WorldWideScience

Sample records for security rules sdlc

  1. Designing Fuzzy Rule Based Expert System for Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    The state of cyber security has begun to attract more attention and interest outside the community of computer security experts. Cyber security is not a single problem, but rather a group of highly different problems involving different sets of threats. Fuzzy Rule based system for cyber security is a system consists of a rule depository and a mechanism for accessing and running the rules. The depository is usually constructed with a collection of related rule sets. The aim of this study is to...

  2. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Recordkeeping rule for national securities exchanges, national securities associations, registered clearing agencies and the... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  3. The Comparative Study of Collaborative Learning and SDLC Model to develop IT Group Projects

    Directory of Open Access Journals (Sweden)

    Sorapak Pukdesree

    2017-11-01

    Full Text Available The main objectives of this research were to compare the attitudes of learners between applying SDLC model with collaborative learning and typical SDLC model and to develop electronic courseware as group projects. The research was a quasi-experimental research. The populations of the research were students who took Computer Organization and Architecture course in the academic year 2015. There were 38 students who participated to the research. The participants were divided voluntary into two groups including an experimental group with 28 students using SDLC model with collaborative learning and a control group with 10 students using typical SDLC model. The research instruments were attitude questionnaire, semi-structured interview and self-assessment questionnaire. The collected data was analysed by arithmetic mean, standard deviation, and independent sample t-test. The results of the questionnaire revealed that the attitudes of the learners using collaborative learning and SDLC model were statistically significant difference between the mean score for experimental group and control group at a significance level of 0.05. The independent statistical analyses were significantly different between the two groups at a significance level of 0.05. The results of the interviewing revealed that most of the learners had the corresponding opinions that collaborative learning was very useful with highest level of their attitudes comparing with the previous methodology. Learners had left some feedbacks that collaborative learning should be applied to other courses.

  4. 45 CFR 164.306 - Security standards: General rules.

    Science.gov (United States)

    2010-10-01

    ... entity. (ii) The covered entity's technical infrastructure, hardware, and software security capabilities... 45 Public Welfare 1 2010-10-01 2010-10-01 false Security standards: General rules. 164.306 Section... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  5. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  6. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  7. The HIPAA Security Rule: implications for biomedical devices.

    Science.gov (United States)

    2004-11-01

    The HIPAA Security Rule, with which hospitals must become compliant by April 2005, is broad in scope. Some aspect of this rule will affect virtually every function and department within a healthcare organization. The functions and departments that deal with biomedical technologies face special challenges due to the great diversity of technologies, the variety of data maintained and transmitted, and the risks associated with compromises to data security--combined with the presence of older technology and the absence of integrated expertise. It is essential that hospitals recognize this challenge and initiate steps now to implement appropriate information security management.

  8. 49 CFR 393.120 - What are the rules for securing metal coils?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing metal coils? 393... Specific Securement Requirements by Commodity Type § 393.120 What are the rules for securing metal coils? (a) Applicability. The rules in this section apply to the transportation of one or more metal coils...

  9. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing concrete pipe? 393... Specific Securement Requirements by Commodity Type § 393.124 What are the rules for securing concrete pipe? (a) Applicability. (1) The rules in this section apply to the transportation of concrete pipe on...

  10. Considerations for Cloud Security Operations

    OpenAIRE

    Cusick, James

    2016-01-01

    Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.

  11. Hasil Rancang Bangun Sistem ERP dengan SDLC Model Waterfall: Studi Kasus Sistem Inventori PT Pan Brothers, Tbk.

    Directory of Open Access Journals (Sweden)

    Harijanto Pangestu

    2012-12-01

    Full Text Available Competition in the business world effects the use of information technology. To achieve competitive advantage in the global competition, PT Pan Brothers, Tbk. should establish an integrated information system based on ERP (Enterprise Resource Planning. With the ERP system, information will be accurate and up-todate to support strategic decision making. It takes conscientious planning in building the ERP system. Management information systems development projects have a very important role. One determining component is how to choose and use appropriate information systems development method. SDLC (system development life cycle is growing very rapidly along with the development of information technology. It is necessary to choose the right SDLC in building an integrated system based on ERP. Each SDLC models has advantages and disadvantages. SDLC models will only be optimal if used according to the situation and conditions. Waterfall model provides clear deliverables and milestones, good documentation, easy to understand, easy to implement, emphasizes on good procedural workmanship (precoding design. Some of its weaknesses are difficult to integrate risk management, high cost change documents, high administrative costs, often late completion thus.To avoid them, there should be a well-planned project management and steps properly so it can be on time and will not exceed budget.

  12. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ... rescinding SSR 97-2p as obsolete. (Catalog of Federal Domestic Assistance Program Nos. 96.001, Social... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling...

  13. Irrigation infrastructure and water appropriation rules for food security

    Science.gov (United States)

    Gohar, Abdelaziz A.; Amer, Saud A.; Ward, Frank A.

    2015-01-01

    In the developing world's irrigated areas, water management and planning is often motivated by the need for lasting food security. Two important policy measures to address this need are improving the flexibility of water appropriation rules and developing irrigation storage infrastructure. Little research to date has investigated the performance of these two policy measures in a single analysis while maintaining a basin wide water balance. This paper examines impacts of storage capacity and water appropriation rules on total economic welfare in irrigated agriculture, while maintaining a water balance. The application is to a river basin in northern Afghanistan. A constrained optimization framework is developed to examine economic consequences on food security and farm income resulting from each policy measure. Results show that significant improvements in both policy aims can be achieved through expanding existing storage capacity to capture up to 150 percent of long-term average annual water supplies when added capacity is combined with either a proportional sharing of water shortages or unrestricted water trading. An important contribution of the paper is to show how the benefits of storage and a changed water appropriation system operate under a variable climate. Results show that the hardship of droughts can be substantially lessened, with the largest rewards taking place in the most difficult periods. Findings provide a comprehensive framework for addressing future water scarcity, rural livelihoods, and food security in the developing world's irrigated regions.

  14. 75 FR 40867 - Modifications to the HIPAA Privacy, Security, and Enforcement Rules Under the Health Information...

    Science.gov (United States)

    2010-07-14

    ... HIPAA Privacy, Security, and Enforcement Rules Under the Health Information Technology for Economic and... Under the Health Information Technology for Economic and Clinical Health Act AGENCY: Office for Civil...), the Security Standards for the Protection of Electronic Protected Health Information (Security Rule...

  15. 77 FR 54646 - Social Security Acquiescence Ruling (AR) 12-1(8); Correction; Petersen v. Astrue, 633 F.3d 633...

    Science.gov (United States)

    2012-09-05

    ... II of the Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security Acquiescence Ruling; Correction. SUMMARY: The Social Security Administration published a document... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR...

  16. 77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)

    Science.gov (United States)

    2012-11-13

    ...). (Catalog of Federal Domestic Assistance, Program Nos. 96.001 Social Security--Disability Insurance; 96.002... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725

  17. 78 FR 8217 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p... Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of January 29, 2013, in FR Doc. 2013-01833, on page 6168, in...

  18. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p... Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of January 29, 2013, in FR Doc. 2013-01833, on page 6168, in...

  19. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p... Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration published a document in the Federal Register of January 29, 2013, in FR Doc. 2013-01833, on page 6171, in...

  20. The Rule of Law and the U.S. Quest for Security in El Salvador

    National Research Council Canada - National Science Library

    Stapleton, Anthony K

    2007-01-01

    .... Separate case studies examine U.S. efforts to promote the rule of law in El Salvador in response to security threats ranging from human rights violations and insurgency to illegal immigration and transnational street gangs...

  1. Improving cloud network security using tree-rule firewall

    NARCIS (Netherlands)

    He, Xiangjian; Chomsiri, Thawatchai; Nanda, Priyadarsi; Tan, Zhiyuan

    This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limitations in performing the tasks and are inapplicable

  2. 76 FR 61438 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Proposed Rule...

    Science.gov (United States)

    2011-10-04

    ... Organizations; International Securities Exchange, LLC; Notice of Proposed Rule Change Related to Trading Halts Due to Extraordinary Market Volatility September 28, 2011. Pursuant to Section 19(b)(1) of the... September 27, 2011, the International Securities Exchange, LLC (``Exchange'' or ``ISE'') filed with the...

  3. 78 FR 17066 - Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in...

    Science.gov (United States)

    2013-03-19

    ... Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in Outbound... stock transfers for certain outbound asset reorganizations. The temporary regulations also modify the... changes with respect to transfers of stock or securities by a domestic corporation to a foreign...

  4. Automatic Learning of Fine Operating Rules for Online Power System Security Control.

    Science.gov (United States)

    Sun, Hongbin; Zhao, Feng; Wang, Hao; Wang, Kang; Jiang, Weiyong; Guo, Qinglai; Zhang, Boming; Wehenkel, Louis

    2016-08-01

    Fine operating rules for security control and an automatic system for their online discovery were developed to adapt to the development of smart grids. The automatic system uses the real-time system state to determine critical flowgates, and then a continuation power flow-based security analysis is used to compute the initial transfer capability of critical flowgates. Next, the system applies the Monte Carlo simulations to expected short-term operating condition changes, feature selection, and a linear least squares fitting of the fine operating rules. The proposed system was validated both on an academic test system and on a provincial power system in China. The results indicated that the derived rules provide accuracy and good interpretability and are suitable for real-time power system security control. The use of high-performance computing systems enables these fine operating rules to be refreshed online every 15 min.

  5. Extracting classification rules from an informatic security incidents repository by genetic programming

    OpenAIRE

    Carlos Javier Carvajal Montealegre

    2015-01-01

    This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming) approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper conclude...

  6. Macroeconomic Implications of Changes in Social Security Rules

    Directory of Open Access Journals (Sweden)

    Bilal Bagis

    2017-02-01

    Full Text Available The Turkish social insurance system has been feverishly debated for years, particularly through its burden on the economy. The most recent reform is an attempt to neutralize the deterioration within the social security system and its effects on the economy. After the recent reform, ‘the way that retirement benefits are calculated’ is changed unfavorably for workers and the minimum age for retirement is increased. In particular, for an agent with 25 years of social security tax payments, the replacement rate is down from 65 percent to 50 percent. On the other hand, retirement age is up from 60 to 65. The aim of this paper is to investigate the macroeconomic effects of these changes using an OLG model. The author’s findings indicate that labor supply, output and capital stock increase when changes above are applied to the benchmark economy calibrated to the Turkish economy data in 2005. A critical change with the current reform is that the marginal benefit of working has become uniform over ages. In a simulation exercise, the marginal retirement benefit in the benchmark economy is changed to be uniform over ages while keeping the size of social security system unchanged. As a result, the benefit of retiring at a later period increases. However, uniform distribution of the marginal benefits itself decreases both the capital stock and output of the economy. Increasing the retirement age, on the other hand, has positive effects on the economy since agents obtain retirement benefits for fewer years and at an older age. Age increase has substantial positive effects on the labor supply, the capital stock, and the output.

  7. Potential impact of a 2-person security rule on BioSafety Level 4 laboratory workers.

    Science.gov (United States)

    LeDuc, James W; Anderson, Kevin; Bloom, Marshall E; Carrion, Ricardo; Feldmann, Heinz; Fitch, J Patrick; Geisbert, Joan B; Geisbert, Thomas W; Holbrook, Michael R; Jahrling, Peter B; Ksiazek, Thomas G

    2009-07-01

    Directors of all major BioSafety Level 4 (BSL-4) laboratories in the United States met in 2008 to review the current status of biocontainment laboratory operations and to discuss the potential impact of a proposed 2-person security rule on maximum-containment laboratory operations. Special attention was paid to the value and risks that would result from a requirement that 2 persons be physically present in the laboratory at all times. A consensus emerged indicating that a video monitoring system represents a more efficient, economical standard; provides greater assurance that pathogens are properly manipulated; and offers an increased margin of employee safety and institutional security. The 2-person security rule (1 to work and 1 to observe) may decrease compliance with dual responsibilities of safety and security by placing undue pressure on the person being observed to quickly finish the work, and by placing the observer in the containment environment unnecessarily.

  8. 78 FR 17053 - Indirect Stock Transfers and the Coordination Rule Exceptions; Transfers of Stock or Securities...

    Science.gov (United States)

    2013-03-19

    ... 1545-BJ75 Indirect Stock Transfers and the Coordination Rule Exceptions; Transfers of Stock or... stock transfers for certain outbound asset reorganizations. The regulations also modify the third... respect to transfers of stock or securities by a domestic corporation to a foreign corporation in a...

  9. Text messaging to communicate with public health audiences: how the HIPAA Security Rule affects practice.

    Science.gov (United States)

    Karasz, Hilary N; Eiden, Amy; Bogan, Sharon

    2013-04-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals' needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule.

  10. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  11. Security Situation Assessment of All-Optical Network Based on Evidential Reasoning Rule

    Directory of Open Access Journals (Sweden)

    Zhong-Nan Zhao

    2016-01-01

    Full Text Available It is important to determine the security situations of the all-optical network (AON, which is more vulnerable to hacker attacks and faults than other networks in some cases. A new approach of the security situation assessment to the all-optical network is developed in this paper. In the new assessment approach, the evidential reasoning (ER rule is used to integrate various evidences of the security factors including the optical faults and the special attacks in the AON. Furthermore, a new quantification method of the security situation is also proposed. A case study of an all-optical network is conducted to demonstrate the effectiveness and the practicability of the new proposed approach.

  12. New security measures are proposed for N-plants: Insider Rule package is issued by NRC

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    New rules proposed by the Nuclear Regulatory Commission (NRC) will require background investigations and psychological assessments of new job candidates and continual monitoring of the behavior of all power plant workers with access to sensitive areas. Licensees will have to submit an ''access authorization'' program for approval describing how they will conduct these security activities. The employee checks will go back five years to examine credit, educational, and criminal histories. Implementation of the rules could involve the Edison Electric Institute as an intermediary to funnel criminal checks from the Justice Department and FBI. The NRC is also considering a clarification of areas designated as ''vital'' because current designations may be too strict

  13. 26 CFR 1.404(a)-14 - Special rules in connection with the Employee Retirement Income Security Act of 1974.

    Science.gov (United States)

    2010-04-01

    ... designation “old” is a reference to section 404 as amended by the Employee Retirement Income Security Act of... Retirement Income Security Act of 1974. 1.404(a)-14 Section 1.404(a)-14 Internal Revenue INTERNAL REVENUE... Income Security Act of 1974. (a) Purpose of this section. This section provides rules for determining the...

  14. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  15. Social Security Rulings on Federal Old-Age, Survivors, Disability, Health Insurance, Supplemental Security Income, and Black Lung Benefits. Cumulative Bulletin 1976.

    Science.gov (United States)

    Social Security Administration (DHEW), Washington, DC.

    The purpose of this publication is to make available to the public official rulings relating to the Federal old-age, survivors, disability, health insurance, supplemental security income, and miners' benefit programs. The rulings contain precedential case decisions, statements of policy and interpretations of the law and regulations. Included is a…

  16. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  17. Solidarity as the foundation of the Social Rule of Law, Social Security and social protection in Colombia

    OpenAIRE

    Cañon Ortegon, Leonardo

    2017-01-01

    Solidarity as a human value, as a philosophical principle of the Social Security and as a duty of the Colombians tightly connects the foundations of the Social Rule of Law with the Social Security Model, whose parameters were set by the Political Constitution of 1991 for the development of the model of social security and social protection. The last adopted by Colombia according to Law 100 of 1993 in its diverse applications: pensions, health, occupational risks, complementary social services...

  18. 77 FR 51842 - Social Security Acquiescence Ruling (AR) 12-X(8); Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011...

    Science.gov (United States)

    2012-08-27

    ... decided to relitigate the issue. (Catalog of Federal Domestic Assistance, Program Nos. 96.001 Social... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR... Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security...

  19. 17 CFR 249.1100 - Form MSD, application for registration as a municipal securities dealer pursuant to rule 15Ba2-1...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form MSD, application for registration as a municipal securities dealer pursuant to rule 15Ba2-1 under the Securities Exchange Act of 1934 or amendment to such application. 249.1100 Section 249.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  20. 17 CFR 41.13 - Futures contracts on security indexes trading on or subject to the rules of a foreign board of...

    Science.gov (United States)

    2010-04-01

    ... Indexes § 41.13 Futures contracts on security indexes trading on or subject to the rules of a foreign... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 41.13 Section 41.13 Commodity and...

  1. Demographic-Based Perceptions of Adequacy of Software Security's Presence within Individual Phases of the Software Development Life Cycle

    Science.gov (United States)

    Kramer, Aleksey

    2013-01-01

    The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…

  2. The EU’s Cybercrime and Cyber-Security Rule-Making: Mapping the Internal and External Dimensions of EU Security

    NARCIS (Netherlands)

    Fahey, E.

    2014-01-01

    EU Security impacts significantly upon individuals and generates many questions of the rule of law, legal certainty and fundamental rights. These are not always central concerns for EU risk regulation, especially given that EU risk regulation has sought to draw close correlations between EU risk and

  3. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    Science.gov (United States)

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.

  4. 17 CFR 240.3a55-3 - Futures contracts on security indexes trading on or subject to the rules of a foreign board of...

    Science.gov (United States)

    2010-04-01

    ... Miscellaneous Exemptions § 240.3a55-3 Futures contracts on security indexes trading on or subject to the rules... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3...

  5. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.

    Directory of Open Access Journals (Sweden)

    Hongchen Wu

    Full Text Available The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.

  6. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.

    Science.gov (United States)

    Wu, Hongchen; Wang, Xinjun

    2016-01-01

    The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.

  7. 77 FR 40261 - The Interagency Security Classification Appeals Panel (ISCAP) Bylaws, Rules, and Appeal Procedures

    Science.gov (United States)

    2012-07-09

    ... previously published its bylaws as a regulatory appendix, Classified National Security Information Directive... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2003 [NARA-12-0003] RIN 3095-AB76 The Interagency Security Classification Appeals Panel (ISCAP) Bylaws...

  8. 49 CFR 393.116 - What are the rules for securing logs?

    Science.gov (United States)

    2010-10-01

    ... contain them. Longer logs may also be so loaded. (b) Components of a securement system. (1) Logs must be...) Use of securement system. (1) Logs must be solidly packed, and the outer bottom logs must be in... it may pass through a pulley or equivalent device in the middle and be tensioned from one end. (5...

  9. 49 CFR 393.130 - What are the rules for securing heavy vehicles, equipment and machinery?

    Science.gov (United States)

    2010-10-01

    ... heavy vehicles, equipment and machinery? (a) Applicability. The rules in this section apply to the transportation of heavy vehicles, equipment and machinery which operate on wheels or tracks, such as front end... heavy vehicles, equipment or machinery with crawler tracks or wheels. (1) In addition to the...

  10. A sharable cloud-based pancreaticoduodenectomy collaborative database for physicians: emphasis on security and clinical rule supporting.

    Science.gov (United States)

    Yu, Hwan-Jeu; Lai, Hong-Shiee; Chen, Kuo-Hsin; Chou, Hsien-Cheng; Wu, Jin-Ming; Dorjgochoo, Sarangerel; Mendjargal, Adilsaikhan; Altangerel, Erdenebaatar; Tien, Yu-Wen; Hsueh, Chih-Wen; Lai, Feipei

    2013-08-01

    Pancreaticoduodenectomy (PD) is a major operation with high complication rate. Thereafter, patients may develop morbidity because of the complex reconstruction and loss of pancreatic parenchyma. A well-designed database is very important to address both the short-term and long-term outcomes after PD. The objective of this research was to build an international PD database implemented with security and clinical rule supporting functions, which made the data-sharing easier and improve the accuracy of data. The proposed system is a cloud-based application. To fulfill its requirements, the system comprises four subsystems: a data management subsystem, a clinical rule supporting subsystem, a short message notification subsystem, and an information security subsystem. After completing the surgery, the physicians input the data retrospectively, which are analyzed to study factors associated with post-PD common complications (delayed gastric emptying and pancreatic fistula) to validate the clinical value of this system. Currently, this database contains data from nearly 500 subjects. Five medical centers in Taiwan and two cancer centers in Mongolia are participating in this study. A data mining model of the decision tree analysis showed that elderly patients (>76 years) with pylorus-preserving PD (PPPD) have higher proportion of delayed gastric emptying. About the pancreatic fistula, the data mining model of the decision tree analysis revealed that cases with non-pancreaticogastrostomy (PG) reconstruction - body mass index (BMI)>29.65 or PG reconstruction - BMI>23.7 - non-classic PD have higher proportion of pancreatic fistula after PD. The proposed system allows medical staff to collect and store clinical data in a cloud, sharing the data with other physicians in a secure manner to achieve collaboration in research. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  11. 26 CFR 1.356-3 - Rules for treatment of securities as “other property”.

    Science.gov (United States)

    2010-04-01

    ... includes the fair market value of such excess principal amount as of the date of the exchange. If no securities are surrendered in exchange, the term other property includes the fair market value, as of the... amount of $1,000 with a fair market value of $990. The amount of $990 is treated as “other property...

  12. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  13. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  14. 78 FR 12130 - Social Security Ruling, SSR 13-3p; Appeal of an Initial Medical Disability Cessation...

    Science.gov (United States)

    2013-02-21

    ... World War II Veterans.) Dated: February 12, 2013. Michael J. Astrue, Commissioner of Social Security....1590, 404.1593, and 404.1594. Pertinent History: Section 223(f) of the Social Security Act (Act) sets... decision regarding the beneficiary's medical cessation and possible reentitlement, thereby eliminating the...

  15. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    Science.gov (United States)

    2016-12-01

    University, 2008 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND...in Proceedings of the 6th International Symposium on Wikis and Open Collaboration, art . 11. Gdansk, Poland—July 07–09, 2010 (New York: ACM, 2010...footnotes/may2010/in_defense_of_wikipedia_bonnett. 166 Dariusz Jemielniak, Common Knowledge?: An Ethnography of Wikipedia (Stanford, CA: Stanford

  16. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  17. 78 FR 30967 - Cross-Border Security-Based Swap Activities; Re-Proposal of Regulation SBSR and Certain Rules and...

    Science.gov (United States)

    2013-05-23

    ... Act''), that were added by Subtitle B of Title VII of the Dodd-Frank Wall Street Reform and Consumer... context of the security-based swap dealer definition, for affiliated groups with a registered security... 3235-AL05). Table of Contents I. Background A. The Dodd-Frank Wall Street Reform and Consumer...

  18. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  19. Decree n.06-488 /P-RM of 23 november 2006 determining the rules related to the protection against ionizing radiation, safety and security of ionizing radiation sources

    International Nuclear Information System (INIS)

    2006-01-01

    This decree determine the r(ules of protection of workers, public, patients and environment against the risks of ionizing radiation. The scope of these rules is defined as well as the definitions of some terms and concepts used in the field such as raioelement, radiopactive waste, dose, level of intervention, etc. The responsability for Malian Agency for radioprotection and for different stakeholders are clarified and those of workers as well. The condition of declaration, obtaining authorization and exemption are set. Instructions related to radioprotection, safety and security ofn ionizing radiation are stated regarding occupational, madical and public exposure and in case of emergency. instructions related to inventory and inspec tion are also defined

  20. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  1. Secure DBMS.

    Science.gov (United States)

    1982-02-01

    F30602-80-C- 0235 9. PERFORMING ORGANIZATION NAME AND ADDRESS I0. PROGRAM ELEMENT. PROJECT. TASK HARRIS CORPORATION AREA & WORK UNIT NUMBERS Government...performed for the Rome Air Development Center under Contract F30602-80-C- 0235 . The study was performed by the staff of the Hprris Corporation...processors from making TM - HP 6-31 simultaneous incompatable changes to the data base. However, the simple security rule prohibits a lower level

  2. 76 FR 8946 - Security Ratings

    Science.gov (United States)

    2011-02-16

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No. 33-9186; 34-63874; File No. S7-18-08] RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange... relating to the use of security ratings by credit rating agencies in our rules and forms. In this release...

  3. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  4. 17 CFR 240.14d-102 - Schedule 14D-1F. Tender offer statement pursuant to rule 14d-1(b) under the Securities Exchange...

    Science.gov (United States)

    2010-04-01

    ... into English (if applicable)) (Jurisdiction of Subject Company's [Issuer's] Incorporation or..., Quebec, British Columbia or Alberta (or, if the issuer of the subject securities is not a reporting.... E. The bidder must file the Schedule or amendment in electronic format in the English language in...

  5. An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study

    Science.gov (United States)

    Reis, David W.

    2012-01-01

    Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…

  6. An Enhancement of Optimized Detection Rule of Security Monitoring and Control for Detection of Cyberthreat in Location-Based Mobile System

    Directory of Open Access Journals (Sweden)

    Wonhyung Park

    2017-01-01

    Full Text Available A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime that misused the leaked information caused by the cyberattack of mobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.

  7. RIGHTS, RULES, AND DEMOCRACY

    Directory of Open Access Journals (Sweden)

    Richard S. Kay, University of Connecticut-School of Law, Estados Unidos

    2012-11-01

    Full Text Available Abstract: Democracy require protection of certain fundamental rights, but can we expect courts to follow rules? There seems little escape from the proposition that substantive constitutional review by an unelected judiciary is a presumptive abridgement of democratic decision-making. Once we have accepted the proposition that there exist human rights that ought to be protected, this should hardly surprise us. No one thinks courts are perfect translators of the rules invoked before them on every occasion. But it is equally clear that rules sometimes do decide cases. In modern legal systems the relative roles of courts and legislators with respect to the rules of the system is a commonplace. Legislatures make rules. Courts apply them in particular disputes. When we are talking about human rights, however, that assumption must be clarified in at least one way. The defense of the practice of constitutional review in this article assumes courts can and do enforce rules. This article also makes clear what is the meaning of “following rules”. Preference for judicial over legislative interpretation of rights, therefore, seems to hang on the question of whether or not judges are capable of subordinating their own judgment to that incorporated in the rules by their makers. This article maintains that, in general, entrenched constitutional rules (and not just constitutional courts can and do constrain public conduct and protect human rights. The article concludes that the value judgments will depend on our estimate of the benefits we derive from the process of representative self-government. Against those benefits we will have to measure the importance we place on being able to live our lives with the security created by a regime of human rights protected by the rule of law. Keywords: Democracy. Human Rights. Rules. Judicial Review.

  8. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  9. Employee Retirement Income Security Act of 1974: rules and regulations for administration and enforcement; claims procedure. Pension and Welfare Benefits Administration, Labor. Final regulation.

    Science.gov (United States)

    2000-11-21

    This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  10. 17 CFR 10.36 - Commission review of rulings.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Commission review of rulings. 10.36 Section 10.36 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE Parties and Limited Participation § 10.36 Commission review of rulings. Interlocutory review by...

  11. Employee Retirement Income Security Act of 1974; rules and regulations for administration and enforcement; claims procedure--Department of Labor. Notice of proposed rulemaking.

    Science.gov (United States)

    1998-09-09

    This document contains a proposed regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). This proposed regulation would establish new standards for the processing of group health disability, pension, and other employee benefit plan claims filed by participants and beneficiaries. In the case of group health plans, as well as certain plans providing disability benefits, the new standards are intended to ensure more timely benefit determinations, improved access to information on which a benefit determination is made, and greater assurance that participants and beneficiaries will be afforded a full and fair review of denied claims. If adopted as final, the proposed regulation would affect participants and beneficiaries of employee benefit plans, plan, fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  12. Employee Retirement Income Security Act of 1974; rules and regulations for administration and enforcement; claims procedure. Final regulation; delay of applicability date.

    Science.gov (United States)

    2001-07-09

    This action delays for at least six months and not more than one year the applicability date for the regulation governing minimum requirements for benefit claims procedures of group health plans covered by Title I of the Employee Retirement Income Security Act. As published on November 21, 2000, the benefit claims procedure would be applicable to claims filed on or after January 1, 2002. The current action amends the regulation so that it will apply to group health claims filed on or after the first day of the first plan year beginning on or after July 1, 2002, but in no event later than January 1, 2003. This action provides a limited additional period within which group health plan sponsors, administrators, and service providers can bring their claims processing systems into compliance with the new requirements. A postponement of the applicability date with respect to group health claims will allow a more orderly transition to the new standards and will avoid the confusion and additional expense that would be caused if certain pending Congressional bills are enacted before or soon after the original applicability date. This action does not apply to pension plans or plans providing disability or welfare benefits (other than group health). For these plans, the regulation will continue to be applicable to claims filed on or after January 1, 2002.

  13. 19 CFR 177.9 - Effect of ruling letters.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Effect of ruling letters. 177.9 Section 177.9 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) ADMINISTRATIVE RULINGS General Ruling Procedure § 177.9 Effect of ruling letters. (a...

  14. Diderot's rule

    OpenAIRE

    Beck, Jonathan

    2009-01-01

    "Like many new products, newly released creative goods such as books, music records and movies are sometimes 'surprise' hits but often flops. Experimental and empirical research suggests that it is hard to predict the demand for a new creative good, and therefore its success, even for industry experts. Rules of thumb on the quantitative properties of demand uncertainty exist for various creative industries - including a rule by Denis Diderot (1763) according to which one out of ten published ...

  15. 17 CFR 230.146 - Rules under section 18 of the Act.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Rules under section 18 of the... GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.146 Rules under section 18 of the Act... national securities exchanges, or segments or tiers thereof, have listing standards that are substantially...

  16. CBP Customs Rulings Online Search System (CROSS)

    Data.gov (United States)

    Department of Homeland Security — CROSS is a searchable database of CBP rulings that can be retrieved based on simple or complex search characteristics using keywords and Boolean operators. CROSS has...

  17. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  18. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  19. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  20. Reconsidering the Rules for Space Security

    Science.gov (United States)

    2008-04-01

    Sputnikovaya Sistema [Global Navigation Satellite System] GPS Global Positioning System HCV hypersonic cruise vehicle Intelsat International Telecommunications...reduce incentives to use undegraded signals from Russia’s version of GPS, the Global’naya Navigatsionnaya Sputnikovaya Sistema (GLONASS), and...central issues and applicable principles are nonetheless reasonably apparent, and plausible outcomes can be visualized even if the exact content and

  1. Interactive Synthesis of Code Level Security Rules

    Science.gov (United States)

    2017-04-01

    systems such as robots and satellite systems, and an explosion in the Internet of Things (IoT). One of the ways to reducing vulnerabilities is to use...One of the approaches to reduce software vulnerabilities is to use a bug detection tool during the development process. Many bug detection techniques...Clang static analyzer [4] is a tool that checks for a variety of bugs from proper API usage to divide by zero detection. These tools all have one thing in

  2. Radiological protection national system. Basic security rules

    International Nuclear Information System (INIS)

    1981-01-01

    This work has been prepared as the first one of a set of standards and regulations that will be enforced to provide the protection of men and the environment against the undesirable effects of ionizing radiations. It establishes, in the first place, the system of dose limits for the country and the principles of its utilization. It takes into account the CIPR's recommendations in this area and the mentioned frame of reference, it establishes further the necessary restrictions for the application of the limits to the professionally exposed workers, as well as to the isolated members of the public and the population in general. In addition it establishes the general conditions to be met for the implementation of radiological protection, among them, the classification of working areas and working conditions as well as the compulsory periodical medical surveillance. (H.D.N.)

  3. Federal Coal Mine Health and Safety Act of 1969, Title IV, as amended (The Black Lung Benefits Act); payment of benefits--withholding Part B benefits where Part C payments are made for the same period. Social Security Administration. Final rule.

    Science.gov (United States)

    1982-05-04

    This regulation confirms the interim rule authorizing the Social Security Administration to withhold payment of Part B Black Lung benefits where Part C Black Lung benefits administered by the Dept. of Labor are paid for the same period. We are doing this by expanding the definition of "overpayment" in 20 CFR 410.560(a) to include these duplicate payments under Part C. This regulation provides a quick and efficient means of avoiding unjustified duplicate payments.

  4. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  5. Rule, Britannia

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    . The climax of the masque was “Rule, Britannia!” This song advocated a strong navy as a guard against the absolutist European powers with their lack of civil liberties. Furthermore, a strong navy made a standing army superfluous, and so an army could not be deployed as a repressive force of the state. Later...

  6. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  7. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  8. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  9. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  10. 17 CFR 38.4 - Procedures for listing products and implementing contract market rules.

    Science.gov (United States)

    2010-04-01

    ... products and implementing contract market rules. 38.4 Section 38.4 Commodity and Securities Exchanges... implementing contract market rules. (a) Request for Commission approval of rules and products. (1) An applicant...-certification of rules and products. Rules of a designated contract market and subsequent amendments thereto...

  11. Applicable Law on Demobilized and Dematerialized Securities

    Directory of Open Access Journals (Sweden)

    Wael Saghir

    2017-09-01

    Full Text Available In this paper Wael Saghir examines the priority in the business and financial worlds for companies to pursue reduced transaction costs, creating a trend towards demobilization or dematerialization of securities. His paper explains the nature of securities and the governing laws needed to resolve problems of conflict of law rules related to securities.

  12. Collaboration rules.

    Science.gov (United States)

    Evans, Philip; Wolf, Bob

    2005-01-01

    Corporate leaders seeking to boost growth, learning, and innovation may find the answer in a surprising place: the Linux open-source software community. Linux is developed by an essentially volunteer, self-organizing community of thousands of programmers. Most leaders would sell their grandmothers for workforces that collaborate as efficiently, frictionlessly, and creatively as the self-styled Linux hackers. But Linux is software, and software is hardly a model for mainstream business. The authors have, nonetheless, found surprising parallels between the anarchistic, caffeinated, hirsute world of Linux hackers and the disciplined, tea-sipping, clean-cut world of Toyota engineering. Specifically, Toyota and Linux operate by rules that blend the self-organizing advantages of markets with the low transaction costs of hierarchies. In place of markets' cash and contracts and hierarchies' authority are rules about how individuals and groups work together (with rigorous discipline); how they communicate (widely and with granularity); and how leaders guide them toward a common goal (through example). Those rules, augmented by simple communication technologies and a lack of legal barriers to sharing information, create rich common knowledge, the ability to organize teams modularly, extraordinary motivation, and high levels of trust, which radically lowers transaction costs. Low transaction costs, in turn, make it profitable for organizations to perform more and smaller transactions--and so increase the pace and flexibility typical of high-performance organizations. Once the system achieves critical mass, it feeds on itself. The larger the system, the more broadly shared the knowledge, language, and work style. The greater individuals' reputational capital, the louder the applause and the stronger the motivation. The success of Linux is evidence of the power of that virtuous circle. Toyota's success is evidence that it is also powerful in conventional companies.

  13. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security, which is the entry point for computer security information at CERN. FILE SERVICES COMPUTING RULE The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules.

  14. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security which is the entry point for computer security information at CERN. File Services Computing Rule The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules

  15. 78 FR 49311 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2013-08-13

    ... Organizations; International Securities Exchange, LLC; Order Approving Proposed Rule Change Related to Market... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange...'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change related to market maker risk parameters and...

  16. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  17. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  18. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  19. Urban Code/ Urban Code Deploy

    Data.gov (United States)

    Social Security Administration — COTS databases to support the automation of application deployments through different environments. It keeps track of software deliverables at various stages of SDLC...

  20. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Science.gov (United States)

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  1. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  2. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  3. The problems of nuclear security in Georgia

    International Nuclear Information System (INIS)

    Nabakhtiani, N.

    2006-01-01

    Georgia is carrying out activities to improve nuclear security according to the demands of international standards and rules. The support of developed countries and international organisations is very important to solve the associated problems. (author)

  4. Biometric Feature Script for Information Security

    Directory of Open Access Journals (Sweden)

    N. E. Gunko

    2010-03-01

    Full Text Available Special studies related to the development of rules for making decisions on the psychological characteristics of the offender in his manuscript handwriting with the goal of ensuring information security.

  5. 33 CFR 89.27 - Waters upon which Inland Rule 24(i) applies.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Waters upon which Inland Rule 24(i) applies. 89.27 Section 89.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY INLAND NAVIGATION RULES INLAND NAVIGATION RULES: IMPLEMENTING RULES Waters Upon Which Certain...

  6. 77 FR 59030 - Self-Regulatory Organizations; BATS Exchange, Inc.; Order Granting Approval of Proposed Rule...

    Science.gov (United States)

    2012-09-25

    ...'' to modify the criteria for certain securities listed on BATS as Index Fund Shares. The proposed rule.... II. Description of the Proposed Rule Change Proposal To Amend Index Fund Shares Rules The Exchange proposes certain changes to Rule 14.11(c) relating to Index Fund Shares, commonly referred to as exchange...

  7. Intuitionistic Rules : Admissible Rules of Intermediate Logics

    NARCIS (Netherlands)

    Goudsmit, J.P.

    2015-01-01

    In this thesis, we investigate the admissible rules of intermediate logics. On the one hand, one can characterize the admissibility of rules in certain logic, and on the other hand, one can characterize logics through their admissible rules. We take both approaches, and reach new results in both

  8. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  9. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  10. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  11. Water Security and International Law

    Directory of Open Access Journals (Sweden)

    Tuomas Kuokkanen

    2017-01-01

    Full Text Available The article explores water security from an international law point of view. The article argues that in order to better understand water security it is important to focus on the function of international water law. Even though water security is a relatively recent concept it was latent in the process of the evolution of international water law. In addition, the article examines the relationship between man and water from the point of view of water security. The article seeks to answer the question: how does international water law deal with that relationship? Is water only an object to be utilized and protected or has the relationship become more complex and ambivalent through the occurrence of various extreme events. Furthermore, the article places the concept of water security into a historiographical and substantive context. It explores three broad approaches by international law to water issues: general international law, the regulatory approach and the management approach. The article argues that they are all relevant to water security. Finally, the article seeks to demonstrate that even though water security has emerged as a new notion, this does not mean that international law does not include rules and principles relevant for water security. Indeed, many general principles of international law are applicable in the context of water security. In addition, specific regulations dealing with water quantity and quality issues have been developed in international environmental law, although they are not necessarily labelled as water security rules. Moreover, various risk management methods have been elaborated to deal with water-related disasters and crises. Reciprocally, water security arguments are not necessarily new notions but rather reflect already existing concepts and principles.

  12. New Mandatory Computer Security Course

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    Just like any other organization, CERN is permanently under attack - even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Since 2007, newcomers have to follow a dedicated basic computer security course informing them about the “Do’s” and “Dont’s” when using CERNs computing facilities. This course has recently been redesigned. It is now mandatory for all CERN members (users and staff) owning a CERN computer account and must be followed once every three years. Members who...

  13. Reminder: Mandatory Computer Security Course

    CERN Multimedia

    IT Department

    2011-01-01

    Just like any other organization, CERN is permanently under attack – even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Therefore, a new dedicated basic computer security course has been designed informing you about the “Do’s” and “Dont’s” when using CERN's computing facilities. This course is mandatory for all person owning a CERN computer account and must be followed once every three years. Users who have never done the course, or whose course needs to be renewe...

  14. Reforming Security Sector Governance South Asia | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In South Asia, security discourse has traditionally been confined to government circles, with no room for voices from civil society. The global call for good governance is reversing this trend, however, and the role of civil society in security reform has become critical. An engaged civil society can not only be a watchdog for rule ...

  15. Food security governance in Latin America

    NARCIS (Netherlands)

    Pérez-Escamilla, Rafael; Shamah-Levy, Teresa; Candel, Jeroen

    2017-01-01

    In spite of major advances in recent decades, food insecurity continues to be a pressing concern to policymakers across the world. Food security governance (FSG) relates to the formal and informal rules and processes through which interests are articulated, and decisions relevant to food security

  16. Dynamic Rule Encryption for Mobile Payment

    Directory of Open Access Journals (Sweden)

    Emir Husni

    2017-01-01

    Full Text Available The trend of financial transactions by using a mobile phone or mobile payment increases. By using the mobile payment service, users can save money on mobile phone (handset and separate from the pulse. For protecting users, mobile payment service providers must complete the mobile payment service with the transaction security. One way to provide transaction security is to utilize a secure mobile payment application. This research provides a safety feature used for an Android-based mobile payment application. This security feature is making encryption rules dynamically named Dynamic Rule Encryption (DRE. DRE has the ability to protect data by means of encrypting data with dynamic rules, and DRE also has a token function for an authentication. DRE token raised with dynamic time-based rules. Here, the time is used as a reference with the order of the day in the year (day of the year. The processes of the DRE’s encryption, decryption, and the DRE’s functionality as the token are discussed in this paper. Here, the Hamming distance metric is employed for having maximum differences between plaintext and ciphertext.

  17. DIRAC distributed secure framework

    International Nuclear Information System (INIS)

    Casajus, A; Graciani, R

    2010-01-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  18. 31 CFR 356.32 - What tax rules apply?

    Science.gov (United States)

    2010-07-01

    ... political subdivision of a State, except for State estate or inheritance taxes and other exceptions as... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What tax rules apply? 356.32 Section...) Miscellaneous Provisions § 356.32 What tax rules apply? (a) General. Securities issued under this part are...

  19. 26 CFR 1.860G-2 - Other rules.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 9 2010-04-01 2010-04-01 false Other rules. 1.860G-2 Section 1.860G-2 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Real Estate Investment Trusts § 1.860G-2 Other rules. (a) Obligations principally secured by an...

  20. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  1. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  2. 26 CFR 1.1092(b)-1T - Coordination of loss deferral rules and wash sale rules (temporary).

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Coordination of loss deferral rules and wash sale rules (temporary). 1.1092(b)-1T Section 1.1092(b)-1T Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Wash Sales of Stock Or Securities...

  3. 76 FR 47996 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA; Correction

    Science.gov (United States)

    2011-08-08

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] Security..., DHS. ACTION: Temporary final rule; correction. SUMMARY: On July 11, 2011 the Coast Guard published a temporary final rule in the Federal Register (76 FR 40617), establishing temporary security zones around...

  4. New Brunswick electricity market rules : summary

    International Nuclear Information System (INIS)

    2004-02-01

    The electricity market rules for New Brunswick were reviewed with particular reference to two broad classifications. The first classification is based on the roles and responsibilities of the system operator (SO) in facilitating the Bilateral Contract market, as well as the role of market participants in participating in the Bilateral Contract market. The second classification is based on the roles and responsibilities of each of the SO, market participants and transmitters in maintaining the reliability of the integrated electricity system and ensuring a secure supply of electricity for consumers in New Brunswick. The market rules consist of 10 chapters entitled: (1) introduction to the market rules and administrative rules of general application, (2) market participation and the use of the SO-controlled grid, (3) market administration, (4) technical and connection requirements, testing and commissioning, (5) system reliability, (6) operational requirements, (7) settlement, (8) connection of new or modified facilities, (9) transmission system planning, investment and operation, and (10) definitions and interpretation

  5. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  6. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  7. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  8. Risk management. National Aeronautics and Space Administration (NASA). Interim rule adopted as final with changes.

    Science.gov (United States)

    2000-11-22

    This is a final rule amending the NASA FAR Supplement (NFS) to emphasize considerations of risk management, including safety, security (including information technology security), health, export control, and damage to the environment, within the acquisition process. This final rule addresses risk management within the context of acquisition planning, selecting sources, choosing contract type, structuring award fee incentives, administering contracts, and conducting contractor surveillance.

  9. 17 CFR 41.49 - Filing proposed margin rule changes with the Commission.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Filing proposed margin rule... TRADING COMMISSION SECURITY FUTURES PRODUCTS Customer Accounts and Margin Requirements § 41.49 Filing proposed margin rule changes with the Commission. (a) Notification requirement for notice-designated...

  10. 78 FR 4365 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Science.gov (United States)

    2013-01-22

    ... Securities and Exchange Commission (``Commission'') published in the Federal Register a proposed rule for... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-68660; File No. S7-08-12] RIN 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major...

  11. 76 FR 46668 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Science.gov (United States)

    2011-08-03

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...

  12. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  13. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  14. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  15. Phonological reduplication in sign language: rules rule

    Directory of Open Access Journals (Sweden)

    Iris eBerent

    2014-06-01

    Full Text Available Productivity—the hallmark of linguistic competence—is typically attributed to algebraic rules that support broad generalizations. Past research on spoken language has documented such generalizations in both adults and infants. But whether algebraic rules form part of the linguistic competence of signers remains unknown. To address this question, here we gauge the generalization afforded by American Sign Language (ASL. As a case study, we examine reduplication (X→XX—a rule that, inter alia, generates ASL nouns from verbs. If signers encode this rule, then they should freely extend it to novel syllables, including ones with features that are unattested in ASL. And since reduplicated disyllables are preferred in ASL, such rule should favor novel reduplicated signs. Novel reduplicated signs should thus be preferred to nonreduplicative controls (in rating, and consequently, such stimuli should also be harder to classify as nonsigns (in the lexical decision task. The results of four experiments support this prediction. These findings suggest that the phonological knowledge of signers includes powerful algebraic rules. The convergence between these conclusions and previous evidence for phonological rules in spoken language suggests that the architecture of the phonological mind is partly amodal.

  16. 33 CFR 89.25 - Waters upon which Inland Rules 9(a)(ii), 14(d), and 15(b) apply.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Waters upon which Inland Rules 9(a)(ii), 14(d), and 15(b) apply. 89.25 Section 89.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY INLAND NAVIGATION RULES INLAND NAVIGATION RULES: IMPLEMENTING RULES Waters...

  17. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  18. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  19. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  20. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    Science.gov (United States)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  1. Binary effectivity rules

    DEFF Research Database (Denmark)

    Keiding, Hans; Peleg, Bezalel

    2006-01-01

    effectivity rule is regular if it is the effectivity rule of some regular binary SCR. We characterize completely the family of regular binary effectivity rules. Quite surprisingly, intrinsically defined von Neumann-Morgenstern solutions play an important role in this characterization...

  2. Modifying Intramural Rules.

    Science.gov (United States)

    Rokosz, Francis M.

    1981-01-01

    Standard sports rules can be altered to improve the game for intramural participants. These changes may improve players' attitudes, simplify rules for officials, and add safety features to a game. Specific rule modifications are given for volleyball, football, softball, floor hockey, basketball, and soccer. (JN)

  3. 78 FR 79037 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-27

    ... change a non-substantive word to update the sentence structure of paragraph (a). [ssquf] ISE Rule 715... Rule Change to Make Non-Controversial Changes to ISE Rules December 20, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...

  4. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  5. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  6. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  7. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  8. CERN’s Computing rules updated to include policy for control systems

    CERN Document Server

    IT Department

    2008-01-01

    The use of CERN’s computing facilities is governed by rules defined in Operational Circular No. 5 and its subsidiary rules of use. These rules are available from the web site http://cern.ch/ComputingRules. Please note that the subsidiary rules for Internet/Network use have been updated to include a requirement that control systems comply with the CNIC(Computing and Network Infrastructure for Control) Security Policy. The security policy for control systems, which was approved earlier this year, can be accessed at https://edms.cern.ch/document/584092 IT Department

  9. 77 FR 54464 - Eliminating the Prohibition Against General Solicitation and General Advertising in Rule 506 and...

    Science.gov (United States)

    2012-09-05

    ... General Solicitation and General Advertising in Rule 506 and Rule 144A Offerings AGENCY: Securities and... general solicitation and general advertising contained in Rule 502(c) of Regulation D would not apply to... offerings that use general solicitation or general advertising, the issuer take reasonable steps to verify...

  10. 33 CFR 83.36 - Signals to attract attention (Rule 36).

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Signals to attract attention... SECURITY INLAND NAVIGATION RULES RULES Sound and Light Signals § 83.36 Signals to attract attention (Rule 36). If necessary to attract the attention of another vessel, any vessel may make light or sound...

  11. 17 CFR 230.100 - Definitions of terms used in the rules and regulations.

    Science.gov (United States)

    2010-04-01

    ... express reference to the Act or to the rules and regulations or to a portion thereof defines such term for... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Definitions of terms used in... terms used in the rules and regulations. (a) As used in the rules and regulations prescribed in this...

  12. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  13. New Safety rules

    CERN Multimedia

    Safety Commission

    2008-01-01

    The revision of CERN Safety rules is in progress and the following new Safety rules have been issued on 15-04-2008: Safety Procedure SP-R1 Establishing, Updating and Publishing CERN Safety rules: http://cern.ch/safety-rules/SP-R1.htm; Safety Regulation SR-S Smoking at CERN: http://cern.ch/safety-rules/SR-S.htm; Safety Regulation SR-M Mechanical Equipment: http://cern.ch/safety-rules/SR-M.htm; General Safety Instruction GSI-M1 Standard Lifting Equipment: http://cern.ch/safety-rules/GSI-M1.htm; General Safety Instruction GSI-M2 Standard Pressure Equipment: http://cern.ch/safety-rules/GSI-M2.htm; General Safety Instruction GSI-M3 Special Mechanical Equipment: http://cern.ch/safety-rules/GSI-M3.htm. These documents apply to all persons under the Director General’s authority. All Safety rules are available at the web page: http://www.cern.ch/safety-rules The Safety Commission

  14. Action Rules Mining

    CERN Document Server

    Dardzinska, Agnieszka

    2013-01-01

    We are surrounded by data, numerical, categorical and otherwise, which must to be analyzed and processed to convert it into information that instructs, answers or aids understanding and decision making. Data analysts in many disciplines such as business, education or medicine, are frequently asked to analyze new data sets which are often composed of numerous tables possessing different properties. They try to find completely new correlations between attributes and show new possibilities for users.   Action rules mining discusses some of data mining and knowledge discovery principles and then describe representative concepts, methods and algorithms connected with action. The author introduces the formal definition of action rule, notion of a simple association action rule and a representative action rule, the cost of association action rule, and gives a strategy how to construct simple association action rules of a lowest cost. A new approach for generating action rules from datasets with numerical attributes...

  15. Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining

    Directory of Open Access Journals (Sweden)

    Nattawat Khamphakdee

    2015-07-01

    Full Text Available The intrusion detection system (IDS is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS  can detect only known attacks. Therefore, we have proposed a procedure for improving Snort IDS rules, based on the association rules data mining technique for detection of network probe attacks.  We employed the MIT-DARPA 1999 data set for the experimental evaluation. Since behavior pattern traffic data are both normal and abnormal, the abnormal behavior data is detected by way of the Snort IDS. The experimental results showed that the proposed Snort IDS rules, based on data mining detection of network probe attacks, proved more efficient than the original Snort IDS rules, as well as icmp.rules and icmp-info.rules of Snort IDS.  The suitable parameters for the proposed Snort IDS rules are defined as follows: Min_sup set to 10%, and Min_conf set to 100%, and through the application of eight variable attributes. As more suitable parameters are applied, higher accuracy is achieved.

  16. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  17. 75 FR 64643 - Reporting of Security-Based Swap Transaction Data

    Science.gov (United States)

    2010-10-20

    .... Entities subject to the rule may have to implement new document retention and reporting policies.\\54\\ \\54... reporting entities)] = 38,000 burden... 3235-AK73 Reporting of Security-Based Swap Transaction Data AGENCY: Securities and Exchange Commission...

  18. 17 CFR 240.19b-4 - Filings with respect to proposed rule changes by self-regulatory organizations.

    Science.gov (United States)

    2010-04-01

    ... and fairly implied by that rule. (e) For the purposes of this paragraph, new derivative securities product means any type of option, warrant, hybrid securities product or any other security, other than a single equity option or a security futures product, whose value is based, in whole or in part, upon the...

  19. 17 CFR 240.3a5-2 - Exemption from the definition of “dealer” for banks effecting transactions in securities issued...

    Science.gov (United States)

    2010-04-01

    ... of âdealerâ for banks effecting transactions in securities issued pursuant to Regulation S. 240.3a5-2... banks effecting transactions in securities issued pursuant to Regulation S. (a) A bank is exempt from...) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...

  20. Secure Web Developers Needed!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    You’re about to launch a new website? Cool!! With today’s web programming languages like PHP, Java, Python or Perl, complex websites can be created, easily fulfilling all your use cases. But hold on. Did you ever think about how easily this can be abused? Attackers today are already using automatic tools which can quickly and easily find and exploit vulnerable web applications.   Web applications often suffer from security vulnerabilities, i.e. design flaws or programming bugs that remained undetected during the whole software development cycle. In production these vulnerabilities become security holes, providing an opportunity for exploitation, and can pose immense security risks (and there is no reason to believe that CERN is immune to this). The costs associated with eliminating these bugs could be loosely described by the "1:10:100 rule", i.e. the relative costs for fixing are 1:10:100 for fixing them in the programming:testing:production phases. Thus, the...

  1. Trade and investment rules for energy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-09-15

    Rules that govern energy trade is an issue that has generated increasing concern everywhere, from the standpoint of both the security of supply for consumers and security of demand for suppliers. This concern reflects the importance of rules that comprehensively address the needs from supply and demand point of view and integrate the international fabric of energy trade. The GATT and the WTO Agreement define trans-border movement of energy but leave many aspects unclear, particularly as efforts accelerate to control carbon emissions. This timely report by a WEC Task Force of experts with legal standing in the energy business identifies the most pressing issues relating to energy trade and suggests actions and measures which, if implemented, would provide clarity and answer many questions. More importantly, these measures would strengthen the WTO and coming rounds of negotiations.

  2. 17 CFR 240.3b-15 - Definition of ancillary portfolio management securities activities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of ancillary portfolio management securities activities. 240.3b-15 Section 240.3b-15 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Definitions § 240.3b-15 Definition of...

  3. 76 FR 43376 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2011-07-20

    ... transactions in credit default swaps that reference government securities. ICE Clear Credit LLC requested these... Commission and the Securities and Exchange Commission issue final rules or guidance to implement Title VII of... a default or other credit event as to such entity or entities or such security or securities. \\10...

  4. 75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information

    Science.gov (United States)

    2010-12-02

    ... Dissemination of Security-Based Swap Information; Proposed Rule #0;#0;Federal Register / Vol. 75 , No. 231... Dissemination of Security-Based Swap Information AGENCY: Securities and Exchange Commission. ACTION: Proposed... SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the...

  5. A Container-based Trusted Multi-level Security Mechanism

    Directory of Open Access Journals (Sweden)

    Li Xiao-Yong

    2017-01-01

    Full Text Available Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level. Through this type of security mechanism, users at different security levels are provided with information at corresponding security levels. Traditional multi-level security mechanism which depends on the safety of operating system finally proved to be not practical. We propose a container-based trusted multi-level security mechanism in this paper to improve the applicability of the multi-level mechanism. It guarantees multi-level security of the system through a set of multi-level security policy rules and trusted techniques. The technical feasibility and application scenarios are also discussed. The ease of realization, strong practical significance and low cost of our method will largely expand the application of multi-level security mechanism in real life.

  6. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  7. Whitelisting and the Rule of Law

    DEFF Research Database (Denmark)

    Leander, Anna

    2016-01-01

    Leander’s chapter argues that whitelists in commercial security are establishing and consolidating a rule of law marked by managerialism. It closely describes the significance of the mundane, seemingly innocuous whitelists. Whitelists have proliferated as part of governance through Codes of Conduct......, Best Practices, Benchmarks and Standards. The chapter shows that these lists stake out regulatory space, establish regulatory relations and prioritize potential (they do work). In the process, they contribute to a regulatory topology where evidence is devalued, conventional legal expertise...... and criticism devalued (they leave a topological imprint). Together, these momentous shifts skew the rule of law towards managerialism and enshrine the managerialism already there. They mark a shift in the quality of the rule of law but do not necessarily weaken it....

  8. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  9. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  10. Farmland Tenure Security in China: Influencing Factors of Actual and Perceived Farmland Tenure Security

    Science.gov (United States)

    Ren, Guangcheng; Zhu, Xueqin; Heerink, Nico; van Ierland, Ekko; Feng, Shuyi

    2017-04-01

    Tenure security plays an important role in farm households' investment, land renting and other decisions. Recent literature distinguishes between actual farmland tenure security (i.e. farm households' actual control of farmland) and perceived farmland tenure security (i.e. farm households' subjective understanding of their farmland tenure situation and expectation regarding government enforcement and equality of the law). However little is known on what factors influence the actual and perceived farmland tenure security in rural China. Theoretically, actual farmland tenure security is related to village self-governance as a major informal governance rule in rural China. Both economic efficiency and equity considerations are likely to play a role in the distribution of land and its tenure security. Household perceptions of farmland tenure security depend not only on the actual farmland tenure security in a village, but may also be affected by households' investment in and ability of changing social rules. Our study examines what factors contribute to differences in actual and perceived farmland tenure security between different villages and farm households in different regions of China. Applying probit models to the data collected from 1,485 households in 124 villages in Jiangsu, Jiangxi, Liaoning and Chongqing, we find that development of farmland rental market and degree of self-governance of a village have positive impacts, and development of labour market has a negative effect on actual farmland tenure security. Household perceptions of tenure security depend not only on actual farmland tenure security and on households' investment in and ability of changing social rules, but also on risk preferences of households. This finding has interesting policy implications for future land reforms in rural China.

  11. Strategy as simple rules.

    Science.gov (United States)

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple.

  12. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  13. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  14. Using Programmer-Written Compiler Extensions to Catch Security Holes

    National Research Council Canada - National Science Library

    Ashcraft, Ken

    2001-01-01

    This paper shows how system-specific static analysis can find security errors that violate rules such as "integers from untrusted sources must be sanitized before use" and "do not dereference user-supplied pointers...

  15. Using Bayesian Networks and Decision Theory to Model Physical Security

    National Research Council Canada - National Science Library

    Roberts, Nancy

    2003-01-01

    .... Cameras, sensors and other components used along with the simple rules in the home automation software provide an environment where the lights, security and other appliances can be monitored and controlled...

  16. Formal policies for flexible EHR security.

    Science.gov (United States)

    Blobel, Bernd; Pharow, Peter

    2006-01-01

    State of the Art methodologies for establishing requirements and solutions to securing applications are based on narrative descriptions about the use of available system, sometimes also dedicated to system components. Even nowadays new developments to ruling application security services by the use of predicate logic suffer from being administered manually. Therefore, security and privacy requirements cannot be properly met resulting in restrictions and fears for allowing the use of sensitive data and functions. Because of the sensitivity of personal health information and especially of genetic data with its wider implications beyond the original subject of care, weaknesses in guaranteeing fine-grained security and privacy rules lead to less acceptance or even the avoidance of essential information transfer and use. To overcome the problem, security and privacy have to become properties of the architectural components of the respective health information system. Embedding security into the systems architecture allows for negotiating and enforcing any security and privacy services related to principals, their roles, their relationships, further contextual information as well as other regulations summarized in formally modeled policies. The paper introduces the evolving paradigm of the model-driven architecture, first time also comprehensively deployed for security and privacy services in bio-genetic and health information systems.

  17. Beyond the security paradox: Ten criteria for a socially informed security policy.

    Science.gov (United States)

    Pavone, Vincenzo; Ball, Kirstie; Degli Esposti, Sara; Dibb, Sally; Santiago-Gómez, Elvira

    2017-04-01

    This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data gathered at 12 citizen summits in nine European countries. The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy. These criteria not only reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens' priorities. They also cast light on an interesting paradox: although people feel safe in their daily lives, they believe security could, and should, be improved.

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  20. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  1. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  2. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Security Engineering

    Science.gov (United States)

    2012-01-31

    Clarkson, Chong, and Myers, 2008; Fujioka and Okamoto, 1992] across a diverse set of redundant components. For example, an automobile brake control...e.g., a radio frequency spectrum analyzer embedded in a subsystem’s hardware chassis , and listening for a wireless triggering command at the time of...S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, Experimental security analysis of a modern automobile , IEEE Symposium on

  4. 78 FR 18410 - Order Granting a Limited Exemption From Rule 102 of Regulation M Concerning the NASDAQ Stock...

    Science.gov (United States)

    2013-03-26

    ... COMMISSION Order Granting a Limited Exemption From Rule 102 of Regulation M Concerning the NASDAQ Stock... Securities and Exchange Commission (``Commission'') approved a proposed rule change of the NASDAQ Stock... directly or indirectly accepting payment from an issuer of a security for acting as a market marker'' yet...

  5. 75 FR 25005 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Amending...

    Science.gov (United States)

    2010-05-06

    ... ``Units'') that are traded on a national securities exchange and are defined as an ``NMS stock'' in Rule... securities and/or Financial Instruments and Money Marker Instruments); or (ii) interests in a trust or... the ETFS Platinum Trust ceases to be an ``NMS stock'' as provided for in Rule 5.4(b)(5) or the ETFS...

  6. 78 FR 11245 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2013-02-15

    ... and potential rewards of investing in both equity funds and bond funds. Certain of the Preferred... First Trust Preferred Securities and Income ETF Under NYSE Arca Equities Rule 8.600 February 8, 2013. I...'') of the First Trust Preferred Securities and Income ETF (``Fund'') under NYSE Arca Equities Rule 8.600...

  7. Constitutive rules, language, and ontology

    NARCIS (Netherlands)

    Hindriks, Frank

    It is a commonplace within philosophy that the ontology of institutions can be captured in terms of constitutive rules. What exactly such rules are, however, is not well understood. They are usually contrasted to regulative rules: constitutive rules (such as the rules of chess) make institutional

  8. Totally optimal decision rules

    KAUST Repository

    Amin, Talha

    2017-11-22

    Optimality of decision rules (patterns) can be measured in many ways. One of these is referred to as length. Length signifies the number of terms in a decision rule and is optimally minimized. Another, coverage represents the width of a rule’s applicability and generality. As such, it is desirable to maximize coverage. A totally optimal decision rule is a decision rule that has the minimum possible length and the maximum possible coverage. This paper presents a method for determining the presence of totally optimal decision rules for “complete” decision tables (representations of total functions in which different variables can have domains of differing values). Depending on the cardinalities of the domains, we can either guarantee for each tuple of values of the function that totally optimal rules exist for each row of the table (as in the case of total Boolean functions where the cardinalities are equal to 2) or, for each row, we can find a tuple of values of the function for which totally optimal rules do not exist for this row.

  9. 17 CFR 300.502 - Claim for securities.

    Science.gov (United States)

    2010-04-01

    ... A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to Satisfaction... purchased from the customer's account; or (2) Whether or not written confirmation of the purchase has been... Debtor held cash in an account for a customer, the customer has a “claim for securities” with respect to...

  10. Following the Rules.

    Science.gov (United States)

    Katz, Anne

    2016-05-01

    I am getting better at following the rules as I grow older, although I still bristle at many of them. I was a typical rebellious teenager; no one understood me, David Bowie was my idol, and, one day, my generation was going to change the world. Now I really want people to understand me: David Bowie remains one of my favorite singers and, yes, my generation has changed the world, and not necessarily for the better. Growing up means that you have to make the rules, not just follow those set by others, and, at times, having rules makes a lot of sense.
.

  11. Security classification of information

    Energy Technology Data Exchange (ETDEWEB)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  12. 78 FR 8675 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-02-06

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change to Amend ISE Rule 2102 to Extend the Market-Wide Circuit Breaker Pilot Program January... 19b-4 thereunder,\\2\\ notice is hereby given that, on January 29, 2013, International Securities...

  13. 77 FR 37722 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Eliminate the Rules and Fees Related to the Second Market June 18, 2012. Pursuant to...\\ notice is hereby given that on June 6, 2012, the International Securities Exchange, LLC (the ``Exchange...

  14. 75 FR 62900 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-13

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on October 4, 2010, International Securities...

  15. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  16. 78 FR 66318 - Securities Investor Protection Corporation

    Science.gov (United States)

    2013-11-05

    ... approximates what the customer would expect to be in his account but for the failure of the broker-dealer. This... ``Rules Relating to Satisfaction of Customer Claims for Standardized Options,'' which relates to the satisfaction of customer claims for standardized options under the Securities Investor Protection Act of 1970...

  17. Securities and Exchange Commission Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... available online at www.reginfo.gov . DATES: Comments should be received on or before June 30, 2010... Investment Trust Interests, and Municipal Fund Securities Used for Education Savings 433 Rule 15c2-3: Point-of-Sale Disclosure of Purchases in Open-End Management Investment 3235-AJ12 Company Shares, Unit...

  18. Governance: The Mission Ingredient in Security Cooperation

    Science.gov (United States)

    2017-06-09

    operational principles to achieve international aid effectiveness.80 1. Promote gender equality and female empowerment; 2. Apply science, technology, and...International Development, Equal Rights, Equal Access: Toolkit for Addressing Gender -Based Violence through Rule of Law Projects (Washington, DC: U.S...governance, corruption, human rights, international, best practices, gender rights, foreign policy 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  19. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  20. Claims Procedure for Plans Providing Disability Benefits. Final rule.

    Science.gov (United States)

    2016-12-19

    This document contains a final regulation revising the claims procedure regulations under the Employee Retirement Income Security Act of 1974 (ERISA) for employee benefit plans providing disability benefits. The final rule revises and strengthens the current rules primarily by adopting certain procedural protections and safeguards for disability benefit claims that are currently applicable to claims for group health benefits pursuant to the Affordable Care Act. This rule affects plan administrators and participants and beneficiaries of plans providing disability benefits, and others who assist in the provision of these benefits, such as third-party benefits administrators and other service providers.

  1. Thin Capitalization Rules and Entrepreneurial Capital Structure Decisions

    Directory of Open Access Journals (Sweden)

    Alexandra Maßbaum

    2009-12-01

    Full Text Available Tax planners often choose debt over equity financing. As this has led to increased corporate debt financing, many countries have introduced thin capitalization rules to secure their tax revenues. In a general capital structure model we analyze if thin capitalization rules affect dividend and financing decisions, and whether they can partially explain why corporations receive both debt and equity capital. We model the Belgian, German and Italian rules as examples. We find that the so-called Miller equilibrium and definite financing effects depend significantly on the underlying tax system. Further, our results are useful for the treasury to decide what thin capitalization type to implement.

  2. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the ...

  3. Data-Driven Security-Constrained OPF

    DEFF Research Database (Denmark)

    Thams, Florian; Halilbasic, Lejla; Pinson, Pierre

    2017-01-01

    in market clearing algorithms. Our goal is to minimize redispatching actions, and instead allow the market to determine the most cost-efficient dispatch while considering all security constraints. To maintain tractability of our approach we perform our security assessment offline, examining large datasets...... considerations, while being less conservative than current approaches. Our approach can be scalable for large systems, accounts explicitly for power system security, and enables the electricity market to identify a cost-efficient dispatch avoiding redispatching actions. We demonstrate the performance of our......In this paper we unify electricity market operations with power system security considerations. Using data-driven techniques, we address both small signal stability and steady-state security, derive tractable decision rules in the form of line flow limits, and incorporate the resulting constraints...

  4. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  5. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology of one party, led to regarding the armed services as harmful to designs for developing civic society and a waste of resources generally...... disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology...

  8. (FIELD) SYMMETRIZATION SELECTION RULES

    Energy Technology Data Exchange (ETDEWEB)

    P. PAGE

    2000-08-01

    QCD and QED exhibit an infinite set of three-point Green's functions that contain only OZI rule violating contributions, and (for QCD) are subleading in the large N{sub c} expansion. We prove that the QCD amplitude for a neutral hybrid {l_brace}1,3,5. . .{r_brace}{+-} exotic current to create {eta}{pi}{sup 0} only comes from OZI rule violating contributions under certain conditions, and is subleading in N{sub c}.

  9. 76 FR 51447 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2011-08-18

    ... broken by the exchange if they exceed the applicable percentage from the Reference Price, as noted in the table found under Rule 10(c)(1).\\9\\ The Reference Price, for purposes of Rule 10(c)(4), is the price...\\ Pursuant to Rule 10(c)(1), a security with a Reference Price of greater than zero and up to an including...

  10. 76 FR 51092 - Self-Regulatory Organizations; BATS Y-Exchange, Inc.; Notice of Filing of Proposed Rule Change To...

    Science.gov (United States)

    2011-08-17

    ... Trades will be broken by the Exchange if they exceed the applicable percentage from the Reference Price, as noted in the table found under Rule 11.17(c)(1).\\8\\ The Reference Price, for purposes of Rule 11... the Trading Pause Trigger Price.\\9\\ \\8\\ Pursuant to Rule 11.17(c)(1), a security with a Reference...

  11. 77 FR 6833 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2012-02-09

    ... provisions of the trust issued receipts rules, Bylaws, and all other rules and procedures of the Board of... NASDAQ Rule 5711(d) provides that a Commodity-Based Trust Share is a Trust Issued Receipt that holds a...-Linked Securities; Index-Linked Exchangeable Notes; Equity Gold Shares; Trust Certificates; Commodity...

  12. 75 FR 3774 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2010-01-22

    ... into any contract with or for a customer for the purchase or sale of such security, disclose to the... Control Relationship with Issuer Nasdaq Members shall comply with NASD Rule 2240 as if such Rule were part....] * * * * * 2262. Disclosure of Control Relationship with Issuer Nasdaq Members shall comply with FINRA Rule 2262...

  13. 17 CFR 1.54 - Contract market rules submitted to and approved or not disapproved by the Secretary of Agriculture.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Contract market rules... EXCHANGE ACT Miscellaneous § 1.54 Contract market rules submitted to and approved or not disapproved by the... by the Commission of any contract market bylaw, rule, regulation or resolution. (Sec. 411, Pub. L. 93...

  14. 17 CFR Appendix B to Part 1 - Fees for Contract Market Rule Enforcement Reviews and Financial Reviews

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fees for Contract Market Rule... to Part 1—Fees for Contract Market Rule Enforcement Reviews and Financial Reviews (a) Within 60 days... costs in conducting contract market rule enforcement reviews and financial reviews. (b) The Commission...

  15. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  16. 76 FR 51082 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-17

    ... will be broken by the Exchange if they exceed the applicable percentage from the Reference Price, as noted in the table found under Rule 2128(c)(1).\\7\\ The Reference Price, for purposes of Rule 11.13(c)(4... Pause Trigger Price.\\8\\ \\7\\ Pursuant to Rule 2128(c)(1), a security with a Reference Price of greater...

  17. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  18. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  19. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  20. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    of Europe, in the early 1920s the prospects for peace looked promising. Under these circumstances, buttressed by pacifism as the logical reaction to the carnage of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should...... of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should be implemented, the sooner the better. In order to accelerate peaceful development, and because their armed forces were seen rather as harmful than conducive to security...... to the international milieu and to the European trend towards reconciliation. New issues assumed prominence as a consequence of the post-war quest for peace and prosperity. Reconstruction of society and increased emphasis on welfare measures brought economy into focus of political canvassing. The League of Nations...

  1. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  2. 76 FR 43569 - Identification of Enforceable Rules and Orders

    Science.gov (United States)

    2011-07-21

    ... Mortgage Licensing Act of 2008.\\10\\ \\10\\ This rule will become effective on August 29, 2011. See 76 FR...--Disclosure Requirements and Prohibitions Concerning Franchising 12. 16 CFR part 437--Disclosure Requirements... the Secure and Fair Enforcement for Mortgage Licensing Act of 2008) 3. 24 CFR part 1710--Land...

  3. 19 CFR 177.1 - General ruling practice and definitions.

    Science.gov (United States)

    2010-04-01

    ... authority to represent is known, any person appearing before the Customs Service as an agent in connection... 19 Customs Duties 2 2010-04-01 2010-04-01 false General ruling practice and definitions. 177.1 Section 177.1 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...

  4. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  5. The rule of law

    Directory of Open Access Journals (Sweden)

    Besnik Murati

    2015-07-01

    Full Text Available The state as an international entity and its impact on the individual’s right has been and still continues to be a crucial factor in the relationship between private and public persons. States vary in terms of their political system, however, democratic states are based on the separation of powers and human rights within the state. Rule of law is the product of many actors in a state, including laws, individuals, society, political system, separation of powers, human rights, the establishment of civil society, the relationship between law and the individual, as well as, individual-state relations. Purpose and focus of this study is the importance of a functioning state based on law, characteristics of the rule of law, separation of powers and the basic concepts of the rule of law.

  6. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  7. Vet Centers. Final rule.

    Science.gov (United States)

    2016-03-02

    The Department of Veterans Affairs (VA) adopts as final an interim final rule that amends its medical regulation that governs Vet Center services. The National Defense Authorization Act for Fiscal Year 2013 (the 2013 Act) requires Vet Centers to provide readjustment counseling services to broader groups of veterans, members of the Armed Forces, including a member of a reserve component of the Armed Forces, and family members of such veterans and members. This final rule adopts as final the regulatory criteria to conform to the 2013 Act, to include new and revised definitions.

  8. QCD spectral sum rules

    CERN Document Server

    Narison, Stéphan

    The aim of the book is to give an introduction to the method of QCD Spectral Sum Rules and to review its developments. After some general introductory remarks, Chiral Symmetry, the Historical Developments of the Sum Rules and the necessary materials for perturbative QCD including the MS regularization and renormalization schemes are discussed. The book also gives a critical review and some improvements of the wide uses of the QSSR in Hadron Physics and QSSR beyond the Standard Hadron Phenomenology. The author has participated actively in this field since 1978 just before the expanding success

  9. Cosmic Sum Rules

    DEFF Research Database (Denmark)

    T. Frandsen, Mads; Masina, Isabella; Sannino, Francesco

    2011-01-01

    We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models.......We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models....

  10. Usability Prediction & Ranking of SDLC Models Using Fuzzy Hierarchical Usability Model

    Science.gov (United States)

    Gupta, Deepak; Ahlawat, Anil K.; Sagar, Kalpna

    2017-06-01

    Evaluation of software quality is an important aspect for controlling and managing the software. By such evaluation, improvements in software process can be made. The software quality is significantly dependent on software usability. Many researchers have proposed numbers of usability models. Each model considers a set of usability factors but do not cover all the usability aspects. Practical implementation of these models is still missing, as there is a lack of precise definition of usability. Also, it is very difficult to integrate these models into current software engineering practices. In order to overcome these challenges, this paper aims to define the term `usability' using the proposed hierarchical usability model with its detailed taxonomy. The taxonomy considers generic evaluation criteria for identifying the quality components, which brings together factors, attributes and characteristics defined in various HCI and software models. For the first time, the usability model is also implemented to predict more accurate usability values. The proposed system is named as fuzzy hierarchical usability model that can be easily integrated into the current software engineering practices. In order to validate the work, a dataset of six software development life cycle models is created and employed. These models are ranked according to their predicted usability values. This research also focuses on the detailed comparison of proposed model with the existing usability models.

  11. 17 CFR 270.2a-1 - Valuation of portfolio securities in special cases.

    Science.gov (United States)

    2010-04-01

    ... EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.2a-1 Valuation of portfolio securities in special cases. (a) Any investment company whose securities are qualified... which the securities owned by such company are required by applicable State law or regulations to be...

  12. 76 FR 47630 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-05

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Market Data Fees August 1, 2011. Pursuant to Section 19(b)(1) of the Securities... 1, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the...

  13. 76 FR 51075 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval to...

    Science.gov (United States)

    2011-08-17

    ... Organizations; International Securities Exchange, LLC; Order Granting Approval to a Proposed Rule Change Relating to Appointments to Competitive Market Makers August 11, 2011. I. Introduction On June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities...

  14. 76 FR 32382 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-06-06

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Second Market Fees May 27, 2011. Pursuant to Section 19(b)(1) of the Securities..., 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the...

  15. 76 FR 37863 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-06-28

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to Appointments to Competitive Market Makers June 22, 2011. Pursuant to Section 19(b)(1) of the Securities... that on June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  16. 78 FR 9751 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of...

    Science.gov (United States)

    2013-02-11

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of... Purpose of Calculating Its Clearing Fund Under Procedure XV of Its Rules & Procedures February 5, 2013. On December 17, 2012, the National Securities Clearing Corporation (``NSCC'') filed with the Securities and...

  17. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  18. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  19. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  20. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  1. 76 FR 79141 - List of Rules To Be Reviewed Pursuant to the Regulatory Flexibility Act

    Science.gov (United States)

    2011-12-21

    ... initial notice within a reasonable time after establishing a customer relationship in two additional... requirements for maintaining the assets of a registered management investment company with a foreign securities...: 15 U.S.C. 78a et seq. Description: These rules amended Rule 17Ac2-2 and Form TA-2 under the...

  2. 33 CFR 83.34 - Maneuvering and warning signals (Rule 34).

    Science.gov (United States)

    2010-07-01

    ... SECURITY INLAND NAVIGATION RULES RULES Sound and Light Signals § 83.34 Maneuvering and warning signals... propulsion”. (2) Upon hearing the one or two blast signal of the other shall, if in agreement, sound the same... vessel doubts the safety of the proposed maneuver, she shall sound the danger signal specified in...

  3. 19 CFR 181.97 - Withdrawal of NAFTA advance ruling requests.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Withdrawal of NAFTA advance ruling requests. 181.97 Section 181.97 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Advance Ruling Procedures § 181.97...

  4. 17 CFR 39.4 - Procedures for implementing derivatives clearing organization rules and clearing new products.

    Science.gov (United States)

    2010-04-01

    ... derivatives clearing organization rules and clearing new products. 39.4 Section 39.4 Commodity and Securities... implementing derivatives clearing organization rules and clearing new products. (a) Request for approval of... of § 40.6 of this chapter. (c) Acceptance of new products for clearing. (1) A dormant derivatives...

  5. 20 CFR 410.687 - Rules governing the representation and advising of claimants and parties.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Rules governing the representation and advising of claimants and parties. 410.687 Section 410.687 Employees' Benefits SOCIAL SECURITY... Representation of Parties § 410.687 Rules governing the representation and advising of claimants and parties. No...

  6. 78 FR 42815 - Self-Regulatory Organizations; The Options Clearing Corporation; Order Approving Proposed Rule...

    Science.gov (United States)

    2013-07-17

    ... contract adjustments will retain all other functions and authority granted under the By-Laws, including...-references to By-Laws and Rules that are being amended. \\10\\ OCC's Securities Committee is empowered under...\\ the conforming and clarifying changes to OCC's By-Laws and Rules should help ensure that OCC maintains...

  7. 17 CFR 1.53 - Enforcement of contract market bylaws, rules, regulations, and resolutions.

    Science.gov (United States)

    2010-04-01

    ....53 Enforcement of contract market bylaws, rules, regulations, and resolutions. Each contract market... terms and conditions in contracts of sale to be executed on or subject to the rules of such contract... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforcement of contract market...

  8. 78 FR 44806 - Amendments to Regulation D, Form D and Rule 156

    Science.gov (United States)

    2013-07-24

    ... and Exchange Commission, which today in separate releases amended Rule 506 of Regulation D, Form D and Rule 144A under the Securities Act of 1933 to implement Section 201(a) of the Jumpstart Our Business..., 100 F Street, NE., Washington, DC 20549 on official business days between the hours of 10:00 a.m. and...

  9. Administrative review process for adjudicating initial disability claims. Final rule.

    Science.gov (United States)

    2006-03-31

    The Social Security Administration is committed to providing the high quality of service the American people expect and deserve. In light of the significant growth in the number of disability claims and the increased complexity of those claims, the need to make substantial changes in our disability determination process has become urgent. We are publishing a final rule that amends our administrative review process for applications for benefits that are based on whether you are disabled under title II of the Social Security Act (the Act), or applications for supplemental security income (SSI) payments that are based on whether you are disabled or blind under title XVI of the Act. We expect that this final rule will improve the accuracy, consistency, and timeliness of decision-making throughout the disability determination process.

  10. TEDXCERN BREAKS THE RULES

    CERN Multimedia

    CERN, Bulletin

    2015-01-01

    On Friday, 9 October, TEDxCERN brought together 14 ‘rule-breakers’ to explore ideas that push beyond the boundaries of academia. They addressed a full house of 600 audience members, as well as thousands watching the event online.

  11. Crispen's Five Antivirus Rules.

    Science.gov (United States)

    Crispen, Patrick Douglas

    2000-01-01

    Provides rules for protecting computers from viruses, Trojan horses, or worms. Topics include purchasing commercial antivirus programs and keeping them updated; updating virus definitions weekly; precautions before opening attached files; macro virus protection in Microsoft Word; and precautions with executable files. (LRW)

  12. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the m...

  13. Do Fiscal Rules Matter?

    DEFF Research Database (Denmark)

    Grembi, Veronica; Nannicini, Tommaso; Troiano, Ugo

    2016-01-01

    Fiscal rules are laws aimed at reducing the incentive to accumulate debt, and many countries adopt them to discipline local governments. Yet, their effectiveness is disputed because of commitment and enforcement problems. We study their impact applying a quasi-experimental design in Italy. In 199...

  14. Rule and rupture

    DEFF Research Database (Denmark)

    Lund, Christian; Eilenberg, Michael

    This policy brief contributes to a novel understanding of public authority and state formation. It draws on a recent publication, Rule and Rupture, edited by Christian Lund and Michael Eilenberg (2016), and argues that public authority is not simply given but constituted through social contracts...

  15. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  16. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  17. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  18. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  19. Design Principles for Security

    National Research Council Canada - National Science Library

    Benzel, Terry V; Irvine, Cynthia E; Levin, Timothy E; Bhaskara, Ganesha; Nguyen, Thuy D; Clark, Paul C

    2005-01-01

    As a prelude to the clean-slate design for the SecureCore project, the fundamental security principles from more than four decades of research and development in information security technology were reviewed...

  20. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  1. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  2. 76 FR 9067 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Science.gov (United States)

    2011-02-16

    ... Exchange Rule 1014(b) as a regular member or a foreign currency options participant of the Exchange located... Securities Exchange, LLC's (``ISE'') Schedule of Fees, specifically ISE's Select Symbols and the rates... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63880; File No. SR-Phlx-2011-12] Self...

  3. Privacy and security of patient data in the pathology laboratory

    Directory of Open Access Journals (Sweden)

    Ioan C Cucoranu

    2013-01-01

    Full Text Available Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI. In the United States, the Health Insurance Portability and Accountability Act (HIPAA govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  4. Privacy and security of patient data in the pathology laboratory.

    Science.gov (United States)

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  5. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  6. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  7. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  8. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  9. A Game-Theoretical Approach to Multimedia Social Networks Security

    Science.gov (United States)

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  10. A game-theoretical approach to multimedia social networks security.

    Science.gov (United States)

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  11. Verification of business rules programs

    CERN Document Server

    Silva, Bruno Berstel-Da

    2013-01-01

    Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs.  This book is on business rules programs, that is, rule programs as handled in business rules management systems. Its

  12. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  13. LHCb: DIRAC Secure Distributed Platform

    CERN Multimedia

    Casajus, A

    2009-01-01

    DIRAC, the LHCb community grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by us...

  14. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  15. Commission on Social Security

    CERN Document Server

    Staff Association

    2010-01-01

    A commission studying past, present, and future social stakes ! For many years we have been hearing about the problems of funding of health insurance benefits in our different Member States. At CERN we are not totally immune from this problem.  To start with, let us recall that we have a mutual-benefit scheme which covers everyone for the consequences of the uncertainties in life (illness and accidents). The rules of our scheme are established by CERN in the framework of a sub-group of the Standing Concertation Committee, the CERN Health Insurance Scheme Board (CHISB), which is also in charge of managing the scheme.  The work of the “ProtSoc” (Protection Sociale – Social Security) commission, as we like to call it at the Staff Association, is to help your representatives on the CHISB, by preparing together with them the subjects and positions to be put forward and defended. This commission, which groups together the staff delegates who wish to invest their ...

  16. Security affects us all!

    CERN Multimedia

    SMB Department

    2016-01-01

    In the hope of minimising the number of thefts of the Organization’s property, which can lead to months of work going to waste on certain projects, you are reminded of the importance that CERN attaches to the rules concerning the protection of equipment for which we are responsible. If you see any unusual behaviour or if you are the victim of a theft, don’t hesitate to report it by submitting a ticket through the CERN Portal or calling the CSA. Security affects us all!   CERN is attractive in more ways than one, and it remains as attractive as ever to thieves. With the nice weather and with the holiday season in full swing, the number of thefts recorded at CERN is on the rise. Items stolen include money, computers, electronic equipment, cable drums and copper antennae.   There are a few basic precautions that you should take to protect both your own and the Organization’s property: lock your door, don’t leave valuable items in your office, st...

  17. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  18. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  19. Convention on nuclear safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    1998-01-01

    The document presents the Rules of Procedure and Financial Rules that apply mutatis mutandis to any meeting of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/449) convened in accordance with Chapter 3 of the Convention. It includes four parts: General provisions, Preparatory process for review meetings, Review meetings, and Amendment and interpretation of rules

  20. Deciphering Unwritten Rules

    Directory of Open Access Journals (Sweden)

    Anna Sandgren

    2012-12-01

    Full Text Available The aim of this study was to develop a classic grounded theory of patients, relatives and nurses in palliative cancer care. Data from three earlier studies conducted in palliative care were analyzed. “Deciphering unwritten rules” emerged as the pattern of behavior through which patients, relatives and nurses are dealing with the uncertainty of how to act and behave in palliative cancer care. Deciphering means finding out what the rules mean and trying to interpret them and this can be done consciously or unnoticed. Deciphering unwritten rules involves the strategies figuring out, deliberating, maneuvering and evaluating. This theory demonstrates the complexities of palliative care and the importance of knowledge, counseling and resources for all involved.

  1. Ontology in association rules.

    Science.gov (United States)

    Ferraz, Inhaúma Neves; Garcia, Ana Cristina Bicharra

    2013-01-01

    Data mining has emerged to address the problem of transforming data into useful knowledge. Although most data mining techniques, such as the use of association rules, may substantially reduce the search effort over large data sets, often, the consequential outcomes surpass the amount of information humanly manageable. On the other hand, important association rules may be overlooked owing to the setting of the support threshold, which is a very subjective metric, but rooted in most data mining techniques. This paper presents a study on the effects, in terms of precision and recall, of using a data preparation technique, called SemPrune, which is built on domain ontology. SemPrune is intended for pre- and post-processing phases of data mining. Identifying generalization/specialization relations, as well as composition/decomposition relations, is the key to successfully applying SemPrune.

  2. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  3. Peace, Security, Globalisation & Cultural Diplomacy

    Directory of Open Access Journals (Sweden)

    Ashok Natarajan

    2017-06-01

    Full Text Available This article argues for a positive, comprehensive conception of peace that goes beyond the mere absence of war and a more integrated conception of human security that encompasses a wider range of issues than threats of physical violence. Education is one of humanity’s most effective social institutions for redirecting the violent physical energies of destruction into higher avenues of civilization and culture as an instrument of conscious social evolution. Organization is knowledge of higher accomplishment. Organization has the power to vastly accelerate and multiply the potentials of education for the promotion of peace and security. Peace and Security have a mutually reinforcing effect on each other in the sense that peace results in security while security results in peace. Physical violence eventually led to the development of the knowledge needed for the avoidance of violence by means of diplomacy, trade and cultural exchanges, marking the beginning of the transition from the physical to the mental level of evolution. Trade requires travel, transport, human interaction, exchange, trust with respect to products, and reliable mechanisms for the exchange of a stable currency that can only be effectively founded on an enduring peace that generates confidence among the traders. Isolated communities evolve a communal consciousness as they mature into organized social units founded on shared customs and culture, which later develop into a common legal framework. What began as diplomacy so many centuries ago has now evolved into a near universal recognition of fundamental human rights and the rule of law. The evolution of diplomacy in previous centuries is the foundation for the remarkable betterment of human life witnessed in recent times. The world is in the process of evolving a unifying global culture founded on universal values and recognition of the rich contributions of different cultures to humanity’s progress. As physical force once

  4. Poland under "Solidarity" Rule

    OpenAIRE

    Stanislaw Wellisz

    1991-01-01

    The coalition cabinet in which Solidarity played a leading role, but which also included Communists and their allies, won Parliamentary approval on September 12, 1989. This coalition inherited from the Communists an economy in deep crisis: inflation was raging, shortages of virtually all goods were rampant, and the black market was all-pervasive. The new government pledged to restore the market economy. This paper discusses the economy under Solidarity rule, focusing on stabilization and the ...

  5. Rules of Deception

    DEFF Research Database (Denmark)

    Juhlin, Jonas

    In all wars, deception has been an important element for the military planners, on both the tactical level and the operational level. The good, effective deception operation is of great risk of conflicting with the current Laws of Armed Conflicts, which will be of great concern for the deception ......, the paper will discuss how the inclusion of mission specific rules of deception can greatly help define the boundaries, and give necessary guide lines for conducting deception operations within the laws of armed conflict....

  6. Materials for the information security education

    International Nuclear Information System (INIS)

    Yashiro, Shigeo; Aoki, Kazuhisa; Sato, Tomohiko; Tanji, Kazuhiro

    2014-01-01

    With the rapid progress of the utilization of Information Technology (IT), IT infrastructure (network environment and information system) became crucial as a lifeline for promoting business. At the same time, changes in the circumstances surrounding the IT infrastructure globalize the threat of cyber attacks and increase the risk of the information security such as unlawful access to an information system, viral infection, an alteration of a website, disclosure of subtlety information, destruction of an information system and so on. Information security measure is an important issue in Japan Atomic Energy Agency (JAEA). In order to protect the information property of JAEA from the threat, Center for Computational Science and e-Systems (CCSE) has been taking triadic measures for information security: (1) to lay down a set of information security rules, (2) to introduce security equipments to backbone network and (3) to provide information security education. This report is a summary of the contents of the information security education by e-learning. (author)

  7. The Exception Proves the Rule

    OpenAIRE

    Holton, Richard

    2010-01-01

    Legal rules admit of exceptions; indeed, it has been a legal maxim that one can infer the existence of a rule from exceptions that are made to it. Hart claims that the exceptions do not admit of exhaustive statement (a form of legal particularism) but that nonetheless rules can bind. This paper develops a logical framework which accommodates this position, shows that it is available to a positivist, elucidates the role of rules within it, and concludes by discussing the relevan...

  8. The Effect of International Trade on Rule of Law

    Directory of Open Access Journals (Sweden)

    Junsok Yang

    2013-03-01

    Full Text Available In this paper, we look at the relationship between international trade and the rule of law, using the World Justice Project Rule of Law Index, which include index figures on human rights, limits on government powers, transparency and regulatory efficiency. Based on regression analyses using the rule of law index figures and international trade figures (merchandise trade, service trade, exports and importsIn this paper, we look at the relationship between international trade and the rule of law, using the World Justice Project Rule of Law Index, which include index figures on human rights, limits on government powers, transparency and regulatory efficiency. Based on regression analyses using the rule of law index figures and international trade figures (merchandise trade, service trade, exports and imports as percentage of GDP, international trade and basic human rights seem to have little relationship; but trade has a close positive relationship with strong order and security. Somewhat surprisingly, regulatory transparency and effective implementation seems to have little or no effect on international trade and vice versa. International trade shows a clear positive relationship with the country’s criminal justice system, but the relationship with the civil justice system is not as clear as such. For regulatory implementation and civil justice, services trade positively affect these institutions, but these institutions in turn affect exports more strongly than services trade. Finally, the effect of trade on rule of law is stronger on a medium to long term (10-20 year time horizon.

  9. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  10. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  11. 17 CFR 250.52 - Exemption of issue and sale of certain securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of... sale of any security, of which it is the issuer if: (1) The issue and sale of the security are solely.... 79f(a)) and related rules with respect to the issue and sale of any security of which it is the issuer...

  12. Security Sector Reform in Kosovo: From institutional transitions to the democratic consolidation

    OpenAIRE

    Dr.Sc. Bekim Baliqi

    2012-01-01

    This article explores the relationship between Security Sector Reform (SSR) and institutional transition in post-conflict countries, drawing on a case study of Kosovo. The study focuses on the institution-building of core security institutions and the role of international community in Sector Security Reform in Kosovo, reviewing the ways in which security, the rule of law and political context have been intertwined. The article first outlines the context of the international mission in Kosovo...

  13. Proof Rules for Recursive Procedures

    NARCIS (Netherlands)

    Hesselink, Wim H.

    1993-01-01

    Four proof rules for recursive procedures in a Pascal-like language are presented. The main rule deals with total correctness and is based on results of Gries and Martin. The rule is easier to apply than Martin's. It is introduced as an extension of a specification format for Pascal-procedures, with

  14. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  15. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  16. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  17. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  18. WORKSTATION SECURITY ENSURANCE

    OpenAIRE

    Hudoklin, Alenka; Stadler, Alenka

    1998-01-01

    A methodology for the ensured security of a workstation connected in a computer network with in an organization is presented. A technique for the determination of the required security level for a workstation's tangible and intangible components is described. A set of security measures for each security level of the workstation's tangible and intangible components is selected. The methodology is applied to workstations in the computer network of a Slovenian state agency. The required security...

  19. Vehicle security encryption based on unlicensed encryption

    Science.gov (United States)

    Huang, Haomin; Song, Jing; Xu, Zhijia; Ding, Xiaoke; Deng, Wei

    2018-03-01

    The current vehicle key is easy to be destroyed and damage, proposing the use of elliptical encryption algorithm is improving the reliability of vehicle security system. Based on the encryption rules of elliptic curve, the chip's framework and hardware structure are designed, then the chip calculation process simulation has been analyzed by software. The simulation has been achieved the expected target. Finally, some issues pointed out in the data calculation about the chip's storage control and other modules.

  20. Removal of regulations on black lung benefits. Final rule.

    Science.gov (United States)

    2012-03-30

    This final rule removes regulations on the Black Lung program from the Social Security Administration's (SSA) chapter of the Code of Federal Regulations (CFR). The Black Lung Consolidation of Administrative Responsibility Act transferred the responsibility for administering Part B of the Black Lung benefits program from SSA to the Department of Labor (DOL), and we are removing the regulations in recognition of the fact that we are no longer responsible for administering any aspect of the Part B Black Lung program. DOL concurs with this final rule removing the regulations.

  1. Combining security risk assessment and security testing

    OpenAIRE

    Großmann, Jürgen; Seehusen, Fredrik

    2014-01-01

    Complex networked systems have become an integral part of our supply infrastructure. Mobile devices, home automation, smart grids and even vehicles are connected via the Internet and becoming accessible and thus vulnerable to hacker attacks. While the number of security incidents drastically increases, we are more than ever dependent on a secure and mature ICT infrastructure. One of the keys to maintain such a secure and dependable infrastructure are mature, systematic and capable proactive m...

  2. Business rules for creating process flexibility : Mapping RIF rules and BDI rules

    NARCIS (Netherlands)

    Gong, Y.; Overbeek, S.J.; Janssen, M.

    2011-01-01

    Business rules and software agents can be used for creating flexible business processes. The Rule Interchange Format (RIF) is a new W3C recommendation standard for exchanging rules among disparate systems. Yet, the impact that the introduction of RIF has on the design of flexible business processes

  3. New Games, New Rules

    DEFF Research Database (Denmark)

    Constantiou, Ioanna; Kallinikos, Jannis

    2015-01-01

    , the usefulness of big data rests on their steady updatability, a condition that reduces the time span within which this data is useful or relevant. Jointly, these attributes challenge established rules of strategy making as these are manifested in the canons of procuring structured information of lasting value...... that addresses specific and long-term organizational objectives. The developments underlying big data thus seem to carry important implications for strategy making, and the data and information practices with which strategy has been associated. We conclude by placing the understanding of these changes within...

  4. Post Rule of Law

    DEFF Research Database (Denmark)

    Carlson, Kerstin Bree

    2016-01-01

    inception at Nuremberg, individual elements of hybridity have consistently caused concern amongst practitioners and legal theorists, largely around questions of transposition as jurists from one tradition resisted practices from the other. Transposition problems remain unresolved in modern ICP and have...... addresses the practice of hybridity in ICP, drawing examples from the construction and evolution of hybrid procedure at the International Criminal Tribunal for the Former Yugoslavia (ICTY), to argue that the hybridity practiced by international criminal tribunals renders them ‘post rule of law’ institutions...

  5. Description logic rules

    CERN Document Server

    Krötzsch, M

    2010-01-01

    Ontological modelling today is applied in many areas of science and technology,including the Semantic Web. The W3C standard OWL defines one of the most important ontology languages based on the semantics of description logics. An alternative is to use rule languages in knowledge modelling, as proposed in the W3C's RIF standard. So far, it has often been unclear how to combine both technologies without sacrificing essential computational properties. This book explains this problem and presents new solutions that have recently been proposed. Extensive introductory chapters provide the necessary

  6. Ruling by Record

    DEFF Research Database (Denmark)

    Nuijten, Monique; Lorenzo, David

    2009-01-01

    This contribution looks at land property relations in a peasant community in the central highlands of Peru. Rather than using a rights-based approach, the authors propose a `practice force field approach' for their analysis of property relations under communal land tenure regimes. Their study...... combines qualitative ethnographic case studies with quantitative analysis of data on land distribution. In contrast to rights-based approaches, this perspective understands the legal discourses that people draw upon to explain property relations as `justifying rule talk' rather than the reflection...

  7. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. The Product and Quotient Rules Revisited

    Science.gov (United States)

    Eggleton, Roger; Kustov, Vladimir

    2011-01-01

    Mathematical elegance is illustrated by strikingly parallel versions of the product and quotient rules of basic calculus, with some applications. Corresponding rules for second derivatives are given: the product rule is familiar, but the quotient rule is less so.

  10. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  11. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  12. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...... as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism....

  13. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  14. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  15. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  16. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  17. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  18. Growing U.S. Security Interests In Central Asia

    Science.gov (United States)

    2002-10-01

    underpinning U.S. policy toward Central Asia . These included establishing the rule of law in an effort to combat crime and corruption , creating a...GROWING U.S. SECURITY INTERESTS IN CENTRAL ASIA Elizabeth Wishnick October 2002 Report Documentation Page Report Date 00Oct2002 Report Type N/A...Dates Covered (from... to) - Title and Subtitle Growing U.S. Security Interests In Central Asia Contract Number Grant Number Program Element Number

  19. Security Belt for Wireless Implantable Medical Devices.

    Science.gov (United States)

    Kulaç, Selman

    2017-09-19

    In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.

  20. Capacity Credit and Security of Supply

    DEFF Research Database (Denmark)

    Chozas, Julia Fernandez; Mathiesen, Brian Vad

    2015-01-01

    This paper addresses the question of how renewable energies can contribute to security of supply. In order to analyse this subject, the paper has two differentiated parts. In the first part, the concept of security of supply is reviewed. This provides the baseline to understand how current...... electricity systems are planned, and how renewable energies fit in these systems. The second part of the article assesses the actual contribution that variable renewable energies can make to security of supply, firstly from a qualitative point of view and secondly in measurable terms. The study is based...... demand for electricity is highest, the study focuses on the capacity credit of future Danish scenarios including high penetrations of offshore wind, onshore wind, wave and solar PV. The results of this project can ultimately lead towards the improvement of existing rules and methods in system planning...

  1. Air traffic security act unconstitutional; Luftsicherheitsgesetz verfassungswidrig

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2006-05-15

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1{sup st} Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  2. 75 FR 2915 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2010-01-19

    ...-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Market Data Fees January 8, 2010. I. Introduction On November 25, 2009, the International... subscription fees for the sale of three [[Page 2916

  3. 75 FR 33506 - Safety and Security Zones; Tall Ships Challenge 2010, Great Lakes, Cleveland, OH, Bay City, MI...

    Science.gov (United States)

    2010-06-14

    ...-AA87 Safety and Security Zones; Tall Ships Challenge 2010, Great Lakes, Cleveland, OH, Bay City, MI...: Temporary final rule. SUMMARY: The Coast Guard is establishing temporary safety and security zones around... Safety and Security Zones; Tall Ships Challenge [[Page 33507

  4. 76 FR 50407 - Addition of Persons Acting Contrary to the National Security or Foreign Policy Interests of the...

    Science.gov (United States)

    2011-08-15

    ... to the national security or foreign policy interests of the United States. These persons will be... national security or foreign policy interests of the United States) of the EAR. Second, this rule... security or foreign policy interests of the United States and those acting on behalf of such persons may be...

  5. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  6. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Science.gov (United States)

    2010-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer included in the index is an equity security, as defined in section... its outstanding common equity held by non-affiliates of $71 million or more; (C) The issuer of the...

  7. Medicare program; final waivers in connection with the shared savings program; continuation of effectiveness and extension of timeline for publication of final rule. Interim final rule; continuation of effectiveness and extension of timeline for publication of final rule.

    Science.gov (United States)

    2014-10-17

    This document announces the continuation of effectiveness of an interim final rule and the extension of the timeline for publication of the final rule. This document is issued in accordance with section 1871(a)(3)(C) of the Social Security Act (the Act), which allows an interim final rule to remain in effect after the expiration of the timeline specified in section 1871(a)(3)(B) of the Act if the Secretary publishes a notice of continuation prior to the expiration of the timeline.

  8. 32 CFR 324.6 - Procedural rules.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Procedural rules. 324.6 Section 324.6 National... DFAS PRIVACY ACT PROGRAM Systems of Records § 324.6 Procedural rules. DFAS procedural rules... first as a proposed rule to allow for public comment and then as a final rule. Procedural rules will be...

  9. Ruled Laguerre minimal surfaces

    KAUST Repository

    Skopenkov, Mikhail

    2011-10-30

    A Laguerre minimal surface is an immersed surface in ℝ 3 being an extremal of the functional ∫ (H 2/K-1)dA. In the present paper, we prove that the only ruled Laguerre minimal surfaces are up to isometry the surfaces ℝ (φλ) = (Aφ, Bφ, Cφ + D cos 2φ) + λ(sin φ, cos φ, 0), where A,B,C,D ε ℝ are fixed. To achieve invariance under Laguerre transformations, we also derive all Laguerre minimal surfaces that are enveloped by a family of cones. The methodology is based on the isotropic model of Laguerre geometry. In this model a Laguerre minimal surface enveloped by a family of cones corresponds to a graph of a biharmonic function carrying a family of isotropic circles. We classify such functions by showing that the top view of the family of circles is a pencil. © 2011 Springer-Verlag.

  10. The biosphere rules.

    Science.gov (United States)

    Unruh, Gregory C

    2008-02-01

    Sustainability, defined by natural scientists as the capacity of healthy ecosystems to function indefinitely, has become a clarion call for business. Leading companies have taken high-profile steps toward achieving it: Wal-Mart, for example, with its efforts to reduce packaging waste, and Nike, which has removed toxic chemicals from its shoes. But, says Unruh, the director of Thunderbird's Lincoln Center for Ethics in Global Management, sustainability is more than an endless journey of incremental steps. It is a destination, for which the biosphere of planet Earth--refined through billions of years of trial and error--is a perfect model. Unruh distills some lessons from the biosphere into three rules: Use a parsimonious palette. Managers can rethink their sourcing strategies and dramatically simplify the number and types of materials their companies use in production, making recycling cost-effective. After the furniture manufacturer Herman Miller discovered that its leading desk chair had 200 components made from more than 800 chemical compounds, it designed an award-winning successor whose far more limited materials palette is 96% recyclable. Cycle up, virtuously. Manufacturers should design recovery value into their products at the outset. Shaw Industries, for example, recycles the nylon fiber from its worn-out carpet into brand-new carpet tile. Exploit the power of platforms. Platform design in industry tends to occur at the component level--but the materials in those components constitute a more fundamental platform. Patagonia, by recycling Capilene brand performance underwear, has achieved energy costs 76% below those for virgin sourcing. Biosphere rules can teach companies how to build ecologically friendly products that both reduce manufacturing costs and prove highly attractive to consumers. And managers need not wait for a green technological revolution to implement them.

  11. Social Security Administration

    Science.gov (United States)

    ... a my Social Security account. Newsroom Social Security's Fiscal Year (FY) 2017 Agency Financial Report (AFR) Our ... Us Accessibility FOIA Open Government Glossary Privacy Report Fraud, Waste or Abuse Site Map Other Government Websites: ...

  12. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard......’ experiences of security influence the way they make sense of, assess, and handle IT security mechanisms. Moreover, I studied cases in which the users handled IT security sensitive technology in a secure way, but still had unwanted experiences of security. Through the developed design methods I was able...... to activate and access study participants’ prior experiences of making sense of IT security sensitive technology. Moreover, the methods helped clarify users’ immediate experience in an encounter with IT security sensitive technology. The findings were integrated into the design of a digital signature solution...

  13. Privatising security and war

    Directory of Open Access Journals (Sweden)

    José L Gómez del Prado

    2011-03-01

    Full Text Available State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  14. Privatising security and war

    OpenAIRE

    José L Gómez del Prado

    2011-01-01

    State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  15. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  16. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  17. Air Cargo Security

    Science.gov (United States)

    2007-07-30

    security identification display areas ( SIDAs ). This effectively elevates the required security measures for these cargo handling areas and requires...monitoring. Additional technologies, such as computer algorithms for highlighting potential threat objects, may also be considered to aid human observers

  18. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  19. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  20. Atomic Energy (factories) rules: 1988

    International Nuclear Information System (INIS)

    1988-01-01

    These rules are made by the Central Government under the Factories Act, 1948 and extend to all factories engaged in carrying out the purposes of the Atomic Energy Act, 1962. The rules cover the requirements of inspecting staff, health aspects, personnel safety, personnel welfare, working hours, employment of young persons, special provisions in case of dangerous manufacturing processes or operations, supplemental rules for administrative aspects and special powers of competent authority. (M.G.B.)

  1. I6-FPS: Automating the ICMPv6 Filtering Rules

    Directory of Open Access Journals (Sweden)

    Wan Ali Wan Nor Ashiqin

    2018-01-01

    Full Text Available Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6 when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP is aggressively filtered by a network administrator while in IPv6, ICMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. While conducting the attack scenarios testing, IPv6-Filtering Prototype System (I6-FPS was developed to overcome the deficiency and limited filtering tools that supported IPv6 filtering rules (ip6table. I6-FPS is used to automate and simplify the writing of ip6table and it was developed using PHP5 and Shell script languages. This research revealed that I6-FPS is significant in the initial phase of securing IPv6 deployment as well as focusing on the ICMPv6 filtering rules. The I6-FPS has the potential to be enhanced and developed over time by including more functions to that system in generating specific filtering ip6table rules.

  2. European union mission for the rule of law in Kosovo

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Bejtush Gashi

    2011-12-01

    Full Text Available Here we have studied the international circumstances that have affected the deployment of the EULEX Mission in Kosovo. The EULEX mission is the European Union Mission for the Rule of Law in Kosovo. Its main goal is to advise, assist and support the Kosovo authorities in issues of the rule of law, especially in the field of police, judiciary and customs performance. Also this mission has the responsibility to develop and further strengthen the independent multi-ethnic justice system in Kosovo, by ensuring that the rule of law institutions are not politically influenced and that they meet the known international standards and best European practices. This mission was foreseen to be deployed to Kosovo, based on the Ahtissari Comprehensive Status Proposal for Kosovo, but due to its non-approval by the UN Security Council, its full implementation was delayed until December 2008. EULEX acts within the framework of Resolution 1244 of the UN Security Council and under a single chain of command in Brussels. EULEX officials have supported Kosovo Police, the Judiciary system and Kosovo Customs, through MMA actions for achieving objectives and goals that are foreseen by the program strategy of EULEX. But in terms of efficiency, EULEX has only achieved modest results. In the northern part of Kosovo, EULEX has failed, as a result of its ambivalent mandate and incoherence of EU Foreign and Security Policy.

  3. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  4. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  5. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  6. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  7. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  8. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  9. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  10. Introduction to Hardware Security

    OpenAIRE

    Yier Jin

    2015-01-01

    Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain an...

  11. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  12. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  13. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  14. Admissibility of logical inference rules

    CERN Document Server

    Rybakov, VV

    1997-01-01

    The aim of this book is to present the fundamental theoretical results concerning inference rules in deductive formal systems. Primary attention is focused on: admissible or permissible inference rules the derivability of the admissible inference rules the structural completeness of logics the bases for admissible and valid inference rules. There is particular emphasis on propositional non-standard logics (primary, superintuitionistic and modal logics) but general logical consequence relations and classical first-order theories are also considered. The book is basically self-contained and

  15. Ranking Cases with Classification Rules

    Science.gov (United States)

    Zhang, Jianping; Bala, Jerzy W.; Hadjarian, Ali; Han, Brent

    Many real-world machine learning applications require a ranking of cases, in addition to their classification. While classification rules are not a good representation for ranking, the human comprehensibility aspect of rules makes them an attractive option for many ranking problems where such model transparency is desired. There have been numerous studies on ranking with decision trees, but not many on ranking with decision rules. Although rules are similar to decision trees in many respects, there are important differences between them when used for ranking. In this chapter, we propose a framework for ranking with rules. The framework extends and substantially improves on the reported methods for ranking with decision trees. It introduces three types of rule-based ranking methods: post analysis of rules, hybrid methods, and multiple rule set analysis. We also study the impact of rule learning bias on the ranking performance. While traditional measures used for ranking performance evaluation tend to focus on the entire rank ordered list, the aim of many ranking applications is to optimize the performance on only a small portion of the top ranked cases. Accordingly, we propose a simple method for measuring the performance of a classification or ranking algorithm that focuses on these top ranked cases. Empirical studies have been conducted to evaluate some of the proposed methods.

  16. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper

    Directory of Open Access Journals (Sweden)

    William R. Simpson

    2016-04-01

    Full Text Available Increasing threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to put in place steel gates and prevent hostile entities from entering the enterprise domain. The current complexity level has made the fortress approach to security implemented throughout the defense, banking, and other high trust industries unworkable. The alternative security approach presented in this paper is the result of a concentrated fourteen year program of pilots and research. Its distributed approach has no need for passwords or accounts and derives from a set of tenets that form the basic security model requirements. At each step in the process it determines identities and claims for access and privileges. These techniques are resilient, secure, extensible, and scalable. They are currently being implemented for a major enterprise, and are a candidate for other enterprise security approaches. This paper discusses the Enterprise Level Security architecture, a web-based security architecture designed to select and incorporate technology into a cohesive set of policies and rules for an enterprise information system. The paper discusses the history, theoretical underpinnings, implementation decisions, current status, and future plans for expansion of capabilities and scale.

  17. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  18. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  19. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  20. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  1. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  2. Challenges for Rule Systems on the Web

    Science.gov (United States)

    Hu, Yuh-Jong; Yeh, Ching-Long; Laun, Wolfgang

    The RuleML Challenge started in 2007 with the objective of inspiring the issues of implementation for management, integration, interoperation and interchange of rules in an open distributed environment, such as the Web. Rules are usually classified as three types: deductive rules, normative rules, and reactive rules. The reactive rules are further classified as ECA rules and production rules. The study of combination rule and ontology is traced back to an earlier active rule system for relational and object-oriented (OO) databases. Recently, this issue has become one of the most important research problems in the Semantic Web. Once we consider a computer executable policy as a declarative set of rules and ontologies that guides the behavior of entities within a system, we have a flexible way to implement real world policies without rewriting the computer code, as we did before. Fortunately, we have de facto rule markup languages, such as RuleML or RIF to achieve the portability and interchange of rules for different rule systems. Otherwise, executing real-life rule-based applications on the Web is almost impossible. Several commercial or open source rule engines are available for the rule-based applications. However, we still need a standard rule language and benchmark for not only to compare the rule systems but also to measure the progress in the field. Finally, a number of real-life rule-based use cases will be investigated to demonstrate the applicability of current rule systems on the Web.

  3. Amendments to excepted benefits. Final rules.

    Science.gov (United States)

    2014-10-01

    This document contains final regulations that amend the regulations regarding excepted benefits under the Employee Retirement Income Security Act of 1974, the Internal Revenue Code (the Code), and the Public Health Service Act. Excepted benefits are generally exempt from the health reform requirements that were added to those laws by the Health Insurance Portability and Accountability Act and the Patient Protection and Affordable Care Act. In addition, eligibility for excepted benefits does not preclude an individual from eligibility for a premium tax credit under section 36B of the Code if an individual chooses to enroll in coverage under a Qualified Health Plan through an Affordable Insurance Exchange. These regulations finalize some but not all of the proposed rules with minor modifications; additional guidance on limited wraparound coverage is forthcoming.

  4. 78 FR 68111 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing of Proposed Rule Change, as...

    Science.gov (United States)

    2013-11-13

    ... entered by ATP Holders. \\7\\ Under Rules 980NY(c)(i)-(iii), incoming orders or quotes, or those residing in... ATP Holder During the Trading Day November 6, 2013. Pursuant to Section 19(b)(1) of the Securities... (``Commission'') the proposed rule change as described in Items I, II, and III below, which Items have been...

  5. 76 FR 38226 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing of Proposed Rule Change...

    Science.gov (United States)

    2011-06-29

    ... than the proposed execution price; and (B) on the BOX Book within a depth of the BOX Book so that it... Customer Orders that are within a depth of the BOX Book so that they would otherwise trade with the Agency... prescribed within the BOX Rules. \\4\\ See, e.g., International Securities Exchange Rule 716 and Chicago Board...

  6. 76 FR 76205 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Relating...

    Science.gov (United States)

    2011-12-06

    ... Shares \\3\\ (``Shares'') under NYSE Arca Equities Rule 8.600: Russell Global Opportunity ETF; Russell Bond... and Trading of the Russell Global Opportunity ETF; Russell Bond ETF; and Russell Real Return ETF Under NYSE Arca Equities Rule 8.600 December 1, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange...

  7. 76 FR 80410 - Pendency of Request for Approval of Special Withdrawal Liability Rules; the Cultural Institutions...

    Science.gov (United States)

    2011-12-23

    ...This notice advises interested persons that the Pension Benefit Guaranty Corporation (``PBGC'') has received a request from The Cultural Institutions Pension Plan for approval of a plan amendment providing for special withdrawal liability rules. Under Sec. 4203(f) of the Employee Retirement Income Security Act of 1974 and PBGC's regulation on Extension of Special Withdrawal Liability Rules, a multiemployer pension plan may, with PBGC approval, be amended to provide for special withdrawal liability rules similar to those that apply to the construction and entertainment industries. Such approval is granted only if PBGC determines that the rules apply to an industry with characteristics that make use of the special rules appropriate and that the rules will not pose a significant risk to PBGC. Before granting an approval, PBGC's regulations require PBGC to give interested persons an opportunity to comment on the request. The purpose of this notice is to advise interested persons of the request and to solicit their views on it.

  8. On Friedrich Hayek and Taxation: Rationality, Rules, and Majority Rule

    OpenAIRE

    Spicer, Michael W.

    1995-01-01

    Explores the implications of the work of the late Friedrich Hayek for taxation policy. Examines Hayek's writings on the limits of rationality, the role of rules, and the limits of majority rule. Argues that Hayek's work provides general support for broad-based nondiscrimnatory tax policies but can be interpreted as cautioning against either radical or frequent changes in tax policy.

  9. Convention on nuclear safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    1999-01-01

    The document is the first revision of the Rules of Procedures and Financial Rules that apply mutatis mutandis to any meetings of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/573), convened in accordance with the Chapter 3 of the Convention

  10. Convention on Nuclear Safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    2002-01-01

    The document is the second revision of the Rules of Procedures and Financial Rules that apply mutatis mutandis to any meetings of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/573), convened in accordance with the Chapter 3 of the Convention

  11. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  12. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  13. 76 FR 51089 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of Proposed Rule Change To...

    Science.gov (United States)

    2011-08-17

    ... Price, as noted in the table found under Rule 11.17(c)(1).\\8\\ The Reference Price, for purposes of Rule... Trading Pause Trigger Price.\\9\\ \\8\\ Pursuant to Rule 11.17(c)(1), a security with a Reference Price of... Reference Price of greater than $25.00 and up to and including $50.00 is subject to a 5% threshold; and a...

  14. AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    R Poorva Devi

    2016-04-01

    Full Text Available So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP. However cloud is providing one of the services is, security-as-a-service to its clients, still people are terrified to use the service from cloud vendor. Number of solutions, security components and measurements are coming with the new scope for the cloud security issue, but 79.2% security outcome only obtained from the different scientists, researchers and other cloud based academy community. To overcome the problem of cloud security the proposed model that is, “Quality based Enhancing the user data protection via fuzzy rule based systems in cloud environment”, will helps to the cloud clients by the way of accessing the cloud resources through remote monitoring management (RMMM and what are all the services are currently requesting and consuming by the cloud users that can be well analyzed with Managed service provider (MSP rather than a traditional CSP. Normally, people are trying to secure their own private data by applying some key management and cryptographic based computations again it will direct to the security problem. In order to provide good quality of security target result by making use of fuzzy rule based systems (Constraint & Conclusion segments in cloud environment. By using this technique, users may obtain an efficient security outcome through the cloud simulation tool of Apache cloud stack simulator.

  15. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  16. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  17. Secure Transportation Management

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  19. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  20. 76 FR 7884 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2011-02-11

    ... rules (e.g., proprietary traders). See Notice, p. 16; 75 FR 80091, at 80095. See also Securities... register with ISE every associated person acting in the capacity of a sole proprietor, officer, partner...\\ Proposed Supplementary Material to Rule 313.07 exempts members that are sole proprietors from this...

  1. 76 FR 72652 - Basis Reporting by Securities Brokers and Basis Determination for Debt Instruments and Options

    Science.gov (United States)

    2011-11-25

    ...: IRS Reports Clearance Officer, SE:W:CAR:MP:T:T:SP, Washington, DC 20224. Comments on the collection of... covered security, including the wash sale and short sale provisions. In addition, the general rules of Sec... is not required to apply the wash sale rules under section 1091 when reporting the sale. However, the...

  2. 75 FR 42802 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-07-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate for Adding...''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on June 28, 2010, the International...

  3. 76 FR 1488 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-01-10

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 28, 2010, the International...

  4. 75 FR 2913 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-01-19

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options...\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 31, 2009, the International...

  5. 75 FR 34499 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-06-17

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate for Adding...\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on May 26, 2010, the International...

  6. 75 FR 44828 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2010-07-29

    ... the SBP process to mitigate risks that the SBP poses to NSCC. \\6\\ 15 U.S.C. 78q-1. B. Self-Regulatory...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Amend Addendum C of Its Rules and Procedures To Implement Risk Enhancements to Its Stock Borrow...

  7. 5 CFR 4.3 - Prohibition against securing withdrawal from competition.

    Science.gov (United States)

    2010-01-01

    ... from competition. 4.3 Section 4.3 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE RULES PROHIBITED PRACTICES (RULE IV) § 4.3 Prohibition against securing withdrawal from competition. No person shall influence another person to withdraw from competition for any position in the competitive...

  8. 77 FR 19401 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change Amending...

    Science.gov (United States)

    2012-03-30

    .... Error positions may result from a technical or systems issue that causes orders to be executed in the... Operation of an Error Account for Arca Securities March 26, 2012. Pursuant to Section 19(b)(1) \\1\\ of the... describe the operation of an error account for Arca Securities. The text of the proposed rule change is...

  9. 76 FR 62118 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Approving a Proposed Rule Change Amending...

    Science.gov (United States)

    2011-10-06

    ... Rule 6.96(b)(2) To Make Permanent the Pilot Program That Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify... program that permits the Exchange to accept inbound orders routed by Archipelago Securities LLC (``Arca...

  10. 76 FR 62119 - Self-Regulatory Organizations; NYSE Arca, Inc; Order Approving a Proposed Rule Change Amending...

    Science.gov (United States)

    2011-10-06

    ... Rule 7.45(c)(2) To Make Permanent the Pilot Program That Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify... program that permits the Exchange to accept inbound orders routed by Archipelago Securities LLC (``Arca...

  11. 76 FR 53513 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule...

    Science.gov (United States)

    2011-08-26

    ... Rule 17(c)(2)(B) To Make Permanent the Pilot Program That Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify... the pilot program that permits the Exchange to accept inbound orders routed by Archipelago Securities...

  12. 76 FR 62125 - Self-Regulatory Organizations; NYSE Amex LLC; Order Approving a Proposed Rule Change Amending...

    Science.gov (United States)

    2011-10-06

    ... Rule 993NY(b)(2) To Make Permanent the Pilot Program that Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify... program that permits the Exchange to accept inbound orders routed by Archipelago Securities LLC (``Arca...

  13. 76 FR 62116 - Self-Regulatory Organizations; NYSE Amex LLC; Order Approving a Proposed Rule Change Amending...

    Science.gov (United States)

    2011-10-06

    ... Rule 17(c)(2)(B) To Make Permanent the Pilot Program That Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify... program that permits the Exchange to accept inbound orders routed by Archipelago Securities LLC (``Arca...

  14. 76 FR 62122 - Self-Regulatory Organizations; New York Stock Exchange LLC; Order Approving a Proposed Rule...

    Science.gov (United States)

    2011-10-06

    ... Rule 17(c)(2)(B) To Make Permanent the Pilot Program That Permits the Exchange To Accept Inbound Orders Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify... existing pilot program that permits the Exchange to accept inbound orders routed by Archipelago Securities...

  15. 75 FR 2902 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing of Proposed Rule Change by...

    Science.gov (United States)

    2010-01-19

    ... market activity altogether. In today's evolving regulatory climate, the Exchange believes that the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61326; File No. SR-Phlx-2009-113] Self... Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...

  16. 76 FR 23221 - Joint Public Roundtable on Issues Related to the Schedule for Implementing Final Rules for Swaps...

    Science.gov (United States)

    2011-04-26

    ... investments in advanced technology that are necessary for us to effectively oversee the futures, options, and... COMMODITY FUTURES TRADING COMMISSION 17 CFR Chapter I SECURITIES AND EXCHANGE COMMISSION 17 CFR... Schedule for Implementing Final Rules for Swaps and Security-Based Swaps Under the Dodd-Frank Wall Street...

  17. 78 FR 40531 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of a Proposed Rule Change...

    Science.gov (United States)

    2013-07-05

    ... technical corrections and amended the proposed rule text to clarify that any CLP Security listed on the Exchange shall be eligible for the CLP Program for the first six months that it is listed on the Exchange... Liquidity Providers to enhance liquidity on the Exchange in all Exchange-listed securities (the ``CLP...

  18. 78 FR 62841 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing of Proposed Rule Change To...

    Science.gov (United States)

    2013-10-22

    ... million, shares of liquidity during the month, which is a higher rate than the base rate of $0.0007 per... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70655; File No. SR-BX-2013-054] Self-Regulatory... Exchange Rule 7018(a) With Respect to Transactions in Securities Priced at $1 per Share or Greater October...

  19. 77 FR 51088 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing of Proposed Rule Change...

    Science.gov (United States)

    2012-08-23

    ... securities'' (also known as Treasury debt securities) means a bond or note or other evidence of indebtedness... are organized as noted. Generally, rules applicable to equity and currency options can currently be... databases providing bond information, including information regarding the listing and/or trading location of...

  20. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three of these ......The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  1. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  2. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  3. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  4. Breaking Rules – Making Bonds

    Indian Academy of Sciences (India)

    IAS Admin

    RESONANCE | January 2016. GENERAL | ARTICLE. Breaking Rules – Making Bonds. A G Samuelson. Boron-containing molecules discovered recently have new types of dative bonds between carbenes and borylenes. At the same time, they show that traditional thumb rules regarding acids and bases are no longer valid.

  5. Revised Rules for Concrete Bridges

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Jensen, F. M.; Middleton, C.

    This paper is based on research performed for the Highway Agency, London, UK under the project DPU/9/44 "Revision of Bridge Assessment Rules Based on Whole Life Performance: Concrete Bridges" It contains details of a methodology which can be used to generate Whole Life (WL) reliability profiles....... These WL reliability profiles may be used to establish revised rules for Concrete Bridges....

  6. Reflections on the Goldwater Rule.

    Science.gov (United States)

    Appelbaum, Paul S

    2017-06-01

    The APA's Goldwater Rule, precluding psychiatrists from rendering opinions to the media about public figures whom they have not examined, has often engendered controversy. Here, I consider the justifications for the rule, how well they stand up to criticism, and the extent, if any, to which modifications might be called for. Although embarrassment to the profession is often cited as the basis for the Rule, it reflects more substantive concerns, including the risk of harm to living persons and discouraging persons in need of treatment from seeking psychiatric attention. The most potent criticisms of the Rule are that it discourages public education about mental illness and its effects and precludes legitimate scholarly endeavors by psychiatrists studying foreign leaders, historical figures, and others. However, there are many ways of providing education about mental illness without violating the Rule, and read properly, it should not prevent legitimate historical investigation, though some clarification of the Rule on this point might be helpful. Even psychiatrists who seek to aid policymakers in dealing with international or domestic threats should not find that the Rule interferes with their efforts. On balance, the Goldwater Rule continues to be an important underpinning of ethical behavior by psychiatrists. © 2017 American Academy of Psychiatry and the Law.

  7. Business rule mining from spreadsheets

    NARCIS (Netherlands)

    Roy, S.

    2015-01-01

    Business rules represent the knowledge that guides the operations of a business organization. They are implemented in software applications used by organizations, and the activity of extracting them from software is known as business rule mining. It has various purposes amongst which migration and

  8. The evolution of Horn's rule

    NARCIS (Netherlands)

    de Jaegher, K.

    2007-01-01

    Horn’s rule says that messages can be kept ambiguous if only a single interpretation is plausible. Speakers only perform costly disambiguation to convey surprising information. This paper shows that, while noncooperative game theory cannot justify Horn’s rule, evolutionary game theory can. In order

  9. Business model for business rules

    NARCIS (Netherlands)

    Koen Smit; Eline Haan; Martin Zoet

    2014-01-01

    Business rule models are widely applied, standalone and embedded in smart objects. They have become segregated from information technology and they are now a valuable asset in their own right. As more business rule models are becoming assets, business models to monetize these assets are designed.

  10. Rule Value Reinforcement Learning for Cognitive Agents

    OpenAIRE

    Child, C. H. T.; Stathis, K.

    2006-01-01

    RVRL (Rule Value Reinforcement Learning) is a new algorithm which extends an existing learning framework that models the environment of a situated agent using a probabilistic rule representation. The algorithm attaches values to learned rules by adapting reinforcement learning. Structure captured by the rules is used to form a policy. The resulting rule values represent the utility of taking an action if the rule`s conditions are present in the agent`s current percept. Advantages of the new f...

  11. Testing the performance of technical trading rules in the Chinese markets based on superior predictive test

    Science.gov (United States)

    Wang, Shan; Jiang, Zhi-Qiang; Li, Sai-Ping; Zhou, Wei-Xing

    2015-12-01

    Technical trading rules have a long history of being used by practitioners in financial markets. The profitable ability and efficiency of technical trading rules are yet controversial. In this paper, we test the performance of more than seven thousand traditional technical trading rules on the Shanghai Securities Composite Index (SSCI) from May 21, 1992 through June 30, 2013 and China Securities Index 300 (CSI 300) from April 8, 2005 through June 30, 2013 to check whether an effective trading strategy could be found by using the performance measurements based on the return and Sharpe ratio. To correct for the influence of the data-snooping effect, we adopt the Superior Predictive Ability test to evaluate if there exists a trading rule that can significantly outperform the benchmark. The result shows that for SSCI, technical trading rules offer significant profitability, while for CSI 300, this ability is lost. We further partition the SSCI into two sub-series and find that the efficiency of technical trading in sub-series, which have exactly the same spanning period as that of CSI 300, is severely weakened. By testing the trading rules on both indexes with a five-year moving window, we find that during the financial bubble from 2005 to 2007, the effectiveness of technical trading rules is greatly improved. This is consistent with the predictive ability of technical trading rules which appears when the market is less efficient.

  12. Spatio-Temporal Rule Mining

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Pedersen, Torben Bach

    2005-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services (LBS). To achieve high quality for such services, spatio-temporal data mining techniques...... are needed. In this paper, we describe experiences with spatio-temporal rule mining in a Danish data mining company. First, a number of real world spatio-temporal data sets are described, leading to a taxonomy of spatio-temporal data. Second, the paper describes a general methodology that transforms...... the spatio-temporal rule mining task to the traditional market basket analysis task and applies it to the described data sets, enabling traditional association rule mining methods to discover spatio-temporal rules for LBS. Finally, unique issues in spatio-temporal rule mining are identified and discussed....

  13. Palestinian Security Sector Reform : the View of the Public | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In its August 2009 platform, Building Palestinian State Institutions, the government of Salam Fayyad has committed itself to modernizing the Palestinian security sector based on the rule of law and oversight by the legislature and judicial authorities. However, the process is currently being conducted without parliamentary ...

  14. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2017-09-29

    State Department spokesman John Kirby. “Lifting Holds on Security Assistance to the Government of Bahrain.” June 29, 2015. 62 Nicole Gaouette. “U.S...family were long buried . Two smaller islands, Janan and Hadd Janan, were ruled not part of the Hawar Islands group and were also awarded to Qatar

  15. Palestinian Security Sector Reform : the View of the Public | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In its August 2009 platform, Building Palestinian State Institutions, the government of Salam Fayyad has committed itself to modernizing the Palestinian security sector based on the rule of law and oversight by the legislature and judicial authorities. However, the process is currently being conducted without parliamentary ...

  16. Distinguishing Between Private Law and Social-Security Law in ...

    African Journals Online (AJOL)

    In social-security law, the receipt of more than one social benefit is called "double dipping", whereas in private law the problem of double compensation is addressed by applying the collateral-source rule. In some instances the applicable legislation clearly prescribes the deduction or not of the social benefit, but ...

  17. A study of institutional environment and household food security at ...

    African Journals Online (AJOL)

    cntaganda

    also the much wanted institutional support being exposed. Key words: Food access, institutional environment, food production, district development plans, farmer cooperatives, household food security. 1. Introduction. Rwanda is .... institutions and their functions in the following definition: 'Formal or informal rules that govern ...

  18. 16 CFR 802.60 - Acquisitions by securities underwriters.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Acquisitions by securities underwriters. 802.60 Section 802.60 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... underwriter, in the ordinary course of business, and in the process of underwriting, shall be exempt from the...

  19. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  20. Computer Security at Nuclear Facilities. Reference Manual (Russian Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  1. Computer Security at Nuclear Facilities. Reference Manual (Arabic Edition)

    International Nuclear Information System (INIS)

    2011-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  2. Computer Security at Nuclear Facilities. Reference Manual (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  3. Secure Multicast Routing Algorithm for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Rakesh Matam

    2016-01-01

    Full Text Available Multicast is an indispensable communication technique in wireless mesh network (WMN. Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.

  4. 78 FR 68497 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-11-14

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Exchange Trading Days and Hours of Business and Trading Halts November 7, 2013... thereunder,\\2\\ notice is hereby given that, on October 31, 2013, the International Securities Exchange, LLC...

  5. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  6. 75 FR 79320 - Security-Based Swap Data Repository Registration, Duties, and Core Principles

    Science.gov (United States)

    2010-12-20

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 240 and 249 [Release No. 34-63347; File No. S7-35-10] RIN 3235-AK79 Security-Based Swap Data Repository Registration, Duties, and Core Principles Correction In proposed rule document 2010-29719 beginning on page 77306 in the issue of December 10, 2010...

  7. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1159] RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule with request for comments. SUMMARY: The Coast...

  8. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1159] RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule; reopening of comment period. SUMMARY: The Coast...

  9. 33 CFR 165.130 - Sandy Hook Bay, New Jersey-security zone.

    Science.gov (United States)

    2010-07-01

    ....4″ W; then to the beginning. (c) The following rules apply to the security zone established in... following boundaries are a security zone: A line beginning on the shore at 40°25′55.6″ N, 074°04′31.4″ W... the shoreline to the beginning point. (b) Terminal Channel. The waters within the following boundaries...

  10. 76 FR 47627 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-05

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Two Market Data Feeds August 1, 2011. Pursuant to Section 19(b)(1) of the... on August 1, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...

  11. 78 FR 7844 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-02-04

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Certain Market Maker Fees January 29, 2013. Pursuant to Section 19(b)(1) of the... on January 17, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  12. 78 FR 37870 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-06-24

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Related to Market Maker Risk Parameters and Complex Orders June 18, 2013. Pursuant to Section 19(b)(1) of the... on June 5, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...

  13. 78 FR 24271 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-24

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Market Maker Plus Rebate Program April 18, 2013. Pursuant to Section 19(b)(1... hereby given that on April 10, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the...

  14. 77 FR 1757 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-01-11

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options January 5, 2012...,\\2\\ notice is hereby given that on December 28, 2011, the International Securities Exchange, LLC (the...

  15. 78 FR 17988 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-25

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Regarding Market Maker Quoting Requirements March 19, 2013. Pursuant to Section 19(b)(1) of... given that on March 5, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  16. 78 FR 45580 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-07-29

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend Certain Market Maker Fees July 23, 2013. Pursuant to Section 19(b)(1) of the... hereby given that on July 11, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the...

  17. 76 FR 5412 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-01-31

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Establish a New Class of Market Participant for Index Options January 25, 2011. Pursuant to Section 19(b)(1) of... given that on January 12, 2011, International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  18. 77 FR 31680 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-05-29

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate May 22, 2012...-4 thereunder,\\2\\ notice is hereby given that on May 15, 2012, the International Securities Exchange...

  19. 76 FR 56832 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-09-14

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a New Market Data Feed September 8, 2011. Pursuant to Section 19(b)(1) of the... on August 31, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  20. 77 FR 37944 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-06-25

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Allow Competitive Market Makers To Use Their Membership Points To Enter Multiple Quotes in an Options Class June 19... 19b-4 thereunder,\\2\\ notice is hereby given that on June 6, 2012, the International Securities...

  1. 76 FR 70178 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-11-10

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Market Data Fees November 3, 2011. Pursuant to Section 19(b)(1) of the... that, on October 24, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  2. 75 FR 42812 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-07-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options July 15, 2010..., \\2\\ notice is hereby given that on June 30, 2010, International Securities Exchange, LLC (``ISE'' or...

  3. 76 FR 64417 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-10-18

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Competitive Market Maker Trading Rights October 12, 2011. Pursuant to Section...\\ notice is hereby given that on October 3, 2011, the International Securities Exchange, LLC (the...

  4. 75 FR 71475 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-11-23

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Market Data Fees November 17, 2010. Pursuant to Section 19(b... hereby given that on November 4, 2010, the International Securities Exchange, LLC (the ``Exchange'' or...

  5. 78 FR 48742 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-08-09

    ...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate...\\ notice is hereby given that on July 23, 2013, Miami International Securities Exchange LLC (``Exchange... allocated Marketing Fees for orders directed to that LMM. The text of the proposed rule change is available...

  6. 16 CFR 801.21 - Securities and cash not considered assets when acquired.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Securities and cash not considered assets when acquired. 801.21 Section 801.21 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS... regularly prepared balance sheet of “A” referred to in § 801.11—the voting securities of X must be reflected...

  7. 17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.

    Science.gov (United States)

    2010-04-01

    ... on the current net asset value of such security which is next computed after receipt of a tender of... paragraph shall not prevent a sponsor of a unit investment trust (hereinafter referred to as the “Trust”) engaged exclusively in the business of investing in eligible trust securities (as defined in Rule 14a-3(b...

  8. 77 FR 25892 - Security Zones; North Atlantic Treaty Organization (NATO) Summit, Chicago, IL

    Science.gov (United States)

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0052] RIN 1625-AA87 Security Zones; North Atlantic Treaty Organization (NATO) Summit, Chicago, IL AGENCY: Coast Guard... Temporary Final Rule (TFR) published in the Federal Register on April 13, 2012. In the preamble, the Coast...

  9. 76 FR 10947 - Registration and Regulation of Security-Based Swap Execution Facilities

    Science.gov (United States)

    2011-02-28

    ... Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities... interpretation of the definition of ``security-based swap execution facility'' set forth in Section 3(a)(77) of... satisfy the statutory definition. In addition, the Commission is proposing to amend Rule 3a-1 under the...

  10. 12 CFR 563g.16 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE... future, if: (a) The securities would satisfy all of the eligibility requirements of the Commission's Rule...

  11. 75 FR 64071 - Basis Reporting by Securities Brokers and Basis Determination for Stock

    Science.gov (United States)

    2010-10-18

    ... Reporting by Securities Brokers and Basis Determination for Stock; Final Rule #0;#0;Federal Register / Vol... Reporting by Securities Brokers and Basis Determination for Stock AGENCY: Internal Revenue Service (IRS... taxpayers to compute the basis of certain stock by averaging. The regulations affect brokers and custodians...

  12. 75 FR 52383 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Approving Proposed...

    Science.gov (United States)

    2010-08-25

    ... reflecting financial difficulties; substitution of credit or liquidity providers, or their failure to perform... security holders; bond calls; defeasances; release, substitution, or sale of property securing repayment of... considered the proposed rule's impact on efficiency, competition and capital formation. 15 U.S.C. 78c(f). \\13...

  13. 77 FR 16883 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-03-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Add an Index..., 2012, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the... Max SPY. Options on the Max SPY will be p.m. cash-settled and will have European-style exercise...

  14. 78 FR 17733 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... given that on March 18, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE..., including exercise style. Accordingly, the Exchange noted in its Mini Options filing that Exchange rules...

  15. 75 FR 66410 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-28

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... hereby given that, on October 14, 2010, the International Securities Exchange, LLC (the ``Exchange'' or...

  16. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Science.gov (United States)

    2010-03-09

    ... of 1974: Implementation of Exemptions; Department of Homeland Security United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records System of Records AGENCY... rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Immigration...

  17. 77 FR 43151 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Science.gov (United States)

    2012-07-24

    ... requirements in assessing credit risk for portfolio investments. The FDIC received five comments on the... rule, federal and state savings associations are required to evaluate the credit risk of a security... reliance on a credit rating to evaluate the credit risk of a security, and consistently have been advised...

  18. 76 FR 46603 - Security Ratings

    Science.gov (United States)

    2011-08-03

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No. 33-9245; 34-64975; File No. S7-18-08] RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange... requirements under the Securities Act of 1933 and the Securities Exchange Act of 1934 for securities offering...

  19. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  20. Paradox of Writing Clear Rules: Interplay of Financial Reporting Standards and Engineering

    OpenAIRE

    Shyam Sunder

    2011-01-01

    Attempts to improve financial reporting by adding clarity to its rules and standards through issuance of interpretations and guidance also serve to furnish a better roadmap for evasion through financial engineering. Thus, paradoxically, regulation of financial reporting becomes a victim of its own pursuit of clarity. The interplay between rules written to govern preparation and auditing of fi nancial reports on one hand, and fi nancial engineering of securities to manage the appearance of fi ...

  1. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  2. A PROPOSAL OF FUZZY MULTIDIMENSIONAL ASSOCIATION RULES

    Directory of Open Access Journals (Sweden)

    Rolly Intan

    2006-01-01

    Full Text Available Association rules that involve two or more dimensions or predicates can be referred as multidimensional association rules. Rather than searching for frequent itemsets (as is done in mining single-dimensional association rules, in multidimensional association rules, we search for frequent predicate sets. In general, there are two types of multidimensional association rules, namely interdimension association rules and hybrid-dimension association rules. Interdimension association rules are multidimensional association rules with no repeated predicates. This paper introduces a method for generating interdimension association rules. A more meaningful association rules can be provided by generalizing crisp value of attributes to be fuzzy value. To generate the multidimensional association rules implying fuzzy value, this paper introduces an alternative method for mining the rules by searching for the predicate sets.

  3. 75 FR 27272 - Amateur Service Rules

    Science.gov (United States)

    2010-05-14

    ... COMMISSION 47 CFR Part 97 Amateur Service Rules AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: This document proposes to amend the amateur radio service rules to facilitate the use of... the amateur service rules by making them conform with other Commission rules, thereby eliminating...

  4. 75 FR 78169 - Amateur Service Rules

    Science.gov (United States)

    2010-12-15

    ... COMMISSION 47 CFR Parts 0 and 97 Amateur Service Rules AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: This document revises the Amateur Radio Service rules to amend and clarify the rules with respect to amateur service vanity call signs. The rules are necessary to amend the amateur...

  5. Rule Versus the Causality Rule in Insurance Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    When the Buyer of insurance has negligently kept silent or misrepresented a (material) fact to the Seller, one of two rules will determine the extent to which cover will consequently be reduced. The pro-rata rule lowers cover in proportion to how much the Seller would have increased the premium had...... (2003), the article assumes that Buyers may misrepresent, either intentionally or unintentionally, and that the Court cannot distinguish one from the other. A trade-off then arises between risk allocation and deterrence. From the perspective of risk allocation, the pro rata rule is preferable since...... it subjects the risk averse Buyer of insurance to less variance. This implies that the pro rata rule should apply when there is significant risk for a Buyer of unintentional misrepresentation, and when the incentive to intentionally misrepresent can be curtailed through frequent verification of the Buyer...

  6. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result......This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  7. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  8. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  9. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  10. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  11. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  12. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  13. Operator algebra from fusion rules

    International Nuclear Information System (INIS)

    Fuchs, J.

    1989-03-01

    It is described how the fusion rules of a conformal field theory can be employed to derive differential equations for the four-point functions of the theory, and thus to determine eventually the operator product coeffients for primary fields. The results are applied to the Ising fusion rules. A set of theories possessing these function rules is found which is labelled by two discrete parameters. For a specific value of one of the parameters, these are the level one Spin(2m+1) Wess-Zusimo-Witten theories; it is shown that they represent an infinite number of inequivalent theories. (author). 38 refs

  14. The Rule of Law Effort in Afghanistan: A Success Story in the Making

    Science.gov (United States)

    2016-06-10

    investigate , prosecute, and incarcerate criminals for insurgent-related crimes. A strong criminal justice system contributes to order and security and...international human rights norms and standards. It requires, as well, measures to ensure adherence to the principles of supremacy of law, equality...implement programs to achieve the three objectives of: security; governance, rule of law, and Human Rights ; and economic and social development

  15. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  16. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  17. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  18. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  19. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  20. Declining job security

    OpenAIRE

    Robert G. Valletta

    1998-01-01

    Although common belief and recent evidence point to a decline in "job security," the academic literature to date has been noticeably silent regarding the behavioral underpinnings of declining job security. In this paper, I define job security in the context of implicit contracts designed to overcome incentive problems in the employment relationship. Contracts of this nature imply the possibility of inefficient separations in response to adverse shocks, and they generate predictions concerning...

  1. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  2. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  3. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  4. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  5. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  6. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  7. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  8. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  9. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  10. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  11. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  12. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  13. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  14. Decision mining revisited - Discovering overlapping rules

    NARCIS (Netherlands)

    Mannhardt, Felix; De Leoni, Massimiliano; Reijers, Hajo A.; Van Der Aalst, Wil M P

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  15. Corporate culture, compliance and railroad operating rules

    Science.gov (United States)

    1997-12-01

    A focus group was held at the 1996 Bi-annual Operating Rules Association meeting of North American railroads to discuss the : general issue of compliance and operating rules. Twelve operating rules officers participated, representing Class I, II, and...

  16. Wrapping rules (in) string theory

    Science.gov (United States)

    Bergshoeff, Eric A.; Riccioni, Fabio

    2018-01-01

    In this paper we show that the number of all 1/2-BPS branes in string theory compactified on a torus can be derived by universal wrapping rules whose formulation we present. These rules even apply to branes in less than ten dimensions whose ten-dimensional origin is an exotic brane. In that case the wrapping rules contain an additional combinatorial factor that is related to the highest dimension in which the ten-dimensional exotic brane, after compactification, can be realized as a standard brane. We show that the wrapping rules also apply to cases with less supersymmetry. As a specific example, we discuss the compactification of IIA/IIB string theory on ( T 4/ ℤ 2) × T n .

  17. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  18. Rule-Based Runtime Verification

    Science.gov (United States)

    Barringer, Howard; Goldberg, Allen; Havelund, Klaus; Sen, Koushik

    2003-01-01

    We present a rule-based framework for defining and implementing finite trace monitoring logics, including future and past time temporal logic, extended regular expressions, real-time logics, interval logics, forms of quantified temporal logics, and so on. Our logic, EAGLE, is implemented as a Java library and involves novel techniques for rule definition, manipulation and execution. Monitoring is done on a state-by-state basis, without storing the execution trace.

  19. Cellular automata with voting rule

    International Nuclear Information System (INIS)

    Makowiec, D.

    1996-01-01

    The chosen local interaction - the voting (majority) rule applied to the square lattice is known to cause the non ergodic cellular automata behaviour. Presented computer simulation results verify two cases of non ergodicity. The first one is implicated by the noise introduced to the local interactions and the second one follows properties of the initial lattice configuration selected at random. For the simplified voting rule - non symmetric voting, the critical behaviour has been explained rigorously. (author)

  20. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.