dragomir
2016-05-01
Full Text Available This paper achieved an analysis of some important management strategies for an investment, in correlation with index of global pollution. Environmental security assessment shall be determined taking into account the workplace security and effects on health, safety of workers in an industry investment. It is necessary to observe and collect a larger number of data generated by the development of an industrial process, so as to make a deep analysis on global pollution index and how it is affected industrial investment environment. This research shows how can the substances that infest the environment to produce much damage and influence the environmental factors (air, water, soil, landscape, fauna and flora. When we know the risks that characterize the plant equipment, we can protect the life and we can protect the environment for a sustainable development in the future.
OpenMeetings as a browser-based teleconferencing tool for EFDA laboratories
Energy Technology Data Exchange (ETDEWEB)
Santos, B., E-mail: bsantos@ipfn.ist.utl.pt [Associacao EURATOM/IST, Instituto de Plasmas e Fusao Nuclear - Laboratorio Associado, Instituto Superior Tecnico, P-1049-001 Lisboa (Portugal); Castro, R. [Asociacion EURATOM/CIEMAT Para Fusion, 28040 Madrid (Spain); Santos, J.H.; Gomes, D.; Fernandes, H.; Sousa, J.; Varandas, C.A.F. [Associacao EURATOM/IST, Instituto de Plasmas e Fusao Nuclear - Laboratorio Associado, Instituto Superior Tecnico, P-1049-001 Lisboa (Portugal)
2011-10-15
Remote participation is a key success factor for worldwide organizations and video-conference is an important aspect when laboratory collaborators are geographically dispersed. Several tools for video-conference are available worldwide. However, there is a need for a default integrated set of tools which provide all the needed features for remote participation between cooperating laboratories. Moreover, laboratories currently use different video-conference tools to communicate leading to a non-compatible method among them. OpenMeetings is open source software which provides video-conferences through web-browsing. It is operating system independent, requires no computer installation providing easy integration with already existing tools and customization of requirements. This paper intends to give an OpenMeetings overview as a video-conference application between worldwide laboratories and to demonstrate its integration with the European Fusion Development Agreement (EFDA) Federation authentication and authorization features. EFDA Federation is a multi-organization security infrastructure, whose purpose is to provide sharing and provision of a wide set of resources so that authenticated users may access them in a transparent and secure mode. This infrastructure is based on a distributed security technology called PAPI (Point of Access to Providers of Information). OpenMeetings can be a valuable EFDA Federation resource and a good approach as a method to provide a worldwide laboratory video-conferencing application, based on standard browsers.
OpenMeetings as a browser-based teleconferencing tool for EFDA laboratories
International Nuclear Information System (INIS)
Santos, B.; Castro, R.; Santos, J.H.; Gomes, D.; Fernandes, H.; Sousa, J.; Varandas, C.A.F.
2011-01-01
Remote participation is a key success factor for worldwide organizations and video-conference is an important aspect when laboratory collaborators are geographically dispersed. Several tools for video-conference are available worldwide. However, there is a need for a default integrated set of tools which provide all the needed features for remote participation between cooperating laboratories. Moreover, laboratories currently use different video-conference tools to communicate leading to a non-compatible method among them. OpenMeetings is open source software which provides video-conferences through web-browsing. It is operating system independent, requires no computer installation providing easy integration with already existing tools and customization of requirements. This paper intends to give an OpenMeetings overview as a video-conference application between worldwide laboratories and to demonstrate its integration with the European Fusion Development Agreement (EFDA) Federation authentication and authorization features. EFDA Federation is a multi-organization security infrastructure, whose purpose is to provide sharing and provision of a wide set of resources so that authenticated users may access them in a transparent and secure mode. This infrastructure is based on a distributed security technology called PAPI (Point of Access to Providers of Information). OpenMeetings can be a valuable EFDA Federation resource and a good approach as a method to provide a worldwide laboratory video-conferencing application, based on standard browsers.
Metrology network: a case study on the metrology network of defense and security from SIBRATEC
International Nuclear Information System (INIS)
Pereira, Marisa Ferraz Figueira
2016-01-01
This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)
Herrick, Nathan J; Cloyd, Raymond A
2017-06-01
Greenhouse producers are interested in integrating natural enemies along with pesticides to suppress western flower thrips, Frankliniella occidentalis (Pergande), populations. The insidious flower bug, Orius insidiosus (Say), is a commercially available natural enemy of western flower thrips. We conducted a series of laboratory experiments to determine the direct and indirect effects of 28 pesticides (insecticides, miticides, and fungicides), 4 pesticide mixtures, and 4 surfactants (36 total treatments plus a water control) on the adult O. insidiosus survival and predation on western flower thrips adults under laboratory conditions. The number of live and dead O. insidiosus adults was recorded after 24, 48, 72, and 96 h. The results of the study indicate that the fungicides (aluminum tris, azoxystrobin, fenhexamid, and kresoxim-methyl), insect growth regulators (azadirachtin, buprofezin, kinoprene, and pyriproxyfen), botanicals (Capsicum oleoresin extract, garlic oil, soybean oil; and rosemary, rosemary oil, peppermint oil, and cottonseed oil), and entomopathogenic fungi (Beauveria bassiana and Metarhizium anisopliae) were minimally directly harmful to adult O. insidiosus, with 80% to 100% adult survival. However, abamectin, spinosad, pyridalyl, chlorfenapyr, tau-fluvalinate, imidacloprid, dinotefuran, acetamiprid, and thiamethoxam directly affected O. insidiosus survival after 96 h (0-60% adult survival). The pesticide mixtures of abamectin + spinosad and chlorfenapyr + dinotefuran reduced adult survival (20% and 0%, respectively, after 48 h). Furthermore, the surfactants were not directly harmful to O. insidiosus adults. All western flower thrips adults were killed by the surviving adult O. insidiosus after 48 h, indicating no indirect effects of the pesticides on predation. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Authenticated Secure Container System (ASCS)
International Nuclear Information System (INIS)
1991-01-01
Sandia National Laboratories developed an Authenticated Secure Container System (ASCS) for the International Atomic Energy Agency (IAEA). Agency standard weights and safeguards samples can be stored in the ASCS to provide continuity of knowledge. The ASCS consists of an optically clear cover, a base containing the Authenticated Item Monitoring System (AIMS) transmitter, and the AIMS receiver unit for data collection. The ASCS will provide the Inspector with information concerning the status of the system, during a surveillance period, such as state of health, tampering attempts, and movement of the container system. The secure container is located inside a Glove Box with the receiver located remotely from the Glove Box. AIMS technology uses rf transmission from the secure container to the receiver to provide a record of state of health and tampering. The data is stored in the receiver for analysis by the Inspector during a future inspection visit. 2 refs
Mid-Term Direction of JAEA Nuclear Fuel Cycle Engineering Laboratories
International Nuclear Information System (INIS)
Ojima, H.; Sugiyama, T.; Tanaka, K.; Takeda, S.; Nomura, S.
2009-01-01
1. Introduction Nuclear Fuel Cycle Engineering Laboratories (NCL) of Japan Atomic Energy Agency (JAEA) has sufficient experience and ability through its 50 year operation to establish the next generation closed cycle. It strives to become a world-class Center Of Excellence. 2. Current activity in NCL: 1) - Recycling of MOX fuel: The Tokai Reprocessing Plant has reprocessed 29 tons of MOX fuel from the ATR Fugenh as a part of 1140 tons of cumulative spent fuel reprocessed. JAEA has supported the pre-operation of the Rokkasho Reprocessing Plant. An innovative MOX pellet fabrication process has been developed in the Plutonium Fuel Development Center, and a part of products obtained by the development are used as a fuel for core confirmation test for re-startup of the FBR Monjuh. Characterization of MOX containing Am and Np has been studied and a new data such as melting point and thermal conductivity were reported. In the Chemical Processing Facility, a hot lab., an advanced aqueous reprocessing technology has been tested for TRU recovery, economical improvement, etc., using irradiated MOX fuel from the FR Joyoh. 2) - Supporting Activity: JAEA has improved the effectiveness and efficiency of existing safeguards activities. The Integrated Safeguards approach for all facilities in NCL has been implemented since August, 2008, as a pioneer and a good example in the world. To reduce anxiety among local residents, NCL has explained its operation plans and exchanged information and opinions with them concerning potential risks to health and environment. Recently, stake-holder participation in the management of NCL was started from the view point of Corporate Social Responsibility. In April, 2008, the agreement was signed with Idaho National Laboratory for cooperation of personnel training in fuel cycle area. 3. Mid-Term Direction: In Japan, feasibility and direction of the transition period from the LWR era to the FBR era should be discussed for the next several years. Study
Mid-Term Direction of JAEA Nuclear Fuel Cycle Engineering Laboratories
Energy Technology Data Exchange (ETDEWEB)
Ojima, H.; Sugiyama, T.; Tanaka, K.; Takeda, S.; Nomura, S. [Tokai-mura, Ibaraki-ken 319-1194 (Japan)
2009-06-15
1. Introduction Nuclear Fuel Cycle Engineering Laboratories (NCL) of Japan Atomic Energy Agency (JAEA) has sufficient experience and ability through its 50 year operation to establish the next generation closed cycle. It strives to become a world-class Center Of Excellence. 2. Current activity in NCL: 1) - Recycling of MOX fuel: The Tokai Reprocessing Plant has reprocessed 29 tons of MOX fuel from the ATR Fugenh as a part of 1140 tons of cumulative spent fuel reprocessed. JAEA has supported the pre-operation of the Rokkasho Reprocessing Plant. An innovative MOX pellet fabrication process has been developed in the Plutonium Fuel Development Center, and a part of products obtained by the development are used as a fuel for core confirmation test for re-startup of the FBR Monjuh. Characterization of MOX containing Am and Np has been studied and a new data such as melting point and thermal conductivity were reported. In the Chemical Processing Facility, a hot lab., an advanced aqueous reprocessing technology has been tested for TRU recovery, economical improvement, etc., using irradiated MOX fuel from the FR Joyoh. 2) - Supporting Activity: JAEA has improved the effectiveness and efficiency of existing safeguards activities. The Integrated Safeguards approach for all facilities in NCL has been implemented since August, 2008, as a pioneer and a good example in the world. To reduce anxiety among local residents, NCL has explained its operation plans and exchanged information and opinions with them concerning potential risks to health and environment. Recently, stake-holder participation in the management of NCL was started from the view point of Corporate Social Responsibility. In April, 2008, the agreement was signed with Idaho National Laboratory for cooperation of personnel training in fuel cycle area. 3. Mid-Term Direction: In Japan, feasibility and direction of the transition period from the LWR era to the FBR era should be discussed for the next several years. Study
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
2010-01-01
... SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating... possesses a chemical of interest that meets the STQ for any security issue, a facility need not include... development, involving chemicals of interest conducted outside the laboratory. (ii) [Reserved] (3) Propane. In...
Directory of Open Access Journals (Sweden)
Neha Dhungana
2017-08-01
Full Text Available Objectives: The aim of this study was to compare the operational impact of using vanadate oxidase versus diazo direct bilirubin assays for an academic medical center patient population. Design and methods: Retrospective study was done over an approximately 3.5 year period. The main automated chemistry instrumentation was a Roche Diagnostics cobas 8000 line. The Roche Direct Bilirubin assay was compared to Diazyme Laboratories Direct Bilirubin Assay and Randox Laboratories Direct Bilirubin assay using manufacturer's guidelines for hemolysis index, lipemia index, and analytical measurement range (AMR. Results: Retrospective data was analyzed for 47,333 serum/plasma specimens that had clinical orders for direct bilirubin. A total of 5943 specimens (12.6% exceeded the hemolysis index limit for the Roche method compared to only 0.2% and 0.05% of specimens for the Diazyme and Randox methods, respectively. The impact was particularly large on patients less than 2 years old, for which 51.3% of specimens exceeded the hemolysis index for the Roche method. A total of 1671 specimens (3.5% exceeded the lipemia index limit for the Roche method compared to less than 0.1% for the Randox method. Lastly, 988 (2.1% of specimens had direct bilirubin concentrations exceeding the upper AMR limit of 10 mg/dL [171 µmol/L] for the Roche assay compared to less than 1% of specimens for the vanadate oxidase methods. Conclusions: Vanadate oxidase direct bilirubin methods offer advantages over diazo methods in terms of less interference by hemolysis and lipemia, as well as wider AMR. The advantages are particularly evident for neonatal and infant populations. Keywords: Bilirubin, Clinical chemistry tests, Hemolysis, Hyperlipidemias, Jaundice, Photometry
Samuelson, Bethany T; Cuker, Adam; Siegal, Deborah M; Crowther, Mark; Garcia, David A
2017-01-01
Direct oral anticoagulants (DOACs) are the treatment of choice for most patients with atrial fibrillation and/or noncancer-associated venous thromboembolic disease. Although routine monitoring of these agents is not required, assessment of anticoagulant effect may be desirable in special situations. The objective of this review was to summarize systematically evidence regarding laboratory assessment of the anticoagulant effects of dabigatran, rivaroxaban, apixaban, and edoxaban. PubMed, Embase, and Web of Science were searched for studies reporting relationships between drug levels and coagulation assay results. We identified 109 eligible studies: 35 for dabigatran, 50 for rivaroxaban, 11 for apixaban, and 13 for edoxaban. The performance of standard anticoagulation tests varied across DOACs and reagents; most assays, showed insufficient correlation to provide a reliable assessment of DOAC effects. Dilute thrombin time (TT) assays demonstrated linear correlation (r 2 = 0.67-0.99) across a range of expected concentrations of dabigatran, as did ecarin-based assays. Calibrated anti-Xa assays demonstrated linear correlation (r 2 = 0.78-1.00) across a wide range of concentrations for rivaroxaban, apixaban, and edoxaban. An ideal test, offering both accuracy and precision for measurement of any DOAC is not widely available. We recommend a dilute TT or ecarin-based assay for assessment of the anticoagulant effect of dabigatran and anti-Xa assays with drug-specific calibrators for direct Xa inhibitors. In the absence of these tests, TT or APTT is recommended over PT/INR for assessment of dabigatran, and PT/INR is recommended over APTT for detection of factor Xa inhibitors. Time since last dose, the presence or absence of drug interactions, and renal and hepatic function should impact clinical estimates of anticoagulant effect in a patient for whom laboratory test results are not available. Copyright © 2016 American College of Chest Physicians. Published by Elsevier
2002-01-01
For 50 years, Lawrence Livermore National Laboratory has been making history and making a difference. The outstanding efforts by a dedicated work force have led to many remarkable accomplishments. Creative individuals and interdisciplinary teams at the Laboratory have sought breakthrough advances to strengthen national security and to help meet other enduring national needs. The Laboratory's rich history includes many interwoven stories -- from the first nuclear test failure to accomplishments meeting today's challenges. Many stories are tied to Livermore's national security mission, which has evolved to include ensuring the safety, security, and reliability of the nation's nuclear weapons without conducting nuclear tests and preventing the proliferation and use of weapons of mass destruction. Throughout its history and in its wide range of research activities, Livermore has achieved breakthroughs in applied and basic science, remarkable feats of engineering, and extraordinary advances in experimental and computational capabilities. From the many stories to tell, one has been selected for each year of the Laboratory's history. Together, these stories give a sense of the Laboratory -- its lasting focus on important missions, dedication to scientific and technical excellence, and drive to made the world more secure and a better place to live.
Human engineering considerations in designing a computerized controlled access security system
International Nuclear Information System (INIS)
Moore, J.W.; Banks, W.W.
1988-01-01
This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad
Water availability and management for food security
Food security is directly linked to water security for food production. Water availability for crop production will be dependent upon precipitation or irrigation, soil water holding capacity, and crop water demand. The linkages among these components in rainfed agricultural systems shows the impact ...
Holographic optical security systems
Fagan, William F.
1990-06-01
One of the most successful applications of Holography,in recent years,has been its use as an optical security technique.Indeed the general public's awareness of holograms has been greatly enhanced by the incorporation of holographic elements into the VISA and MASTERCHARGE credit cards.Optical techniques related to Holography,are also being used to protect the currencies of several countries against the counterfeiter. The mass production of high quality holographic images is by no means a trivial task as a considerable degree of expertise is required together with an optical laboratory and embossing machinery.This paper will present an overview of the principal holographic and related optical techniques used for security purposes.Worldwide, over thirty companies are involved in the production of security elements utilising holographic and related optical technologies.Counterfeiting of many products is a major criminal activity with severe consequences not only for the manufacturer but for the public in general as defective automobile parts,aircraft components,and pharmaceutical products, to cite only a few of the more prominent examples,have at one time or another been illegally copied.
The summarize of the technique about proactive network security protection
International Nuclear Information System (INIS)
Liu Baoxu; Li Xueying; Cao Aijuan; Yu Chuansong; Xu Rongsheng
2003-01-01
The proactive protection measures and the traditional passive security protection tools are complementarities each other. It also can supply the conventional network security protection system and enhance its capability of the security protection. Based upon sorts of existing network security technologies, this article analyses and summarizes the technologies, functions and the development directions of some key proactive network security protection tools. (authors)
Ondoa, Pascale; Datema, Tjeerd; Keita-Sow, Mah-Sere; Ndihokubwayo, Jean-Bosco; Isadore, Jocelyn; Oskam, Linda; Nkengasong, John; Lewis, Kim
2016-01-01
Functional national laboratory networks and systems are indispensable to the achievement of global health security targets according to the International Health Regulations. The lack of indicators to measure the functionality of national laboratory network has limited the efficiency of past and current interventions to enhance laboratory capacity in resource-limited-settings. We have developed a matrix for the assessment of national laboratory network functionality and progress thereof, with support from the African Society of Laboratory Medicine and the Association of Public Health Laboratories. The laboratory network (LABNET) scorecard was designed to: (1) Measure the status of nine overarching core capabilities of laboratory network required to achieve global health security targets, as recommended by the main normative standards; (2) Complement the World Health Organization joint external evaluation tool for the assessment of health system preparedness to International Health Regulations (2005) by providing detailed information on laboratory systems; and (3) Serve as a clear roadmap to guide the stepwise implementation of laboratory capability to prevent, detect and act upon infectious threats. The application of the LABNET scorecard under the coordination of the African Society of Laboratory Medicine and the Association of Public Health Laboratories could contribute to the design, monitoring and evaluation of upcoming Global Health Security Agenda-supported laboratory capacity building programmes in sub Saharan-Africa and other resource-limited settings, and inform the development of national laboratory policies and strategic plans. Endorsement by the World Health Organization Regional Office for Africa is foreseen.
Lazarus, Sheryl; Thurlow, Martha
2015-01-01
Sound test security policies and procedures are needed to ensure test security and confidentiality, and to help prevent cheating. In this era when cheating on tests draws regular media attention, there is a need for thoughtful consideration of the ways in which possible test security measures may affect accessibility for some students with…
Survey of network and information security technology
International Nuclear Information System (INIS)
Liu Baoxu; Wang Xiaozhen
2007-01-01
With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)
19 CFR 113.67 - Commercial gauger and commercial laboratory bond conditions.
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Commercial gauger and commercial laboratory bond... SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Customs Bond Conditions § 113.67 Commercial gauger and commercial laboratory bond conditions. Commercial Gauger Bond Conditions (a) Commercial gauger bond...
Control system security in nuclear power plant
International Nuclear Information System (INIS)
Li Jianghai; Huang Xiaojin
2012-01-01
The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)
Batteries and Energy Storage | Argonne National Laboratory
Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Batteries Security User Facilities Science Work with Us Energy Batteries and Energy Storage Energy Systems Modeling Transportation SPOTLIGHT Batteries and Energy Storage Argonne's all- encompassing battery research program spans
Inherent security benefits of underground dry storage of nuclear materials
International Nuclear Information System (INIS)
Moore, R.D.; Zahn, T.
1997-07-01
This paper, augmented by color slides and handouts, will examine the inherent security benefits of underground dry storage of nuclear materials. Specific items to be presented include: the successful implementation of this type of storage configuration at Argonne National Laboratory - West; facility design concepts with security as a primary consideration; physical barriers achieved by container design; detection, assessment, and monitoring capabilities; and open-quotes self protectionclose quotes strategies. This is a report on the security features of such a facility. The technical operational aspects of the facility are beyond the scope of this paper
Laboratory directed research and development FY91
International Nuclear Information System (INIS)
Anderson, S.E.; Hedman, I.; Kirvel, R.D.; McGregor, C.K.
1991-01-01
This review of research programs at Lawrence Livermore National Laboratory is composed of individual papers on various subjects. Broad topics of interest are: chemistry and materials science, computation, earth sciences, engineering, nuclear physics, and physics, and biology. Director's initiatives include the development of a transgenic mouse, accelerator mass spectrometry, high-energy physics detectors, massive parallel computing, astronomical telescopes, the Kuwaiti oil fires and a compact torus accelerator
Printable, scannable biometric templates for secure documents and materials
Cambier, James L.; Musgrave, Clyde
2000-04-01
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
Integrating Safeguards and Security with Safety into Design
International Nuclear Information System (INIS)
Bean, Robert S.; Hockert, John W.; Hebditch, David J.
2009-01-01
There is a need to minimize security risks, proliferation hazards, and safety risks in the design of new nuclear facilities in a global environment of nuclear power expansion, while improving the synergy of major design features and raising operational efficiency. In 2008, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) launched the Next Generation Safeguards Initiative (NGSI) covering many safeguards areas. One of these, launched by NNSA with support of the DOE Office of Nuclear Energy, was a multi-laboratory project, led by the Idaho National Laboratory (INL), to develop safeguards by design. The proposed Safeguards-by-Design (SBD) process has been developed as a structured approach to ensure the timely, efficient, and cost effective integration of international safeguards and other nonproliferation barriers with national material control and accountability, physical security, and safety objectives into the overall design process for the nuclear facility lifecycle. A graded, iterative process was developed to integrate these areas throughout the project phases. It identified activities, deliverables, interfaces, and hold points covering both domestic regulatory requirements and international safeguards using the DOE regulatory environment as exemplar to provide a framework and guidance for project management and integration of safety with security during design. Further work, reported in this paper, created a generalized SBD process which could also be employed within the licensed nuclear industry and internationally for design of new facilities. Several tools for integrating safeguards, safety, and security into design are discussed here. SBD appears complementary to the EFCOG TROSSI process for security and safety integration created in 2006, which focuses on standardized upgrades to enable existing DOE facilities to meet a more severe design basis threat. A collaborative approach is suggested.
Training programs for the systems approach to nuclear security
International Nuclear Information System (INIS)
Ellis, D.
2005-01-01
Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a
46 CFR 159.010-7 - Recognized independent laboratory: Memorandum of Understanding.
2010-10-01
... independent laboratory and the Coast Guard; (7) An agreement to conduct comparison testing with other... for conducting comparison tests with other recognized laboratories. (d) Copies of MOUs signed by the... Understanding. 159.010-7 Section 159.010-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
Directed Self-Inquiry: A Scaffold for Teaching Laboratory Report Writing
Deiner, L. Jay; Newsome, Daniel; Samaroo, Diana
2012-01-01
A scaffold was created for the explicit instruction of laboratory report writing. The scaffold breaks the laboratory report into sections and teaches students to ask and answer questions in order to generate section-appropriate content and language. Implementation of the scaffold is done through a series of section-specific worksheets that are…
Laboratory directed research and development FY91
Energy Technology Data Exchange (ETDEWEB)
Anderson, S.E.; Hedman, I.; Kirvel, R.D.; McGregor, C.K. (eds.)
1991-01-01
This review of research programs at Lawrence Livermore National Laboratory is composed of individual papers on various subjects. Broad topics of interest are: chemistry and materials science, computation, earth sciences, engineering, nuclear physics, and physics, and biology. Director's initiatives include the development of a transgenic mouse, accelerator mass spectrometry, high-energy physics detectors, massive parallel computing, astronomical telescopes, the Kuwaiti oil fires and a compact torus accelerator. (GHH)
17 CFR 450.4 - Custodial holdings of government securities.
2010-04-01
... securities as of the close of business upon the instruction of such broker or dealer, it shall send a... depository institution's control or direction that are not in its physical possession, where the securities... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Custodial holdings of...
Directory of Open Access Journals (Sweden)
Pascale Ondoa
2016-10-01
Full Text Available Background: Functional national laboratory networks and systems are indispensable to the achievement of global health security targets according to the International Health Regulations. The lack of indicators to measure the functionality of national laboratory network has limited the efficiency of past and current interventions to enhance laboratory capacity in resourcelimited-settings. Scorecard for laboratory networks: We have developed a matrix for the assessment of national laboratory network functionality and progress thereof, with support from the African Society of Laboratory Medicine and the Association of Public Health Laboratories. The laboratory network (LABNET scorecard was designed to: (1 Measure the status of nine overarching core capabilities of laboratory network required to achieve global health security targets, as recommended by the main normative standards; (2 Complement the World Health Organization joint external evaluation tool for the assessment of health system preparedness to International Health Regulations (2005 by providing detailed information on laboratory systems; and (3 Serve as a clear roadmap to guide the stepwise implementation of laboratory capability to prevent, detect and act upon infectious threats. Conclusions: The application of the LABNET scorecard under the coordination of the African Society of Laboratory Medicine and the Association of Public Health Laboratories could contribute to the design, monitoring and evaluation of upcoming Global Health Security Agenda-supported laboratory capacity building programmes in sub Saharan-Africa and other resource-limited settings, and inform the development of national laboratory policies and strategic plans. Endorsement by the World Health Organization Regional Office for Africa is foreseen.
Pacific Northwest National Laboratory Institutional Plan FY 2004-2008
Energy Technology Data Exchange (ETDEWEB)
Quadrel, Marilyn J.
2004-04-15
This Institutional Plan for FY 2004-2008 is the principal annual planning document submitted to the Department of Energy's Office of Science by Pacific Northwest National Laboratory in Richland, Washington. This plan describes the Laboratory's mission, roles, and technical capabilities in support of Department of Energy priorities, missions, and plans. It also describes the Laboratory strategic plan, key planning assumptions, major research initiatives, and program strategy for fundamental science, energy resources, environmental quality, and national security.
Chemical Sniffing Instrumentation for Security Applications.
Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F
2016-07-27
Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).
International Nuclear Information System (INIS)
Tsygankov, G.; Churikov, Y.; Teryokhin, V.
1996-01-01
The AR Russian Institute of Technical Physics (VNIITF), also called Chelyabinsk-70, is one of two Russian federal nuclear centers established to design, test and support nuclear weapons throughout their life cycle. The site contains research facilities which use nuclear materials, two experimental plants which manufacture prototype samples for nuclear weapons, and a site for various ground tests. Chelyabinsk-70 also has cooperative relationships with the major nuclear materials production facilities in the Urals region of Russia. Chelyabinsk-70 has been participating in the US/Russian Laboratory-to-laboratory cooperative program for approximately one year. Six US Department of Energy Laboratories are carrying out a program of cooperation with VNIITF to improve the capabilities and facilities for nuclear materials protection, control, and accounting (MPC ampersand A) at VNIITF. A Safeguards Effectiveness Evaluation Workshop was conducted at VNIITF in July, 1995. Enhanced safeguards systems are being implemented, initially at a reactor test area that contains three pulse reactors. Significant improvements to physical security and access control systems are under way. C-70 is developing an extensive computerized system that integrates the physical security alarm station with elements of the nuclear material control system. The existing systems will be augmented with Russian and US technologies. This paper will describe the on-going activities and describe the cooperative effort between the Lawrence Livermore, Los Alamos, Sandia, Oak Ridge, Pacific Northwest, and Brookhaven US Department of Energy National Laboratories and VNIITF
Security analysis of cyber-physical system
Li, Bo; Zhang, Lichen
2017-05-01
In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.
International Nuclear Information System (INIS)
Gwiazdowska, B.; Bulski, W.
2004-01-01
The aim of this paper is to present the history and experience of the Polish SSDL (Secondary Standard Dosimetry Laboratory). It also presents the propositions in the domain of quality assurance in radiotherapy in Poland, as fulfilling the requirements of the Directive 97/43 EURATOM on health protection of individuals against the dangers of ionizing radiation in relation to medical exposure, which is obligatory for the countries of the European Union. It has been pointed out that there are, among other provisions, two concepts concerning the quality assurance in application of radiation in medicine, mentioned by the Directive, a) inspection and b) clinical audit, which should be implemented by the Member States. In the process of establishing and implementing the Directive confusion may appear as to the difference between the two concepts of external audits. The role of the SSDLs in carrying out external dosimetry audits is presented. The history of the establishment of the Polish SSDL (Secondary Standard Dosimetry Laboratory) and its inclusion into the international network of laboratories coordinated by the International Atomic Energy Agency and the World Health Organization is presented as well as the resulting advantages, obligations and perspectives for further activities. The main activities of the Polish have been presented, namely maintaining a data-base on the radiotherapy infrastructure in Poland, preparation of recommendations on dosimetry procedures and quality control, calibration of dosimeters, external postal quality audits of dosimetry, etc. These activities are illustrated with the results from the period 1991-2003. Based on the solutions and results presented in this paper, the authors conclude that the Ministry of Health should grant the Polish SSDL with a suitable legal status for carrying out external audits nationwide, especially since, according to the Directive 97/43, clinical audits in radiotherapy have to include dosimetry audits. (author)
Computer Security: professionalism in security, too
Stefan Lueders, Computer Security Team
2015-01-01
At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement. In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...
Teaching Network Security with IP Darkspace Data
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.
2016-01-01
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Analysis and comparison of transportation security systems
International Nuclear Information System (INIS)
Rinne, R.L.
1976-05-01
The role of modeling in the analysis of transportation security systems is described. Various modeling approaches are outlined. The conflict model developed in Sandia Laboratories' Transportation Mode Analysis for the NRC Special Safeguards Study is used to demonstrate the capability of models to determine system sensitivities and compare alternatives
Simple, low-cost ways to dramatically improve the security of tags and seals
International Nuclear Information System (INIS)
Johnston, R.G.; Garcia, A.R.E.
1999-01-01
The Vulnerability Assessment Team at Los Alamos National Laboratory has analyzed over 100 different tags and security seals (tamper-indicating devices). We have demonstrated how all these security products can be defeated quickly, easily, and inexpensively using low-tech methods. In our view, most of these security devices can be significantly improved with minor changes in their design and/or in how they are used. In this paper, we present some generic suggestions for improving the security and reliability of tags and seals. (author)
Pacific Northwest National Laboratory Institutional Plan FY 2001-2005
Energy Technology Data Exchange (ETDEWEB)
Fisher, Darrell R.; Pearson, Erik W.
2000-12-29
The Pacific Northwest National Laboratory Institutional Plan for FY 2001-2005 sets forth the laboratory's mission, roles, technical capabilities, and laboratory strategic plan. In the plan, major initiatives also are proposed and the transitioning initiatives are discussed. The Programmatic Strategy section details our strategic intent, roles, and research thrusts in each of the U.S. Department of Energy's mission areas. The Operations/Infrastructure Strategic Plan section includes information on the laboratory's human resources; environment, safety, and health management; safeguards and security; site and facilities management; information resources management; managaement procatices and standards; and communications and trust.
Pacific Northwest National Laboratory Institutional Plan FY 2000-2004
Energy Technology Data Exchange (ETDEWEB)
Pearson, Erik W.
2000-03-01
The Pacific Northwest National Laboratory Institutional Plan for FY 2000-2004 sets forth the laboratory's mission, roles, technical capabilities, and laboratory strategic plan. In the plan, major initiatives also are proposed and the transitioning initiatives are discussed. The Programmatic Strategy section details our strategic intent, roles, and research thrusts in each of the U.S. Department of Energy's mission areas. The Operations/Infrastructure Strategic Plan section includes information on the laboratory's human resources; environment, safety, and health management; safeguards and security; site and facilities management; information resources management; management practices and standards; and communications and trust.
Transmission Line Security Monitor: Final Report
Energy Technology Data Exchange (ETDEWEB)
John Svoboda
2011-04-01
The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.
Physical protection solutions for security problems at nuclear power plants
International Nuclear Information System (INIS)
Darby, J.L.; Jacobs, J.
1980-09-01
Under Department of Energy sponsorship, Sandia National Laboratories has developed a broad technological base of components and integrated systems to address security concerns at facilities of importance, including nuclear reactors. The primary security concern at a light water reactor is radiological sabotage, a deliberate set of actions at a plant which could expose the public to a significant amount of radiation (on the order of 10 CFR 100 limits)
Security systems engineering overview
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Rethinking EU energy security considering past trends and future prospects
Amineh, Mehdi P.; Crijns - Graus, Wina
2014-01-01
EU energy policy objectives are directed at three highly interdependent areas: energy supply security, competitiveness and decarbonization to prevent climate change. In this paper, we focus on the issue of energy supply security. Security of energy supply for the immediate and medium-term future is
Application of the JDL data fusion process model for cyber security
Giacobe, Nicklaus A.
2010-04-01
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.
Sandia National Laboratories 1979 environmental monitoring report
International Nuclear Information System (INIS)
Simmons, T.N.
1980-04-01
Sandia National Laboratories in Albuquerque is located south of the city on two broad mesas. The local climate is arid continental. Radionuclides are released from five technical areas from the Laboratories' resarch activities. Sandia's environmental monitoring program searches for cesium-137, tritium, uranium, alpha emitters, and beta emitters in water, soil, air, and vegetation. No activity was found in public areas in excess of local background in 1979. The Albuquerque population receives only 0.076 person-rem (estimated) from airborne radioactive releases. While national security research is the laboratories' major responsibility, energy research is a major area of activity. Both these research areas cause radioactive releases
Consumer direct access to clinical laboratory testing: what are the critical issues?
Wilkinson, David S; Pontius, C Anne
2003-01-01
Americans are demanding, independent people. In most aspects of our lives, we are used to walking into a store or other place of business with the expectation that the personnel working for the business will make every effort to satisfy our requests quickly and without the need for a third party to intervene or approve the transaction. Hence, the popularity of convenience stores, do-it-yourself stores and kits, and e-commerce. The delivery of health-care services, however, generally does not conform to this model. Before most diagnostic tests or treatments are ordered, patients usually consult a physician. In many cases, prior to tests or treatments being performed, additional consultations are required with insurance plans. But the winds of change, they are a-blowing. More and more, people demand an active role in managing their health care. One emerging trend is direct patient access to clinical laboratory testing (1).
Quality control activities in the environmental radiology laboratory
International Nuclear Information System (INIS)
Llaurado, M.; Quesada, D.; Rauret, G.; Tent, J.; Zapata, D.
2006-01-01
During the last twenty years many analytical laboratories have implemented quality assurance systems. A quality system implementation requires documentation of all activities (technical and management), evaluation of these activities and its continual improvement. Implementation and adequate management of all the elements a quality system includes are not enough to guarantee quality of the analytical results generated at a time. That is the aim of a group of specific activities labelled as quality control activities. The Laboratori de Radiologia Ambiental (Environmental Radiology Laboratory; LRA) at the University of Barcelona was created in 1984 to carry out part of the quality control assays of the Environmental Radiology Monitoring Programs around some of the Spanish nuclear power plants, which are developed by the Servei Catala d'Activitats Energetiques (SCAR) and the Consejo de Seguridad Nuclear (CSN), organisations responsible for nuclear security and radiological protection. In these kind of laboratories, given the importance of the results they give, quality control activities become an essential aspect. In order to guarantee the quality of its analytical results, the LRA Direction decided to adopt the international standard UNE-EN ISO/IEC 17025 for its internal quality system and to accreditate some of the assays it carries out. In such as system, it is established, the laboratory shall monitor the validity of tests undertaken and data shall be recorded in such a way that trends are detectable. The present work shows the activities carried out in this way by the LRA, which are: Equipment control activities which in the special case of radiochemical techniques include measurement of backgrounds and blanks as well as periodical control of efficiency and resolution. Activities to assure the specifications settled by method validation, which are testing of reference materials and periodical analysis of control samples. Evaluation of the laboratory work quality
International Nuclear Information System (INIS)
Lowe, Daniel L.
2004-01-01
The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security
New Brunswick Laboratory. Progress report, October 1995--September 1996
International Nuclear Information System (INIS)
1997-04-01
Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL's interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group, Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL's status among DOE laboratories and facilities. Noteworthy are the facts that NBL's small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide
New Brunswick Laboratory. Progress report, October 1995--September 1996
Energy Technology Data Exchange (ETDEWEB)
NONE
1997-04-01
Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL`s interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group, Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL`s status among DOE laboratories and facilities. Noteworthy are the facts that NBL`s small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide.
32 CFR 2001.50 - Telecommunications automated information systems and network security.
2010-07-01
... NATIONAL SECURITY INFORMATION Safeguarding § 2001.50 Telecommunications automated information systems and... identified in the Committee on National Security Systems (CNSS) issuances and the Intelligence Community Directive (ICD) 503, Intelligence Community Information Technology Systems Security Risk Management...
Creation of security engineering programs by the Southwest Surety Institute
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
Laboratory Directed Research and Development Program FY 2006
Energy Technology Data Exchange (ETDEWEB)
Hansen (Ed.), Todd
2007-03-08
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operate unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness.
Risk assessment of climate systems for national security.
Energy Technology Data Exchange (ETDEWEB)
Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.
2012-10-01
Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.
The Intersection of National Security and Climate Change
Energy Technology Data Exchange (ETDEWEB)
Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fankhauser, Jana G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kurzrok, Andrew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sandusky, Jessica A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
2014-07-29
On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.
Using OpenSSH to secure mobile LAN network traffic
Luu, Brian B.; Gopaul, Richard D.
2002-08-01
Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.
Energy Technology Data Exchange (ETDEWEB)
Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan
2013-01-01
This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.
Asset backed securities : risks, ratings and quantitative modelling
Jönsson, B.H.B.; Schoutens, W.
2009-01-01
Asset backed securities (ABSs) are structured finance products backed by pools of assets and are created through a securitisation process. The risks in asset backed securities, such as, credit risk, prepayment risk, market risks, operational risk, and legal risks, are directly connected with the
Quantum Secure Communication Scheme with W State
International Nuclear Information System (INIS)
Wang Jian; Zhang Quan; Tang Chaojng
2007-01-01
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.
Internet of Cloud: Security and Privacy issues
Cook, Allan; Robinson, Michael; Ferrag, Mohamed Amine; Maglaras, Leandros A.; He, Ying; Jones, Kevin; Janicke, Helge
2017-01-01
The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions th...
Analytical Chemistry Laboratory (ACL) procedure compendium
International Nuclear Information System (INIS)
1992-06-01
Covered are: analytical laboratory operations (ALO) sample receipt and control, ALO data report/package preparation review and control, single shell tank (PST) project sample tracking system, sample receiving, analytical balances, duties and responsibilities of sample custodian, sample refrigerator temperature monitoring, security, assignment of staff responsibilities, sample storage, data reporting, and general requirements for glassware
Idaho National Laboratory Mission Accomplishments, Fiscal Year 2015
Energy Technology Data Exchange (ETDEWEB)
Allen, Todd Randall [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia Latta [Idaho National Lab. (INL), Idaho Falls, ID (United States)
2015-09-01
A summary of mission accomplishments for the research organizations at the Idaho National Laboratory for FY 2015. Areas include Nuclear Energy, National and Homeland Security, Science and Technology Addressing Broad DOE Missions; Collaborations; and Stewardship and Operation of Research Facilities.
Issues of Falsifying Financial Statements in Terms of Economic Security
Zhitlukhina, Olga G.; Rakutko, Svetlana Y.; Berezhnova, Elena I.; Selezneva, Elena Y.; Belik, Elena V.; Shalaeva, Nina I.; Denisevich, Elena I.; Belik, Natalia V.; Saenko, Zhanna E.; Sultanova, Alina A.
2016-01-01
The paper deals with problems of the country's economic security and entities, timely resolution of which influences directly the country's national security. The cornerstone of successful existence of any country, especially the Russian Federation, during such complicated period is the presence of effective national economic security system.…
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Directives. 700.62 Section 700.62 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE...
Security prospects through cloud computing by adopting multiple clouds
DEFF Research Database (Denmark)
Jensen, Meiko; Schwenk, Jörg; Bohli, Jens Matthias
2011-01-01
Clouds impose new security challenges, which are amongst the biggest obstacles when considering the usage of cloud services. This triggered a lot of research activities in this direction, resulting in a quantity of proposals targeting the various security threats. Besides the security issues coming...... with the cloud paradigm, it can also provide a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper initiates this discussion by contributing a concept which achieves security merits by making use of multiple distinct clouds at the same time....
Security Policy for a Generic Space Exploration Communication Network Architecture
Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.
2016-01-01
This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.
The security of gas supply-a critical issue for Europe?
International Nuclear Information System (INIS)
Weisser, Hellmuth
2007-01-01
Gas is competing with oil for being the dominant energy source. In electricity generation gas is to play as pivotal a role as oil in transportation. The security equation of gas and electricity become unseparably interrelated. Energy disruptions have considerable influence on the national accounts far beyond the direct cost of market participants (asymmetry). The present gas supply to the EU depends dangerously on too few sources and venues. There is a decided lack of optionality. The EU directly or through its members needs a clear proactive policy on 'Security of Gas Supply' with a strong multilateral direction. The measures developed for the oil industry over the last 30 years can at least serve as a starting point for a constructive debate. When discussing security of supply dependence it is useful to clearly define the various risks one wishes to protect against. Free riders relying on alternative fuels without participating in their security systems are not permissible
Macintosh Computer Classroom and Laboratory Security: Preventing Unwanted Changes to the System.
Senn, Gary J.; Smyth, Thomas J. C.
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Direct visualization of solute locations in laboratory ice samples
Directory of Open Access Journals (Sweden)
T. Hullar
2016-09-01
Full Text Available Many important chemical reactions occur in polar snow, where solutes may be present in several reservoirs, including at the air–ice interface and in liquid-like regions within the ice matrix. Some recent laboratory studies suggest chemical reaction rates may differ in these two reservoirs. While investigations have examined where solutes are found in natural snow and ice, few studies have examined either solute locations in laboratory samples or the possible factors controlling solute segregation. To address this, we used micro-computed tomography (microCT to examine solute locations in ice samples prepared from either aqueous cesium chloride (CsCl or rose bengal solutions that were frozen using several different methods. Samples frozen in a laboratory freezer had the largest liquid-like inclusions and air bubbles, while samples frozen in a custom freeze chamber had somewhat smaller air bubbles and inclusions; in contrast, samples frozen in liquid nitrogen showed much smaller concentrated inclusions and air bubbles, only slightly larger than the resolution limit of our images (∼ 2 µm. Freezing solutions in plastic vs. glass vials had significant impacts on the sample structure, perhaps because the poor heat conductivity of plastic vials changes how heat is removed from the sample as it cools. Similarly, the choice of solute had a significant impact on sample structure, with rose bengal solutions yielding smaller inclusions and air bubbles compared to CsCl solutions frozen using the same method. Additional experiments using higher-resolution imaging of an ice sample show that CsCl moves in a thermal gradient, supporting the idea that the solutes in ice are present in mobile liquid-like regions. Our work shows that the structure of laboratory ice samples, including the location of solutes, is sensitive to the freezing method, sample container, and solute characteristics, requiring careful experimental design and interpretation of results.
Wireless Network Penetration Testing and Security Auditing
Directory of Open Access Journals (Sweden)
Wang Shao-Long
2016-01-01
Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.
Design and Emergence of a Pedagogical Online Infosec Laboratory as an Ensemble Artefact
Iqbal, Sarfraz
2016-01-01
Information security (InfoSec) education becomes increasingly important. Building hands-on capabilities to tackle challenges is a precondition to mitigate and eliminate cyber threats. Existing studies, however, show that the field lacks pedagogically founded information security laboratories that can be used flexibly to educate both on-campus and…
Jones, Jason D; Cassidy, Jude
2014-01-01
The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.
Information Security for Business: the Necessity of Reputational Risk Management
Directory of Open Access Journals (Sweden)
Vitaly Eduardovich Dorokhov
2015-06-01
Full Text Available The article presents the analysis of actual information security problems in commercial segment. The main directions in regulations of the Russian Federation connected with information security assurance are defined. The results indicate the insufficiency of legal regulation in prevention of reputational losses due to information security incidents
Laboratory directed research development annual report. Fiscal year 1996
Energy Technology Data Exchange (ETDEWEB)
NONE
1997-05-01
This document comprises Pacific Northwest National Laboratory`s report for Fiscal Year 1996 on research and development programs. The document contains 161 project summaries in 16 areas of research and development. The 16 areas of research and development reported on are: atmospheric sciences, biotechnology, chemical instrumentation and analysis, computer and information science, ecological science, electronics and sensors, health protection and dosimetry, hydrological and geologic sciences, marine sciences, materials science and engineering, molecular science, process science and engineering, risk and safety analysis, socio-technical systems analysis, statistics and applied mathematics, and thermal and energy systems. In addition, this report provides an overview of the research and development program, program management, program funding, and Fiscal Year 1997 projects.
Idaho national laboratory - a nuclear research center
International Nuclear Information System (INIS)
Zaidi Mohammed, K.
2006-01-01
Full text: The Idaho National Laboratory (INL) is committed to providing international nuclear leadership for the 21st Century, developing and demonstrating compelling national security technologies, and delivering excellence in science and technology as one of the United States Department of Energy's (DOE) multi program national laboratories. INL runs three major programs - Nuclear, Security and Science. Nuclear programs covers the Advanced test reactor, Six Generation IV technology concepts selected for Rand D, targeting tumors - Boron Neutron Capture therapy. Homeland Security establishes the Control System Security and Test Center, Critical Infrastructure Test Range evaluates technologies on a scalable basis, INL conducts high performance computing and visualization research and science. To provide leadership in the education and training, INL has established an Institute of Nuclear Science and Engineering (INSE) under the Center for Advanced Energy Studies (CAES) and the Idaho State University (ISU). INSE will offer a four year degree based on a newly developed curriculum - two year of basic science course work and two years of participation in project planning and development. The students enrolled in this program can continue to get a masters or a doctoral degree. This summer INSE is the host for the training of the first international group selected by the World Nuclear University (WNU) - 75 fellowship holders and their 30 instructors from 40 countries. INL has been assigned to provide future global leadership in the field of nuclear science and technology. Here, at INL, we keep safety first above all things and our logo is 'Nuclear leadership synonymous with safety leadership'. (author)
Future directions for the European influenza reference laboratory network in influenza surveillance.
Goddard, N; Rebelo-de-Andrade, H; Meijer, A; McCauley, J; Daniels, R; Zambon, M
2015-07-30
By defining strategic objectives for the network of influenza laboratories that have national influenza centre status or national function within European Union Member States, Iceland and Norway, it is possible to align their priorities in undertaking virological surveillance of influenza. This will help maintain and develop the network to meet and adapt to new challenges over the next 3-5 years and underpin a longer-term strategy over 5-10 years. We analysed the key activities undertaken by influenza reference laboratories in Europe and categorised them into a framework of four key strategic objectives areas: enhancing laboratory capability, ensuring laboratory capacity, providing emergency response and translating laboratory data into information for public health action. We make recommendations on the priority areas for future development.
Source Code Analysis Laboratory (SCALe) for Energy Delivery Systems
2010-12-01
technical competence for the type of tests and calibrations SCALe undertakes. Testing and calibration laboratories that comply with ISO / IEC 17025 ...and exec t [ ISO / IEC 2005]. f a software system indicates that the SCALe analysis di by a CERT secure coding standard. Successful conforma antees that...to be more secure than non- systems. However, no study has yet been performed to p t ssment in accordance with ISO / IEC 17000: “a demonstr g to a
Resilient Infrastructure and Building Security
DEFF Research Database (Denmark)
Ingwar, Mads Ingerslew
inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...... to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...
Energy Technology Data Exchange (ETDEWEB)
Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL
2015-01-01
The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to
A Critical assesment of IS Security Research Between 1990-2004
DEFF Research Database (Denmark)
Willison, Robert Andrew; Siponen, Mikko
This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....
Privacy and security in the digital age: Contemporary ethical challenges and future directions
DEFF Research Database (Denmark)
Hiranandani, Vanmala Sunder
2011-01-01
Privacy is at the core of civil rights from which all other human rights and freedoms flow. Since the twentieth century, and particularly since 9/11, rapid deployment of information and surveillance technologies in the name of national security has grave implications for individual privacy...... and human rights. This article reviews major strands in contemporary privacy-security debate, while critiquing existing conceptualisations of privacy that are inadequate in the context of multifaceted and ubiquitous surveillance technologies post 9/11. Further, this paper contends most privacy...
7 CFR 3550.108 - Security requirements (loans only).
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Security requirements (loans only). 3550.108 Section..., DEPARTMENT OF AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 504 Origination and Section 306C Water and Waste Disposal Grants § 3550.108 Security requirements (loans only). When the total...
Framing GM Crops as a Food Security Solution
Dibden, Jacqui; Gibbs, David; Cocklin, Chris
2013-01-01
The spectre of a food security crisis has raised important questions about future directions for agriculture and given fresh impetus to a long-standing debate about the potential contribution of agricultural biotechnology to food security. This paper considers the discursive foundations for promotion of agricultural biotechnology, arguing that…
32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...
Sandia National Laboratories: The First Fifty Years
Energy Technology Data Exchange (ETDEWEB)
MORA,CARL J.
1999-11-03
On Nov. 1, 1999, Sandia National Laboratories celebrates its 50th birthday. Although Sandia has its roots in the World War II-era Manhattan Project, Sandia began operating as a separate nuclear weapons engineering laboratory under the management of AT&T on Nov. 1, 1949. Today the lab employs more than 7,000 people at its two sites in Albuquerque and Livermore, California, and has research and development missions in national security, energy and environmental technologies, and U.S. economic competitiveness. Lockheed Martin Corporation operates Sandia for the US. Department of Energy.
Contributing to Food Security in the Context of Climate Change
International Nuclear Information System (INIS)
2014-01-01
Since the laboratories of the IAEA Department of Nuclear Sciences and Applications were established in Seibersdorf in 1962, the world’s population has grown from 3.14 billion to 7.15 billion, which, combined with continuously increasing industrialization and economic development, has led to greater global food demand. This has placed substantial stress on natural resources as well as the agricultural production chain. The challenges to food safety and security have also been amplified by the impacts of climate change, which have global ramifications, as noted in the March 2014 report of the UN Intergovernmental Panel on Climate Change. Climate change impacts include higher temperatures, drought, more frequent extreme weather events and increased soil salinity which can have severe effects on agricultural production. Helping Member States adapt to and mitigate these impacts is a main focus of the five laboratories of the Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture in Seibersdorf. These laboratories are dedicated to increasing food security and safety using nuclear science and technology
Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.
Energy Technology Data Exchange (ETDEWEB)
Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.
2008-12-01
This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.
International Nuclear Information System (INIS)
1962-01-01
Most of the IAEA laboratory facilities a r e now in full operation, and work has begun on a number of problems that can best be dealt with by an international centre. The laboratory at Seibersdorf, about 30 km from the Agency's headquarters in Vienna, started functioning in October last year, and a certain amount of work is also being done with a few facilities installed in the headquarters building. During the past year laboratory work has steadily increased and several programmes are now fully established. The Agency's laboratory is not intended to be a centre of independent research; in the main, its scope is governed by the scientific requirements of the Agency's programmes of assistance to its Member States and its role in connection with safety and security in atomic energy work. The functions of the laboratory are thus limited to (a) measurement of radionuclides and preparation of radioactive standards, (b) calibration and adaptation of measuring equipment, (c) quality control of special materials for nuclear technology, (d) measurement and analyses in connection with the Agency's safeguards and health and safety programme, and (e) services to Member States that can be provided with the facilities established for these tasks
International Nuclear Information System (INIS)
Bertoldo, N; Hunter, S; Fertig, R; Laguna, G; MacQueen, D
2004-01-01
A real-time radiological sensor network for emergency response was developed and deployed at the Lawrence Livermore National Laboratory (LLNL). The Real-Time Radiological Area Monitoring (RTRAM) network is comprised of 16 Geiger-Mueller (GM) sensors positioned on the LLNL Livermore site perimeter to continuously monitor for a radiological condition resulting from a terrorist threat to site security and the health and safety of LLNL personnel. The RTRAM network sensor locations coincide with wind sector directions to provide thorough coverage of the one square mile site. These loW--power sensors are supported by a central command center (CCC) and transmit measurement data back to the CCC computer through the LLNL telecommunications infrastructure. Alarm conditions are identified by comparing current data to predetermined threshold parameters and are validated by comparison with plausible dispersion modeling scenarios and prevailing meteorological conditions. Emergency response personnel are notified of alarm conditions by automatic radio and computer based notifications. A secure intranet provides emergency response personnel with current condition assessment data that enable them to direct field response efforts remotely. The RTRAM network has proven to be a reliable system since initial deployment in August 2001 and maintains stability during inclement weather conditions
33 CFR 165.1409 - Security Zones; Hawaii, HI.
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...
Cyber security. Compliance to the new CSA 290.7 standard
Energy Technology Data Exchange (ETDEWEB)
Daley, M.; Doucet, R.; Echlin, M.; MacDonald, M.; Mihaylov, V.; Sijs, J.; Trask, D. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada)
2015-12-15
Since 2008, the Canadian Nuclear Safety Commission (CNSC), similar to regulators of other critical industries, has requested their licensees to implement cyber security programs and conduct self- assessments without the benefit of an industry specific cyber security standard that provides common metrics for coverage and effectiveness of their programs. However, for the nuclear industry, a new CSA standard 290.7 entitled 'Cyber security for nuclear power plants and small reactor facilities', released in December 2014, will have the CNSC looking to facility operators to be compliant to the new standard. This paper will discuss initiatives at Canadian Nuclear Laboratories to develop of a suite of tools, techniques, and best practices that can be used by the regulator and industry for assessing compliance and effectiveness of cyber security technology and implementations. (author)
Cyber security - compliance to the new CSA 290.7 standard
Energy Technology Data Exchange (ETDEWEB)
Daley, M.; Doucet, R.; Echlin, M.; MacDonald, M.; Mihaylov, V.; Sijs, J.; Trask, D., E-mail: Matthew.Daley@cnl.ca [Canadian Nuclear Laboratories, Chalk River, ON, (Canada)
2015-07-01
Since 2008, the Canadian Nuclear Safety Commission (CNSC), similar to regulators of other critical industries, has requested their licensees to implement cyber security programs and conduct self-assessments without the benefit of an industry specific cyber security standard that provides common metrics for coverage and effectiveness of their programs. However, for the nuclear industry, a new CSA standard 290.7 entitled 'Cyber security for nuclear power plants and small reactor facilities' [1], released in December 2014, will have the CNSC looking to facility operators to be compliant to the new standard. This paper will discuss initiatives at Canadian Nuclear Laboratories to develop of a suite of tools, techniques, and best practices that can be used by the regulator and industry for assessing compliance and effectiveness of cyber security technology and implementations. (author)