WorldWideScience

Sample records for technology security program

  1. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    postdoctoral fellowships at the Olin Institute for Strategic Studies at Harvard University and the Center for International Security and Cooperation...government and business have frequently invited him to speak on Middle Eastern affairs. JEANNE GUILLEMIN’s training in sociology and anthropology led to her...been the recipient of several scholarships and awards, including two NATO Fellowships and two Fulbright Scholarships. In 1995, he was named to the

  2. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  3. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  4. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  5. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  6. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  7. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    that S&T is appropriately harnessed to continue its valued contribution to our nation’s security. The purpose of the policy will be to:  define...Commonwealth resources by ensuring the right research is being done, by the most appropriate providers,  ensure the research team/s are held accountable ...policy will realise the leadership role of DSTO as Australia’s national security S&T coordinator and program manager. As the coordinator, DSTO will be

  8. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    Energy Technology Data Exchange (ETDEWEB)

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the &apos

  9. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    Energy Technology Data Exchange (ETDEWEB)

    Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  10. Securing smart grid technology

    Science.gov (United States)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  11. Information Technology and Security

    OpenAIRE

    Denning, Dorothy E.

    2003-01-01

    in Grave New World: Global Dangers in the 21st Century (Michael Brown ed.), Georgetown Press, 2003. (.pdf of prepublication version) This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, perform...

  12. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  13. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  14. National Security Technology Incubator Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  15. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  16. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  17. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  18. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  19. National Security Technology Incubator Action Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  20. Input from Key Stakeholders in the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  1. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45 Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science...

  2. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  3. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  4. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  5. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  6. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... SPACE ADMINISTRATION 48 CFR Parts 1804 and 1852 RIN 2700-AD46 Information Technology (IT) Security... NASA FAR Supplement (NFS) to update requirements related to Information Technology Security, consistent with Federal policies for the security of unclassified information and information systems. The...

  7. Technology-Enabled Crime, Policing and Security

    Science.gov (United States)

    McQuade, Sam

    2006-01-01

    Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…

  8. Clean Coal Technology Programs: Program Update 2009

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-10-01

    The purpose of the Clean Coal Technology Programs: Program Update 2009 is to provide an updated status of the U.S. Department of Energy (DOE) commercial-scale demonstrations of clean coal technologies (CCT). These demonstrations have been performed under the Clean Coal Technology Demonstration Program (CCTDP), the Power Plant Improvement Initiative (PPII), and the Clean Coal Power Initiative (CCPI). Program Update 2009 provides: (1) a discussion of the role of clean coal technology demonstrations in improving the nation’s energy security and reliability, while protecting the environment using the nation’s most abundant energy resource—coal; (2) a summary of the funding and costs of the demonstrations; and (3) an overview of the technologies being demonstrated, along with fact sheets for projects that are active, recently completed, or recently discontinued.

  9. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  10. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  11. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  12. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  13. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  14. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... 46 CFR Part 503 RIN 3072-AC40 Information Security Program AGENCY: Federal Maritime Commission... relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect January 5, 2010, and which prescribes a...

  15. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  16. Space Shuttle security policies and programs

    Science.gov (United States)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  17. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA. ACTION... Administration (NARA), has amended National Industrial Security Program Directive No. 1. This amendment to...). The Executive Order established a National Industrial Security Program (NISP) to safeguard Federal...

  18. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  19. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  20. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  1. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  2. IT security governance guidebook with security program metrics

    CERN Document Server

    Cohen, Fred

    2006-01-01

    The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provid

  3. Department of Energy security program needs effective information systems

    Energy Technology Data Exchange (ETDEWEB)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program.

  4. Technology Commercialization Program 1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-11-01

    This reference compilation describes the Technology Commercialization Program of the Department of Energy, Defense Programs. The compilation consists of two sections. Section 1, Plans and Procedures, describes the plans and procedures of the Defense Programs Technology Commercialization Program. The second section, Legislation and Policy, identifies legislation and policy related to the Program. The procedures for implementing statutory and regulatory requirements are evolving with time. This document will be periodically updated to reflect changes and new material.

  5. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  6. Cyber Security Evaluation of II&C Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  7. Interactive Programming Support for Secure Software Development

    Science.gov (United States)

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  8. IT Security Plan for Flight Simulation Program

    CERN Document Server

    Hood, David; 10.5121/ijcsea.2011.1510

    2011-01-01

    Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

  9. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  10. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  11. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  12. Security Service Technology for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Aiqun Hu; Tao Li; Mingfu Xue

    2011-01-01

    As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.

  13. Radiologic Technology Program Standards.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This publication contains statewide standards for the radiologic technology program in Georgia. The standards are divided into 12 categories; Foundations (philosophy, purpose, goals, program objectives, availability, evaluation); Admissions (admission requirements, provisional admission requirements, recruitment, evaluation and planning); Program…

  14. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  15. External Service Providers to the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  16. MoldaNet: a network distributed molecular graphics and modelling program that integrates secure signed applet and Java 3D technologies.

    Science.gov (United States)

    Yoshida, H; Rzepa, H S; Tonge, A P

    1998-06-01

    MoldaNet is a molecular graphics and modelling program that integrates several new Java technologies, including authentication as a Secure Signed Applet, and implementation of Java 3D classes to enable access to hardware graphics acceleration. It is the first example of a novel class of Internet-based distributed computational chemistry tool designed to eliminate the need for user pre-installation of software on their client computer other than a standard Internet browser. The creation of a properly authenticated tool using a signed digital X.509 certificate permits the user to employ MoldaNet to read and write the files to a local file store; actions that are normally disallowed in Java applets. The modularity of the Java language also allows straightforward inclusion of Java3D and Chemical Markup Language classes in MoldaNet to permit the user to filter their model into 3D model descriptors such as VRML97 or CML for saving on local disk. The implications for both distance-based training environments and chemical commerce are noted.

  17. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  18. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26, 2010...

  19. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  20. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  1. SHARED TECHNOLOGY TRANSFER PROGRAM

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN, JOHN M. HAUT, RICHARD C.

    2008-03-07

    The program established a collaborative process with domestic industries for the purpose of sharing Navy-developed technology. Private sector businesses were educated so as to increase their awareness of the vast amount of technologies that are available, with an initial focus on technology applications that are related to the Hydrogen, Fuel Cells and Infrastructure Technologies (Hydrogen) Program of the U.S. Department of Energy. Specifically, the project worked to increase industry awareness of the vast technology resources available to them that have been developed with taxpayer funding. NAVSEA-Carderock and the Houston Advanced Research Center teamed with Nicholls State University to catalog NAVSEA-Carderock unclassified technologies, rated the level of readiness of the technologies and established a web based catalog of the technologies. In particular, the catalog contains technology descriptions, including testing summaries and overviews of related presentations.

  2. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  3. Secure Execution of Distributed Session Programs

    CERN Document Server

    Alves, Nuno; Yoshida, Nobuko; Deniélou, Pierre-Malo; 10.4204/EPTCS.69.1

    2011-01-01

    The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols) are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP) protocol. The key technical point is the delicate treatment of secure session de...

  4. Addressing social resistance in emerging security technologies

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  5. Addressing social resistance in emerging security technologies.

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus. Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake.

  6. Center for Coastline Security Technology, Year 3

    Science.gov (United States)

    2008-05-01

    Figure 2.6.8: Close-Up Photograph of RPUUV Tail Section. Figure 2.6.9: Force and moments applied on a hydrofoil . Figure 2.6.10: The NACA 21016... hydrofoil profile. Florida Atlantic University 4/28/08 Page 10 Center for Coastline Security Technology Year Three-Final Report Figure...as a 3D wing with a NACA 21016 hydrofoil profile (Figure 2.6.10) held by 3 cylinders (Figure 2.6.8). Center for Coastline Security Technology Year

  7. Small engine technology programs

    Science.gov (United States)

    Niedzwiecki, Richard W.

    1990-01-01

    Described here is the small engine technology program being sponsored at the Lewis Research Center. Small gas turbine research is aimed at general aviation, commuter aircraft, rotorcraft, and cruise missile applications. The Rotary Engine program is aimed at supplying fuel flexible, fuel efficient technology to the general aviation industry, but also has applications to other missions. The Automotive Gas Turbine (AGT) and Heavy-Duty Diesel Transport Technology (HDTT) programs are sponsored by DOE. The Compound Cycle Engine program is sponsored by the Army. All of the programs are aimed towards highly efficient engine cycles, very efficient components, and the use of high temperature structural ceramics. This research tends to be generic in nature and has broad applications. The HDTT, rotary technology, and the compound cycle programs are all examining approaches to minimum heat rejection, or 'adiabatic' systems employing advanced materials. The AGT program is also directed towards ceramics application to gas turbine hot section components. Turbomachinery advances in the gas turbine programs will benefit advanced turbochargers and turbocompounders for the intermittent combustion systems, and the fundamental understandings and analytical codes developed in the research and technology programs will be directly applicable to the system projects.

  8. Pollution Prevention Program: Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    The Department of Energy (DOE) has established a national Research, Development, Demonstration, Testing, and Evaluation (RDDT&E) Program for pollution prevention and waste minimization at its production plants During FY89/90 the Office of Environmental Restoration and Waste Management (EM), through the Office of Technology Development (OTD), established comprehensive, pollution prevention technical support programs to demonstrate new, environmentally-conscious technology for production processes. The RDDT&E program now entails collaborative efforts across DOE. The Pollution Prevention Program is currently supporting three major activities: The DOE/US Air Force Memorandum of Understanding Program is a collaborative effort to utilize the combined resources of DOE and the Department of Defense, eliminate duplication of effort in developing technologies, and to facilitate technology solutions aimed at reducing waste through process modification, material substitution or recycling. The Waste Component Recycle, Treatment and Disposal Integrated Demonstration (WeDID) will develop recycle, treatment, and disposal processes and associated technologies for use in the dismantlement of non-nuclear weapons components, to support US arms treaties and policies. This program will focus on meeting all security and regulatory requirements (with additional benefit to the commercial electronics industry). The Environmentally Conscious Manufacturing Integrated Demonstration (ECMID) will effectively implement ECM technologies that address both the needs of the DOE Complex and US electronics industry, and encourage strong interaction between DOE and US industry. The ECMID will also develop life cycle analysis tools that will aid decisionmakers in selecting the optimum process based on the tradeoffs between cost an environmental impact.

  9. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  10. Security technologies and protocols for Asynchronous Transfer Mode networks

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.

    1996-06-01

    Asynchronous Transfer Mode (ATM) is a new data communications technology that promises to integrate voice, video, and data traffic into a common network infrastructure. In order to fully utilize ATM`s ability to transfer real-time data at high rates, applications will start to access the ATM layer directly. As a result of this trend, security mechanisms at the ATM layer will be required. A number of research programs are currently in progress which seek to better understand the unique issues associated with ATM security. This paper describes some of these issues, and the approaches taken by various organizations in the design of ATM layer security mechanisms. Efforts within the ATM Forum to address the user communities need for ATM security are also described.

  11. Radiologic Technology Program Guide.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This guide presents the standard curriculum for technical institutes in Georgia. The curriculum addresses the minimum competencies for a radiologic technology program. The guide contains four major sections. The General Information section contains an introduction giving an overview and defining purpose and objectives; a program description,…

  12. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  13. Energy Technology Programs: program summaries for 1979

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-01

    The Energy Technology Programs in the BNL Department of Energy and Environment cover a broad range of activities, namely: electrochemical research, chemical energy storage, chemical heat pumps, solar technology, fossil technology, catalytic systems development, space-conditioning technology, and technical support/program management. Summaries of the individual tasks associated with these activities along with publications, significant accomplishments, and program funding levels are presented.

  14. Infrared: A Key Technology for Security Systems

    Directory of Open Access Journals (Sweden)

    Carlo Corsi

    2012-01-01

    Full Text Available Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due to the coolers avoidance, low cost, and, overall, completely integrable with Silicon technology FPAs, especially designed and tailored for specific applications, smart sensors, has really been impacted with revolutionary and new ideas and system concepts in all the infrared fields, especially for security applications. Lastly, the advent of reliable Infrared Solid State Laser Sources, operating up to the Long Infrared Wavelength Band and the new emerging techniques in Far Infrared Submillimeter Terahertz Bands, has opened wide and new areas for developing new, advanced security systems. A review of all the items with evidence of the weak and the strong points of each item, especially considering possible future developments, will be reported and discussed.

  15. Enabling National Security Through Dual-Use Technology

    Science.gov (United States)

    2014-04-30

    efforts. Kratz leads Lockheed Martin’s Automatic Identification Technology implementation, including RFID and UID. After successfully completing eight...bäÉîÉåíÜ=^ååì~ä=^Åèìáëáíáçå= oÉëÉ~êÅÜ=póãéçëáìã= qÜìêëÇ~ó=pÉëëáçåë= sçäìãÉ=ff= = Enabling National Security Through Dual-Use Technology Lou Kratz...Security Through Dual-Use Technology 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER

  16. Modern Quantum Technologies of Information Security

    CERN Document Server

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  17. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  18. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program...

  19. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  20. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    , small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way......Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......-oriented extension of the process calculus KLAIM that excels at modeling mobile, distributed systems. A novel feature of our approach is that advices are able to analyze the future use of data, which is achieved by using program analysis techniques. We also present AspectK to propose other possible aspect...

  1. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  2. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  3. Geothermal Technologies Program Overview - Peer Review Program

    Energy Technology Data Exchange (ETDEWEB)

    Milliken, JoAnn [Office of Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States)

    2011-06-06

    This Geothermal Technologies Program presentation was delivered on June 6, 2011 at a Program Peer Review meeting. It contains annual budget, Recovery Act, funding opportunities, upcoming program activities, and more.

  4. User Interface Program for secure electronic tags

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US.

  5. Department of Veterans Affairs' Implementation of Information Security Education Assistance Program. GAO-10-170R

    Science.gov (United States)

    Wilshusen, Gregory C.; Melvin, Valerie C.

    2009-01-01

    The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…

  6. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A...

  7. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  8. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  9. Space Technology Research Grants Program

    Data.gov (United States)

    National Aeronautics and Space Administration — The Space Technology Research Grants Program will accelerate the development of "push" technologies to support the future space science and exploration...

  10. Hybrid propulsion technology program

    Science.gov (United States)

    1990-01-01

    Technology was identified which will enable application of hybrid propulsion to manned and unmanned space launch vehicles. Two design concepts are proposed. The first is a hybrid propulsion system using the classical method of regression (classical hybrid) resulting from the flow of oxidizer across a fuel grain surface. The second system uses a self-sustaining gas generator (gas generator hybrid) to produce a fuel rich exhaust that was mixed with oxidizer in a separate combustor. Both systems offer cost and reliability improvement over the existing solid rocket booster and proposed liquid boosters. The designs were evaluated using life cycle cost and reliability. The program consisted of: (1) identification and evaluation of candidate oxidizers and fuels; (2) preliminary evaluation of booster design concepts; (3) preparation of a detailed point design including life cycle costs and reliability analyses; (4) identification of those hybrid specific technologies needing improvement; and (5) preperation of a technology acquisition plan and large scale demonstration plan.

  11. Nuclear Technology Programs

    Energy Technology Data Exchange (ETDEWEB)

    Harmon, J.E. (ed.)

    1990-10-01

    This document reports on the work done by the Nuclear Technology Programs of the Chemical Technology Division, Argonne National Laboratory, in the period April--September 1988. These programs involve R D in three areas: applied physical chemistry, separation science and technology, and nuclear waste management. The work in applied physical chemistry includes investigations into the processes that control the release and transport of fission products under accident-like conditions, the thermophysical properties of selected materials in environments simulating those of fusion energy systems. In the area of separation science and technology, the bulk of the effort is concerned with developing and implementing processes for the removal and concentration of actinides from waste streams contaminated by transuranic elements. Another effort is concerned with examining the feasibility of substituting low-enriched for high-enriched uranium in the production of fission-product {sup 99}Mo. In the area of waste management, investigations are underway on the performance of materials in projected nuclear repository conditions to provide input to the licensing of the nation's high-level waste repositories.

  12. ABC Technology Development Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-10-14

    The Accelerator-Based Conversion (ABC) facility will be designed to accomplish the following mission: `Provide a weapon`s grade plutonium disposition capability in a safe, economical, and environmentally sound manner on a prudent schedule for [50] tons of weapon`s grade plutonium to be disposed on in [20] years.` This mission is supported by four major objectives: provide a reliable plutonium disposition capability within the next [15] years; provide a level of safety and of safety assurance that meets or exceeds that afforded to the public by modern commercial nuclear power plants; meet or exceed all applicable federal, state, and local regulations or standards for environmental compliance; manage the program in a cost effective manner. The ABC Technology Development Program defines the technology development activities that are required to accomplish this mission. The technology development tasks are related to the following topics: blanket system; vessel systems; reactivity control systems; heat transport system components; energy conversion systems; shutdown heat transport systems components; auxiliary systems; technology demonstrations - large scale experiments.

  13. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA. ACTION... Federal Register of November 30, 2009, regarding the National Industrial Security Program Directive No. 1...

  14. Secure Logistic Management System Using Wireless Technologies

    Directory of Open Access Journals (Sweden)

    K.R. Prasanna

    2012-06-01

    Full Text Available This study proposes an idea of solving problems arising in logistics management, with the aid of wireless communication technologies like RFID, GSM and GPS. This study includes the modules of goods delivery status, vehicle location tracking, overloading of goods, interlocking system and finding out the misplaced goods. The integrated system consists of RFID and GPS technology for goods count and vehicle tracking. Overloading of goods is identified with the help of the weight sensors. If the goods are misplaced, the secure system will indicate the authorized base station and will not allow the vehicle to move. If the wrong goods are taken out from the cargo the buzzer will be ON and the message will be intimated to the concerned person through GSM.

  15. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... today, we have witness a lot of national security issues that risks the continued existence of the country as one ... lack of economic security such as Income security, Employment security, Job security, ..... In Australia, building and .... Table 4.2.8 Respondents by IT on Oil and Gas production and distribution.

  16. Smart Door Lock System: Improving Home Security using Bluetooth Technology

    National Research Council Canada - National Science Library

    Jayant Dabhade; Amirush Javare; Tushar Ghayal; Ankur Shelar; Ankita Gupta

    2017-01-01

      In today's world, smart home control system is necessary in daily life. As the technology is emerging a lot it's time for us to be more technical related to home secure security and easy access to the user...

  17. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  18. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  19. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  20. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  1. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  2. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  3. Software Technology for Adaptable, Reliable Systems (STARS) Technical Program Plan,

    Science.gov (United States)

    1986-08-06

    TPP (8/06186) * SOFTWARE TECHNOLOGY IE c0 FOR r ADAPTABLE, RELIABLE SYSTEMS (STARS) TECHNICAL PROGRAM PLAN 6 AUGUST 1986 DTIC ELECTEri NOV 141986WI...NONE NONE 11. TITLE (Include Security Classification) %. Software Technology for Adaptable, Reliable Systems (STARS) Technical Program Plan 12. PERSONAL...document is the top-level technical program plan for the STARS program. It describes the objectives of the program, the technical approach to achieve

  4. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of informatio

  5. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  6. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  7. The security and recent technology of quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    WANG Xiang-bin; YING Hao; MA Huai-xing; PENG Cheng-zhi; YANG Tao; PAN Jian-wei

    2006-01-01

    In principle,quantum key distribution (QKD)can be used to make unconditionally secure private communication.However,the security of the existing real system for QKD needs to be carefully examined.Actually,the existing experiments based on weak coherent states are not secure under photon-number-splitting attack.Fortunately,the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.

  8. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  9. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  10. SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 38 (April 2009)

    OpenAIRE

    2009-01-01

    This April 2009 issue of the Naval Postgraduate School (NPS) Maritime Defense and Security Research Program Newsletter highlights the following research: "Join MDA [Maritime Defense and Awareness] Outreach on ODNI [Office of the Director of National Intelligence] Bridge" and "NPS Cooperative Operations and Applied Science & Technology Studies." It also provides links to future events, reports, articles, and NPS Theses regarding maritime defense and security.

  11. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  12. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  13. Respiratory Therapy Technology Program Standards.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This publication contains statewide standards for the respiratory therapy technology program in Georgia. The standards are divided into 12 categories: Foundations (philosophy, purpose, goals, program objectives, availability, evaluation; Admissions (admission requirements, provisional admission requirements, recruitment, evaluation and planning);…

  14. Avionics Maintenance Technology Program Standards.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This publication contains statewide standards for the avionics maintenance technology program in Georgia. The standards are divided into the following categories: foundations, diploma/degree (philosophy, purpose, goals, program objectives, availability, evaluation); admissions, diploma/degree (admission requirements, provisional admission…

  15. Avionics Maintenance Technology Program Guide.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This program guide presents the avionics maintenance technology curriculum for technical institutes in Georgia. The general information section contains the following for both the diploma program and the associate degree program: purpose and objectives; program description, including admissions, typical job titles, and accreditation and…

  16. Security Risks and Modern Cyber Security Technologies for Corporate Networks

    CERN Document Server

    Gharibi, Wajeb

    2011-01-01

    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.

  17. 75 FR 26171 - Cyber Security Certification Program

    Science.gov (United States)

    2010-05-11

    ... rely on the durability and security of IP-based networks to move capital and to track goods and... networks with better security practices. The reduced incentive for heightened cyber security likely is... improve network security. Moreover, the Commission's review of the best practices indicates that,...

  18. 78 FR 51192 - Secure Supply Chain Pilot Program

    Science.gov (United States)

    2013-08-20

    ... HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program AGENCY: Food and Drug... the start of the Secure Supply Chain Pilot Program (SSCPP). The SSCPP is intended to assist FDA in its... Supply Chain Pilot Program Requirements To be selected to participate in the SSCPP, an applicant...

  19. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  20. Wearable Technology Devices Security and Privacy Vulnerability Analysis

    Directory of Open Access Journals (Sweden)

    Ke Wan Ching

    2016-05-01

    Full Text Available Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable technology is not mature yet in term of device security and privacy acceptance of the public. There exists some security weakness that prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is authentication issue. The low processing due to less computing power of wearable device causethe developer's inability to equip some complicated security mechanisms and algorithm on the device.In this study, an overview of security and privacy vulnerabilities on wearable devices is presented.

  1. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ... ADMINISTRATION Information Collection; Implementation of Information Technology Security Provision AGENCY... new information collection requirement regarding Implementation of Information Technology Security... of Information Technology Security Provision,'' under the heading ``Enter Keyword or ID''...

  2. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  3. Control Systems Security Test Center - FY 2004 Program Summary

    Energy Technology Data Exchange (ETDEWEB)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  4. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program; Correction AGENCY: Food...). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document...

  5. Biofuels. Environment, technology and food security

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J. [NEST - Excellence Group in Thermal Power and Distributed Generation, Mechanical Engineering Institute, Universidade Federal de Itajuba (Brazil); Yanez, Edgar E. [CENIPALMA, Oil Palm Research Center - Cenipalma, Calle 21 42-C-47, Bogota (Colombia); Castillo, Edgar F. [CENICANA - Sugarcane Research Center of Colombia, Calle 58 N, 3BN-110, A.A., 9138 - Cali (Colombia); Almazan, Oscar [ICIDCA - Instituto Cubano de Investigaciones de los Derivados de la Cana de Azucar, Via Blanca y Carretera Central 804, San Miguel del Padron, A.P. 4036, La Habana (Cuba)

    2009-08-15

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  6. Database security and encryption technology research and application

    Science.gov (United States)

    Zhu, Li-juan

    2013-03-01

    The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.

  7. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  8. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  9. The Institute for Security Technology Studies (ISTS): overview

    Science.gov (United States)

    Kotz, David F.

    2004-09-01

    The Institute for Security Technology Studies (ISTS) was founded at Dartmouth College in 2000 as a national center of security research and development. The Institute conducts interdisciplinary research and development projects addressing the challenges of cyber and homeland security, to protect the integrity of the Internet, computer networks, and other interdependent information infrastructures. ISTS also develops technology for providing the information and tools necessary to assist communities and first responders with the evolving, complex security landscape. ISTS is a member of and administers the Institute for Information Infrastructure Protection (I3P), a consortium of 24 leading academic institutions, non-profits and federal laboratories that brings industry, academia and government together to articulate and focus on problems that need to be solved to help ensure the nation's information infrastructure is safe, secure, and robust.

  10. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  11. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source.

  12. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  13. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  14. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  15. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee Management... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  16. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  17. Robotics Technology Crosscutting Program. Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    The Robotics Technology Development Program (RTDP) is a needs-driven effort. A length series of presentations and discussions at DOE sites considered critical to DOE`s Environmental Restoration and Waste Management (EM) Programs resulted in a clear understanding of needed robotics applications toward resolving definitive problems at the sites. A detailed analysis of the resulting robotics needs assessment revealed several common threads running through the sites: Tank Waste Retrieval (TWR), Contaminant Analysis Automation (CAA), Mixed Waste Operations (MWO), and Decontamination and Dismantlement (D and D). The RTDP Group also realized that some of the technology development in these four areas had common (Cross Cutting-CC) needs, for example, computer control and sensor interface protocols. Further, the OTD approach to the Research, Development, Demonstration, Testing, and Evaluation (RDDT and E) process urged an additional organizational breakdown between short-term (1--3 years) and long-term (3--5 years) efforts (Advanced Technology-AT). These factors lead to the formation of the fifth application area for Crosscutting and Advanced Technology (CC and AT) development. The RTDP is thus organized around these application areas -- TWR, CAA, MWO, D and D, and CC and AT -- with the first four developing short-term applied robotics. An RTDP Five-Year Plan was developed for organizing the Program to meet the needs in these application areas.

  18. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  19. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  20. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  1. Robotics Technology Development Program. Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    The Robotics Technology Development Program (RTDP) is a ``needs-driven`` effort. A lengthy series of presentations and discussions at DOE sites considered critical to DOE`s Environmental Restoration and Waste Management (EM) Programs resulted in a clear understanding of needed robotics applications toward resolving definitive problems at the sites. A detailed analysis of the Tank Waste Retrieval (TWR), Contaminant Analysis Automation (CAA), Mixed Waste Operations (MWO), and Decontamination & Dismantlement (D&D). The RTDP Group realized that much of the technology development was common (Cross Cutting-CC) to each of these robotics application areas, for example, computer control and sensor interface protocols. Further, the OTD approach to the Research, Development, Demonstration, Testing, and Evaluation (RDDT&E) process urged an additional organizational break-out between short-term (1--3 years) and long-term (3--5 years) efforts (Advanced Technology-AT). The RDTP is thus organized around these application areas -- TWR, CAA, MWO, D&D and CC&AT -- with the first four developing short-term applied robotics. An RTDP Five-Year Plan was developed for organizing the Program to meet the needs in these application areas.

  2. Robotics crosscutting program: Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    The Office of Environmental Management (EM) is responsible for cleaning up the legacy of radioactive and chemically hazardous waste at contaminated sites and facilities throughout the U.S. Department of Energy (DOE) nuclear weapons complex, preventing further environmental contamination, and instituting responsible environmental management. Initial efforts to achieve this mission resulted in the establishment of environmental restoration and waste management programs. However, as EM began to execute its responsibilities, decision makers became aware that the complexity and magnitude of this mission could not be achieved efficiently, affordably, safely, or reasonably with existing technology. Once the need for advanced cleanup technologies became evident, EM established an aggressive, innovative program of applied research and technology development. The Office of Technology Development (OTD) was established in November 1989 to advance new and improved environmental restoration and waste management technologies that would reduce risks to workers, the public, and the environment; reduce cleanup costs; and devise methods to correct cleanup problems that currently have no solutions. In 1996, OTD added two new responsibilities - management of a Congressionally mandated environmental science program and development of risk policy, requirements, and guidance. OTD was renamed the Office of Science and Technology (OST). This documents presents information concerning robotics tank waste retrieval overview, robotic chemical analysis automation, robotics decontamination and dismantlement, and robotics crosscutting and advanced technology.

  3. The Westinghouse Hanford Company Unclassified Computer Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Gurth, R.J.

    1994-02-01

    This paper describes the evolution of the Westinghouse Hanford Company (WHC) Unclassified Computer Security (UCS) Program over the past seven years. The intent has been to satisfy the requirements included in the DOE Order 1360.2B (DOE 1992) for Unclassified Computer Security in the most efficient and cost-effective manner.

  4. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...

  5. Technology for low-cost PIR security sensors

    Science.gov (United States)

    Liddiard, Kevin C.

    2008-03-01

    Current passive infrared (PIR) security sensors employing pyroelectric detectors are simple, cheap and reliable, but have several deficiencies. These sensors, developed two decades ago, are essentially short-range moving-target hotspot detectors. They cannot detect slow temperature changes, and thus are unable to respond to radiation stimuli indicating potential danger such as overheating electrical appliances and developing fires. They have a poor optical resolution and limited ability to recognize detected targets. Modern uncooled thermal infrared technology has vastly superior performance but as yet is too costly to challenge the PIR security sensor market. In this paper microbolometer technology will be discussed which can provide enhanced performance at acceptable cost. In addition to security sensing the technology has numerous applications in the military, industrial and domestic markets where target range is short and low cost is paramount.

  6. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  7. A SURVEY REPORT ON VPN SECURITY & ITS TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    JAYANTHI GOKULAKRISHNAN

    2014-08-01

    Full Text Available Virtual Private Network (VPN is a communication network which provides secure data transmission in an unsecured or public network by using any combination of technologies. A virtual connection is made across the users who are geographically dispersed and networks over a shared or public network, like the Internet. Even though the data is transmitted in a public network, VPN provides an impression as if the data is transmitted through private connection. This paper provides a survey report on VPN security and its technologies.

  8. High Efficiency Engine Technologies Program

    Energy Technology Data Exchange (ETDEWEB)

    Rich Kruiswyk

    2010-07-13

    Caterpillar's Product Development and Global Technology Division carried out a research program on waste heat recovery with support from DOE (Department of Energy) and the DOE National Energy Technology Laboratory. The objective of the program was to develop a new air management and exhaust energy recovery system that would demonstrate a minimum 10% improvement in thermal efficiency over a base heavy-duty on-highway diesel truck engine. The base engine for this program was a 2007 C15 15.2L series-turbocharged on-highway truck engine with a LPL (low-pressure loop) exhaust recirculation system. The focus of the program was on the development of high efficiency turbomachinery and a high efficiency turbocompound waste heat recovery system. The focus of each area of development was as follows: (1) For turbine stages, the focus was on investigation and development of technologies that would improve on-engine exhaust energy utilization compared to the conventional radial turbines in widespread use today. (2) For compressor stages, the focus was on investigating compressor wheel design parameters beyond the range typically utilized in production, to determine the potential efficiency benefits thereof. (3) For turbocompound, the focus was on the development of a robust bearing system that would provide higher bearing efficiencies compared to systems used in turbocompound power turbines in production. None of the turbocharger technologies investigated involved addition of moving parts, actuators, or exotic materials, thereby increasing the likelihood of a favorable cost-value tradeoff for each technology. And the turbocompound system requires less hardware addition than competing bottoming cycle technologies, making it a more attractive solution from a cost and packaging standpoint. Main outcomes of the program are as follows: (1) Two turbine technologies that demonstrated up to 6% improvement in turbine efficiency on gas stand and 1-3% improvement in thermal efficiency

  9. High Efficiency Engine Technologies Program

    Energy Technology Data Exchange (ETDEWEB)

    Rich Kruiswyk

    2010-07-13

    Caterpillar's Product Development and Global Technology Division carried out a research program on waste heat recovery with support from DOE (Department of Energy) and the DOE National Energy Technology Laboratory. The objective of the program was to develop a new air management and exhaust energy recovery system that would demonstrate a minimum 10% improvement in thermal efficiency over a base heavy-duty on-highway diesel truck engine. The base engine for this program was a 2007 C15 15.2L series-turbocharged on-highway truck engine with a LPL (low-pressure loop) exhaust recirculation system. The focus of the program was on the development of high efficiency turbomachinery and a high efficiency turbocompound waste heat recovery system. The focus of each area of development was as follows: (1) For turbine stages, the focus was on investigation and development of technologies that would improve on-engine exhaust energy utilization compared to the conventional radial turbines in widespread use today. (2) For compressor stages, the focus was on investigating compressor wheel design parameters beyond the range typically utilized in production, to determine the potential efficiency benefits thereof. (3) For turbocompound, the focus was on the development of a robust bearing system that would provide higher bearing efficiencies compared to systems used in turbocompound power turbines in production. None of the turbocharger technologies investigated involved addition of moving parts, actuators, or exotic materials, thereby increasing the likelihood of a favorable cost-value tradeoff for each technology. And the turbocompound system requires less hardware addition than competing bottoming cycle technologies, making it a more attractive solution from a cost and packaging standpoint. Main outcomes of the program are as follows: (1) Two turbine technologies that demonstrated up to 6% improvement in turbine efficiency on gas stand and 1-3% improvement in thermal efficiency

  10. Security Management System for Oilfield Based on GSM Technology

    Directory of Open Access Journals (Sweden)

    Batchu Spandana,

    2011-06-01

    Full Text Available Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for the oil thefting, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical task for the security people. To improve the security level by implantation of wireless embedded technology will solve this problem. By reducing the manual power, at the site locations, and by improving the security level with the help of GSM based wireless technology which consist of transmitter (GSM modem at the site location and receiver is the GSM mobile. Information transmitted by the GSM modem at the plant location will be sent to the respective person’s mobile as a text message. The security people will take appropriate action according to the problem. For this we are used LPC2148 (ARM7 based microcontroller, which is the current dominant microcontroller in mobile based products and Softwaredevelopment tools as Keil, flash magic for loading hex file into the microcontroller.

  11. Respiratory Therapy Technology Program Guide.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This guide presents the standard curriculum for technical institutes in Georgia. The curriculum addresses the minimum competencies for a respiratory therapy technology program. The guide contains four sections. The General Information section contains an introduction giving an overview and defining the purpose and objectives, a program…

  12. A Chemical Technology Program Partnership

    Science.gov (United States)

    Hicks, Gary

    1998-01-01

    Brazosport College would be the first to admit that they owe the success of their Chemical Technology Program to the partnership that was developed between the college and the surrounding chemical industry. The college is a two-year institution located near the Texas Gulf Coast with more than twelve chemical companies in the immediate area. Dow Chemical is the largest, employing more than 5,000. Currently, the Science Department at Brazosport College offers associate of science degrees in biology, chemistry, and physics, and associate of applied science degrees in chemical technology and instrumentation technology to meet the needs of these industries. In addition, many students enroll in classes to prepare for specific occupations or to build their skills for employment. This may only require the student to take a few courses. The current Chemical Technology Program addresses skills needed for both laboratory and process technician jobs in the chemical industry. An Associate of Applied Science Degree in Chemical Technology is offered with either a laboratory or a process option. These programs were developed with input from the chemical industry, and the college trains all new process employees for BASF and Dow. Additionally, the college does customized flexible-entry training in process operations and laboratory analysis for these and several other companies.

  13. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... committing crimes against the bank and that will preserve evidence that may aid in their identification and... illuminating, during the hours of darkness, the area around the vault, if the vault is visible from outside the... security officer determines to be appropriate, taking into consideration: (i) The incidence of...

  14. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... identifying persons committing crimes against the institution and that will preserve evidence that may aid in... hours of darkness, the area around the vault, if the vault is visible from outside the banking office... security officer determines to be appropriate, taking into consideration: (i) The incidence of...

  15. PERSEUS Technology: New Trends in Information and Communication Security

    CERN Document Server

    Filiol, Eric

    2011-01-01

    Using cryptography to protect information and communication has bacically two major drawbacks. First, the specific entropy profile of encrypted data makes their detection very easy. Second, the use of cryptography can be more or less regulated, not to say forbidden, according to the countries. If the right to freely protect our personal and private data is a fundamental right, it must not hinder the action of Nation States with respect to National security. Allowing encryption to citizens holds for bad guys as well. In this paper we propose a new approach in information and communication security that may solve all these issues, thus representing a rather interesting trade-off between apparently opposite security needs. We introduce the concept of scalable security based on computationnally hard problem of coding theory with the PERSEUS technology. The core idea is to encode date with variable punctured convolutional codes in such a way that any cryptanalytic attempt will require a time-consuming encoder reco...

  16. Systems and technologies for enhanced coastal maritime security

    Science.gov (United States)

    Carapezza, Edward M.; Bucklin, Ann

    2008-04-01

    This paper describes a design for an innovative command and control system for an intelligent coastal maritime security system. The architecture for this intelligent coastal maritime security system is derived from the forth generation real-time control (RCS) system architecture1 developed by the National Institute of Science and Technology (NIST) over the past twenty years. This command and control system is a decision support system for real-time monitoring, response and training for security scenarios that can be hosted at various locations along the coast of the United States where homeland security surveillance and response activities are required. Additionally, this paper describes the design for a derivative real-time simulation based environment that can be used as a state-of-art test bed for developing new hardware and software components to be integrated into previous versions of deployed real-time control systems.

  17. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  18. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  19. National Security and Information Technology: The New Regulatory Option?

    Science.gov (United States)

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  20. Information Security / 2002 Command & Control Research & Technology Symposium

    OpenAIRE

    Buddenberg, Rex

    2002-01-01

    Approved for public display, distribution unlimited 2002 Command & Control Research & Technology Symposium, Naval Postgraduate School, Code IS/Bu, Monterey,CA,93943 Security in information systems is a complex problem. Single solutions to complex problems don't exist and matching the appropriate solution (or more accurately, a set of solutions) to a requirement is necessary.

  1. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  2. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  3. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  4. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program policy... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 6...

  5. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  6. Introduction to Distribution of National Security Programs [video

    OpenAIRE

    Kelberg, Scott; Center for Homeland Defense and Security Naval Postgraduate School

    2014-01-01

    In this Viewpoints session, Scott Kelberg discusses the management and distribution of instructive programs in homeland and cyber security. The National Preparedness Directorate (NPD) has been able to create optimal training programs and educational opportunities by taking advantage of interagency collaboration and focusing on reaching the right student.

  7. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS..., 56662-56663 that the Homeland Security Science and Technology Advisory Committee (HSSTAC) would meet on... will be held at the Department of Homeland Security (DHS), Science and Technology Directorate, 1120...

  8. Space Propulsion Technology Program Overview

    Science.gov (United States)

    Escher, William J. D.

    1991-01-01

    The topics presented are covered in viewgraph form. Focused program elements are: (1) transportation systems, which include earth-to-orbit propulsion, commercial vehicle propulsion, auxiliary propulsion, advanced cryogenic engines, cryogenic fluid systems, nuclear thermal propulsion, and nuclear electric propulsion; (2) space platforms, which include spacecraft on-board propulsion, and station keeping propulsion; and (3) technology flight experiments, which include cryogenic orbital N2 experiment (CONE), SEPS flight experiment, and cryogenic orbital H2 experiment (COHE).

  9. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  10. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  11. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  12. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting...

  13. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that...

  14. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science...

  15. 计算机网络安全技术%Security Technologies of Computer Network

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 卢锡城; 卢泽新; 韩亚欣

    2000-01-01

    With the development of computer network,requirements of computer network security have been more and more urgent. In tills paper, goals of network security are reviewed. Several network attack methods,such as interruption,interception, modification, fabrication,are studied. Network security technologies,such as security mechan!sm,encryption,security detection,firewall,were discussed.

  16. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  17. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  18. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  19. Strengthening 4-H Program Communication through Technology

    Science.gov (United States)

    Robideau, Kari; Santl, Karyn

    2011-01-01

    Advances in technology are transforming how youth and parents interact with programs. The Strengthening 4-H Communication through Technology project was implemented in eight county 4-H programs in Northwest Minnesota. This article outlines the intentional process used to effectively implement technology in program planning. The project includes:…

  20. 75 FR 1591 - Green Technology Pilot Program

    Science.gov (United States)

    2010-01-12

    ... Patent and Trademark Office Green Technology Pilot Program ACTION: Proposed collection; comment request...@uspto.gov . Include A0651-0062 Green Technology Pilot Program comment@ in the subject line of the... examination pilot program for patent applications pertaining to green technologies, including greenhouse...

  1. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July 21...

  2. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating Manual...

  3. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  4. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  5. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... technology to meet certain provisions of the Cruise Vessel Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection technologies. The Notice of request for...

  6. Secure Linear Programming Using Privacy-Preserving Simplex

    CERN Document Server

    Saxena, Amitabh; Hoogh, Sebastiaan J

    2009-01-01

    The SecureSCM project (www.securescm.org) aims to develop cryptographic solutions to the problem of data sharing in Supply Chain Optimization (SCO). The SCO problem has a precise mathematical structure. It is an instance of the general Linear Programming (LP) problem. However, standard techniques for LP problems are not suitable for this purpose because they require participants to reveal private data needed as input to the algorithm. The risk of revealing this information far exceeds the benefits gained. Therefore, the aim of the project is to develop efficient techniques for securely solving LP problems. In this paper we give a summary of work done in the cryptographic aspects of the project. We describe the state-of-the art building blocks for secure linear programming along with an analysis of their complexity.

  7. Clean Coal Technology Demonstration Program: Program Update 1998

    Energy Technology Data Exchange (ETDEWEB)

    Assistant Secretary for Fossil Energy

    1999-03-01

    Annual report on the Clean Coal Technology Demonstration Program (CCT Program). The report address the role of the CCT Program, implementation, funding and costs, accomplishments, project descriptions, legislative history, program history, environmental aspects, and project contacts. The project descriptions describe the technology and provides a brief summary of the demonstration results.

  8. Clean Coal Technology Demonstration Program: Program Update 2000

    Energy Technology Data Exchange (ETDEWEB)

    Assistant Secretary for Fossil Energy

    2001-04-01

    Annual report on the Clean Coal Technology Demonstration Program (CCT Program). The report address the role of the CCT Program, implementation, funding and costs, accomplishments, project descriptions, legislative history, program history, environmental aspects, and project contacts. The project descriptions describe the technology and provides a brief summary of the demonstration results.

  9. Clean Coal Technology Demonstration Program: Program Update 2001

    Energy Technology Data Exchange (ETDEWEB)

    Assistant Secretary for Fossil Energy

    2002-07-30

    Annual report on the Clean Coal Technology Demonstration Program (CCT Program). The report address the role of the CCT Program, implementation, funding and costs, accomplishments, project descriptions, legislative history, program history, environmental aspects, and project contacts. The project descriptions describe the technology and provides a brief summary of the demonstration results. Also includes Power Plant Improvement Initiative Projects.

  10. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  11. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  12. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Science.gov (United States)

    2010-04-13

    ... below has been submitted to the Office of Management and Budget (OMB) for review, as required by the... Multiclass Securities program is to increase liquidity in the secondary mortgage market and to attract new... Desk Officer, Office of Management and Budget, New Executive Office Building, Washington, DC 20503; fax...

  13. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... application development. The language is implemented in a prototype compiler that generates Java code exploiting a distributed cryptographic runtime....

  14. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  15. A Doctoral Program With Specialization in Information Security

    Science.gov (United States)

    2004-01-01

    non-native English speakers are required to score well on the TOEFL examination as a requirement for admission to the NPS Ph.D. program. A Master’s...selected (checked) courses intended to prepare them for dissertation research. Candidates in the Information Assurance and Security specialization

  16. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  17. Building Technologies Program Multi-Year Program Plan Technology Validation and Market Introduction 2008

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-01-01

    Building Technologies Program Multi-Year Program Plan 2008 for technology validation and market introduction, including ENERGY STAR, building energy codes, technology transfer application centers, commercial lighting initiative, EnergySmart Schools, EnergySmar

  18. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration....

  19. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  20. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  1. Supplemental nutrition assistance program participation and child food security.

    Science.gov (United States)

    Mabli, James; Worthington, Julie

    2014-04-01

    This article investigates the association between Supplemental Nutrition Assistance Program (SNAP) participation and child food security by using data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 3000 households with children and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 months. Next, by using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 months later. Multivariate logistic regression analysis was used to estimate associations between SNAP and child food security. SNAP participation was associated with an approximately one-third decrease in the odds of children being food insecure in both samples. In the cross-sectional analysis only, SNAP was also associated with a decrease in the odds of children experiencing severe food insecurity (designated very low food security). Findings were qualitatively robust to different empirical specifications. After controlling for other possible confounders, we found children in households that had participated in SNAP for 6 months experienced improvements in food security. On the basis of these findings, we conclude SNAP serves a vital role in improving the health and well-being of low-income children by increasing food security. Future research is needed to determine whether specific groups of children experience differential improvements in food security.

  2. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  3. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    Directory of Open Access Journals (Sweden)

    Mustafijur Rahman

    2015-03-01

    Full Text Available "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detection and lock system etc. Furthermore it has advanced security compared to other houses and can send a message to the user for action that occur inside his/her house while he/she is away from home. It can also allow a person to control appliances from a remote location by mobile phone using GSM technology.

  4. 49 CFR 1546.103 - Form, content, and availability of security program.

    Science.gov (United States)

    2010-10-01

    ... protection. (2) In English unless TSA requests that the program be submitted in the official language of the... program. 1546.103 Section 1546.103 Transportation Other Regulations Relating to Transportation (Continued... CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program....

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  6. Student Technology Competencies for School Counseling Programs.

    Science.gov (United States)

    Hines, Peggy LaTurno

    2002-01-01

    This article briefly reviews the growth of technology and the development of standards related to technology in counseling, Pre-K-12 education, educator preparation programs, and the field of school counseling. The development of pre-admission and program outcome technology skills at Indiana State University is discussed along with the specific…

  7. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ... Bureau of Industry and Security Proposed Information Collection; Comment Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security... of U.S. industrial base sectors deemed critical to U.S. national security. The information gathered...

  8. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00 a... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  9. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00 a.m... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  10. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  11. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Science.gov (United States)

    2010-04-01

    ... Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the related forms prescribed by the Social Security Administration for use by the public in applying...

  12. 75 FR 64692 - Green Technology Pilot Program

    Science.gov (United States)

    2010-10-20

    ... Patent and Trademark Office Green Technology Pilot Program ACTION: Proposed collection; comment request...: ] E-mail: InformationCollection@uspto.gov . Include ``0651- 0062 Green Technology Pilot Program... Office (USPTO) implemented a pilot program on December 8, 2009, that permits patent...

  13. Clean Coal Technology Programs: Program Update 2003 (Volume 1)

    Energy Technology Data Exchange (ETDEWEB)

    Assistant Secretary for Fossil Energy

    2003-12-01

    Annual report on the Clean Coal Technology Demonstration Program (CCTDP), Power Plant Improvement Initiative (PPII), and Clean Coal Power Initiative (CCPI). The report addresses the roles of the programs, implementation, funding and costs, project descriptions, legislative history, program history, environmental aspects, and project contacts. The project descriptions describe the technology and provides a brief summary of the demonstration results.

  14. Terahertz Technology for Defense and Security-Related Applications

    DEFF Research Database (Denmark)

    Iwaszczuk, Krzysztof

    This thesis deals with chosen aspects of terahertz (THz) technology that have potential in defense and security-related applications. A novel method for simultaneous data acquisition in time-resolved THz spectroscopy experiments is developed. This technique is demonstrated by extracting the sheet...... conductivity of photoexcited charge carriers in semi-insulating gallium arsenide. Comparison with results obtained using a standard data acquisition scheme shows that the new method minimizes errors originating from uctuations in the laser system output and timing errors in the THz pulse detection. Furthermore...

  15. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  16. 75 FR 22553 - Technology Innovation Program Advisory Board

    Science.gov (United States)

    2010-04-29

    ... National Institute of Standards and Technology Technology Innovation Program Advisory Board AGENCY.... SUMMARY: The Technology Innovation Program Advisory Board, National Institute of Standards and Technology... Technology Innovation Program (TIP) Advisory Board is composed of ten members appointed by the Director...

  17. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  18. Division of Environmental Control Technology program, 1977

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-06-01

    Environmental engineering programs are reviewed for the following technologies; coal; petroleum and gas; oil shale; solar; geothermal and energy conservation; nuclear energy; and decontamination and decommissioning. Separate abstracts were prepared for each technology. (MHR)

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM CASE STUDIES: DEMONSTRATING PROGRAM OUTCOMES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This bookle...

  1. Employment among Social Security disability program beneficiaries, 1996-2007.

    Science.gov (United States)

    Mamun, Arif; O'Leary, Paul; Wittenburg, David C; Gregory, Jesse

    2011-01-01

    We use linked administrative data from program and earnings records to summarize the 2007 employment rates of Social Security disability program beneficiaries at the national and state levels, as well as changes in employment since 1996. The findings provide new information on the employment activities of beneficiaries that should be useful in assessing current agency policies and providing benchmarks for ongoing demonstration projects and future return-to-work initiatives. The overall employment rate--which we define as annual earnings over $1,000--was 12 percent in 2007. Substantial variation exists within the population. Disability Insurance beneficiaries and those younger than age 40 were much more likely to work relative to other Social Security beneficiaries. Additionally, substantial regional variation exists across states; employment rates ranged from 7 percent (West Virginia) to 23 percent (North Dakota). Moreover, we find that the employment rates among beneficiaries were sensitive to the business cycle and persistent over time.

  2. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  3. Defense Transportation’s EDI Program: A Security Risk Assessment

    Science.gov (United States)

    1993-05-01

    available when needed. One way to provide proof of system-security procedures is to follow the guide- lines in the Inteinal Management Control Program ( IMCP ...as mandated by the Federal Manager’s Financial Integrity Act (FMFIA). The IMCP prescribes both general and specific standards for maintaining...appropriate internal controls. For 12 example, the IMCP states that control systems shall be properly documented, trans- actions and other significant

  4. Evaluating Security Technologies Used to Enhance Physical Security Capabilities at Domestic and Deployed Bases

    Science.gov (United States)

    2013-07-01

    secure wireless communications, behavioral analysis , and installation access control 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...Secure Wireless Communications  Installation Access Control  Integrated Waterside Security  Behavioral Analysis , and  Other areas as prescribed...Wireless Communications  Installation Access Control  Situational Awareness  Behavioral Analysis  Integrated Waterside Security, and  Other areas

  5. How Programming Fits with Technology Education Curriculum

    Science.gov (United States)

    Wright, Geoffrey A.; Rich, Peter; Leatham, Keith R.

    2012-01-01

    Programming is a fundamental component of modern society. Programming and its applications influence much of how people work and interact. Because of people's reliance on programming in one or many of its applications, there is a need to teach students to be programming literate. Because the purpose of the International Technology and Engineering…

  6. How Programming Fits with Technology Education Curriculum

    Science.gov (United States)

    Wright, Geoffrey A.; Rich, Peter; Leatham, Keith R.

    2012-01-01

    Programming is a fundamental component of modern society. Programming and its applications influence much of how people work and interact. Because of people's reliance on programming in one or many of its applications, there is a need to teach students to be programming literate. Because the purpose of the International Technology and Engineering…

  7. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    Energy Technology Data Exchange (ETDEWEB)

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  8. The Information Technology Program Manager’s Dilemma: Rapidly Evolving Technology and Stagnant Processes

    Science.gov (United States)

    2010-08-01

    information technology systems. The current DoDI 5000.02 leaves IT project and program managers wondering how the current process applies to them, as the guidance is fairly rigid and does not allow for the flexibility required to appropriately manage IT programs. Until very recently, in comparison to the development of a traditional weapons system, IT programs seemed to have been viewed as a utility or service instead of a critical component to national security. Perhaps that is because data passing through cables cannot be observed with the naked senses and therefore an

  9. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  10. Based on combination of L2TP and IPSec VPN security technology research

    Directory of Open Access Journals (Sweden)

    Ya-qin Fan

    2012-01-01

    Full Text Available This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data transmission, and the simulation results of VPN is valuable for security professionals to refer.

  11. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007)...

  12. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be...

  13. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan...

  14. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  15. Building Technologies Program Multi-Year Program Plan Program Portfolio Management 2008

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-01-01

    Building Technologies Program Multi-Year Program Plan 2008 for program portfolio management, including the program portfolio management process, program analysis, performance assessment, stakeholder interactions, and cross-cutting issues.

  16. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  17. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  18. Innovative Technology Development Program. Final summary report

    Energy Technology Data Exchange (ETDEWEB)

    Beller, J.

    1995-08-01

    Through the Office of Technology Development (OTD), the U.S. Department of Energy (DOE) has initiated a national applied research, development, demonstration, testing, and evaluation program, whose goal has been to resolve the major technical issues and rapidly advance technologies for environmental restoration and waste management. The Innovative Technology Development (ITD) Program was established as a part of the DOE, Research, Development, Demonstration, Testing, and Evaluation (RDDT&E) Program. The plan is part of the DOE`s program to restore sites impacted by weapons production and to upgrade future waste management operations. On July 10, 1990, DOE issued a Program Research and Development Announcement (PRDA) through the Idaho Operations Office to solicit private sector help in developing innovative technologies to support DOE`s clean-up goals. This report presents summaries of each of the seven projects, which developed and tested the technologies proposed by the seven private contractors selected through the PRDA process.

  19. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  20. Environmental technologies program, Fiscal year 1994

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-12-31

    This document presents details of the technology that is currently being demonstrated at the Hanford Site. The program is testing technology for cost and time savings in the following clean-up areas: detection and characterization; soil and ground water remediation; remote handling; waste minimization; and high-level, low-level, and mixed waste treatment. This document also contains a technology integration section.

  1. 76 FR 70970 - Technology Innovation Program Advisory Board

    Science.gov (United States)

    2011-11-16

    ... National Institute of Standards and Technology Technology Innovation Program Advisory Board AGENCY.... SUMMARY: The Technology Innovation Program (TIP) Advisory Board will hold a meeting via teleconference on... Innovation Program Acting Deputy Director, National Institute of Standards and Technology, 100 Bureau...

  2. 76 FR 22673 - Technology Innovation Program Advisory Board

    Science.gov (United States)

    2011-04-22

    ... National Institute of Standards and Technology Technology Innovation Program Advisory Board AGENCY... notice in the Federal Register announcing an open meeting for the Technology Innovation Program Advisory... rene.cesaro@nist.gov . SUPPLEMENTARY INFORMATION: The Technology Innovation Program (TIP)...

  3. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  4. A tracking technology for security personnel and first responders

    Science.gov (United States)

    Womble, Phillip; Barzilov, Alexander; Paschal, Jon; Hopper, Lindsay; Music, Abe; Morgan, Timothy; Moore, Ryan; Pinson, Dudley; Schultz, Frederick; Maston, Michael J.; Kowalik, Robert

    2005-05-01

    Northwest Nuclear, LLC (NWN), the Applied Physics Institute (API) at Western Kentucky University, and Crisis Prep Services, LLC (CPS) have developed a tracking technology for first responders and security personnel based upon the AeroScout system (a product of AeroScout, Inc.) and technologies developed independently by NWN, API, and CPS. These systems provide location information using 802.11XXX architecture by measuring the time of arrival of packets from a set of active radio frequency (RF) tags to a set of location receivers. The system can track and graphically display the location on maps, drawings, floor plans or photographs of tagged items on any 802.11-compliant devices (PDAs, laptops, computers, WiFi telephones) situated both outside and inside structures. This location information would be vital for tracking the location of first responders, security, and other emergency personnel during rescue operations; particularly, under adverse conditions (e.g., fires). NWN, API, and CPS have been improving the precision of the location measurement to an uncertainty of 20 cm or 8 inches (under certain conditions) and also developing algorithms to increase the accuracy. NWN and API personnel have developed: 1) special tags which indicate tampering or sudden movement and transmit briefly under these conditions, and 2) permanent and portable systems which can be deployed rapidly. Additional software created by Crisis Prep Services, LLC allows response force personnel to be tracked and located inside a building in real time as well as use the software and tags as a training and rehersal system. The location of each person is depicted on a drawing of the building and is displayed on a laptop computer or any other browser capable device.

  5. Clean Coal Technology Demonstration Program: Program update 1993

    Energy Technology Data Exchange (ETDEWEB)

    1994-03-01

    The Clean Coal Technology Demonstration Program (also referred to as the CCT Program) is a $6.9 billion cost-shared industry/government technology development effort. The program is to demonstrate a new generation of advanced coal-based technologies, with the most promising technologies being moved into the domestic and international marketplace. Technology has a vital role in ensuring that coal can continue to serve U.S. energy interests and enhance opportunities for economic growth and employment while meeting the national committment to a clean and healthy global environment. These technologies are being advanced through the CCT Program. The CCT Program supports three substantive national objectives: ensuring a sustainable environment through technology; enhancing energy efficiency and reliability; providing opportunities for economic growth and employment. The technologies being demonstrated under the CCT Program reduce the emissions of sulfur oxides, nitrogen oxides, greenhouse gases, hazardous air pollutants, solid and liquid wastes, and other emissions resulting from coal use or conversion to other fuel forms. These emissions reductions are achieved with efficiencies greater than or equal to currently available technologies.

  6. Report on Sensor Technology for Battlefield and Physical Security Applications.

    Science.gov (United States)

    1977-07-01

    END ITEMS, IT SHOULD BE USEFUL IF WE GET A HANDLE ON THE OVERALL MANAGEMENT CONCEPTo THE PROGRAM OBJECTIVES, AND THE ESTIMATED FUNDING LEVELS...LEARN MORE ABOUT THE DEVICES THAT WILL BE AVAILABLE ON THE OPEN MARKET . WE WOULD EXPECT SUCH A CENTER TO BE ACCESSABLE BY ALL FEDERAL AGENCIES AND TO...that the ported coaxial cable sensor technology does work and that it appears to work better than other sensors on the market . The ADM development

  7. 76 FR 18166 - Technology Innovation Program Advisory Board

    Science.gov (United States)

    2011-04-01

    ... National Institute of Standards and Technology Technology Innovation Program Advisory Board AGENCY.... SUMMARY: The Technology Innovation Program Advisory Board, National Institute of Standards and Technology.... Cesaro's e-mail address is rene.cesaro@nist.gov . SUPPLEMENTARY INFORMATION: The Technology...

  8. Clean Technology Evaluation & Workforce Development Program

    Energy Technology Data Exchange (ETDEWEB)

    Patricia Glaza

    2012-12-01

    The overall objective of the Clean Technology Evaluation portion of the award was to design a process to speed up the identification of new clean energy technologies and match organizations to testing and early adoption partners. The project was successful in identifying new technologies targeted to utilities and utility technology integrators, in developing a process to review and rank the new technologies, and in facilitating new partnerships for technology testing and adoption. The purpose of the Workforce Development portion of the award was to create an education outreach program for middle & high-school students focused on clean technology science and engineering. While originally targeting San Diego, California and Cambridge, Massachusetts, the scope of the program was expanded to include a major clean technology speaking series and expo as part of the USA Science & Engineering Festival on the National Mall in Washington, D.C.

  9. Systems autonomy technology: Executive summary and program plan

    Science.gov (United States)

    Bull, John S (Editor)

    1987-01-01

    The National Space Strategy approved by the President and Congress in 1984 sets for NASA a major goal of conducting effective and productive space applications and technology programs which contribute materially toward United States leadership and security. To contribute to this goal, OAST supports the Nation's civil and defense space programs and overall economic growth. OAST objectives are to ensure timely provision of new concepts and advanced technologies, to support both the development of NASA missions in space and the space activities of industry and other organizations, to utilize the strengths of universities in conducting the NASA space research and technology program, and to maintain the NASA centers in positions of strength in critical space technology areas. In line with these objectives, NASA has established a new program in space automation and robotics that will result in the development and transfer and automation technology to increase the capabilities, productivity, and safety of NASA space programs including the Space Station, automated space platforms, lunar bases, Mars missions, and other deep space ventures. The NASA/OAST Automation and Robotics program is divided into two parts. Ames Research Center has the lead role in developing and demonstrating System Autonomy capabilities for space systems that need to make their own decisions and do their own planning. The Jet Propulsion Laboratory has the lead role for Telerobotics (that portion of the program that has a strong human operator component in the control loop and some remote handling requirement in space). This program is intended to be a working document for NASA Headquarters, Program Offices, and implementing Project Management.

  10. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  11. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  12. Characterization, Monitoring and Sensor Technology Integrated Program

    Energy Technology Data Exchange (ETDEWEB)

    1993-04-01

    This booklet contains summary sheets that describe FY 1993 characterization, monitoring, and sensor technology (CMST) development projects. Currently, 32 projects are funded, 22 through the OTD Characterization, Monitoring, and Sensor Technology Integrated Program (CMST-IP), 8 through the OTD Program Research and Development Announcement (PRDA) activity managed by the Morgantown Energy Technology Center (METC), and 2 through Interagency Agreements (IAGs). This booklet is not inclusive of those CMST projects which are funded through Integrated Demonstrations (IDs) and other Integrated Programs (IPs). The projects are in six areas: Expedited Site Characterization; Contaminants in Soils and Groundwater; Geophysical and Hydrogeological Measurements; Mixed Wastes in Drums, Burial Grounds, and USTs; Remediation, D&D, and Waste Process Monitoring; and Performance Specifications and Program Support. A task description, technology needs, accomplishments and technology transfer information is given for each project.

  13. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  14. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  15. Security Mitigations for Return-Oriented Programming Attacks

    CERN Document Server

    Bania, Piotr

    2010-01-01

    With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system's security protection mechanisms. In this paper we present a short summary of novel and known mitigation techniques against return-oriented programming (ROP) attacks. The techniques described in this article are related mostly to x86-32 processors and Microsoft Windows operating systems.

  16. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00 a.m...

  17. Programming and Technology for Accessibility in Geoscience

    Science.gov (United States)

    Sevre, E.; Lee, S.

    2013-12-01

    Many people, students and professors alike, shy away from learning to program because it is often believed to be something scary or unattainable. However, integration of programming into geoscience education can be a valuable tool for increasing the accessibility of content for all who are interested. It is my goal to dispel these myths and convince people that: 1) Students with disabilities can use programming to increase their role in the classroom, 2) Everyone can learn to write programs to simplify daily tasks, 3) With a deep understanding of the task, anyone can write a program to do a complex task, 4) Technology can be combined with programming to create an inclusive environment for all students of geoscience, and 5) More advanced knowledge of programming and technology can lead geoscientists to create software to serve as assistive technology in the classroom. It is my goal to share my experiences using technology to enhance the classroom experience as a way of addressing the aforementioned issues. Through my experience, I have found that programming skills can be included and learned by all to enhance the content of courses without detracting from curriculum. I hope that, through this knowledge, geoscience courses can become more accessible for people with disabilities by including programming and technology to the benefit of all involved.

  18. Clean Coal Technology Demonstration Program. Program update 1994

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-04-01

    The Clean Coal Technology Demonstration Program (CCT Program) is a $7.14 billion cost-shared industry/government technology development effort. The program is to demonstrate a new generation of advanced coal-based technologies, with the most promising technologies being moved into the domestic and international marketplace. Clean coal technologies being demonstrated under the CCT program are creating the technology base that allows the nation to meet its energy and environmental goals efficiently and reliably. The fact that most of the demonstrations are being conducted at commercial scale, in actual user environments, and under conditions typical of commercial operations allows the potential of the technologies to be evaluated in their intended commercial applications. The technologies are categorized into four market sectors: advanced electric power generation systems; environmental control devices; coal processing equipment for clean fuels; and industrial technologies. Sections of this report describe the following: Role of the Program; Program implementation; Funding and costs; The road to commercial realization; Results from completed projects; Results and accomplishments from ongoing projects; and Project fact sheets. Projects include fluidized-bed combustion, integrated gasification combined-cycle power plants, advanced combustion and heat engines, nitrogen oxide control technologies, sulfur dioxide control technologies, combined SO{sub 2} and NO{sub x} technologies, coal preparation techniques, mild gasification, and indirect liquefaction. Industrial applications include injection systems for blast furnaces, coke oven gas cleaning systems, power generation from coal/ore reduction, a cyclone combustor with S, N, and ash control, cement kiln flue gas scrubber, and pulse combustion for steam coal gasification.

  19. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology (IT) resources....

  20. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... telecommunications policy. The new NSTAC Chair, James Crowe, Chief Executive Officer (CEO), Level 3...

  1. Building Technologies Program Multi-Year Program Plan Program Overview 2008

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-01-01

    Building Technologies Program Multi-Year Program Plan Program Overview 2008, including market overview and federal role, program vision, mission, design and structure, and goals and multi-year targets.

  2. Geothermal Technologies Program 2011 Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    Hollett, Douglas [Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States); Stillman, Greg [Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States)

    2011-06-01

    On June 6-10, 2011, the U.S. Department of Energy (DOE), Office of Energy Efficiency and Renewable Energy (EERE), Geothermal Technologies Program (GTP or the Program) conducted its annual program peer review in Bethesda, Maryland. In accordance with the EERE Peer Review Guide, the review provides an independent, expert evaluation of the strategic goals and direction of the program and is a forum for feedback and recommendations on future program planning. The purpose of the review was to evaluate DOE-funded projects for their contribution to the mission and goals of the Program and to assess progress made against stated objectives.

  3. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  4. Technology Partnership Program fiscal year 1998 program plan

    Energy Technology Data Exchange (ETDEWEB)

    Ford, R.

    1997-09-15

    The Oak Ridge Y-12 Plant will use the Technology Partnership Program to support the DOE nuclear weapons complex (NWC), particularly at the Oak Ridge Y-12 Plant. This support will be achieved through partnerships with industry that enhance the science and technology base and the core capabilities necessary to meet current and future weapons program mission needs. This program will enhance the Weapons Complex technology base and core capabilities by participating, in diversified portfolios of collaborative projects with industrial. The Y-12 Technology Partnership Program (TPP) closely aligns its program with the goals, objectives, and strategies of the DP Stockpile Stewardship and Management plans and DOE technology transfer policy. The Y-12 Defense Programs Office is the primary customer of the Y-12 TPP, and provides input to program planning and execution. Industry involvement is also an essential component. Programs and projects within the Y-12 TPP are responsive to identified weapons complex mission needs. In FY98 the Y-12 TPP will execute the plan devised during FY97 which emphasized the program`s increasing focus on providing benefits to DP. This plan called for the soft-landing of four terminated projects early in FY97 and the normal conclusion of four others at various times throughout the year. Successful conclusion of these projects enabled a call for new TPP projects in FY98 with clearer Defense Program benefits. The Defense Programs benefits were assured by the participation of Y-12`s Weapon Advisory Council, which met to determine proposal guidelines and criteria. The Weapons Advisory Council later met to rank each proposal against the established guidelines assuring those proposals with the best DP benefits would be chosen. The goal for the Y-12 TPP program will be to successfully implement the winning proposals in the first quarter of FY98 and maintain administrative and fiscal control over these and continuing projects.

  5. Technology Partnership Program fiscal year 1998 program plan

    Energy Technology Data Exchange (ETDEWEB)

    Ford, R.

    1997-09-15

    The Oak Ridge Y-12 Plant will use the Technology Partnership Program to support the DOE nuclear weapons complex (NWC), particularly at the Oak Ridge Y-12 Plant. This support will be achieved through partnerships with industry that enhance the science and technology base and the core capabilities necessary to meet current and future weapons program mission needs. This program will enhance the Weapons Complex technology base and core capabilities by participating, in diversified portfolios of collaborative projects with industrial. The Y-12 Technology Partnership Program (TPP) closely aligns its program with the goals, objectives, and strategies of the DP Stockpile Stewardship and Management plans and DOE technology transfer policy. The Y-12 Defense Programs Office is the primary customer of the Y-12 TPP, and provides input to program planning and execution. Industry involvement is also an essential component. Programs and projects within the Y-12 TPP are responsive to identified weapons complex mission needs. In FY98 the Y-12 TPP will execute the plan devised during FY97 which emphasized the program`s increasing focus on providing benefits to DP. This plan called for the soft-landing of four terminated projects early in FY97 and the normal conclusion of four others at various times throughout the year. Successful conclusion of these projects enabled a call for new TPP projects in FY98 with clearer Defense Program benefits. The Defense Programs benefits were assured by the participation of Y-12`s Weapon Advisory Council, which met to determine proposal guidelines and criteria. The Weapons Advisory Council later met to rank each proposal against the established guidelines assuring those proposals with the best DP benefits would be chosen. The goal for the Y-12 TPP program will be to successfully implement the winning proposals in the first quarter of FY98 and maintain administrative and fiscal control over these and continuing projects.

  6. Public Procurement of Security Technology : A multiple case study of Swedish municipalities and regions

    OpenAIRE

    Rolandsson, Rasmus

    2016-01-01

    Municipalities and regions in Sweden have an increasing need to purchase security technology to secure their properties and their operations. However this procurement process is strictly regulated by the Swedish procurement act (“Lagen om Offentlig Upphandling”, LoU), leading to a similar procurement process. However no academic studies have been done on the procurement of security technology in local authorities.This thesis explores and maps this process and the important aspects which affec...

  7. Computer Programming Projects in Technology Courses.

    Science.gov (United States)

    Thomas, Charles R.

    1985-01-01

    Discusses programming projects in applied technology courses, examining documentation, formal reports, and implementation. Includes recommendations based on experience with a sophomore machine elements course which provided computers for problem solving exercises. (DH)

  8. Environmental Technology Verification Program (ETV) Policy Compendium

    Science.gov (United States)

    The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

  9. A Program Office Guide to Technology Transfer

    Science.gov (United States)

    1988-11-01

    maintenance is emphasized, interchan- tions. Second source component verification geability requirements are pushed lower to the activities often are...technology tiansfer risk, the program office considers the following: 10.7 THE TECNOLOGY TRANSFERPLAN * Schedule intensity and concurrency The

  10. Appendix J - GPRA06 vehicle technologies program

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2009-01-18

    The target market for the Office of FreedomCAR and Vehicle Technologies (FCVT) program include light vehicles (cars and light trucks) and heavy vehicles (trucks more than 10,000 pounds Gross Vehicle Weight).

  11. The Military Critical Technologies Program's Space Systems Technologies

    Science.gov (United States)

    Wick, R.

    The major objectives of the Militarily Critical Technologies Program (MCTP) are to identify and characterize technologies by specific parameters including quantitative values and to assess worldwide technology capabilities. The MCTP program, which is sponsored by the office of the Deputy Under Secretary/ITS vice Under Secretary, develops the Militarily Critical Technologies List (MCTL) though the support of the Institute for Defense Analyses. This paper describes the MCTL and its Space Systems Technologies. It outlines the unique TWG process developed by the Institute for Defense Analyses (IDA) to support the MCTP. It also outlines the approach used to determine which technologies are included as well as how worldwide technology capability assessment for each technology is determined. Each TWG has a broad membership that includes representatives from government, industry and academia who are subject matter experts in their respective fields. Therefore, the TWG process provides a systematic, ongoing assessment and analysis of goods and technologies to determine technologies that are being developed worldwide that significantly enhance or degrade military capabilities.

  12. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  13. The Clean Coal Technology Program: Lessons learned

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The Clean Coal Technology (CCT) Program is a unique partnership between the federal government and industry that has as its primary goal the successful introduction of new clean coal utilization technologies into the energy marketplace. Clean coal technologies being demonstrated under the CCT Program are establishing a technology base that will enable the nation to meet more stringent energy and environmental goals. Most of the, demonstrations are being conducted at commercial scale, in actual user environments, and under circumstances typical of commercial operations. These features allow the potential of the technologies to be evaluated in their intended commercial applications. Each application addresses one of the following four market sectors: advanced electric power generation; environmental control devices; coal processing for clean fuels; and industrial applications. The purpose of this report is fourfold: Explain the CCT program as a model for successful joint government industry partnership for selecting and demonstrating technologies that have promise for adaptation to the energy marketplace; set forth the process by which the process has been implemented and the changes that have been made to improve that process; outline efforts employed to inform potential users and other interested parties about the technologies being developed; and examine some of the questions which must be considered in determining if the CCT Program model can be applied to other programs.

  14. Semiconductor technology program: Progress briefs

    Science.gov (United States)

    Galloway, K. F.; Scace, R. I.; Walters, E. J.

    1981-01-01

    Measurement technology for semiconductor materials, process control, and devices, is discussed. Silicon and silicon based devices are emphasized. Highlighted activities include semiinsulating GaAs characterization, an automatic scanning spectroscopic ellipsometer, linewidth measurement and coherence, bandgap narrowing effects in silicon, the evaluation of electrical linewidth uniformity, and arsenicomplanted profiles in silicon.

  15. 75 FR 10464 - Broadband Technology Opportunities Program

    Science.gov (United States)

    2010-03-08

    ... National Telecommunications and Information Administration RIN 0660-ZA28 Broadband Technology Opportunities... Technology Opportunities Program (BTOP) is extended until 5:00 p.m. Eastern Daylight Time (EDT) on March 26... Sustainable Broadband Adoption (SBA) projects. DATES: All applications for funding CCI projects must...

  16. Mine Waste Technology Program Electrochemical Tailings Cover

    Science.gov (United States)

    This report summarizes the results of Mine Waste Technology Program (MWTP) Activity III, Project 40, Electrochemical Tailings Cover, funded by the U.S. Environmental Protection Agency (EPA) and jointly administered by EPA and the U.S. Department of Energy (DOE). MSE Technology A...

  17. The Changing Nature of Educational Technology Programs

    Science.gov (United States)

    Spector, J. Michael

    2015-01-01

    The many changes in educational technologies have been well documented in both the professional and popular literature. What is less well documented is the changing nature of programs that prepare individuals for careers in the broad multi-disciplinary field of educational technology. This article is a first attempt to look at how educational…

  18. Solar Energy Technologies Program Newsletter - July 2009

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-07-01

    This quarterly newsletter is intended for participants and stakeholders in the DOE Solar Program. The content includes features on technology development, market transformation, and policy analysis for solar. Highlights include solar industry updates, DOE funding opportunity announcements and awards, and national laboratory technology developments.

  19. Characterization monitoring & sensor technology crosscutting program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    The purpose of the Characterization, Monitoring, and Sensor Technology Crosscutting Program (CMST-CP) is to deliver appropriate characterization, monitoring, and sensor technology (CMST) to the OFfice of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60).

  20. Solar Energy Technologies Program Newsletter - September 2009

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-10-01

    This quarterly newsletter is intended for participants and stakeholders in the DOE Solar Program. The content includes features on technology development, market transformation, and policy analysis for solar. Highlights include solar industry updates, DOE funding opportunity announcements and awards, and national laboratory technology developments.

  1. Mine Waste Technology Program Electrochemical Tailings Cover

    Science.gov (United States)

    This report summarizes the results of Mine Waste Technology Program (MWTP) Activity III, Project 40, Electrochemical Tailings Cover, funded by the U.S. Environmental Protection Agency (EPA) and jointly administered by EPA and the U.S. Department of Energy (DOE). MSE Technology A...

  2. Technology Refresh Program Launches Phase II | Poster

    Science.gov (United States)

    The Technology Refresh Program (TRP) is an NCI-funded initiative designed to promote efficient spending on computer equipment by providing staff members with access to the latest technology to meet their computing needs, said Kyle Miller, IT coordinator, Computer and Statistical Services (C&SS), NCI at Frederick.

  3. 75 FR 62369 - Technology Innovation Program Advisory Board

    Science.gov (United States)

    2010-10-08

    ... Innovation Program Advisory Board AGENCY: National Institute of Standards and Technology, Department of Commerce. ACTION: Notice of public meeting. SUMMARY: The Technology Innovation Program Advisory Board... address is rene.cesaro@nist.gov . SUPPLEMENTARY INFORMATION: The Technology Innovation Program...

  4. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  5. Technology for Online Portfolio Assessment Programs

    Science.gov (United States)

    Ferrara, Victoria M.

    2010-01-01

    Portfolio assessment is a valid and reliable method to assess experiential learning. Developing a fully online portfolio assessment program is neither easy nor inexpensive. The institution seeking to take its portfolio assessment program online must make a commitment to its students by offering the technologies most suited to meet students' needs.…

  6. Commercial Refrigeration Technology. Florida Vocational Program Guide.

    Science.gov (United States)

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    The program guide for commercial refrigeration technology courses in Florida identifies primary considerations for the organization, operation, and evaluation of a vocational education program. Following an occupational description for the job title for refrigeration mechanic, and its Dictionary of Occupational Titles code, are six sections…

  7. Telecommunications and Technology Infrastructure Program, 2013

    Science.gov (United States)

    California Community Colleges, Chancellor's Office, 2014

    2014-01-01

    This 16th annual report highlights up-to-date information on the programs supported through the Chancellor's Office Telecommunications and Technology Infrastructure Program (TTIP). To summarize 2012-13, one would describe it as a year of planning and preparation. The system-wide budget cuts of the past few years, reports of impacted classes, staff…

  8. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network

  9. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  10. HUMID AIR TURBINE CYCLE TECHNOLOGY DEVELOPMENT PROGRAM

    Energy Technology Data Exchange (ETDEWEB)

    Richard Tuthill

    2002-07-18

    The Humid Air Turbine (HAT) Cycle Technology Development Program focused on obtaining HAT cycle combustor technology that will be the foundation of future products. The work carried out under the auspices of the HAT Program built on the extensive low emissions stationary gas turbine work performed in the past by Pratt & Whitney (P&W). This Program is an integral part of technology base development within the Advanced Turbine Systems Program at the Department of Energy (DOE) and its experiments stretched over 5 years. The goal of the project was to fill in technological data gaps in the development of the HAT cycle and identify a combustor configuration that would efficiently burn high moisture, high-pressure gaseous fuels with low emissions. The major emphasis will be on the development of kinetic data, computer modeling, and evaluations of combustor configurations. The Program commenced during the 4th Quarter of 1996 and closed in the 4th Quarter of 2001. It teamed the National Energy Technology Laboratory (NETL) with P&W, the United Technologies Research Center (UTRC), and a subcontractor on-site at UTRC, kraftWork Systems Inc. The execution of the program started with bench-top experiments that were conducted at UTRC for extending kinetic mechanisms to HAT cycle temperature, pressure, and moisture conditions. The fundamental data generated in the bench-top experiments was incorporated into the analytical tools available at P&W to design the fuel injectors and combustors. The NETL then used the hardware to conduct combustion rig experiments to evaluate the performance of the combustion systems at elevated pressure and temperature conditions representative of the HAT cycle. The results were integrated into systems analysis done by kraftWork to verify that sufficient understanding of the technology had been achieved and that large-scale technological application and demonstration could be undertaken as follow-on activity. An optional program extended the

  11. Lighting Computer Programs in Lighting Technology

    OpenAIRE

    Ekren, Nazmi; Dursun, Bahtiyar; Ercan AYKUT

    2008-01-01

    It is well known that the computer in lighting technology is a vital component for lighting designers. Lighting computer programs are preferred in preparing architectural projects in lighting techniques, especially in lighting calculations. Lighting computer programs, which arise with the aim of helping lighting designers, gain more interest day by day. The most important property of lighting computer programs is the ability to enable the simulation of lighting projects without requiring any ...

  12. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc... and accurate information concerning the securities of Security Intelligence Technologies, Inc. because...

  13. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  14. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  15. Standard cost elements for technology programs

    Science.gov (United States)

    Christensen, Carisa B.; Wagenfuehrer, Carl

    1992-01-01

    The suitable structure for an effective and accurate cost estimate for general purposes is discussed in the context of a NASA technology program. Cost elements are defined for research, management, and facility-construction portions of technology programs. Attention is given to the mechanisms for insuring the viability of spending programs, and the need for program managers is established for effecting timely fund disbursement. Formal, structures, and intuitive techniques are discussed for cost-estimate development, and cost-estimate defensibility can be improved with increased documentation. NASA policies for cash management are examined to demonstrate the importance of the ability to obligate funds and the ability to cost contracted funds. The NASA approach to consistent cost justification is set forth with a list of standard cost-element definitions. The cost elements reflect the three primary concerns of cost estimates: the identification of major assumptions, the specification of secondary analytic assumptions, and the status of program factors.

  16. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for...

  17. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop...

  18. 76 FR 72433 - Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program

    Science.gov (United States)

    2011-11-23

    ... soliciting comments, of the following collection of information on August 3, 2011, 76 FR 46830. The... OMB Review: Secure Flight Program AGENCY: Transportation Security Administration, DHS. ACTION: 30-day... submit to Secure Flight for the purposes of watch list matching, identifying information of...

  19. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    Soils and food security. ... Whilst all these threats are important of particular significance is the loss of soil through ... A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after ...

  20. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  1. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-03-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  2. Characterization, monitoring, and sensor technology crosscutting program: Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    The purpose of the Characterization, Monitoring, and Sensor Technology Crosscutting Program (CMST-CP) is to deliver appropriate characterization, monitoring, and sensor technology (CMST) to the Office of Waste Management (EM-30), the Office of Environmental Restoration (EM-40), and the Office of Facility Transition and Management (EM-60). The technology development must also be cost effective and appropriate to EM-30/40/60 needs. Furthermore, the required technologies must be delivered and implemented when needed. Accordingly, and to ensure that available DOE and other national resources are focused an the most pressing needs, management of the technology development is concentrated on the following Focus Areas: Contaminant Plume Containment and Remediation (PFA); Landfill Stabilization (LSFA); High-Level Waste Tank Remediation (TFA); Mixed Waste Characterization, Treatment, and Disposal (MWFA); and Facility Deactivation, Decommissioning, and Material Disposition (FDDMDFA). Brief descriptions of CMST-CP projects funded in FY95 are presented.

  3. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  4. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  5. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on ho

  6. Survey of Security Technologies on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuwei Yang

    2015-01-01

    Full Text Available Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages and pointed out the future direction of the hot research field.

  7. U.S.-Brazil security cooperation and the challenge of technology transfer

    OpenAIRE

    Storer, Robert J.

    2014-01-01

    Approved for public release; distribution is unlimited. Since 2010, the United States and Brazil have made efforts to expand security cooperation between the two countries with the signing of a defense cooperation agreement, a general security of military information agreement, and the establishment of a defense cooperation dialogue. Despite these positive steps, the issue of technology transfer threatens to impede greater U.S.-Brazil security cooperation. Brazilian defense policy identifi...

  8. Clean coal technology demonstration program: Program update 1996-97

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-10-01

    The Clean Coal Technology Demonstration Program (known as the CCT Program) reached a significant milestone in 1996 with the completion of 20 of the 39 active projects. The CCT Program is responding to a need to demonstrate and deploy a portfolio of technologies that will assure the U.S. recoverable coal reserves of 297 billion tons could continue to supply the nation`s energy needs economically and in a manner that meets the nation`s environmental objectives. This portfolio of technologies includes environmental control devices that contributed to meeting the accords on transboundary air pollution recommended by the Special Envoys on Acid Rain in 1986. Operational, technical, environmental, and economic performance information and data are now flowing from highly efficient, low-emission, advanced power generation technologies that will enable coal to retain its prominent role into the next millennium. Further, advanced technologies are emerging that will enhance the competitive use of coal in the industrial sector, such as in steelmaking. Coal processing technologies will enable the entire coal resource base to be used while complying with environmental requirements. These technologies are producing products used by utilities and industrial processes. The capability to coproduce products, such as liquid and solid fuels, electricity, and chemicals, is being demonstrated at a commercial scale by projects in the CCT Program. In summary, this portfolio of technologies is satisfying the national need to maintain a multifuel energy mix in which coal is a key component because of its low-cost, availability, and abundant supply within the nation`s borders.

  9. Laser Science & Technology Program Annual Report - 2000

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H-L

    2001-03-20

    The Laser Science and Technology (LS&T) Program Annual Report 2001 provides documentation of the achievements of the LLNL LS&T Program during the April 2001 to March 2002 period using three formats: (1) an Overview that is a narrative summary of important results for the year; (2) brief summaries of research and development activity highlights within the four Program elements: Advanced Lasers and Components (AL&C), Laser Optics and Materials (LO&M), Short Pulse Laser Applications and Technologies (SPLAT), and High-Energy Laser System and Tests (HELST); and (3) a compilation of selected articles and technical reports published in reputable scientific or technology journals in this period. All three elements (Annual Overview, Activity Highlights, and Technical Reports) are also on the Web: http://laser.llnl.gov/lasers/pubs/icfq.html. The underlying mission for the LS&T Program is to develop advanced lasers, optics, and materials technologies and applications to solve problems and create new capabilities of importance to the Laboratory and the nation. This mission statement has been our guide for defining work appropriate for our Program. A major new focus of LS&T beginning this past year has been the development of high peak power short-pulse capability for the National Ignition Facility (NIF). LS&T is committed to this activity.

  10. Water harvesting technologies in ensuring food security: Lessons ...

    African Journals Online (AJOL)

    Mo

    One of the success stories in water development and food security in the pastoral and agro-pastoral areas of Somali ... hydroelectric power, live animals for export, and tourist ... of overgrazing, land degradation and conflicts between clans.

  11. Geothermal Technologies Program Blue Ribbon Panel Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2011-06-17

    The Geothermal Technologies Program assembled a geothermal Blue Ribbon Panel on March 22-23, 2011 in Albuquerque, New Mexico for a guided discussion on the future of geothermal energy in the United States and the role of the DOE Program. The Geothermal Blue Ribbon Panel Report captures the discussions and recommendations of the experts. An addendum is available here: http://www.eere.energy.gov/geothermal/pdfs/gtp_blue_ribbon_panel_report_addendum10-2011.pdf

  12. Usage of Wifi Technology for PLC Programming

    OpenAIRE

    Jaromír ŠKUTA

    2009-01-01

    This contribution describes usage of WIFI technology for programming and parameterization of application in PLC. INSYS WLAN unit from the Microelectronics INSYS Corporation is the base of application. Software access point with using USB WIFI component WL167 is running in industrial PC. Particular PC clients are connecting into network infrastructure PLC by the help of this access point and INSYS WLAN unit. This connection allows configuring and uploading program into this PLC.

  13. 48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.

    Science.gov (United States)

    2010-10-01

    ... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information...

  14. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible...

  15. An Analysis of Bluetooth Technology,Features,Future and Security

    OpenAIRE

    Ullah, Malik Zaka

    2009-01-01

    In this thesis I present my analysis on various aspects of Bluetooth wireless technology. The Bluetooth technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. Therefore during in this thesis I try to analysis the current status of this technology and issue which are related to this technology. The first section introduces Bluetooth technology, in which I discussed the architecture of Bluetooth and different terminolo...

  16. Adaptive security systems -- Combining expert systems with adaptive technologies

    Energy Technology Data Exchange (ETDEWEB)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  17. Reviews of computing technology: Securing network applications, Kerberos and RSA

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  18. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  19. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  20. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... COMMISSION Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys... Energy Corp. because it has not filed any periodic reports since the period ended December 31, 2006. It... concerning the securities of Biomedical Waste Systems, Inc. because it has not filed any periodic reports...

  1. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... ADMINISTRATION 20 CFR Part 416 RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008 (HEART Act) AGENCY: Social Security Administration. ACTION... Income (SSI) program made by the HEART Act. We inadvertently stated the RIN incorrectly as 0960- AD78...

  2. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that expired on May 10,...

  3. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that will expire on October 1,...

  4. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only to those requirements at section 412(a)(2) of the Act, as amended by PRWORA, titled “Grants...

  5. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  6. 76 FR 4350 - Health Information Technology Extension Program

    Science.gov (United States)

    2011-01-25

    ... HUMAN SERVICES Health Information Technology Extension Program ACTION: Public Notice. SUMMARY: This notice announces changes to the Health Information Technology Extension Program, which assists providers seeking to adopt and become meaningful users of health information technology, as authorized under...

  7. Investigate the Computer Information Network Security Technology and the Development Direction

    OpenAIRE

    Ping Teng

    2017-01-01

    After China’s accession to the WTO, the computer information network security technology of our country has a rapid development, bring many conveniences for the people’s life and work, indirectly changing their daily life and working mode. For the whole development situation of our country, the development direction of informatization is the inevitable trend of development in our country, while the using process of computer information network security technology in the society still exist ma...

  8. A Technology Program that Rescues Spacecraft

    Science.gov (United States)

    Deutsch, Leslie J.; Lesh, J. R.

    2004-03-01

    There has never been a long-duration deep space mission that did not have unexpected problems during operations. JPL's Interplanetary Network Directorate (IND) Technology Program was created to develop new and improved methods of communication, navigation, and operations. A side benefit of the program is that it maintains a cadre of human talent and experimental systems that can be brought to bear on unexpected problems that may occur during mission operations. Solutions fall into four categories: applying new technology during operations to enhance science performance, developing new operational strategies, providing domain experts to help find solutions, and providing special facilities to trouble-shoot problems. These are illustrated here using five specific examples of spacecraft anomalies that have been solved using, at least in part, expertise or facilities from the IND Technology Program: Mariner 10, Voyager, Galileo, SOHO, and Cassini/Huygens. In this era of careful cost management, and emphasis on returns-on-investment, it is important to recognize this crucial additional benefit from such technology program investments.

  9. ELECTRIC INFRASTRUCTURE TECHNOLOGY, TRAINING, AND ASSESSMENT PROGRAM

    Energy Technology Data Exchange (ETDEWEB)

    TREMEL, CHARLES L

    2007-06-28

    The objective of this Electric Infrastructure Technology, Training and Assessment Program was to enhance the reliability of electricity delivery through engineering integration of real-time technologies for wide-area applications enabling timely monitoring and management of grid operations. The technologies developed, integrated, tested and demonstrated will be incorporated into grid operations to assist in the implementation of performance-based protection/preventive measures into the existing electric utility infrastructure. This proactive approach will provide benefits of reduced cost and improved reliability over the typical schedule-based and as needed maintenance programs currently performed by utilities. Historically, utilities have relied on maintenance and inspection programs to diagnose equipment failures and have used the limited circuit isolation devices, such as distribution main circuit breakers to identify abnormal system performance. With respect to reliable problem identification, customer calls to utility service centers are often the sole means for utilities to identify problem occurrences and determine restoration methodologies. Furthermore, monitoring and control functions of equipment and circuits are lacking; thus preventing timely detection and response to customer outages. Finally, the two-way flow of real-time system information is deficient, depriving decision makers of key information required to effectively manage and control current electric grid demands to provide reliable customer service in abnormal situations. This Program focused on advancing technologies and the engineering integration required to incorporate them into the electric grid operations to enhance electrical system reliability and reduce utility operating costs.

  10. Application of Statistics in Engineering Technology Programs

    Science.gov (United States)

    Zhan, Wei; Fink, Rainer; Fang, Alex

    2010-01-01

    Statistics is a critical tool for robustness analysis, measurement system error analysis, test data analysis, probabilistic risk assessment, and many other fields in the engineering world. Traditionally, however, statistics is not extensively used in undergraduate engineering technology (ET) programs, resulting in a major disconnect from industry…

  11. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., computer ethics, and best practices, in accordance with DOC IT Security Program Policy, chapter 15, section... term “Sensitive” is defined by the guidance set forth in the Computer Security Act of 1987 (Pub. L. 100... of computer systems, networks, and telecommunications systems. (c) The contractor shall...

  12. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  13. Scaling Concolic Execution of Binary Programs for Security Applications

    Science.gov (United States)

    2013-08-01

    execution. We also study unexplored applications of concolic execution in security-related problems such as malware genealogy and protocol model inference...tions of concolic execution. We also study unexplored applications of con- colic execution in security-related problems such as malware genealogy and...discovery and signature generation. We then study further unexplored uses of concolic execution in security-related problems such as malware genealogy

  14. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  15. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  16. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  17. The Harpoon Security System for Helper Programs on a Pocket Companion

    NARCIS (Netherlands)

    Smit, Gerardus Johannes Maria; Havinga, Paul J.M.; van Os, Daniel

    We present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed in this paper is a service program that can migrate once from a server to a Pocket Companion or vice-versa. A helper program is

  18. The Harpoon Security System for Helper Programs on a Pocket Companion

    NARCIS (Netherlands)

    Smit, Gerard J.M.; Havinga, Paul J.M.; Os, van Daniel

    1997-01-01

    We present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed in this paper is a service program that can migrate once from a server to a Pocket Companion or vice-versa. A helper program is convenien

  19. Annual highlights of the energy technology programs

    Energy Technology Data Exchange (ETDEWEB)

    1978-12-01

    The Energy Storage and Conversion Division reports summary activities in the following: electrolysis-based hydrogen energy storage systems; an electrochemically regenerative hydrogen--halogen energy storage system; fuel cells (materials and electrolysis); high temperature water electrolysis; hydrogen energy storage systems for automobile propulsion; program planning for research related to energy conservation; New York Energy Office oil retrofit pilot program; burner-boiler/furnace testing; and proposed programs. The Engineering Division reports on solar-assisted heat pump systems; solar cooling subsystems and systems; solar demonstration project in Northeast U.S.; hardware simulators for tests of solar cooling/heating systems; fossil-energy programs; catalytic process for conversion of synthesis gas to methanol; coal-fired heater; coal/oil mixture combustion; rotating fluidized bed containing limestone for removal of sulfur from hot gases; improved oil and gas burners; residue and waste fuels; and proposed programs. The Conservation Program Management Group reports on conservation program management; space conditioning, diagnostics, and controls technology for conservation in buildings; and energy conservation in residential buildings. Funding for 1978 and 1979 for each program is indicated. (MCW)

  20. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... contractor shall include the following statement on deliveries of hardware, software, and data products... delivery of hardware, software, or data on diskettes under this contract. (d) This clause shall not limit... Virus Security. 2452.239-71 Section 2452.239-71 Federal Acquisition Regulations System DEPARTMENT...

  1. Using Automatic Identification System Technology to Improve Maritime Border Security

    Science.gov (United States)

    2014-12-01

    18 Dave Dixon et al., Security Modeling for Maritime Port Defense Resource Allocation ( Aiken , SC: Savannah River National Laboratory, 2010), 3...Maritime Port Defense Resource Allocation. Aiken , SC: Savannah River National Laboratory, 2010. Eggers, William D., and John O’Leary. If We Can Put a

  2. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  3. Semiconductor Technology and U.S. National Security

    Science.gov (United States)

    2010-04-21

    international community to a nation that ―is focused not on the world but on itself.Ŝ While China’s efforts to expand its economic and military strengths are...26, 2009) 39 Lieberman, 5. 40 Department of Commerce Home Page, http://www.osec.doc.gov/ omo /dmp/default. 41 Bureau of Industry and Security

  4. Wilberforce Power Technology in Education Program

    Science.gov (United States)

    Gordon, Edward M.; Buffinger, D. R.; Hehemann, D. G.; Breen, M. L.; Raffaelle, R. P.

    1999-01-01

    The Wilberforce Power Technology in Education Program is a multipart program. Three key parts of this program will be described. They are: (1) WISE-The Wilberforce Summer Intensive Experience. This annual offering is an educational program which is designed to provide both background reinforcement and a focus on study skills to give the participants a boost in their academic performance throughout their academic careers. It is offered to entering Wilberforce students. Those students who take advantage of WISE learn to improve important skills which enable them to work at higher levels in mathematics, science and engineering courses throughout their college careers, but most notably in the first year of college study. (2) Apply technology to reaming. This is being done in several ways including creating an electronic chemistry text with hypertext links to a glossary to help the students deal with the large new vocabulary required to describe and understand chemistry. It is also being done by converting lecture materials for the Biochemistry class to PowerPoint format. Technology is also being applied to learning by exploring simulation software of scientific instrumentation. (3) Wilberforce participation in collaborative research with NASA's John H. Glenn Research Center at Lewis Field. This research has focused on two areas in the past year. The first of these is the deposition of solar cell materials. A second area involves the development of polymeric materials for incorporation into thin film batteries.

  5. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    architecture to reason about information security. ACM...least 6 by PI Chong) on Shill and related research, including at Cornell University, NII Shonan ( Japan ), and Brown University. o Postdoctoral Fellow...of application architecture to enforce high-level application-specific information security guarantees (Chong and van der Meyden, 2015), the use

  6. Eliciting Responsivity: Exploring Programming Interests of Federal Inmates as a Function of Security Classification.

    Science.gov (United States)

    Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke

    2016-03-01

    Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings.

  7. Sécurité, justice et technologies Security, Justice and Technologies

    Directory of Open Access Journals (Sweden)

    Jean-Charles Froment

    2011-10-01

    Full Text Available Les réflexions qui structurent cet article sont issues de près de quinze années d’observation du développement du recours aux nouvelles technologies de contrôle dans le champ de la justice et de la sécurité. Elles s’appuient plus spécifiquement sur l’étude de deux d’entre elles, principalement le placement sous surveillance électronique et accessoirement la vidéosurveillance, qui ont vu leur champ d’application s’élargir considérablement en l’espace d’une vingtaine d’années. De ces travaux se dégagent neuf clés de lecture à partir desquelles on peut analyser les caractéristiques et l’impact du développement de ces technologies (la vitesse de circulation des modèles ; le jeu du marché ; la question du contrôle ; les formes de la désinstitutionnalisation du pouvoir ; la problématique des libertés ; la plasticité des usages ; les stratégies de légitimation ; les enjeux de régulation ; l’insuffisance d’évaluation.This analysis is based over 15 years of investigation about new technologies in the field of justice and security, and more specifically about electronic monitoring and CCTV which have known a strong development for the last twenty years... From these reflections, Jean-Charles Froment introduces nine analysis keys about the characteristics and the impact of the development of this technologies (speed of policy transfer; rules of market; progressive change towards a «society of control»; power conversions; human rights; plasticity of uses; legitimacy strategies; regulation challenges; weakness of evaluation.

  8. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  9. The space shuttle program technologies and accomplishments

    CERN Document Server

    Sivolella, Davide

    2017-01-01

    This book tells the story of the Space Shuttle in its many different roles as orbital launch platform, orbital workshop, and science and technology laboratory. It focuses on the technology designed and developed to support the missions of the Space Shuttle program. Each mission is examined, from both the technical and managerial viewpoints. Although outwardly identical, the capabilities of the orbiters in the late years of the program were quite different from those in 1981. Sivolella traces the various improvements and modifications made to the shuttle over the years as part of each mission story. Technically accurate but with a pleasing narrative style and simple explanations of complex engineering concepts, the book provides details of many lesser known concepts, some developed but never flown, and commemorates the ingenuity of NASA and its partners in making each Space Shuttle mission push the boundaries of what we can accomplish in space. Using press kits, original papers, newspaper and magazine articles...

  10. Building technologies program. 1995 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Selkowitz, S.E.

    1996-05-01

    The 1995 annual report discusses laboratory activities in the Building Technology Program. The report is divided into four categories: windows and daylighting, lighting systems, building energy simulation, and advanced building systems. The objective of the Building Technologies program is to assist the U.S. building industry in achieving substantial reductions in building-sector energy use and associated greenhouse gas emissions while improving comfort, amenity, health, and productivity in the building sector. Past efforts have focused on windows and lighting, and on the simulation tools needed to integrate the full range of energy efficiency solutions into achievable, cost-effective design solutions for new and existing buildings. Current research is based on an integrated systems and life-cycle perspective to create cost-effective solutions for more energy-efficient, comfortable, and productive work and living environments. Sixteen subprograms are described in the report.

  11. Technology Security Policy: From the Cold War to the New World Order

    Science.gov (United States)

    1993-12-01

    Mitchel B. Wallerstein , "Controlling Dual-Use Technologies in the New World Order," Issues in &ience and Technology, Summer 1991, pp. 74-5 and Aaron Karp...Relations and Armed Services, letter to Anthony Lake, the Assistant to the President for National Security Affairs, August 6, 1993. Wallerstein , Mitchell

  12. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    areas. Advanced Computing and Communications The exponential growth of the digital economy, driven by ubiquitous computing and communication...technologies, holds tremendous potential for innovation, economic competitiveness , and national security. New and rapidly evolving technological...weapons- focused R&D, many of the capabilities being developed have significant dual-use potential. Digital connectivity, for instance, brings

  13. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information...

  14. Information technology convergence security, robotics, automations and communication

    CERN Document Server

    Barolli, Leonard; Xhafa, Fatos; Jeong, Hwa-Young

    2013-01-01

    Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.

  15. Wearable Technology Devices Security and Privacy Vulnerability Analysis

    OpenAIRE

    Ke Wan Ching; Manmeet Mahinderjit Singh

    2016-01-01

    Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable tec...

  16. Survey of Collaboration Technologies in Multi-level Security Environments

    Science.gov (United States)

    2014-04-28

    Dickson. 1996. "Teams in Organizations: Recent Research on Performance and Effectiveness". Annual Review of Psychology , 47:307-338. [32] Hall, D.L... Psychology , 94, 2, 535-546. [48] Moore, J.A. (2002). JView: an information visualization paradigm. Proc. SPIE, Vol. 4716, 367-374. In Enabling...date. Multilevel security solutions like the Multi-Layer Access Solution were developed by Gestalt and MAXIM Systems before these companies became

  17. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A. H. M. Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  18. Secure quantum signatures: a practical quantum technology (Conference Presentation)

    Science.gov (United States)

    Andersson, Erika

    2016-10-01

    Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

  19. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  20. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  1. ATP Interior Noise Technology and Flight Demonstration Program

    Science.gov (United States)

    Stephens, David G.; Powell, Clemans A.

    1988-01-01

    The paper provides an overview of the ATP (Advanced Turboprop Program) acoustics program with emphasis on the NASA technology program and the recent NASA/Industry demonstration programs aimed at understanding and controlling passenger cabin noise. Technology developments in propeller (source) noise, cabin noise transmission, and subjective acoustics are described. Finally, an overview of the industry demonstrator programs is presented.

  2. Divison of Environmental Control Technology program, 1978

    Energy Technology Data Exchange (ETDEWEB)

    Mott, William E.

    1979-06-01

    This report covers Division of Environmental Control Technology projects in progress during FY 1978, within the Office of the Assistant Secretary for Environment, Department of Energy. It is the second in a planned series of annual reports. The Division of Environmental Control Technology (ECT) continues to support the Assistant Secretary for Environment (EV) in discharging two primary responsibilities: (1) under the Environmental Engineering (EE) Program, the independent overview and assessment of environmental control aspects of both the U.S. Department of Energy's (DOE) research, development, and demonstration (RD and D) programs and the Nation's energy policies, and (2) under the Decontamination and Decommissioning Program, the reduction of potential environmental hazards at the radioactively contaminated sites that are presently owned or were formerly used by the Government. This report presents a short summary of objectives, approach, progress and results, future plans, and a reference bibliography for each research, development, or assessment project within the program areas described above.

  3. IPIRG programs - advances in pipe fracture technology

    Energy Technology Data Exchange (ETDEWEB)

    Wilkowski, G.; Olson, R.; Scott, P. [Batelle, Columbus, OH (United States)

    1997-04-01

    This paper presents an overview of the advances made in fracture control technology as a result of the research performed in the International Piping Integrity Research Group (IPIRG) program. The findings from numerous experiments and supporting analyses conducted to investigate the behavior of circumferentially flawed piping and pipe systems subjected to high-rate loading typical of seismic events are summarized. Topics to be discussed include; (1) Seismic loading effects on material properties, (2) Piping system behavior under seismic loads, (3) Advances in elbow fracture evaluations, and (4) {open_quotes}Real{close_quotes} piping system response. The presentation for each topic will be illustrated with data and analytical results. In each case, the state-of-the-art in fracture mechanics prior to the first IPIRG program will be contrasted with the state-of-the-art at the completion of the IPIRG-2 program.

  4. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  5. 75 FR 54285 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-07

    ... Earnings Assistance and Relief Tax Act of 2008 (HEART Act) AGENCY: Social Security Administration. ACTION... Security Income (SSI) program made by the HEART Act. The HEART Act changes the way we treat certain cash..., generally providing a higher SSI benefit (section 201(a) of the HEART Act); Excluding from countable income...

  6. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  7. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  8. Clean coal technology: Export finance programs

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    Participation by US firms in the development of Clean Coal. Technology (CCT) projects in foreign countries will help the United States achieve multiple national objectives simultaneously--addressing critical goals related to energy, environmental technology, industrial competitiveness and international trade. US participation in these projects will result in an improved global environment, an improvement in the balance of payments and an increase in US jobs. Meanwhile, host countries will benefit from the development of economically- and environmentally-sound power facilities. The Clean Air Act Amendments of 1990 (Public Law 101-549, Section 409) as supplemented by a requirement in the Energy Policy Act of 1992 (Public Law 102-486, Section 1331(f)) requires that the Secretary of Energy, acting through the Trade Promotion Coordinating Committee Subgroup on Clean Coal Technologies, submit a report to Congress with information on the status of recommendations made in the US Department of Energy, Clean Coal Technology Export Programs, Report to the United States Congress, February 1992. Specific emphasis is placed on the adequacy of financial assistance for export of CCTS. This report fulfills the requirements of the Act. In addition, although this report focuses on CCT power projects, the issues it raises about the financing of these projects are also relevant to other CCT projects such as industrial applications or coal preparation, as well as to a much broader range of energy and environmental technology projects worldwide.

  9. Information technology security at the Advanced Photon Source.

    Energy Technology Data Exchange (ETDEWEB)

    Sidorowicz, K. V.; McDowell, W.; APS Engineering Support Division

    2007-01-01

    The proliferation of 'botnets,' phishing schemes, denial-of-service attacks, root kits, and other cyber attack schemes designed to capture a system or network creates a climate of concern for system administrators, especially for those managing accelerator and large experimental-physics facilities, as they are very public targets. This paper will describe the steps being taken at the Advanced Photon Source (APS) to protect the infrastructure of the overall network with emphasis on security for the APS control system.

  10. COmmunications and Networking with QUantum operationally Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2016-12-02

    Networking with QUantum operationally-Secure Technology for Maritime Deployment (CONQUEST) Contract Period of Performance: 2 September 2016 – 1 September...potential of using advanced photonic integrated circuits to enable high- speed quantum-secure communications. Task 5: QKD network via un-trusted quantum...has a practical advantage in its imple- mentation since it can use conventional optical telecom components, and does not require cryostats to support

  11. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  12. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  13. Web 2.0 Technologies and Social Networking Security Fears in Enterprises

    Directory of Open Access Journals (Sweden)

    Fernando Almeida

    2012-02-01

    Full Text Available Web 2.0 systems have drawn the attention of corporation, many of which now seek to adopt Web 2.0 technologies and transfer its benefits to their organizations. However, with the number of different social networking platforms appearing, privacy and security continuously has to be taken into account and looked at from different perspectives. This paper presents the most common security risks faced by the major Web 2.0 applications. Additionally, it introduces the most relevant paths and best practices to avoid these identified security risks in a corporate environment.

  14. Wood energy Technology Program; Puuenergian teknologiaohjelma

    Energy Technology Data Exchange (ETDEWEB)

    Hakkila, P. [VTT Energy, Espoo (Finland)

    1999-07-01

    The National Wood Energy Technology Program focuses on developing the production technology and improving the quality of forest chips from logging residues and small- sized trees. In 1998, energy use of forest chips in Finland amounted to 0.5 million solid-m{sup 3}. The main research areas of the program are: integration of energy production into industrial wood production in the conventional forestry; development of planning and logistics in the production and storage of forest chips; development of technology for chipping, handling and storage including operations at chip terminals and at the end-users facilities; development of long-distance transport of fuel chips and unchipped forest residues; preparing forest machine and truck contractors for the production of forest chips on a large scale; development of quality control to improve the heat value of the chips; and the operational reliability of wood chip-fired plants improving the handling and combustion properties of bark, sawdust and other solid wood residues from forest industry. The total budget for 1999 - 2003 is million FIM 250, Tekes' share of which amounts to million FIM 50.

  15. Laser Science and Technology Program Update 2001

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H L; Hackel, L A

    2002-01-01

    The Laser Science and Technology (LS&T) Program's mission is to develop advanced solid-state lasers, optics, materials technologies, and applications to solve problems and create new capabilities of importance to the Nation and the Laboratory. A top, near-term priority is to provide technical support to the National Ignition Facility (NIF) to ensure activation success. LS&T provides the NIF Programs with core competencies and supports its economic viability. The primary objectives of LS&T activities in fiscal year (FY) 2001 have been threefold: (1) to support deployment of hardware and to enhance lasers and optics performance for NIF, (2) to develop advanced solid-state laser systems and optical components for the Department of Energy (DOE) and the Department of Defense (DoD), and (3) to invent, develop, and deliver improved concepts and hardware for other government agencies and U.S. industry. Special efforts have also been devoted to building and maintaining our capabilities in three technology areas: high-power solid-state lasers, high-power optical materials, and applications of advanced lasers.

  16. Overcoming Language and Literacy Barriers: Using Student Response System Technology to Collect Quality Program Evaluation Data from Immigrant Participants

    Science.gov (United States)

    Walker, Susan K.; Mao, Dung

    2016-01-01

    Student response system technology was employed for parenting education program evaluation data collection with Karen adults. The technology, with translation and use of an interpreter, provided an efficient and secure method that respected oral language and collective learning preferences and accommodated literacy needs. The method was popular…

  17. Research and technology operating plan summary: Fiscal year 1975 research and technology program. [space programs, energy technology, and aerospace sciences

    Science.gov (United States)

    1975-01-01

    Summaries are presented of Research and Technology Operating Plans currently in progress throughout NASA. Citations and abstracts of the operating plans are presented along with a subject index, technical monitor index, and responsible NASA organization index. Research programs presented include those carried out in the Office of Aeronautics and Space Technology, Office of Energy Programs, Office of Applications, Office of Space Sciences, Office of Tracking and Data Acquisition, and the Office of Manned Space Flight.

  18. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    security procedures, encouraging their followers to attack the global transportation system.15 The consequences of these attacks are not just the visual ...partnerships for DHS.31 Though this argument is sound , the author only reviews a few programs, and does not acknowledge the broader DHS capability nor its...Capacity Development,”2. 89 Neil A. Englehart, “State Capacity, State Failure, and Human Rights,” Journal of Peace Research 46, no. 2 (2009): 163

  19. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  20. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  1. A Unique Master's Program in Combined Nuclear Technology and Nuclear Chemistry at Chalmers University of Technology, Sweden

    Science.gov (United States)

    Skarnemark, Gunnar; Allard, Stefan; Ekberg, Christian; Nordlund, Anders

    2009-08-01

    The need for engineers and scientists who can ensure safe and secure use of nuclear energy is large in Sweden and internationally. Chalmers University of Technology is therefore launching a new 2-year master's program in Nuclear Engineering, with start from the autumn of 2009. The program is open to Swedish and foreign students. The program starts with compulsory courses dealing with the basics of nuclear chemistry and physics, radiation protection, nuclear power and reactors, nuclear fuel supply, nuclear waste management and nuclear safety and security. There are also compulsory courses in nuclear industry applications and sustainable energy futures. The subsequent elective courses can be chosen freely but there is also a possibility to choose informal tracks that concentrate on nuclear chemistry or reactor technology and physics. The nuclear chemistry track comprises courses in e.g. chemistry of lanthanides, actinides and transactinides, solvent extraction, radioecology and radioanalytical chemistry and radiopharmaceuticals. The program is finished with a one semester thesis project. This is probably a unique master program in the sense of its combination of deep courses in both nuclear technology and nuclear chemistry.

  2. Preventing infant abductions: an infant security program transitioned into an interdisciplinary model.

    Science.gov (United States)

    Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann

    2012-01-01

    Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.

  3. Analysis of Engineering Content within Technology Education Programs

    Science.gov (United States)

    Fantz, Todd D.; Katsioloudis, Petros J.

    2011-01-01

    In order to effectively teach engineering, technology teachers need to be taught engineering content, concepts, and related pedagogy. Some researchers posit that technology education programs may not have enough content to prepare technology teachers to teach engineering design. Certain technology teacher education programs have responded by…

  4. National Advanced Drilling and Excavation Technologies Program

    Energy Technology Data Exchange (ETDEWEB)

    None

    1993-06-15

    The second meeting of Federal agency representatives interested in the National Advanced Drilling and Excavation Technologies (NADET) Program took place on June 15, 1993. The Geothermal Division of the U.S. Department of Energy (DOE) hosted the meeting at the Washington, D.C., offices of DOE. Representatives from the National Science Foundation, U.S. Geological Survey, U.S. Bureau of Mines, National Institute of Standards and Technology, National Aeronautics and Space Administration, Environmental Protection Agency, and various offices within the Department of Energy attended. For a complete list of attendees see Attachment A. The purpose of the meeting was: (1) to cover the status of efforts to gain formal approval for NADET, (2) to brief participants on events since the last meeting, especially two recent workshops that explored research needs in drilling and excavation, (3) to review some recent technological advances, and (4) to solicit statements of the importance of improving drilling and excavation technologies to the missions of the various agencies. The meeting agenda is included as Attachment B.

  5. Solid Polymer Electrolyte Fuel Cell Technology Program

    Science.gov (United States)

    1980-01-01

    Work is reported on phase 5 of the Solid Polymer Electrolyte (SPE) Fuel Cell Technology Development program. The SPE fuel cell life and performance was established at temperatures, pressures, and current densities significantly higher than those previously demonstrated in sub-scale hardware. Operation of single-cell Buildup No. 1 to establish life capabilities of the full-scale hardware was continued. A multi-cell full-scale unit (Buildup No. 2) was designed, fabricated, and test evaluated laying the groundwork for the construction of a reactor stack. A reactor stack was then designed, fabricated, and successfully test-evaluated to demonstrate the readiness of SPE fuel cell technology for future space applications.

  6. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  7. Competitive Technologies for National Security: Review and Recommendations

    Science.gov (United States)

    2008-02-29

    Ibid. 13. SPG Media , “ABL YAL 1A Airborne Laser, USA,” at www.airforce-technology.com/projects/abl (March 15, 2006). 14. Press release, “Boeing Receives...the first quar- ter of 2005, almost all of the venture capital invested in the nanotech industry went to four companies: NanoTex ($33 millon

  8. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  9. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    1*Electrical Power and Machines Department, Ain Shams University, Cairo, EGYPT. 2 ENPPI ... DOI: http://dx.doi.org/10.4314/ijest.v4i2.6. 1. .... Power system security assessment using Kohonen neural network has been illustrated by Niebor et al. ..... Learning rate of BPNN was assumed to be 0.12 and momentum constant.

  10. The NASA space power technology program

    Science.gov (United States)

    Stephenson, R. Rhoads

    NASA has a broad technology program in the field of space power. This paper describes that program, including the roles and responsibilities of the various NASA field centers and major contractors. In the power source area, the paper discusses the SP-100 Space Nuclear Power Project, which has been under way for about seven years and is making substantial progress toward development of components for a 100-kilowatt power system that can be scaled to other sizes. This system is a candidate power source for nuclear electric propulsion, as well as for a power plant for a lunar base. In the energy storage area, the paper describes NASA's battery- and fuel-cell development programs. NASA is actively working on NiCd, NiH2, and lithium batteries. A status update is also given on a U.S. Air Force-sponsored program to develop a large (150 ampere-hour) lithium-thionyl chloride battery for the Centaur upper-stage launch vehicle. Finally, the area of power management and distribution (PMAD) is addressed, including power system components such as solid-state switches and power integrated circuits. Automated load management and other computer-controlled functions offer considerable payoffs. The state of the art in space power is described, along with NASA's medium- and long-term goals in the area.

  11. A GRADUATE CERTIFICATE PROGRAM IN NUCLEAR SAFEGUARDS TECHNOLOGY.

    Energy Technology Data Exchange (ETDEWEB)

    FISHBONE, L.; SISKIND, B.; PEPPER, S.

    2005-07-10

    While there are a number of university graduate-education programs that address non-proliferation and safeguards policy issues; there are none in the United States that train students in the specific technical aspects of nuclear safeguards. Formal education of this kind is necessary to sustain the flow of technically trained individuals to diverse programs in safeguards, nonproliferation, and national security. In response to this need, the University of Missouri-Columbia, with assistance from Brookhaven National Laboratory, is initiating a Graduate Certificate Program in Nuclear Safeguards Technology: Students seeking advanced degrees in a variety of technical areas will complete a required sequence of courses in order to receive the certification. Required course work covers topics such as Nuclear Material Control and Accountability (MC&A), Physical Protection (PP); nuclear measurements, and a variety of other relevant subjects. Laboratory-based instruction will be included which will utilize the University of Missouri Research Reactor(MURR). MURR is the largest university-based research reactor and has extensive laboratory resources including a Canberra Aquila MPC&A Operational Monitoring demonstration system.

  12. Space Technology Mission Directorate Game Changing Development Program FY2015 Annual Program Review: Advanced Manufacturing Technology

    Science.gov (United States)

    Vickers, John; Fikes, John

    2015-01-01

    The Advance Manufacturing Technology (AMT) Project supports multiple activities within the Administration's National Manufacturing Initiative. A key component of the Initiative is the Advanced Manufacturing National Program Office (AMNPO), which includes participation from all federal agencies involved in U.S. manufacturing. In support of the AMNPO the AMT Project supports building and Growing the National Network for Manufacturing Innovation through a public-private partnership designed to help the industrial community accelerate manufacturing innovation. Integration with other projects/programs and partnerships: STMD (Space Technology Mission Directorate), HEOMD, other Centers; Industry, Academia; OGA's (e.g., DOD, DOE, DOC, USDA, NASA, NSF); Office of Science and Technology Policy, NIST Advanced Manufacturing Program Office; Generate insight within NASA and cross-agency for technology development priorities and investments. Technology Infusion Plan: PC; Potential customer infusion (TDM, HEOMD, SMD, OGA, Industry); Leverage; Collaborate with other Agencies, Industry and Academia; NASA roadmap. Initiatives include: Advanced Near Net Shape Technology Integrally Stiffened Cylinder Process Development (launch vehicles, sounding rockets); Materials Genome; Low Cost Upper Stage-Class Propulsion; Additive Construction with Mobile Emplacement (ACME); National Center for Advanced Manufacturing.

  13. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  14. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  15. Laser Science and Technology Program Update 2002

    Energy Technology Data Exchange (ETDEWEB)

    Hackel, L A; Chen, H L

    2003-03-01

    The Laser Science and Technology (LS&T) Program's mission is to develop advanced lasers, optics, materials technologies, and applications to solve problems and create new capabilities of importance to the nation and the Laboratory. A top, near-term priority is to provide technical support in the deployment and upgrade of the National Ignition Facility (NIF). Our other program activities synergistically develop technologies that are of interest to the NIF Directorate but outside the scope of the NIF funding. The primary objectives of LS&T activities in 2002 have been fourfold--(a) to support deployment of hardware and to enhance laser and optics performance for NIF, (b) to develop high-energy petawatt laser science and technology for the Department of Energy (DOE), (c) to develop advanced solid-state laser systems and optical components for the Department of Defense (DoD), and to invent develop, and deliver improved concepts and hardware for other government agencies and industry. Special efforts have been devoted to building and maintaining our capabilities in three technology areas: high-power short-pulse solid-state lasers, high-power optical materials, and applications of advanced lasers. LS&T activities during 2002 focused on seven major areas: (1) NIF Project--LS&T led major advances in the deployment of NIF Final Optics Assembly (FOA) and the development of 3{omega} optics processing and treatment technologies to enhance NIF's operations and performance capabilities. (2) Stockpile Stewardship Program (SSP)--LS&T personnel continued development of ultrashort-pulse lasers and high-power, large-aperture optics for applications in SSP, extreme-field science and national defense. To enhance the high-energy petawatt (HEPW) capability in NIF, LS&T continued development of advanced compressor-grating and front-end laser technologies utilizing optical-parametric chirped-pulse amplification (OPCPA). (3) High-energy-density physics and inertial fusion energy

  16. Laser Science and Technology Program Update 2002

    Energy Technology Data Exchange (ETDEWEB)

    Hackel, L A; Chen, H L

    2003-03-01

    The Laser Science and Technology (LS&T) Program's mission is to develop advanced lasers, optics, materials technologies, and applications to solve problems and create new capabilities of importance to the nation and the Laboratory. A top, near-term priority is to provide technical support in the deployment and upgrade of the National Ignition Facility (NIF). Our other program activities synergistically develop technologies that are of interest to the NIF Directorate but outside the scope of the NIF funding. The primary objectives of LS&T activities in 2002 have been fourfold--(a) to support deployment of hardware and to enhance laser and optics performance for NIF, (b) to develop high-energy petawatt laser science and technology for the Department of Energy (DOE), (c) to develop advanced solid-state laser systems and optical components for the Department of Defense (DoD), and to invent develop, and deliver improved concepts and hardware for other government agencies and industry. Special efforts have been devoted to building and maintaining our capabilities in three technology areas: high-power short-pulse solid-state lasers, high-power optical materials, and applications of advanced lasers. LS&T activities during 2002 focused on seven major areas: (1) NIF Project--LS&T led major advances in the deployment of NIF Final Optics Assembly (FOA) and the development of 3{omega} optics processing and treatment technologies to enhance NIF's operations and performance capabilities. (2) Stockpile Stewardship Program (SSP)--LS&T personnel continued development of ultrashort-pulse lasers and high-power, large-aperture optics for applications in SSP, extreme-field science and national defense. To enhance the high-energy petawatt (HEPW) capability in NIF, LS&T continued development of advanced compressor-grating and front-end laser technologies utilizing optical-parametric chirped-pulse amplification (OPCPA). (3) High-energy-density physics and inertial fusion energy

  17. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Science.gov (United States)

    2010-04-01

    ... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and...

  18. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  19. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  20. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  1. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  2. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three month long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Proceeding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near term, cost effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  3. Hybrid rice technology for food security in the world

    Institute of Scientific and Technical Information of China (English)

    YUAN Long-ping

    2004-01-01

    @@ The current world population is over 6 billion and will reach 8 billion in 2030. Meanwhile, the annual loss of land to other use is 10 to 35 million ha, with half of this lost land coming from cropland.Facing such severe situation of population growth pressure plus cropland reduction, it is obvious that the only way to solve food shortage problem is to greatly enhance the yield level of food crops per unit land area through advance of science and technology.

  4. SECURE MATHEMATICALLY- ASSURED COMPOSITION OF CONTROL MODELS

    Science.gov (United States)

    2017-09-27

    that is provably secure against many classes of cyber -attack. The goal of the project is to provide verifiable security ; that is, system designs which...architecture of the secure SMACCMcopter, illustrating the attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 46 Failed cyber -attack...approach for building secure software. DARPA initiated the High Assurance Cyber Military Systems (HACMS) program to develop the technologies needed to

  5. Quantitative security analysis for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Tri Minh; Huisman, Marieke

    2013-01-01

    Quantitative theories of information flow give us an approach to relax the absolute confidentiality properties that are difficult to satisfy for many practical programs. The classical information-theoretic approaches for sequential programs, where the program is modeled as a communication channel wi

  6. Innovation priorities optimization in the context of national technological security ensuring

    Directory of Open Access Journals (Sweden)

    V.A. Omelyanenko

    2016-12-01

    Full Text Available The aim of this article. The article is devoted to the main aspects of technological security providing through increasing the efficiency of innovation development priorities selection. The features of impact of technological security for national security and international experience of its software were analyzed. The scheme of determination of innovation priorities, based on the assessment of critical technologies and strategy of socio-economic development, were proposed. The scheme of innovation priorities based on “deployment policy” concept was developed. The results of the analysis. Based on analysis of possibilities of using the capacity of international environment, eliminating the technological gap between Ukraine and leading countries in framework of technological security provision should be implemented not by increasing the one-side transfer of foreign technologies, but with the improvement and development of national critical technologies based on foreign experience. Also positive balance of international technology transfer in future can’t be achieved the growth of dumping policy with the expansion of volumes of these technologies only when the country has to spend a resources, which is beneficial only for foreign partners. This balance should be focused on system-level processes, it is necessary to speed up the development of its own technology base, that can eliminate existing or possible “technological blockade”. Conclusions and perspectives for further research. The state’s ability to engage in complicated tech activities is a characteristic of scientific, technical and technological level of its development as well as has great impact on economic situation and national security and assists enhance its international prestige. However, the development of such industries and requires the creation of efficient innovation system and international cooperation mechanisms to compensate for negative effects of unilateral

  7. Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

    Directory of Open Access Journals (Sweden)

    Mei-Yu Wu

    2013-01-01

    Full Text Available Information technology has an enormous influence in many enterprises. Computers have not only become important devices that people rely on in their daily lives and work, but have also become essential tools for enterprises. More and more enterprises have shifted their focus to how to prevent outer forces from invading and stealing from networks. However, many enterprises have disregarded the significance of internal leaking, which also plays a vital role in information management. This research proposes an information security management approach that is based on context-aware role-based access control (RBAC and communication monitoring technology, in order to achieve enterprise information security management. In this work, it is suggested that an enterprise may, first, use an organizational chart to list job roles and corresponding permissions. RBAC is a model that focuses on different work tasks and duties. Subsequently, the enterprise may define a security policy to enforce the context-aware RBAC model. Finally, the enterprise may use communication monitoring technology in order to implement information security management. The main contribution of this work is the potential it provides to both reduce information security incidents, such as internal information leakage, and allow for effective cost control of information systems.

  8. Computer Network Security Technology%浅谈计算机网络安全技术

    Institute of Scientific and Technical Information of China (English)

    梁其烺

    2011-01-01

    从当前计算机网络安全现状入手,对主要的网络安全威胁进行了讨论。最后分析了计算机网络安全技术的类型,力图使网络设计者和使用者对网络安全有一个全面的认识,从而能正确采用成功对策。%The present situation of the current computer network security,network security of the main threats were discussed,the final analysis,the type of computer network security technology to try to make the network designers and users of network security with a comprehensive understanding, so that it can correctly the use of successful strategies.

  9. A Framework for an Effective Information Security Awareness Program in Healthcare

    Directory of Open Access Journals (Sweden)

    Arash Ghazvini

    2017-02-01

    Full Text Available Electronic Health Record (EHR is a valuable asset of every healthcare and it needs to be protected. Human errors are recognized as the major information security threats to EHR systems. Employees who interact with EHR systems should be trained about the risks and hazards related to information security. However, there are limited studies regarding the effectiveness of training programs. The aim of this paper is to propose a framework that provides guidelines for healthcare organizations to select an effective information security training delivery method. In addition, this paper proposes a guideline to develop information security content for awareness training programs. Lastly, this study attempts to implement the proposed framework in a selected healthcare for evaluation. Hence, a serious game is developed as a training method to deliver information security content for the selected healthcare. An effective training program raises employees’ awareness toward information security with a long-term impact. It helps to gradually change employees’ behavior over time by reducing their negligence towards secure utilization of healthcare EHR systems.

  10. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available stream_source_info Venter-2015.pdf.txt stream_content_type text/plain stream_size 1509 Content-Encoding UTF-8 stream_name Venter-2015.pdf.txt Content-Type text/plain; charset=UTF-8 Finding the right technology solutions... • Real-life field conditions • Simulated events Maritime Scenario • Maritime and Harbour Protection in Saldanha area • Refugee Influx, Intertidal Poaching, Vessel Interception • Specific “Injects” – plausible events simulated • Various...

  11. Rural income transfer programs and rural household food security in Ethiopia.

    Science.gov (United States)

    Uraguchi, Zenebe B

    2012-01-01

    Based on household food security surveys conducted in Ethiopia, this study seeks to understand the roles and limitations of income transfer projects as determinants of households’ food security. By covering the Food-For-Work Programs (FFWPs) and the Productive Safety Net Programs (PSNPs), the study shows that these programs served as temporary safety nets for food availability, but they were limited in boosting the dietary diversity of households and their coping strategies. Households which participated in the programs increased their supply of food as a temporary buffer to seasonal asset depletion. However, participation in the programs was marred by inclusion error (food-secure households were included) and exclusion error (food-insecure households were excluded). Income transfer projects alone were not robust determinants of household food security. Rather, socio-demographic variables of education and family size as well as agricultural input of land size were found to be significant in accounting for changes in households’ food security. The programs in the research sites were funded through foreign aid, and the findings of the study imply the need to reexamine the approaches adopted by bilateral donors in allocating aid to Ethiopia. At the same time the study underscores the need to improve domestic policy framework in terms of engendering rural local institutional participation in project management.

  12. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  13. 2012 DOE Vehicle Technologies Program Annual Merit Review

    Energy Technology Data Exchange (ETDEWEB)

    None

    2012-10-26

    The 2012 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting was held May 14-18, 2012 in Crystal City, Virginia. The review encompassed all of the work done by the Hydrogen Program and the Vehicle Technologies Program: a total of 309 individual activities were reviewed for Vehicle Technologies, by a total of 189 reviewers. A total of 1,473 individual review responses were received for the technical reviews.

  14. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  15. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...The Department of State has submitted the following information collection request to the Office of Management and Budget (OMB) for approval in accordance with the Paperwork Reduction Act of 1995. Title of Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements Pursuant to 22 CFR 126.18. OMB Control Number: 1405-XXXX.......

  16. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  17. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  18. Replication of a Crisis Shelter Model of Care in Staff Secure Detention Programs.

    Science.gov (United States)

    Teare, John F.; Castrianno, Lynn M.; Novicoff, Carolyn D.; Peterson, Roger; Authier, Karen; Daly, Daniel

    This paper presents preliminary evidence for the effectiveness of a model of care designed to provide safe and effective services in both short-term shelter and short-term staff secure detention programs. Boys Town short-term crisis shelter programs were designed to provide a safe and therapeutic environment for homeless and runaway youth in need…

  19. Social Security: The Most Important Anti-Poverty Program for Children

    OpenAIRE

    Heather Boushey

    2005-01-01

    This report finds that more low-income children live in families that receive a Social Security check than in families that receive a check from the Temporary Assistance to Needy Families (TANF) program. The study analyzed data from the Survey on Income and Program Participation (SIPP).

  20. Physics of the Cosmos Program Annual Technology Report

    Science.gov (United States)

    Pham, Bruce Thai; Cardiff, Ann H.

    2015-01-01

    What's in this Report? What's New? This fifth Program Annual Technology Report (PATR) summarizes the Programs technology development activities for fiscal year (FY) 2015. The PATR serves four purposes.1. Summarize the technology gaps identified by the astrophysics community;2. Present the results of this years technology gap prioritization by the PCOS Technology Management Board (TMB);3. Report on newly funded PCOS Strategic Astrophysics Technology (SAT) projects; and4. Detail progress, current status, and activities planned for the coming year for all technologies supported by PCOS Supporting Research and Technology (SRT) funding in FY 2015. .

  1. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  2. Assessing the Economic and National Security Benefits from Publicly Funded Technology Investments: An IDA Round Table.

    Science.gov (United States)

    1995-09-01

    Narin, Francis; Olivastro, Dominic and Stevens, Kimberly A. " Bibliometrics / Theory , Practice, and Problems," Evaluation Review, vol. 18, no. 1...Partnerships (MEP) Program 46 Advanced Technology Program (ATP) 49 Technology Impact Measurement Issues 53 Session Three: Metrics For Multiple Policy...providing orderly information on the likely impact of proposed investments, based upon historical observation and experience. Metrics are also an

  3. Hand Grenade Residuals (Environmental Security Technology Certification Program)

    Science.gov (United States)

    2009-06-01

    safety lever, safety pin and pull ring, safety clip, and a detonator assembly are attached to the body of the grenade. The steel safety pin is shaped...to prevent accidental removal and arming during shipping and handling. The pull ring is provided to facilitate removal of the safety pin . The...safety clip prevents the safety lever from snapping upward into a triggered position in case the safety pin is accidentally dislodged from the fuze. The

  4. Exploration of technologies of use to civil security forces

    Energy Technology Data Exchange (ETDEWEB)

    Farnum, E.H.; Petrovic, J.; McClellan, K.; Trujillo, E.; Neuman, A.; Lounsbury, B. [Los Alamos National Lab., NM (United States); Mann, T. [Foster Miller, Inc., Waltham, MA (United States); Rousseau, R. [Ordnance Body Armor Company (United States)

    1998-12-01

    This is the final report of a two-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The objective was to determine whether armor tile technology could be used to solve problems of civil law enforcement as identified by the New Mexico State Police. Most of the effort focused on the design and construction of a lightweight, portable box that could contain the shrapnel and redirect the blast from a steel-pipe/black-powder bomb. The bomb box task was carried out in collaboration with two companies, Foster Miller, Inc. and Ordnance Body Armor Co., who constructed most of the boxes tested. The results of the tests indicated that soft, flexible fabrics are superior to hard tiles in containing the bomb fragments. Subsequent to these experiments, Foster Miller has developed a bomb container that is commercialized and is currently being sold to law enforcement agencies.

  5. Building Technologies Program Multi-Year Program Plan Research and Development 2008

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-01-01

    Building Technologies Program Multi-Year Program Plan 2008 for research and development, including residential and commercial integration, lighting, HVAC and water heating, envelope, windows, and analysis tools.

  6. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  7. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Employment and Training Administration TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher, Pennsylvania; TA-W-82,634A, Prudential Global Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business...

  8. Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

    Directory of Open Access Journals (Sweden)

    Abdulrahman Muthana

    2009-01-01

    Full Text Available Problem statement: How a host (the code consumer can determine with certainty that a downloaded program received from untrusted source (the code producer will maintain the confidentiality of the data it manipulates and it is safe to install and execute. Approach: The approach adopted for verifying that a downloaded program will not leak confidential data to unauthorized parties was based on the concept of Proof-Carrying Code (PCC. A mobile program (in its assembly form was analyzed for information flow security based on the concept of proof-carrying code. The security policy was centered on a type system for analyzing information flows within assembly programs based on the notion of noninterference. Results: A verification tool for verifying assembly programs for information flow security was built. The tool certifies SPARC assembly programs for secure information flow by statically analyzing the program based on the idea of Proof-Carrying Code (PCC. The tool operated directly on the machine-code requiring only the inputs and outputs of the code annotated with security levels. The tool provided a windows user interface enabling the users to control the verification process. The proofs that untrusted program did not leak sensitive information were generated and checked on the host machine and if they are valid, then the untrusted program can be installed and executed safely. Conclusion: By basing proof-carrying code infrastructure on information flow analysis type-system, a sufficient assurance of protecting confidential data manipulated by the mobile program can be obtained. This assurance was come due to the fact that type systems provide a sufficient guarantee of protecting confidentiality.

  9. The Communications Technology Satellite /CTS/ Program

    Science.gov (United States)

    Evans, W. M.; Davies, N. G.; Hawersaat, W. H.

    1976-01-01

    The purposes of the joint Canadian-U.S. Communications Technology Satellite (CTS) Program are (1) to conduct satellite communication systems experiments using the 12- and 14-GHz bands and low-cost transportable ground terminals, (2) to develop and flight test a power amplifier tube having a greater than 50% efficiency with a saturated power output of 200 W at 12 GHz, (3) to develop and flight test a lightweight extendible solar array with an initial power output greater than 1 kW, and (4) to develop and flight test a 3-axis stabilization system to maintain accurate antenna boresight positioning on a spacecraft with flexible appendages. Brief descriptions of these experiments and of the ground facilities are provided.

  10. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  11. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    Science.gov (United States)

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality

  12. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    or working with a firm to develop non mechanical pumps ( Solar or Wind) that are simple to maintain and repair. 21. Water Way Illegal Activities...management.  Upgrade host country water systems, i.e. water distribution systems, water treatment plants, desalinization plants, rainwater...collection, wells, storage tanks.  Provide specific technologies and designs, i.e. micro-hydro turbine energy technology, solar and wind powered reverse

  13. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  14. Clean Coal Technology Programs: Completed Projects (Volume 2)

    Energy Technology Data Exchange (ETDEWEB)

    Assistant Secretary for Fossil Energy

    2003-12-01

    Annual report on the Clean Coal Technology Demonstration Program (CCTDP), Power Plant Improvement Initiative (PPII), and Clean Coal Power Initiative (CCPI). The report addresses the roles of the programs, implementation, funding and costs, project descriptions, legislative history, program history, environmental aspects, and project contacts. The project descriptions describe the technology and provides a brief summary of the demonstration results.

  15. Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzan Doroodgar

    2014-03-01

    Full Text Available Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare. Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  16. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  17. The Security Technology of E-commence——Intelligent Packet-filtering Firewalls

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Research has revealed that, in the next ten to twen ty years, the implementation of E-commence will become a new basis of economic in crease of China and other countries in the world. And the essence of implementin g E-commerce is the credit standing among the banks, the sellers and the custom ers. But the credit standing in the net ultimately depends on the security of th e network. Firewall is a useful network security technology to keep a network fr om being intruded. The rational use of firewalls can...

  18. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  19. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  20. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    Science.gov (United States)

    2015-05-14

    Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs Report Documentation Page Form... fairness of personnel security in the DoD In the wake of events like 9-11, Ft. Hood, and the Washington Navy Yard shootings, we expanded our

  1. Comparison of State-Funded Technology Maturation Programs.

    Energy Technology Data Exchange (ETDEWEB)

    Keller, Elizabeth James Kistin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warren, Drake [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hess, Marguerite Evelyn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-12-01

    This study examines the structure and impact of state-funded technology maturation programs that leverage research institutions for economic development throughout the United States. The lessons learned and practices identified from previous experiences will inform Sandia National Laboratories' Government Relations and Technology Partnerships teams as they participate in near-term discussions about the proposed Technology Readiness Gross Receipts Tax Credit and Program, and continue to shape longer-term program and partnership opportunities. This Page Intentionally Left Blank

  2. Management of Guidance, Navigation, and Control Technologies for Spacecraft Formations Under the NASA Cross Enterprise Technology Development Program (CETDP)

    Science.gov (United States)

    Hartman, Kathy; Weidow, David; Hadaegh, Fred

    1999-01-01

    Breakthrough technology development is critical to securing the future of our space industry. The National Aeronautics and Space Administration (NASA) Cross-Enterprise Technology Development Program (CETDP) is developing critical space technologies that enable innovative and less costly missions, and spawn new mission opportunities through revolutionary, long-term, high-risk, high-payoff technology advances. The CETDP is a NASA-wide activity managed by the Advanced Technology and Mission Studies Division (AT&MS) at Headquarters Office of Space Science. Program management for CETDP is distributed across the multiple NASA Centers and draws on expertise throughout the Agency. The technology research activities are organized along Project-level divisions called thrust areas that are directly linked to the Agency's goals and objectives of the Enterprises: Earth Science, Space Science, Human Exploration and Development of Space; and the Office of the Chief Technologist's (OCT) strategic technology areas. Cross-Enterprise technology is defined as long-range strategic technologies that have broad potential to span the needs of more than one Enterprise. Technology needs are identified and prioritized by each of the primary customers. The thrust area manager (TAM) for each division is responsible for the ultimate success of technologies within their area, and can draw from industry, academia, other government agencies, other CETDP thrust areas, and other NASA Centers to accomplish the goals of the thrust area. An overview of the CETDP and description of the future directions of the thrust area called Distributed Spacecraft are presented in this paper. Revolutionary technologies developed within this thrust area will enable the implementation of a spatially distributed network of individual vehicles, or assets, collaborating as a single collective unit, and exhibiting a common system-wide capability to accomplish a shared objective. With such a capability, new Earth and space

  3. Management of Guidance, Navigation and Control Technologies for Spacecraft Formations under the NASA Cross-Enterprise Technology Development Program (CETDP)

    Science.gov (United States)

    Hartman, Kathy; Weidow, David; Hadaegh, Fred

    1999-01-01

    Breakthrough technology development is critical to securing the future of our space industry. The National Aeronautics and Space Administration (NASA) Cross-Enterprise Technology Development Program (CETDP) is developing critical space technologies that enable innovative and less costly missions, and spawn new mission opportunities through revolutionary, long-term, high-risk, high-payoff technology advances. The CETDP is a NASA-wide activity managed by the Advanced Technology and Mission Studies Division (AT&MS) at Headquarters Office of Space Science. Program management for CETDP is distributed across the multiple NASA Centers and draws on expertise throughout the Agency. The technology research activities are organized along Project-level divisions called thrust areas that are directly linked to the Agency's goals and objectives of the Enterprises: Earth Science, Space Science, Human Exploration and Development of Space; and the Office of the Chief Technologist's (OCT) strategic technology areas. Cross-Enterprise technology is defined as long-range strategic technologies that have broad potential to span the needs of more than one Enterprise. Technology needs are identified and prioritized by each of the primary customers. The thrust area manager (TAM) for each division is responsible for the ultimate success of technologies within their area, and can draw from industry, academia, other government agencies, other CETDP thrust areas, and other NASA Centers to accomplish the goals of the thrust area. An overview of the CETDP and description of the future directions of the thrust area called Distributed Spacecraft are presented in this paper. Revolutionary technologies developed within this thrust area will enable the implementation of a spatially distributed network of individual vehicles, or assets, collaborating as a single collective unit, and exhibiting a common system-wide capability to accomplish a shared objective. With such a capability, new Earth and space

  4. Techniques of Program Code Obfuscation for Secure Software

    Directory of Open Access Journals (Sweden)

    Marius Popa

    2011-12-01

    Full Text Available The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely used programming language based on Java Development Kit and .NET Framework. The reverse engineering of software is implemented on taking into account the architectures of the software development platforms used by the most part of software developers. The engineering elements of these architectures facilitate understanding and production of data exchange, disassembling and decompiling. The last ones are essential tools to implement the reverse engineering of software. In order to prevent unauthorized disclosure of software engineering techniques, techniques of the source code obfuscation are used. On the other hand, the reverse engineering of software is used in critical software fields like antivirus program development.

  5. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  6. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  7. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  8. Science and Technology to Advance Regional Security in the Middle East and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tompson, A F B; Richardson, J H; Ragaini, R C; Knapp, R B; Rosenberg, N D; Smith, D K; Ball, D Y

    2002-10-09

    This paper is concerned with the promotion and advancement of regional security in the Middle East and Central Asia through the development of bilateral and multilateral cooperation on targeted scientific and technical projects. It is widely recognized that increasing tensions and instability in many parts of the world emphasize--or reemphasize--a need to seek and promote regional security in these areas. At the Lawrence Livermore National Laboratory (LLNL), a national security research facility operated for the US Department of Energy, we are pursuing an effort to use science and technology as a ''low risk'' means of engagement in regions of strategic importance to the United States. In particular, we are developing collaborations and cooperative projects among (and between) national laboratory scientists in the US and our various counterparts in the countries of interest.

  9. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  10. Fire Stations - FIRE_STATIONS_HSIP_IDHS_IN: Fire Stations in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — FIRE_STATIONS_HSIP_IDHS_IN is a point shapefile that contains locations of fire station, as developed for the Homeland Security Infrastructure Program (HSIP). The...

  11. Hospitals - HOSPITALS_HSIP_IDHS_IN: Hospitals in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — HOSPITALS_HSIP_IDHS_IN is a point shapefile that contains hospital locations, as developed for the Homeland Security Infrastructure Program (HSIP). The data were...

  12. Nonstandard Support Concepts in USAF Managed Security Assistance Program

    Science.gov (United States)

    1977-06-01

    the sale of nonstandard weapon systems and subsystems emphasize3 the fact that foreign customers are actively participating as buyers in the interna ...sufficient integrated logistica ] system must be fully considered. Programs such as Peace Hawk and Peace Log must be utilized to permit and insure a fully

  13. In Situ Remediation Integrated Program: Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    The In Situ Remediation Integrated Program (ISR IP) was instituted out of recognition that in situ remediation could fulfill three important criteria: significant cost reduction of cleanup by eliminating or minimizing excavation, transportation, and disposal of wastes; reduced health impacts on workers and the public by minimizing exposure to wastes during excavation and processing; and remediation of inaccessible sites, including: deep subsurfaces, in, under, and around buildings. Buried waste, contaminated soils and groundwater, and containerized wastes are all candidates for in situ remediation. Contaminants include radioactive wastes, volatile and non-volatile organics, heavy metals, nitrates, and explosive materials. The ISR IP intends to facilitate development of in situ remediation technologies for hazardous, radioactive, and mixed wastes in soils, groundwater, and storage tanks. Near-term focus is on containment of the wastes, with treatment receiving greater effort in future years. ISR IP is an applied research and development program broadly addressing known DOE environmental restoration needs. Analysis of a sample of 334 representative sites by the Office of Environmental Restoration has shown how many sites are amenable to in situ remediation: containment--243 sites; manipulation--244 sites; bioremediation--154 sites; and physical/chemical methods--236 sites. This needs assessment is focused on near-term restoration problems (FY93--FY99). Many other remediations will be required in the next century. The major focus of the ISR EP is on the long term development of permanent solutions to these problems. Current needs for interim actions to protect human health and the environment are also being addressed.

  14. DOE Solar Energy Technologies Program FY 2005 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    2006-03-01

    The DOE Solar Energy Technologies Program FY 2005 Annual Report chronicles the R&D results of the U.S. Department of Energy Solar Energy Technologies Program for Fiscal Year 2005. In particular, the report describes R&D performed by the Program?s national laboratories (National Renewable Energy Laboratory, Sandia National Laboratories, Oak Ridge National Laboratory, and Brookhaven National Laboratory) and university and industry partners.

  15. A Needs Assessment Study and Curriculum Development for a Public and Private Security Program at Alvin Community College.

    Science.gov (United States)

    Bethscheider, John

    A needs assessment for a community college curriculum in public and private security was conducted by surveying 50 high schools, four-year colleges, and private security agencies in the Alvin Community College area; 36 institutions responded. Findings revealed: most have a designated director of their security program; most would rather hire the…

  16. 2013 Building Technologies Office Program Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-11-01

    The 2013 Building Technologies Office Program Peer Review Report summarizes the results of the 2013 Building Technologies Office (BTO) peer review, which was held in Washington, D.C., on April 2–4, 2013. The review was attended by over 300 participants and included presentations on 59 BTO-funded projects: 29 from BTO’s Emerging Technologies Program, 20 from the Commercial Buildings Integration Program, 6 from the Residential Buildings Integration Program, and 4 from the Building Energy Codes Program. This report summarizes the scores and comments provided by the independent reviewers for each project.

  17. Critical Issues Forum: A multidisciplinary educational program integrating computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, R.J.; Robertson, B.; Jacobs, D. [Los Alamos National Lab., NM (United States)

    1998-09-01

    The Critical Issues Forum (CIF) funded by the US Department of Energy is a collaborative effort between the Science Education Team of Los Alamos National Laboratory (LANL) and New Mexico high schools to improve science education throughout the state of New Mexico as well as nationally. By creating an education relationship between the LANL with its unique scientific resources and New Mexico high schools, students and teachers participate in programs that increase not only their science content knowledge but also their critical thinking and problem-solving skills. The CIF program focuses on current, globally oriented topics crucial to the security of not only the US but to that of all nations. The CIF is an academic-year program that involves both teachers and students in the process of seeking solutions for real world concerns. Built around issues tied to LANL`s mission, participating students and teachers are asked to critically investigate and examine the interactions among the political, social, economic, and scientific domains while considering diversity issues that include geopolitical entities and cultural and ethnic groupings. Participants are expected to collaborate through telecommunications during the research phase and participate in a culminating multimedia activity, where they produce and deliver recommendations for the current issues being studied. The CIF was evaluated and found to be an effective approach for teacher professional training, especially in the development of skills for critical thinking and questioning. The CIF contributed to students` ability to integrate diverse disciplinary content about science-related topics and supported teachers in facilitating the understanding of their students using the CIF approach. Networking technology in CIF has been used as an information repository, resource delivery mechanism, and communication medium.

  18. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    Science.gov (United States)

    2004-06-01

    International Corporation 4031 Colonel Glenn Highway Beavercreek, OH 45431-1673 Nikolaos G. Bourbakis Wright State University Information Technology...NUMBER 2432 5e. TASK NUMBER 04 6. AUTHOR(S) Russell F. Moody (Science Applications International Corporation) Nikolaos G. Bourbakis (Wright...modeling, retrieving, distributing, and publishing documents on the Web ( Bourbakis ) − Research cryptanalysis. − System security. − Self-healing

  19. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  20. Evaluation of the Advanced Subsonic Technology Program Noise Reduction Benefits

    Science.gov (United States)

    Golub, Robert A.; Rawls, John W., Jr.; Russell, James W.

    2005-01-01

    This report presents a detailed evaluation of the aircraft noise reduction technology concepts developed during the course of the NASA/FAA Advanced Subsonic Technology (AST) Noise Reduction Program. In 1992, NASA and the FAA initiated a cosponsored, multi-year program with the U.S. aircraft industry focused on achieving significant advances in aircraft noise reduction. The program achieved success through a systematic development and validation of noise reduction technology. Using the NASA Aircraft Noise Prediction Program, the noise reduction benefit of the technologies that reached a NASA technology readiness level of 5 or 6 were applied to each of four classes of aircraft which included a large four engine aircraft, a large twin engine aircraft, a small twin engine aircraft and a business jet. Total aircraft noise reductions resulting from the implementation of the appropriate technologies for each class of aircraft are presented and compared to the AST program goals.

  1. NASA technology utilization program: The small business market

    Science.gov (United States)

    Vannoy, J. K.; Garcia-Otero, F.; Johnson, F. D.; Staskin, E.

    1980-01-01

    Technology transfer programs were studied to determine how they might be more useful to the small business community. The status, needs, and technology use patterns of small firms are reported. Small business problems and failures are considered. Innovation, capitalization, R and D, and market share problems are discussed. Pocket, captive, and new markets are summarized. Small manufacturers and technology acquisition are discussed, covering external and internal sources, and NASA technology. Small business and the technology utilization program are discussed, covering publications and industrial applications centers. Observations and recommendations include small business market development and contracting, and NASA management technology.

  2. Near-Net Forging Technology Demonstration Program

    Science.gov (United States)

    Hall, I. Keith

    1996-01-01

    Significant advantages in specific mechanical properties, when compared to conventional aluminum (Al) alloys, make aluminum-lithium (Al-Li) alloys attractive candidate materials for use in cryogenic propellant tanks and dry bay structures. However, the cost of Al-Li alloys is typically five times that of 2219 aluminum. If conventional fabrication processes are employed to fabricate launch vehicle structure, the material costs will restrict their utilization. In order to fully exploit the potential cost and performance benefits of Al-Li alloys, it is necessary that near-net manufacturing methods be developed to off-set or reduce raw material costs. Near-net forging is an advanced manufacturing method that uses elevated temperature metal movement (forging) to fabricate a single piece, near-net shape, structure. This process is termed 'near-net' because only a minimal amount of post-forge machining is required. The near-net forging process was developed to reduce the material scrap rate (buy-to-fly ratio) and fabrication costs associated with conventional manufacturing methods. The goal for the near-net forging process, when mature, is to achieve an overall cost reduction of approximately 50 percent compared with conventional manufacturing options for producing structures fabricated from Al-Li alloys. This NASA Marshall Space Flight Center (MSFC) sponsored program has been a part of a unique government / industry partnership, coordinated to develop and demonstrate near-net forging technology. The objective of this program was to demonstrate scale-up of the near-net forging process. This objective was successfully achieved by fabricating four integrally stiffened, 170- inch diameter by 20-inch tall, Al-Li alloy 2195, Y-ring adapters. Initially, two 2195 Al-Li ingots were converted and back extruded to produce four cylindrical blockers. Conventional ring rolling of the blockers was performed to produce ring preforms, which were then contour ring rolled to produce

  3. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Energy Technology Data Exchange (ETDEWEB)

    Green, M.W.

    1996-12-31

    As problems of violence and crime become more prevalent in our schools (or at least the perception of their prevalence), more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense U.S. social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti-graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems (`big picture`) approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more to the general `order maintenance` of the facility than could be achieved by separate measures not integrated or related.

  4. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  5. U.S.-Brazil Security Cooperation and the Challenge of Technology Transfer

    Science.gov (United States)

    2014-03-01

    direction throughout the process. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. MAJOR RESEARCH QUESTION Since 2010, the United...weapons systems to the Middle East. Regarding the industry’s success in that era, Luis Bitencourt notes: The reason they got that market was mainly due...31. 143 Luis Bitencourt, The Problems of Defence Industrialization for Developing States,” in Arms and Technology Transfers: Security and Economic

  6. Supported Liquid Membrane Extraction Technology and Its Application in Detection of Meat Security

    Institute of Scientific and Technical Information of China (English)

    LIU Jia; LI Weijin

    2010-01-01

    As a novel technology, supported liquid membrane extraction has gradually become the direction of the research of extraction, for the advantages of using little organic solvents, good selectivity and repeatability. This paper is based on describing the working principle, structure and influencing factors of supported liquid membrane, and research in domestic and foreign literatures which are in the same period, and give a review on the application of supported liquid membrane in meat security determination.

  7. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  8. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels.

  9. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  10. Advances in AlGaInN laser diode technology for defence, security and sensing applications

    Science.gov (United States)

    Najda, S. P.; Perlin, P.; Suski, T.; Marona, L.; Boćkowski, M.; Leszczyński, M.; Wisnieski, P.; Czernecki, R.; Targowski, G.

    2016-10-01

    Laser diodes fabricated from the AlGaInN material system is an emerging technology for defence, security and sensing applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., 380nm, to the visible 530nm, by tuning the indium content of the laser GaInN quantum well, giving rise to new and novel applications including displays and imaging systems, free-space and underwater telecommunications and the latest quantum technologies such as optical atomic clocks and atom interferometry.

  11. A two-factor, stochastic programming model of Danish mortgage-backed securities

    DEFF Research Database (Denmark)

    Nielsen, Søren S.; Poulsen, Rolf

    2004-01-01

    -trivial, both in terms of deciding on an initial mortgage, and in terms of managing (rebalancing) it optimally.We propose a two-factor, arbitrage-free interest-rate model, calibrated to observable security prices, and implement on top of it a multi-stage, stochastic optimization program with the purpose...

  12. 75 FR 23565 - Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural...

    Science.gov (United States)

    2010-05-04

    ... Farm Security and Rural Investment Act of 2002, which was published on January 29, 2010 (75 FR 4912... / Tuesday, May 4, 2010 / Rules and Regulations#0;#0; ] DEPARTMENT OF AGRICULTURE Food and Nutrition Service 7 CFR Parts 272 and 273 RIN 0584-AD30 Food Stamp Program: Eligibility and Certification...

  13. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    Energy Technology Data Exchange (ETDEWEB)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.

  14. Extension Youth Educators' Technology Use in Youth Development Programming

    Science.gov (United States)

    McClure, Carli; Buquoi, Brittany; Kotrlik, Joe W.; Machtmes, Krisanna; Bunch, J. C.

    2014-01-01

    The purpose of this descriptive-correlational study was to determine the use of technology in youth programming by Extension youth development educators in Louisiana, Mississippi, and Tennessee. Data were collected via e-mail and a SurveyMonkey© questionnaire. Extension educators are using some technology in youth development programming. More…

  15. Status of NASA's Earth-to-Orbit Propulsion Technology program

    Science.gov (United States)

    Escher, W. J. D.; Moses, J. L.; Gorland, S. H.; Stephenson, F. W.

    1991-01-01

    Earth-to-Orbit Propulsion Technology program is considered. The program's three major technical areas include combustion devices, turbomachinery, and controls and monitoring. Directed toward reducing acquisition and operations risk and cost the ETO program is conducted in two serially-performed categories: technology acquisition and technology validation. The former is constituted of studies, tool building, and bench-scale experimentation. The latter involves next-step verification of the acquisition results and findings, usually leading to a test-bed validated technology 'product'.

  16. The Beamed Energy Technology Working Group, Programs and Goals

    Science.gov (United States)

    Montgomery, Edward E., IV; Smith, W. Scott (Technical Monitor)

    2002-01-01

    A brief description of the Beamed Energy Technology Program will be given. Its relationship to the overall Advanced Technology Program at Marshall Space Flight Center will be discussed. A summary description of the known potential benefits and technical issues remaining in the development of a viable system will be presented along with program plans for a NASA Research Announcement in FY03 to begin development of relevant technologies and systems concepts. The results of workshop activity by the Beamed Energy Technology Working Group will be provided.

  17. The Research on The Fusion Technology of Wireless LANs and Personal Area Networks for Emergency Secure in Coal Mine

    Science.gov (United States)

    Chiyuan, Li

    The author has provided craft brother with predictive wireless communication modality and imaginative solutions, and discussed the applied mode of amalgamation technology of wireless LANs and personal area networks for emergency secure in coal mine. The fire protection jobs of emergency secure will become more scientific, more efficient and more flexible in this circumstance. The study can supply bailout team with the situation of a disaster and the location of miner, enhance the efficiency of emergency secure in coal mine.

  18. Sustainability of a Nuclear Security Educational Program at Tomsk Polytechnic University

    Energy Technology Data Exchange (ETDEWEB)

    Boiko, Vladimir I.; Silaev, Maxim E.; Duncan, Cristen L.; Hazel, Michael J.; Heinberg, Cynthia L.; Goodey, Kent O.; Butler, Gilbert W.

    2012-06-07

    Educational programs for training of specialists in the area of material protection, control and accounting (MPC&A) for Russian nuclear facilities have been implemented at the National Research Tomsk Polytechnic University over the last eight years. The initial stage of creating the program, which can be deemed as successfully functioning, has been completed. The next stage entails further improvement of the program in order to create conditions for its sustainability and steady improvement. The educational program sustainability plan contains a number of steps, including the following: - Analysis of the status, standards and prospects for development of nuclear security educational programs in the world; - Analysis of the current educational program, level of its functionality and the demand for the program as well as its capability to react adequately to external influences; - Analysis of the factors influencing program development at its current stage and in the future; - Assessment of needs and development of proposals for the program’s sustainability; - Assessment of needs and development of proposals for improving quality and increasing the demand for the program by potential employers; - Assessment of needs and development of proposals for expansion of the program’s content and the scope of its application; - Development of short-term and long-term plans for functioning and development. Strategic prospects for development are associated with the transition from MPC&A to a broader range of tasks covered by the specialization in the area of nuclear security.

  19. Part 2 -- current program integrating strategies and lubrication technology

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, B.

    1996-12-01

    This paper is the second of two that describe the Predictive Maintenance Program for rotating machinery at the Palo Verde Nuclear Generating Station. The Predictive Maintenance program has been enhanced through organizational changes and improved interdisciplinary usage of technology. This paper will discuss current program strategies that have improved the interaction between the Vibration and Lube Oil programs. The {open_quotes}Lube Oil{close_quotes} view of the combined program along with case studies will then be presented.

  20. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  1. Pathways to Commercial Success. Technologies and Products Supported by the Fuel Cell Technologies Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2010-08-01

    This report identifies the commercial and near-commercial (emerging) hydrogen and fuel cell technologies and products that resulted from Department of Energy support through the Fuel Cell Technologies Program in the Office of Energy Efficiency and Renewable Energy.

  2. 48 CFR 235.006-70 - Manufacturing Technology Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Manufacturing Technology... CONTRACTING 235.006-70 Manufacturing Technology Program. In accordance with 10 U.S.C. 2521(d), for acquisitions under the Manufacturing Technology Program— (a) Award all contracts using competitive...

  3. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  4. A framework for evaluation of technology transfer programs. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1993-07-01

    The objective of this volume is to describe a framework with which DOE can develop a program specific methodology to evaluate it`s technology transfer efforts. This approach could also be applied to an integrated private sector technology transfer organization. Several benefits will be realized from the application of this work. While the immediate effect will be to assist program managers in evaluating and improving program performance, the ultimate benefits will accrue to the producing industry, the states, and the nation in the form of sustained or increased domestic oil production. This benefit depends also, of course, on the effectiveness of the technology being transferred. The managers of the Technology Transfer program, and the larger federal oil and gas R&D programs, will be provided with a means to design and assess the effectiveness of program efforts as they are developed, tested and performed. The framework allows deficiencies in critical aspects of the program to be quickly identified, allowing for timely corrections and improvements. The actual process of developing the evaluation also gives the staff of the Oil R&D Program or Technology Transfer subprogram the opportunity to become oriented to the overall program goals. The structure and focus imposed by the evaluation paradigm will guide program staff in selecting activities which are consistent with achieving the goals of the overall R&D program.

  5. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  6. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  7. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  8. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  9. DOE Solar Energy Technologies Program FY 2006 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    2007-07-01

    The DOE Solar Energy Technologies Program FY 2006 Annual Report chronicles the R&D results of the U.S. Department of Energy Solar Energy Technologies Program for Fiscal Year 2005. In particular, the report describes R&D performed by the Program's national laboratories (National Renewable Energy Laboratory, Sandia National Laboratories, Oak Ridge National Laboratory, and Brookhaven National Laboratory) and university and industry partners.

  10. DOE Solar Energy Technologies Program 2007 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    The DOE Solar Energy Technologies Program FY 2007 Annual Report chronicles the R&D results of the U.S. Department of Energy Solar Energy Technologies Program from October 2006 to September 2007. In particular, the report describes R&D performed by the Program's national laboratories (National Renewable Energy Laboratory, Sandia National Laboratories, Oak Ridge National Laboratory, and Brookhaven National Laboratory) and university and industry partners.

  11. DOE Solar Energy Technologies Program: FY 2004 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    2005-10-01

    The DOE Solar Energy Technologies Program FY 2004 Annual Report chronicles the R&D results of the U.S. Department of Energy Solar Energy Technologies Program for Fiscal Year 2004. In particular, the report describes R&D performed by the Program's national laboratories (National Renewable Energy Laboratory, Sandia National Laboratories, Oak Ridge National Laboratory, and Brookhaven National Laboratory) and university and industry partners.

  12. Multi-Level Security for Automotive–RFID Based Technology with Lab VIEW Implementation

    Directory of Open Access Journals (Sweden)

    Priya Darshini .V

    2013-03-01

    Full Text Available Security has become a prominent parameter for all the electronic gadgets. This proposed paper aims at securing the automotive and also preventing the unauthorized persons from accessing it. The technologies such as Radio Frequency Identification (RFID, thumb registration system and face recognition will be applied for the security measures. This proposed system will also be implemented in LabVIEW using Educational Laboratory Virtual Instrumentation Suite II (ELVIS. Initially, the RFID system will be authenticated .The importance of this system is that, it gets verification from the Road Transportation Office (RTO.The user will require an authentication to get proceed to the thumb registration module by which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA. Face recognition system is a technique which will be used after the thumb registration system. At last, this system allows the user to drive the car. For emergency, a key insertion slot will be placed in the system through which the user can insert the key. During this emergency mode of operation the camera captures the driver’s image and sends it to the owner’s mobile as Multimedia Messaging Service (MMS. The owner will provide the authentication password; this in turn allows the user to drive the vehicle. Global System for Mobile communication (GSM module is also kept inbuilt for tracking purpose. Among the different technologies proposed, RFID technique is briefly discussed in this paper.

  13. Security inspection in ports by anomaly detection using hyperspectral imaging technology

    Science.gov (United States)

    Rivera, Javier; Valverde, Fernando; Saldaña, Manuel; Manian, Vidya

    2013-05-01

    Applying hyperspectral imaging technology in port security is crucial for the detection of possible threats or illegal activities. One of the most common problems that cargo suffers is tampering. This represents a danger to society because it creates a channel to smuggle illegal and hazardous products. If a cargo is altered, security inspections on that cargo should contain anomalies that reveal the nature of the tampering. Hyperspectral images can detect anomalies by gathering information through multiple electromagnetic bands. The spectrums extracted from these bands can be used to detect surface anomalies from different materials. Based on this technology, a scenario was built in which a hyperspectral camera was used to inspect the cargo for any surface anomalies and a user interface shows the results. The spectrum of items, altered by different materials that can be used to conceal illegal products, is analyzed and classified in order to provide information about the tampered cargo. The image is analyzed with a variety of techniques such as multiple features extracting algorithms, autonomous anomaly detection, and target spectrum detection. The results will be exported to a workstation or mobile device in order to show them in an easy -to-use interface. This process could enhance the current capabilities of security systems that are already implemented, providing a more complete approach to detect threats and illegal cargo.

  14. Two Inseparable Facets of Technology Integration Programs: Technology and Theoretical Framework

    Science.gov (United States)

    Demir, Servet

    2011-01-01

    This paper considers the process of program development aiming at technology integration for teachers. For this consideration, the paper focused on an integration program which was recently developed as part of a larger project. The participants of this program were 45 in-service teachers. The program continued four weeks and the conduct of the…

  15. Two Inseparable Facets of Technology Integration Programs: Technology and Theoretical Framework

    Science.gov (United States)

    Demir, Servet

    2011-01-01

    This paper considers the process of program development aiming at technology integration for teachers. For this consideration, the paper focused on an integration program which was recently developed as part of a larger project. The participants of this program were 45 in-service teachers. The program continued four weeks and the conduct of the…

  16. Curriculum Evaluation and Revision in a Nascent Field: The Utility of the Retrospective Pretest-Posttest Model in a Homeland Security Program of Study

    Science.gov (United States)

    Pelfrey, William V., Sr.; Pelfrey, William V., Jr.

    2009-01-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent…

  17. A Contemporary Preservice Technology Education Program

    Science.gov (United States)

    Flanigan, Rod; Becker, Kurt; Stewardson, Gary

    2012-01-01

    In order to teach engineering education, today's engineering and technology education teachers must be equipped with lesson plans to teach engineering design, among other principles, to the 6th-12th grade levels. At Utah State University (USU), curriculum has been developed for preservice engineering and technology education teachers that…

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM CASE STUDIES: DEMONSTRATING PROGRAM OUTCOMES, VOLUME II

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This bookle...

  19. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  20. Analysis of Computer Network Security Technology%浅析计算机网络安全技术

    Institute of Scientific and Technical Information of China (English)

    岳建

    2011-01-01

    本文就网络安全面临的威胁和网络安全存在的问题作一些分析,最后有针对性的介绍了几种常用的加强网络安全的技术。为网络安全工作探索一条新思路。%In this paper,network security threats and network security problems for some analysis,and finally targeted introduction of several commonly used to enhance network security technology for network security to explore a new idea.