WorldWideScience

Sample records for transportation security administration

  1. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  2. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  3. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  4. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  5. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    Science.gov (United States)

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  6. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  7. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  8. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  9. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  10. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  11. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  12. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  13. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    Science.gov (United States)

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  14. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  15. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  16. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  17. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  18. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  19. 76 FR 2142 - Employee Benefits Security Administration

    Science.gov (United States)

    2011-01-12

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Hearing on Definition of ``Fiduciary'' AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of hearing and extension of comment period. SUMMARY: Notice is hereby given that the Employee Benefits Security Administration will...

  20. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  1. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  2. Analysis of transport administrators and sustainable transport ...

    African Journals Online (AJOL)

    Analysis of transport administrators and sustainable transport development in Lagos, Ogun and Oyo States, Nigeria. ... A good transportation system planning and management is considered vital for ... EMAIL FULL TEXT EMAIL FULL TEXT

  3. Social Security Administration Data for Enumeration Accuracy

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level from federal fiscal year 2006 onwards for the accuracy of the assignment of Social Security numbers (SSN) based on...

  4. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  5. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  6. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  7. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  8. Transportation Security Institute: recruiting next generation professionals.

    Science.gov (United States)

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  9. Administrative mechanics of research fuel transportation

    International Nuclear Information System (INIS)

    Harmon, Diane W.

    1983-01-01

    This presentation contains the discussion on the multitude of administrative mechanics that have to be meshed for the successful completion of a shipment of spent fuel, HEU or LEU in the research reactors fuel cycle. The costs associated with transportation may be the equivalent of 'a black hole', so an overview of cost factors is given. At the end one could find that this black hole factor in the budget is actually a bargain. The first step is the quotation phase. The cost variables in the quotation contain the cost of packaging i.e. containers; the complete routing of the packages and the materials. Factors that are of outmost importance are the routing restrictions and regulations, physical security regulations. All of this effort is just to provide a valid quotation not to accomplish the goal of completing a shipment. Public relations cannot be omitted either

  10. Administrative mechanics of research fuel transportation

    Energy Technology Data Exchange (ETDEWEB)

    Harmon, Diane W [Edlow International Company, Washington, DC (United States)

    1983-09-01

    This presentation contains the discussion on the multitude of administrative mechanics that have to be meshed for the successful completion of a shipment of spent fuel, HEU or LEU in the research reactors fuel cycle. The costs associated with transportation may be the equivalent of 'a black hole', so an overview of cost factors is given. At the end one could find that this black hole factor in the budget is actually a bargain. The first step is the quotation phase. The cost variables in the quotation contain the cost of packaging i.e. containers; the complete routing of the packages and the materials. Factors that are of outmost importance are the routing restrictions and regulations, physical security regulations. All of this effort is just to provide a valid quotation not to accomplish the goal of completing a shipment. Public relations cannot be omitted either.

  11. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  12. Analysis and comparison of transportation security systems

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1976-05-01

    The role of modeling in the analysis of transportation security systems is described. Various modeling approaches are outlined. The conflict model developed in Sandia Laboratories' Transportation Mode Analysis for the NRC Special Safeguards Study is used to demonstrate the capability of models to determine system sensitivities and compare alternatives

  13. Surface Transportation Security Priority Assessment

    Science.gov (United States)

    2010-03-01

    intercity buses), and pipelines, and related infrastructure (including roads and highways), that are within the territory of the United States...Modernizing the information technology infrastructure used to vet the identity of travelers and transportation workers  Using terrorist databases to...examination of persons travelling , surface transportation modes tend to operate in a much more open environment, making it difficult to screen workers

  14. Securing the Aviation Transportation System

    Science.gov (United States)

    2007-12-01

    additional 100,000 airport workers who perform duties in sterile areas (the indoor gate area past the security check point).197 These same...containing thirteen handguns, an assault rifle and eight pounds of marijuana .270 However, two Federal Air Marshals were also onboard the aircraft.271

  15. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  16. 29 CFR 70.54 - Employee Benefits Security Administration.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Employee Benefits Security Administration. 70.54 Section 70... Records and Filings § 70.54 Employee Benefits Security Administration. (a) The annual financial reports (Form 5500) and attachments/schedules as filed by employee benefit plans under the Employee Retirement...

  17. Aviation security : status of transportation security inspector workforce.

    Science.gov (United States)

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  18. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  19. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  20. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  1. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  2. ADMINISTRATIVE EXPENDITURES OF SOCIAL SECURITY FUNDS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Nataliia Ivanchuk

    2017-12-01

    Full Text Available Along with the expenditures for social protection, social security funds finance administrative direction, which should correspond to the amount of functions performed by a particular fund. The purpose of the paper is to determine ways to reduce administrative expenditures of state social security funds in the conditions of reforming Ukrainian economy. For this purpose, the authors investigate distribution of the expenditures between social security funds, analyse dynamics and structure of assignments for fund administration, and suggest possible ways to rationalize maintenance cost for these institutions. Methodology. Administrative expenditures are an integral part of the cost of social security funds and include particular items of expenses in the budget of these institutions. Applying a systematic approach to calculating the administrative costs of social security funds of Ukraine the authors have taken into account the expenditures related to funding management, support for information systems, and organization of work with insured people. Results of the survey showed that in 2007–2016 Pension Fund of Ukraine incurred the largest part of social expenditures (more than 90% compared with other social insurance funds (less than 10%. At the same time, the administrative expenses were divided approximately into two halves between Pension Fund and other social security funds. In 2015, the government launched a reform of social insurance funds that aimed to reduce funds to three institutions but a decrease in the total amount of administrative expenditures has not been achieved yet. In addition, Pension Fund of Ukraine was least burdened with administrative expenses, while other social security funds with a relatively small share of social expenditures were burdened with administrative expenditures much more. Practical implications. Research showed that nowadays the existence of several social security funds in Ukraine is economically

  3. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  4. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  5. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  6. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  7. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  8. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  9. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  10. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  11. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  12. A method to assess multi-modal hazmat transport security vulnerabilities: Hazmat transport SVA

    NARCIS (Netherlands)

    Reniers, G.L.L.; Dullaert, W.E.H.

    2013-01-01

    The suggested Hazmat transport Security Vulnerability Assessment (SVA) methodology presents a user-friendly approach to determine relative security risk levels of the different modes of hazardous freight transport (i.e., road, railway, inland waterways and pipeline transportation). First, transport

  13. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    Science.gov (United States)

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  14. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    Science.gov (United States)

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  15. 75 FR 64389 - Proposed Recommendation to the Social Security Administration for Occupational Information System...

    Science.gov (United States)

    2010-10-19

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0066] Proposed Recommendation to the Social Security Administration for Occupational Information System (OIS) Development Planning; Request for Comment...) to provide independent advice and recommendations on plans and activities to create an occupational...

  16. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  17. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  18. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  19. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  20. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  1. Surface transportation security : TSA has taken actions to manage risk, improve coordination, and measure performance, but additional actions would enhance its efforts, April 21, 2010.

    Science.gov (United States)

    2010-04-21

    Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...

  2. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  3. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  4. Emerging issues in transportation information infrastructure security

    Science.gov (United States)

    1996-07-31

    On October 26-27, 1995, over two hundred transportation leaders and decision-makers from around the nation convened in Cambridge, Massachusetts to participate in a two day symposium on "Challenges and Opportunities for Global Transportation in the 21...

  5. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  6. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  7. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  8. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  9. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  10. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  11. Incorporating security into the transportation planning process.

    Science.gov (United States)

    2009-03-01

    The transportation system is an important network established to ensure the mobility of people and goods between destinations. In addition, it also serves a vital role in responding to disasters, and therefore deserves special attention when those di...

  12. Transportation Security Leadership: The Right Stuff

    National Research Council Canada - National Science Library

    Burke, Karen

    2008-01-01

    .... transportation systems from terrorist threats. With the growing complexity and global nature of the terrorist networks, it requires leadership that is collaborative, integrative, and able to take a holistic leadership approach...

  13. 75 FR 24773 - Research and Innovative Technology Administration Advisory Council on Transportation Statistics...

    Science.gov (United States)

    2010-05-05

    ... DEPARTMENT OF TRANSPORTATION Bureau of Transportation Statistics Research and Innovative Technology Administration Advisory Council on Transportation Statistics; Notice of Meeting AGENCY: Research... Transportation, Research and Innovative Technology Administration, Bureau of Transportation Statistics, Attention...

  14. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  15. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  16. School Transportation Issues, Laws and Concerns: Implications for Future Administrators

    Science.gov (United States)

    Durick, Jody M.

    2010-01-01

    Nearly all building administrators are confronted with a variety of transportation issues. Challenges, concerns and questions can arise from various aspects, including student misbehaviors, transportation laws and its implications at the school level, to importance and implementation of a school bus safety program. As new and upcoming future…

  17. A review of tsp as one of the transportation security aspects of nuclear materials

    International Nuclear Information System (INIS)

    Wiryono

    2013-01-01

    A review has done for the Transportation Safety Plan (TSP) as one of the aspects of safety in the transport of nuclear materials. The review is necessary to harmonize national regulations with international practice. International practice of using TSP as one of the security requirements in addition to the Radiation Protection Program as a requirement of safety in the transport of nuclear materials. TSP is intended to ensure sound implementation of the transport of nuclear materials. TSP evaluation process can be done with a prescriptive approach, performance, and combinations. TSP contains information about administrative requirements, delivery security and response planning. TSP can be used to ensure the security of the implementation of the transport of nuclear materials effectively and efficiently. BAPETEN should require the applicant to submit the TSP as one document security requirements prior approval transporting nuclear materials. BAPETEN need to define the approach to the formulation and evaluation of TSP. BAPETEN need to set up an evaluation and inspection procedures for the implementation of TSP. (author)

  18. General Approaches and Requirements on Safety and Security of Radioactive Materials Transport in Russian Federation

    International Nuclear Information System (INIS)

    Ershov, V.N.; Buchel'nikov, A.E.; Komarov, S.V.

    2016-01-01

    Development and implementation of safety and security requirements for transport of radioactive materials in the Russian Federation are addressed. At the outset it is worth noting that the transport safety requirements implemented are in full accordance with the IAEA's ''Regulations for the Safe Transport of Radioactive Material (2009 Edition)''. However, with respect to security requirements for radioactive material transport in some cases the Russian Federation requirements for nuclear material are more stringent compared to IAEA recommendations. The fundamental principles of safety and security of RM managements, recommended by IAEA documents (publications No. SF-1 and GOV/41/2001) are compared. Its correlation and differences concerning transport matters, the current level and the possibility of harmonization are analysed. In addition a reflection of the general approaches and concrete transport requirements is being evaluated. Problems of compliance assessment, including administrative and state control problems for safety and security provided at internal and international shipments are considered and compared. (author)

  19. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  20. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  1. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  2. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  3. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  4. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  5. Application of the API/NPRA SVA methodology to transportation security issues.

    Science.gov (United States)

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  6. The Efficiency and Public Transport Accessibility of Indirect State Administration in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Vrabková Iveta

    2016-06-01

    Full Text Available This paper examines the efficiency and public transport accessibility of indirect (devolved state administration performed by municipalities with extended powers (hereinafter MEPs in the Czech Republic. Our aim is to evaluate the efficiency of the revenues made by municipalities with extended powers, through performing powers delegated to them by the state administration, and those municipalities’ public transport accessibility as of 31 December, 2014. The rate of efficiency is tested on an output-oriented Free Disposable Hull model. One input variable is selected - the operating expenses of the municipal offices recalculated per inhabitant of the municipality’s administrative district - and two output variables are selected: contribution to the performance of state administration, recalculated per inhabitant of the municipality’s administrative district, and revenues from administrative fees per inhabitant of the municipality’s administrative district. The municipality’s offices’ transport accessibility is evaluated via network analysis using ArcGIS software. The article investigates the hypothesis that public administration deconcentration practices logically result in higher security costs and therefore inefficiency. The results reveal that only 66 of the country’s 205 MEPs are efficient and that operating expenses and state contributions for the performance of state administrative tasks play a significant role in these results. Efficiency is less significantly influenced by administrative fee revenues. Public transport accessibility is analyzed for two time intervals - 6:00 to 8:00 am and 1:00 to 2:00 pm - on Tuesdays. The degree of accessibility is defined using a six-point scale of accessibility. The results show that the best accessibility is in the morning hours, when the offices are accessible for 68.8% of the population aged 15+ in the Czech Republic; the worst accessibility is in the afternoon hours when only 2% of the

  7. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  8. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  9. Network Security: What Non-Technical Administrators Must Know

    Science.gov (United States)

    Council, Chip

    2005-01-01

    Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…

  10. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  11. Security and health protection during the transport of hazardous substances

    International Nuclear Information System (INIS)

    Benkovic, Z.; Bobic, V.

    2009-01-01

    The introduction of this work describes the legal regulations which regulate the conditions and method of the transport of hazardous substances, necessary documentation for storage, forwarding and transport. Hazardous substances are defined and classified according to the ADR. The necessary security measures which are taken for the transport of particular types of hazardous substances are mentioned. Marking and labeling of vehicles for the transport of hazardous substances (plates and lists of hazards), packing and marking of packaging is important. The safety measures which are taken at the filling stations of combustible liquids as well as places specially organized for filling, prohibitions and limitations and necessary transport documentation are mentioned. It is visible from the above mentioned that the activity of the whole security chain is necessary and depends on the good knowledge of basic characteristics and features of substances. All the participants in the security chain have to be familiar with and consistently obey the legal regulations. The manufacturer must know the features of the hazardous substance, supervisory services must be acquainted with the threat and potential danger. The hauler and intervention forces must, in case of accidents and damage, be familiar with the emergency procedures in case of accidents and act properly regarding the threatening dangerous substance.(author)

  12. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  13. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  14. Considerations concerning the secure transport of radioactive materials in Romania

    International Nuclear Information System (INIS)

    Vieru, Gheorghe

    2002-01-01

    As UNO member and founding member of the IAEA, Romania has implemented national regulations concerning the transport of radioactive materials in complete safety, complying with recommendations by IAEA and other international organizations. Accordingly, the National Commission for Nuclear Activities Control, CNCAN, issued the Directive no. 374/October 2001 which provides the rules for secure radioactive material transport in Romania on roads, rail ways, sea/fluvial and air ways. The paper presents the main sources of producing radioactive materials focussing the following: mining of natural uranium ore, nuclear fuel fabrication plants, nuclear power plants operation, nuclear research reactors, industrial use of radioactive sources (as gamma radiography), use of radioisotope in scientific, educational or medical units. The paper pays attention to the special routes and containers adopted for most secure transport of radioactive waste. Finally, one presents specific issues relating to identification and evaluation of the risk factors occurring at the transport of radioactive waste, as well as the potential radiological consequences upon population and environment. Estimated are the collective risk doses for different categories of populations from areas adjacent to the routes of radioactive materials transportation. It is stressed that the annual collective dose which the population is exposed to in case of accident is comparable with the dose from the natural (cosmic radiation background)

  15. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  16. 49 CFR 209.501 - Review of rail transportation safety and security route analysis.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Review of rail transportation safety and security....820 § 209.501 Review of rail transportation safety and security route analysis. (a) Review of route... establish that the route chosen by the carrier poses the least overall safety and security risk, the...

  17. Development and Testing of Intelligent Alcohol Transportation Security System

    Directory of Open Access Journals (Sweden)

    Velaphi Msomi

    2018-01-01

    Full Text Available The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. The system was developed such that only the radar level sensor (VEGAPULS 62 might be in contact with the fluid and the rest of the system remained outside the liquid carrying container to be secured. The system was developed such that it reports any abnormal liquid level drop through short message service (SMS. The functioning of the developed system was tested through the use of 1040 L Intermediate Bulk Container (IBC filled with water which was hauled for about 1.5 km. The liquid theft was simulated and the system sent two SMS. The first SMS reported the beginning of water level drop and the second one reported the ending of water level drop. The second SMS reported the amount of liquid that was taken out of the container.

  18. Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction

    Science.gov (United States)

    Mehta, Kamlesh; Uhlig, Ronald

    2017-01-01

    This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…

  19. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  20. Administrative corruption from sociology perspective and the relationship between administrative corruption and social security

    OpenAIRE

    Mohsen Zarei Jlyany; Gholam Reza Sharafi; Mustafa Tavani; Mansour Haghighatian; Moslem Tavani

    2014-01-01

    certain principles Observance and non- Observance on organizing a social system will have Indisputable effect at the Organization. And administrative systems are not exempt from this, also the selection of the Administration components and also How to Place the components together can affect its performance. Meanwhile, the government's role in the prevalence or no-prevalence, the extent type and the way of administrative corruption influence, in this article, researchers wants to explore the ...

  1. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Science.gov (United States)

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  2. Sample handling and transport for the Secure Automated Fabrication line

    International Nuclear Information System (INIS)

    Sherrell, D.L.; Jensen, J.D.; Genoway, G.G.; Togesen, H.J.

    1983-06-01

    A totally automated system is described which packages, transports, receives, and unpackages sintered plutonium/uranium oxide fuel pellet samples to support automated chemical analysis equipment for the Secure Automated Fabrication (SAF) line. Samples are transferred 100 meters from the fuel production line to a different floor of the facility where automatic determinations are made for purposes of process control and fuel quality certification. The system automatically records identification numbers, net weights sent and received, and all other pertinent information such as fuel lot number, sample point, date, and time of day

  3. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  4. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  5. Security Measures and some Specific Features of the Transport Police Functioning in Russia and Abroad

    Directory of Open Access Journals (Sweden)

    Petr P. Ignatushenko

    2017-03-01

    Full Text Available In the present article specifics of the transport police work in the Russian Federation are discussed, as well as in other countries of the world (USA, Germany, Israel, etc.. Attention is drawn to the need of the role and significance of the Russian police review in the matters of railway and aviation security, as well as safety on river and sea transport. The term “transport security” is a state of security of transport and transport infrastructure, consumers of transport services (passengers from various types of threats (natural and man-made, as well as acts of unlawful interference in the activities of various modes of transport – points put the author. Transport security issues are important for the creation of the transport police system in the Russian Federation, taking into account experience of foreign countries.

  6. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  7. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  8. 14 CFR 401.3 - The Associate Administrator for Commercial Space Transportation.

    Science.gov (United States)

    2010-01-01

    ... space transportation by the United States private sector. [Doc. No. FAA-2006-24197, 72 FR 17016, Apr. 6... AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GENERAL ORGANIZATION AND DEFINITIONS § 401.3 The...

  9. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  10. 49 CFR 1510.7 - Air transportation advertisements and solicitations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Air transportation advertisements and solicitations. 1510.7 Section 1510.7 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE...

  11. Individual social security accounts: issues in assessing administrative feasibility and costs.

    Science.gov (United States)

    Olsen, K A; Salisbury, D L

    1998-11-01

    Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more

  12. Action at sea: Transport security exercise conducted off the coast of Sweden

    International Nuclear Information System (INIS)

    Isaksson, Stig; Jawerth, Nicole

    2015-01-01

    As in an action movie, ships, helicopters and uniformed people set the scene off the coast of Sweden on 6 May 2015 when national authorities conducted an exercise on security while transporting spent nuclear fuel. The exercise was part of a joint project with the IAEA to test and evaluate a new IAEA guide on planning, conducting and evaluating transport security exercises. The test subject and model was the security framework of Sweden’s national nuclear transport system, which regularly ships used fuel from power plants along the coast to the country’s interim storage facility for spent nuclear fuel.

  13. THE PROBLEM OF PROPER CARGO SECURING IN ROAD TRANSPORT – CASE STUDY

    Directory of Open Access Journals (Sweden)

    Maria CIEŚLA

    2013-12-01

    Full Text Available This paper presents the problem of improper security of cargo in trucks as the cause of about 25% of the accidents that takes place in road transport. Attention was drawn to aspects of legal liability for errors resulting from incorrect load securing according to polish law. Article was enriched with practical examples illustrating the effects of improper cargo securing on transport unit and shows how it had to be prepared properly. When planning the proper transport protection of metal sheets rolled both calculation methods and computer applications were used.

  14. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  15. Transportation management and security during the 2004 Democratic National Convention

    Science.gov (United States)

    2005-01-05

    The transportation operations plan for the 2004 Democratic National Convention (DNC) in Boston, Massachusetts, was not a typical transportation plan driven by goals such as mobility and air quality. The DNC was the first national political convention...

  16. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    Science.gov (United States)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  17. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Science.gov (United States)

    2010-04-13

    ... made to the system of records' routine uses, record sources, retention and disposal, notification... information about individuals who are their employees, job applicants, or contractors, or persons to whom they... are being vetted to qualify as federal flight deck officers. The retention and disposal section is...

  18. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  19. Goal system for comparative assessments of nuclear fuel transport under security aspects

    International Nuclear Information System (INIS)

    Behrendt, V.; Schwieren, G.

    1983-01-01

    Due to the great hazard potential of nuclear fuel transports the possibility always exists during transportation that either a single perpetrator or a group of perpetrators will try to get possession of the nuclear fuel. One can assume that at the end of such illegal actions there will be a politically (or otherwise) motivated extortion. Thinking about security one has to face things like sabotage, attacks from inside or outside the system, robbery and/or dispersion of the transported goods. In respect to the security of nuclear transports we carried out an investigation for the German Ministry of the Interior in order to review the different levels of security of different transport systems. This paper deals with the methodological approach, especially with the goal system and the way we executed the investigation

  20. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  1. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  2. Study Regarding the Provision of Security and Safety in the International Maritime Transport

    Directory of Open Access Journals (Sweden)

    Liliana POPA

    2011-11-01

    Full Text Available The security in transport has become a crucial issue internationally, especially after the terrorist attacks of September 2001 and even more recently. Maritime, along with aviation, is considered a sensitive and of high-risk transport sector, in terms of security. Moreover, topics related to safety in maritime transport have become very important over the past decades mostly because of the numerous maritime accidents putting in danger both human lives and the environment. Taking into account the global dimension of maritime transport along with the fact that the participation of Asia in the world trade during the past decade has been substantial, the current maritime safety and security practices apply for all areas. This can only be achieved through the application of high standards and regulations setting the prerequisites for safe and secure navigation. In this direction, a significant number of Directives, Regulations and Initiatives on maritime safety and security have been introduced by international and European organizations, such as the International Maritime Organization, (I.M.O., the International Labour Organization (I.L.O. and the European Union (EU. In the framework of this analysis, the levels of compliance of European and Asian countries, regarding the international legislation, is examined while special emphasis is given on the problems and difficulties encountered during the implementation processes. Furthermore, a number of recommendations aiming to enhance the existing levels of safety and security in maritime transport in both examined area is provided.

  3. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  4. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  5. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  6. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  7. Safety and security in transportation of radioactive material- the perception of risk

    Energy Technology Data Exchange (ETDEWEB)

    Ericsson, A.M.; Jaernry, C. [AMC Konsult AB, Bromma (Sweden)

    2004-07-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations.

  8. Safety and security in transportation of radioactive material- the perception of risk

    International Nuclear Information System (INIS)

    Ericsson, A.M.; Jaernry, C.

    2004-01-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations

  9. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    OpenAIRE

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to pro...

  10. New safety and security requirements for the transport of nuclear and other radioactive materials in Hungary

    International Nuclear Information System (INIS)

    Katona, T.; Horvath, K.; Safar, J.

    2016-01-01

    In addition to the promulgation of mode-specific regulations of international transport of dangerous goods, some Hungarian governmental and ministerial decrees impose further conditions upon the transport of nuclear and other radioactive materials. One of these ministerial decrees on the transport, carriage and packaging of radioactive materials is under revision and it will require • approval of emergency response plan (including security and safety contingency plan); • report on transport incidents and accidents for classifying them in accordance with the INES scale; • the competent authority to request experts’ support for the approval of package designs, radioactive material designs and shipments. Regarding the security of the transport of nuclear and other radioactive materials a new Hungarian governmental decree and a related guidance are about to be published which will supply additional requirements in the field of the transport security especially concerning radioactive materials, implementing - among others - IAEA recommendations of the NSS No9 and No14. The main and relevant features of the Hungarian nuclear regulatory system and the details of both new decrees regarding the safety and security issues of transport of nuclear and other radioactive materials will be discussed. (author)

  11. Legal Framework and Best Practice for Improving Transport Security of Radioactive and Nuclear Materials in Croatia

    International Nuclear Information System (INIS)

    Ilijas, B.; Medakovic, S.

    2012-01-01

    Security of transporting radioactive and nuclear materials always poses a demanding task to the holder of the authorization or beneficiary, and especially transporter. Very strict and precise legal framework must be done for this purpose, yet it has not be too complicated to create a great problems in practice. The best balance between efficiency and simplicity should be achieved. In Croatia on power is 'The Dangerous Goods Transport Act' which stipulates the conditions for the carriage of dangerous goods in individual transport modes, obligations of persons participating in the carriage, requirements for packaging and vehicles, conditions for the appointment of safety advisers and safety adviser's rights and duties, competence and conditions for the implementation of training programs for persons participating in transport, competence of the state authorities related to such carriage and supervision of the implementation of the Act. Besides this Act, which regulates the issue in more general way, in preparation is a new 'Ordinance on Physical Security Measures for Radioactive Sources, Nuclear Material and Nuclear Facilities'. The intention of this Ordinance, in the part dealing with transport, is to bring specific approach, in accordance with IAEA guides, forwarding the most of obligations to the holder of the authorization or beneficiary and transporter, leaving state regulatory bodies mostly supervising role. In practice this can create some problems in the beginning, but with rising security awareness and after some experience collected, this can be the best way to achieve satisfactory security, yet not slowing down and complicating regular jobs with radioactive and nuclear materials.(author).

  12. Security in the transport of radioactive material - interim guidance for comment

    International Nuclear Information System (INIS)

    Legoux, P.; Wangler, M.

    2004-01-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal authorities

  13. Security in the transport of radioactive material - interim guidance for comment

    Energy Technology Data Exchange (ETDEWEB)

    Legoux, P.; Wangler, M. [International Atomic Energy Agency, Vienna (Austria)

    2004-07-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal

  14. Developing an undergraduate degree in public transportation administration and management : feasibility study results.

    Science.gov (United States)

    2006-11-01

    Experiences and results of research by the North Carolina Central University Department of Public Administration while a : conducting feasibility study for establishing a new multidisciplinary undergraduate degree in public transportation administrat...

  15. Legal rights, efficiency and citizen involvement in the administration of social security cash benefits

    DEFF Research Database (Denmark)

    Von Hielmcrone, Nina

    2010-01-01

    for the accretion of new special rules. They merely have to be coded into the system. The government’s modernisation programme has been carried out at the expense of transparency and the legal rights of the citizens. This article deals with Danish legislation; the mechanisms in question are common not only......The Danish social security legislation has been distinguished in recent years by an intense growth in rules and regulations. Numerous laws and ordinances have been promulgated, which make it extremely difficult for both citizens and authorities to come to grips with the laws, much less to gain...... to a vast growth in very detailed and complex rules and thereby lack of transparency for citizens and social workers. The fact that benefits are administered with the aid of computers means that neither administrators nor politicians find the abundance of rules to be a problem, and no limits are thereby set...

  16. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  17. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.

    Science.gov (United States)

    Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra

    2014-12-01

    The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.

  18. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  19. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  20. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  1. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Science.gov (United States)

    2010-10-01

    ... checks by public transportation agency or railroad carrier. 1570.13 Section 1570.13 Transportation Other... regarding security background checks by public transportation agency or railroad carrier. (a) Scope. This... employee of a public transportation agency or a contractor or subcontractor of a public transportation...

  2. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  3. Transportation

    National Research Council Canada - National Science Library

    Adams, James; Carr, Ron; Chebl, Maroun; Coleman, Robert; Costantini, William; Cox, Robert; Dial, William; Jenkins, Robert; McGovern, James; Mueller, Peter

    2006-01-01

    ...., trains, ships, etc.) and maximizing intermodal efficiency. A healthy balance must be achieved between the flow of international commerce and security requirements regardless of transportation mode...

  4. Substantiating the Target Level of Economic Security of Transport Enterprises and the Instrumentarium for Its Provision

    Directory of Open Access Journals (Sweden)

    Lebedko Sergiy A.

    2017-10-01

    Full Text Available The article is aimed at substantiating the methodology for assessing the economic security of transport enterprises, determining the target level and the instrumentarium for its provision. The proposed methodical approach to the assessment of the level of economic security of transport enterprises includes the determination of the level of counteracting threats and is based on the principles of integral estimation. The formed integrated indicator includes both indicators of counteracting the internal (human, managerial and technological, force majeure, financial and external threats (market, stakeholder, power-based, natural, infrastructural. Each measure of counteracting threats is determined by results of assessment of dynamics of the three indicators. A practical testing of the proposed approach is carried out in the case of transport enterprises. Based on the established equation of the regression relationship between the level of economic security and the financial strength, a target level of economic security of transport enterprises has been substantiated. The instrumentarium to provide a targeted level of economic security according to the threat types, including preventive and reactive measures, has been developed.

  5. Spent Nuclear Fuel Transportation Risk Assessment Methodology for Homeland Security

    International Nuclear Information System (INIS)

    Teagarden, Grant A.; Canavan, Kenneth T.; Nickell, Robert E.

    2006-01-01

    In response to increased interest in risk-informed decision making regarding terrorism, EPRI was selected by U.S. DHS and ASME to develop and demonstrate a nuclear sector specific methodology for owner / operators to utilize in performing a Risk Analysis and Management for Critical Asset Protection (RAMCAP) assessment for the transportation of spent nuclear fuel (SNF). The objective is to characterize SNF transportation risk for risk management opportunities and to provide consistent information for DHS decision making. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. Worst reasonable case scenarios characterize risk for a benchmark set of threats and consequence types. A trial application was successfully performed and implementation is underway by one utility. (authors)

  6. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  7. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  8. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  9. Social security administration in India- study of provident funds and pension scheme

    OpenAIRE

    Rao, Madhava P

    2005-01-01

    Social Security is becoming a distinct part of social policy of India and the time has come to give a serious thought to ever increasing Social Security needs of the population. There are diversified views on extension of Social Security coverage. Some say it should be limited to only working population and to their families and while others say that the entire population should be covered under Social Security programmes. Social Security schemes further have been branched out as protective...

  10. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  11. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  12. The Impact of Road Transporter Development Trajectory onto Cargo Safety and Security

    Directory of Open Access Journals (Sweden)

    Márton Lányi

    2018-03-01

    Full Text Available This article attempts to reveal the general behavioural norms of cargo carriers, with a predominant emphasis on security issues. The security awareness level of road transporters has been found hugely dependent on management capabilities. Additionally, this poses a risk factor indicative of a shipment load's quantity and value. At a certain level of road transporter development trajectory, broad research delineates a sharp increase in security awareness, stemming from leadership recognition at larger companies. The results of the following research findings are significantly similar to various well respected scientific theories which verify the hypothesis that the principal barrier to developing a company is a combination of a lack of management capabilities and an unwillingness to adapt to change.

  13. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  14. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  15. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  16. 45 CFR 1336.67 - Security and collateral: Responsibilities of the Loan Administrator.

    Science.gov (United States)

    2010-10-01

    ... inventory or proceeds of inventory sales as well as marketable securities and cash collateral accounts. (1... security at any time during the term of the loan if after review and monitoring an assessment indicates the...

  17. Use of the Social Security Administration Death Master File for ascertainment of mortality status

    Directory of Open Access Journals (Sweden)

    Whitcomb Brian W

    2004-03-01

    Full Text Available Abstract Objectives Internet sources that use the Social Security Administration's (SSA Death Master File have demonstrated high sensitivity among males for detection of mortality status in comparisons to the National Death Index, but the sensitivity has not been investigated for other demographic groups. Methods The authors used the SSA Death Master File to determine the mortality status of 374 decedents from the ongoing Patient Outcomes Study at Cedars-Sinai Medical Center whose deaths were confirmed by physicians using hospital records. Results Decedents identified by the SSA Death Master File were significantly older than those not identified. Foreign-born decedents were significantly less likely to be identified as dead than American-born decedents. Gender and marital status were not significant factors for identification by the SSA Death Master File. Conclusion The results of this study suggest that Internet sources may be used as an inexpensive and effective tool for determination of mortality status. However, among certain populations use of these databases alone may provide incomplete information.

  18. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  19. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  20. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-03-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  1. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-06-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  2. 49 CFR 176.162 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  3. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  4. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  5. Development of a computer-adaptive physical function instrument for Social Security Administration disability determination.

    Science.gov (United States)

    Ni, Pengsheng; McDonough, Christine M; Jette, Alan M; Bogusz, Kara; Marfeo, Elizabeth E; Rasch, Elizabeth K; Brandt, Diane E; Meterko, Mark; Haley, Stephen M; Chan, Leighton

    2013-09-01

    To develop and test an instrument to assess physical function for Social Security Administration (SSA) disability programs, the SSA-Physical Function (SSA-PF) instrument. Item response theory (IRT) analyses were used to (1) create a calibrated item bank for each of the factors identified in prior factor analyses, (2) assess the fit of the items within each scale, (3) develop separate computer-adaptive testing (CAT) instruments for each scale, and (4) conduct initial psychometric testing. Cross-sectional data collection; IRT analyses; CAT simulation. Telephone and Internet survey. Two samples: SSA claimants (n=1017) and adults from the U.S. general population (n=999). None. Model fit statistics, correlation, and reliability coefficients. IRT analyses resulted in 5 unidimensional SSA-PF scales: Changing & Maintaining Body Position, Whole Body Mobility, Upper Body Function, Upper Extremity Fine Motor, and Wheelchair Mobility for a total of 102 items. High CAT accuracy was demonstrated by strong correlations between simulated CAT scores and those from the full item banks. On comparing the simulated CATs with the full item banks, very little loss of reliability or precision was noted, except at the lower and upper ranges of each scale. No difference in response patterns by age or sex was noted. The distributions of claimant scores were shifted to the lower end of each scale compared with those of a sample of U.S. adults. The SSA-PF instrument contributes important new methodology for measuring the physical function of adults applying to the SSA disability programs. Initial evaluation revealed that the SSA-PF instrument achieved considerable breadth of coverage in each content domain and demonstrated noteworthy psychometric properties. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  6. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  7. 78 FR 59082 - Privacy Act of 1974; Department of Transportation, Federal Motor Carrier Safety Administration...

    Science.gov (United States)

    2013-09-25

    ..., [email protected] . For privacy issues please contact: Claire W. Barrett, Departmental Chief... DEPARTMENT OF TRANSPORTATION Office of the Secretary [Docket No. FMCSA-2013-0306] Privacy Act of... Administration (FMCSA), DOT. ACTION: Notice to amend a system of records. SUMMARY: In accordance with the Privacy...

  8. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  9. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  10. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  11. Security in the Transport of Radioactive Material. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  12. Security in the Transport of Radioactive Material. Implementing Guide (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  13. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  14. Prehospital Blood Product Administration Opportunities in Ground Transport ALS EMS - A Descriptive Study.

    Science.gov (United States)

    Mix, Felicia M; Zielinski, Martin D; Myers, Lucas A; Berns, Kathy S; Luke, Anurahda; Stubbs, James R; Zietlow, Scott P; Jenkins, Donald H; Sztajnkrycer, Matthew D

    2018-06-01

    IntroductionHemorrhage remains the major cause of preventable death after trauma. Recent data suggest that earlier blood product administration may improve outcomes. The purpose of this study was to determine whether opportunities exist for blood product transfusion by ground Emergency Medical Services (EMS). This was a single EMS agency retrospective study of ground and helicopter responses from January 1, 2011 through December 31, 2015 for adult trauma patients transported from the scene of injury who met predetermined hemodynamic (HD) parameters for potential transfusion (heart rate [HR]≥120 and/or systolic blood pressure [SBP]≤90). A total of 7,900 scene trauma ground transports occurred during the study period. Of 420 patients meeting HD criteria for transfusion, 53 (12.6%) had a significant mechanism of injury (MOI). Outcome data were available for 51 patients; 17 received blood products during their emergency department (ED) resuscitation. The percentage of patients receiving blood products based upon HD criteria ranged from 1.0% (HR) to 5.9% (SBP) to 38.1% (HR+SBP). In all, 74 Helicopter EMS (HEMS) transports met HD criteria for blood transfusion, of which, 28 patients received prehospital blood transfusion. Statistically significant total patient care time differences were noted for both the HR and the SBP cohorts, with HEMS having longer time intervals; no statistically significant difference in mean total patient care time was noted in the HR+SBP cohort. In this study population, HD parameters alone did not predict need for ED blood product administration. Despite longer transport times, only one-third of HEMS patients meeting HD criteria for blood administration received prehospital transfusion. While one-third of ground Advanced Life Support (ALS) transport patients manifesting HD compromise received blood products in the ED, this represented 0.2% of total trauma transports over the study period. Given complex logistical issues involved in

  15. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    Science.gov (United States)

    2016-12-01

    parties as well. It seemed also difficult to make coalitions among the opposition parties, with their diverse political identities , to win a district...explanations for Abe’s political success in his second administration. Abe’s pragmatism in statecraft mainly originated from his own political experiences...and was crucial for accumulating his political capital and realizing security policy. At the domestic level, political influence from former

  16. Information System Security: Air Force Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... Subsequent reports will cover Web site administration within the Army and DoD. The Naval Audit Service plans to issue a separate report based on the audit of Web site administration within the Navy and the Marine Corps...

  17. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  18. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    International Nuclear Information System (INIS)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John; Olson, Russell Teall

    2016-01-01

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  19. Administration

    DEFF Research Database (Denmark)

    Bogen handler om den praksis, vi kalder administration. Vi er i den offentlige sektor i Danmark hos kontorfolkene med deres sagsmapper, computere, telefoner,, lovsamlinger,, retningslinier og regneark. I bogen udfoldes en mangfoldighed af konkrete historier om det administrative arbejde fra...... forskellige områder i den offentlige sektor. Hensigten er at forstå den praksis og faglighed der knytter sig til det administrative arbejde...

  20. Regulation of glutamate transporter 1 (GLT-1) gene expression by cocaine self-administration and withdrawal.

    Science.gov (United States)

    Kim, Ronald; Sepulveda-Orengo, Marian T; Healey, Kati L; Williams, Emily A; Reissner, Kathryn J

    2018-01-01

    Downregulation of the astroglial glutamate transporter GLT-1 is observed in the nucleus accumbens (NAc) following administration of multiple drugs of abuse. The decrease in GLT-1 protein expression following cocaine self-administration is dependent on both the amount of cocaine self-administered and the length of withdrawal, with longer access to cocaine and longer withdrawal periods leading to greater decreases in GLT-1 protein. However, the mechanism(s) by which cocaine downregulates GLT-1 protein remains unknown. We used qRT-PCR to examine gene expression of GLT-1 splice isoforms (GLT-1A, GLT-1B) in the NAc, prelimbic cortex (PL) and basolateral amygdala (BLA) of rats, following two widely used models of cocaine self-administration: short-access (ShA) self-administration, and the long-access (LgA) self-administration/incubation model. While downregulation of GLT-1 protein is observed following ShA cocaine self-administration and extinction, this model did not lead to a change in GLT-1A or GLT-1B gene expression in any brain region examined. Forced abstinence following ShA cocaine self-administration also was without effect. In contrast, LgA cocaine self-administration and prolonged abstinence significantly decreased GLT-1A gene expression in the NAc and BLA, and significantly decreased GLT-1B gene expression in the PL. No change was observed in NAc GLT-1A gene expression one day after LgA cocaine self-administration, indicating withdrawal-induced decreases in GLT-1A mRNA. In addition, LgA cocaine self-administration and withdrawal induced hypermethylation of the GLT-1 gene in the NAc. These results indicate that a decrease in NAc GLT-1 mRNA is only observed after extended access to cocaine combined with protracted abstinence, and that epigenetic mechanisms likely contribute to this effect. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  2. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  3. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  4. VA INFORMATION SYSTEMS: Computer Security Weaknesses Persist at the Veterans Health Administration

    National Research Council Canada - National Science Library

    2000-01-01

    .... To determine the status of computer security within VHA, we (1) evaluated information system general controls at the VA Maryland Health Cafe System, the New Mexico VA Health Care System, and the VA North Texas Health Care System and (2...

  5. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  6. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  7. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  8. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  9. Game theoretic analysis of congestion, safety and security traffic and transportation theory

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements in traffic and transportation theory, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how ...

  10. Safety And Promotion in the Federal Aviation Administration- Enabling Safe and Successful Commercial Space Transportation

    Science.gov (United States)

    Repcheck, Randall J.

    2010-09-01

    The United States Federal Aviation Administration’s Office of Commercial Space Transportation(AST) authorizes the launch and reentry of expendable and reusable launch vehicles and the operation of launch and reentry sites by United States citizens or within the United States. It authorizes these activities consistent with public health and safety, the safety of property, and the national security and foreign policy interests of the United States. In addition to its safety role, AST has the role to encourage, facilitate, and promote commercial space launches and reentries by the private sector. AST’s promotional role includes, among other things, the development of information of interest to industry, the sharing of information of interest through a variety of methods, and serving as an advocate for Commercial Space Transportation within the United States government. This dual safety and promotion role is viewed by some as conflicting. AST views these two roles as complementary, and important for the current state of commercial space transportation. This paper discusses how maintaining a sound safety decision-making process, maintaining a strong safety culture, and taking steps to avoid complacency can together enable safe and successful commercial space transportation.

  11. Analysis of satisfaction factors at urban transport interchanges: Measuring travelers’ attitudes to information, security and waiting

    Energy Technology Data Exchange (ETDEWEB)

    Lois Garcia, D.; Monzon de Caceres, A.; Hernandez del Olmo, S.

    2016-07-01

    Transport interchanges can be considered as a node, where people transfer from one mode to another, and as a place to stay, using facilities and services as well as waiting areas. Reducing disruption of transfer in multimodal trips is a key element for assuring seamless mobility in big cities. Based on previous research (Hernández & Monzón, 2016) this paper aims to explore the predictive capacity of attitudes towards several service factors on general satisfaction with transport interchange. Complementary, it was analyzing how personal and trip characteristics are related to evaluation of some variables, and examining the influence of waiting time on the perceived quality. To that end, a two steps methodology was conducted (personal and on-line interview) in a representative sample of 740 users (54% female, 55% work purpose trip). We performed path analysis to test the model showing a satisfactory statistical fit. The model developed show good performance for predicting general satisfaction at Moncloa Transport Interchange (Madrid, Spain). The outputs of the model indicate that Information and Safety and Security factors predicted 49% of general satisfaction. Furthermore, the results showed also a strong association between evaluation of Design and Environmental quality, factors that not affect directly general satisfaction but do so through Information and Safety & Security perception, acting the last as mediator variables. Nevertheless, spending time queuing inside the interchange show a negative influence on Information and Safety & Security, while age of participants affect negatively to Information, which mean that elder have some cognitive accessibility problems. Moreover, our data shows gender differences in safety perception, since women feel less safe (particularity the youngest) inside the interchange. The results indicate a number of priority measures to enhance. (Author)

  12. Legal basis and administrative departments for securing and guaranteeing the energy supply

    International Nuclear Information System (INIS)

    Besslich, W.

    1979-01-01

    The headline is no game with the words. It distinguishes between the securing of the supply in times of peace and the guarantee in times of defense during war which is a popular topic again and follows a linguistic term by the Bundesrat of 1915 which was kept alive up to day. (orig.) [de

  13. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  14. Administrative Subpoenas and National Security Letters in Criminal and Foreign Intelligence Investigations: Background and Proposed Adjustments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2005-01-01

    .... Several statutes at least arguably authorize the use of administrative subpoenas primarily or exclusively for use in a criminal investigation in cases involving health care fraud, child abuse, Secret...

  15. Transports of radioactive materials. Legal regulations, safety and security concepts, experience

    International Nuclear Information System (INIS)

    Schwarz, Guenther

    2012-01-01

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  16. Employee Retirement Income Security Act of 1974: rules and regulations for administration and enforcement; claims procedure. Pension and Welfare Benefits Administration, Labor. Final regulation.

    Science.gov (United States)

    2000-11-21

    This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  17. A Modular, Reusable Latch and Decking System for Securing Payloads During Launch and Planetary Surface Transport

    Science.gov (United States)

    Doggett, William R.; Dorsey, John T.; Jones, Thomas C.; King, Bruce D.; Mikulas, Martin M.

    2011-01-01

    Efficient handling of payloads destined for a planetary surface, such as the moon or mars, requires robust systems to secure the payloads during transport on the ground, in space and on the planetary surface. In addition, mechanisms to release the payloads need to be reliable to ensure successful transfer from one vehicle to another. An efficient payload handling strategy must also consider the devices available to support payload handling. Cranes used for overhead lifting are common to all phases of payload handling on Earth. Similarly, both recent and past studies have demonstrated that devices with comparable functionality will be needed to support lunar outpost operations. A first generation test-bed of a new high performance device that provides the capabilities of both a crane and a robotic manipulator, the Lunar Surface Manipulation System (LSMS), has been designed, built and field tested and is available for use in evaluating a system to secure payloads to transportation vehicles. A payload handling approach must address all phases of payload management including: ground transportation, launch, planetary transfer and installation in the final system. In addition, storage may be required during any phase of operations. Each of these phases requires the payload to be lifted and secured to a vehicle, transported, released and lifted in preparation for the next transportation or storage phase. A critical component of a successful payload handling approach is a latch and associated carrier system. The latch and carrier system should minimize requirements on the: payload, carrier support structure and payload handling devices as well as be able to accommodate a wide range of payload sizes. In addition, the latch should; be small and lightweight, support a method to apply preload, be reusable, integrate into a minimal set of hard-points and have manual interfaces to actuate the latch should a problem occur. A latching system which meets these requirements has been

  18. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  19. Contribution to the Study of the State Transport Service in Roman Administration

    Directory of Open Access Journals (Sweden)

    Raquel Escutia-Romero

    2017-01-01

    Full Text Available The cursus publicus was the government transportation system in the Roman Empire. It made government communication, travel by government officials and the transport of certain State goods such as tax money, metals (gold and silver and army equipment possible. This work seeks to illustrate the origin of this official service, the highways used, the infrastructure (mansiones and mutationes, the animals and wagons exchanged periodically along the way, the authorization for the use of cursus publicus administration, the extremely restricted issue of warrants for the use of the cursus publicus (evectiones, the funding of services and the irregularities and abuse of the system and the necessary legislation to avoid and condemn such acts.

  20. 76 FR 40352 - National Nuclear Security Administration; Amended Record of Decision: Site-Wide Environmental...

    Science.gov (United States)

    2011-07-08

    ...-2391; email: [email protected] . For general information concerning the DOE NEPA process... specific actions analyzed in DOE/EIS-0380-SA-02 include packaging the sealed sources (sometimes with a part... transport accident analysis assumed a low probability crash from a landing stall and subsequent fire. For...

  1. Secure ADS-B: Towards Airborne Communications Security in the Federal Aviation Administration’s Next Generation Air Transportation System

    Science.gov (United States)

    2014-03-01

    76 5.2 Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 5.3 Recommendations for Future Work...Global Positioning System ICAO International Civil Aviation Organization IFF Identification Friend or Foe IFR Instrument Flight Rules IMO...Instrument Flight Rules ( IFR ). Under VFR, typically used by General Aviation (GA) aircraft operating under 18,000 feet, the pilot is primarily responsible

  2. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability

    National Research Council Canada - National Science Library

    Hoaglund, Robert; Gazda, Walter

    2007-01-01

    The goal of this analysis is to provide ASCO and its customers with a comprehensive approach to the development of quantitative performance measures to assess security improvements to the port system...

  3. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  4. Limitation of right of codetermination of the works council in case of an administrative order for security controls

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    BetrVG section 87, sub-sec. (1), No. 1 and 7, first sentence; Atomic Energy Act section 7, sub-sec. (2), No. 5; section 17, sub-sec. (1), sentence 2. On the basis of a right of codetermination, the works council may only claim an arrangement that could be decided upon by the employer alone outside the Works Constitution Act. In case the employer is obliged by an administrative act binding upon him, to take certain measures, the works council may not claim an arrangement deviating from this directive by referring to the right of codetermination. Federal Labour Court, decision of May 26, 1988 - 1 ABR 9/87 - concerning the execution of security controls on the personnel entering the WAK. (orig./HP) [de

  5. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  6. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  7. Cocaine Self-Administration Produces Long-Lasting Alterations in Dopamine Transporter Responses to Cocaine

    Science.gov (United States)

    Siciliano, Cody A.; Fordahl, Steve C.

    2016-01-01

    Cocaine addiction is a debilitating neuropsychiatric disorder characterized by uncontrolled cocaine intake, which is thought to be driven, at least in part, by cocaine-induced deficits in dopamine system function. A decreased ability of cocaine to elevate dopamine levels has been repeatedly observed as a consequence of cocaine use in humans, and preclinical work has highlighted tolerance to cocaine's effects as a primary determinant in the development of aberrant cocaine taking behaviors. Here we determined that cocaine self-administration in rats produced tolerance to the dopamine transporter-inhibiting effects of cocaine in the nucleus accumbens core, which was normalized following a 14 or 60 d abstinence period; however, although these rats appeared to be similar to controls, a single self-administered infusion of cocaine at the end of abstinence, even after 60 d, fully reinstated tolerance to cocaine's effects. A single cocaine infusion in a naive rat had no effect on cocaine potency, demonstrating that cocaine self-administration leaves the dopamine transporter in a “primed” state, which allows for cocaine-induced plasticity to be reinstated by a subthreshold cocaine exposure. Further, reinstatement of cocaine tolerance was accompanied by decreased cocaine-induced locomotion and escalated cocaine intake despite extended abstinence from cocaine. These data demonstrate that cocaine leaves a long-lasting imprint on the dopamine system that is activated by re-exposure to cocaine. Further, these results provide a potential mechanism for severe cocaine binge episodes, which occur even after sustained abstinence from cocaine, and suggest that treatments aimed at transporter sites may be efficacious in promoting binge termination following relapse. SIGNIFICANCE STATEMENT Tolerance is a DSM-V criterion for substance abuse disorders. Abusers consistently show reduced subjective effects of cocaine concomitant with reduced effects of cocaine at its main site of action

  8. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  9. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  10. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  11. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  12. Regional, national and international security requirements for the transport of nuclear cargo by sea

    International Nuclear Information System (INIS)

    Booker, P.A.; Barnwell, I.

    2004-01-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea

  13. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  14. Ethanol self-administration in serotonin transporter knockout mice: unconstrained demand and elasticity.

    Science.gov (United States)

    Lamb, R J; Daws, L C

    2013-10-01

    Low serotonin function is associated with alcoholism, leading to speculation that increasing serotonin function could decrease ethanol consumption. Mice with one or two deletions of the serotonin transporter (SERT) gene have increased extracellular serotonin. To examine the relationship between SERT genotype and motivation for alcohol, we compared ethanol self-administration in mice with zero (knockout, KO), one (HET) or two copies (WT) of the SERT gene. All three genotypes learned to self-administer ethanol. The SSRI, fluvoxamine, decreased responding for ethanol in the HET and WT, but not the KO mice. When tested under a progressive ratio schedule, KO mice had lower breakpoints than HET or WT. As work requirements were increased across sessions, behavioral economic analysis of ethanol self-administration indicated that the decreased breakpoint in KO as compared to HET or WT mice was a result of lower levels of unconstrained demand, rather than differences in elasticity, i.e. the proportional decreases in ethanol earned with increasing work requirements were similar across genotypes. The difference in unconstrained demand was unlikely to result from motor or general motivational factors, as both WT and KO mice responded at high levels for a 50% condensed milk solution. As elasticity is hypothesized to measure essential value, these results indicate that KO value ethanol similarly to WT or HET mice despite having lower break points for ethanol. © 2013 John Wiley & Sons Ltd and International Behavioural and Neural Genetics Society.

  15. Relational Security Moderates the Effect of Serotonin Transporter Gene Polymorphism (5-HTTLPR) on Stress Generation and Depression among Adolescents

    Science.gov (United States)

    Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake M.

    2013-01-01

    Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs…

  16. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  17. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the United States.

  18. Secure and economic operational of a gas transportation system; Operacion economica y segura de un sistema de transporte de gas

    Energy Technology Data Exchange (ETDEWEB)

    Sardi, Oscar Jose; Trichilo, Claudia; Valpreda, Carlos [Transportadora de Gas del Sur S.A. (Argentina)

    2003-07-01

    Since 1992, Transportadora de Gas del Sur (TGS) has been operating the longest gas pipeline system in South America. Prior to that date, the system was managed by GE, a state-owned company. Early on in the administration of the company, some improvement opportunities were identified in the technical, commercial, management and personnel fields. An integrated transformation process was developed which involved major investments, acquisition of new technology, re-design of the work force, and new work methodologies. The course of action followed by the company was based on an attempt to achieve permanent improvement on business results. This paper is the result of the improvements applied to our gas transportation system. Due to the time and cost assessment required by scheduled turbine compressor maintenance works (83 - 538.220 hp), a Contingency Plan for turbine compressor breakdowns was established as well as an Economic Dispatch, which can determine low-cost operations in specific periods of time (during the year). This work details the actions taken. (author)

  19. A novel method to calculate the extent and amount of drug transported into CSF after intranasal administration.

    Science.gov (United States)

    Shi, Zhenqi; Zhang, Qizhi; Jiang, Xinguo

    2005-01-31

    The aim of this paper is to establish a novel method to calculate the extent and amount of drug transported to brain after administration. The cerebrospinal fluid (CSF) was chosen as the target region. The intranasal administration of meptazinol hydrochloride (MEP) was chosen as the model administration and intravenous administration was selected as reference. According to formula transform, the extent was measured by the equation of X(A)CSF, infinity/X0 = Cl(CSF) AUC(0-->infinity)CSF/X0 and the drug amount was calculated by multiplying the dose with the extent. The drug clearance in CSF (Cl(CSF)) was calculated by a method, in which a certain volume of MEP solution was injected directly into rat cistern magna and then clearance was assessed as the reciprocal of the zeroth moment of a CSF level-time curve normalized for dose. In order to testify the accurateness of the method, 14C-sucrose was chosen as reference because of its impermeable characteristic across blood-brain barrier (BBB). It was found out that the MEP concentrations in plasma and CSF after intranasal administration did not show significant difference with those after intravenous administration. However, the extent and amount of MEP transported to CSF was significantly lower compared with those to plasma after these two administrations. In conclusion, the method can be applied to measure the extent and amount of drug transported to CSF, which would be useful to evaluate brain-targeting drug delivery.

  20. 49 CFR 234.211 - Security of warning system apparatus.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GRADE CROSSING SIGNAL SYSTEM SAFETY AND STATE ACTION PLANS Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus...

  1. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  2. 4th Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014.

  3. Security in the transport of radioactive material: Implementing guide. Spanish edition; La seguridad fisica en el transporte de materiales radiactivos. Guia de aplicacion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  4. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  5. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  6. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  7. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  8. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Directory of Open Access Journals (Sweden)

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  9. 77 FR 42548 - Privacy Act of 1974; Department of Transportation, Federal Motor Carrier Safety Administration...

    Science.gov (United States)

    2012-07-19

    ... motor carrier business models which may include the use of industry service providers to directly hire... in secure facilities. Electronic records may be stored on magnetic disc, tape, digital media, and CD...

  10. 20 CFR 404.1362 - Treatment of social security benefits or payments where Veterans Administration pension or...

    Science.gov (United States)

    2010-04-01

    ... payments where Veterans Administration pension or compensation payable. 404.1362 Section 404.1362 Employees... Administration pension or compensation payable. (a) Before we receive notice from the Veterans Administration. If... status provisions in § 404.1350 before we receive notice from the Veterans Administration that a pension...

  11. Development of a decision-making tool for reporting drivers with mild dementia and mild cognitive impairment to transportation administrators.

    Science.gov (United States)

    Cameron, Duncan H; Zucchero Sarracini, Carla; Rozmovits, Linda; Naglie, Gary; Herrmann, Nathan; Molnar, Frank; Jordan, John; Byszewski, Anna; Tang-Wai, David; Dow, Jamie; Frank, Christopher; Henry, Blair; Pimlott, Nicholas; Seitz, Dallas; Vrkljan, Brenda; Taylor, Rebecca; Masellis, Mario; Rapoport, Mark J

    2017-09-01

    Driving in persons with dementia poses risks that must be counterbalanced with the importance of the care for autonomy and mobility. Physicians often find substantial challenges in the assessment and reporting of driving safety for persons with dementia. This paper describes a driving in dementia decision tool (DD-DT) developed to aid physicians in deciding when to report older drivers with either mild dementia or mild cognitive impairment to local transportation administrators. A multi-faceted, computerized decision support tool was developed, using a systematic literature and guideline review, expert opinion from an earlier Delphi study, as well as qualitative interviews and focus groups with physicians, caregivers of former drivers with dementia, and transportation administrators. The tool integrates inputs from the physician-user about the patient's clinical and driving history as well as cognitive findings, and it produces a recommendation for reporting to transportation administrators. This recommendation is translated into a customized reporting form for the transportation authority, if applicable, and additional resources are provided for the patient and caregiver. An innovative approach was needed to develop the DD-DT. The literature and guideline review confirmed the algorithm derived from the earlier Delphi study, and barriers identified in the qualitative research were incorporated into the design of the tool.

  12. 76 FR 73011 - Pipeline and Hazardous Materials Safety Administration

    Science.gov (United States)

    2011-11-28

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration Office of... Safety Administration (PHMSA), DOT. ACTION: Notice of actions on Special Permit Applications. SUMMARY: In... reissue the Nuclear 173.56(b)(3)(i special permit Security ). originally issued Administration on an...

  13. Regional transportation operations collaboration and coordination : a primer for working together to improve transportation safety, reliability, and security

    Science.gov (United States)

    2002-01-01

    This primer was written for transportation professionals and public safety officials from cities, counties, and States who are responsible for day-to-day management and operations within a metropolitan region. It is intended to help agencies and orga...

  14. Best Practices and Lessons Learned In LANL Approaches to Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Drypolcher, Katherine Carr [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-24

    Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.

  15. Report to Congress on innovative safety and security technology solutions for alternative transportation facilities

    Science.gov (United States)

    2017-05-01

    This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...

  16. 20 CFR 410.686b - Fee for services performed for an individual before the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... Representation of Parties § 410.686b Fee for services performed for an individual before the Social Security... person or in writing; (ii) There was a death or serious illness in the individual's family; (iii...

  17. Mathematical modeling of positron emission tomography (PET) data to assess radiofluoride transport in living plants following petiolar administration.

    Science.gov (United States)

    Converse, Alexander K; Ahlers, Elizabeth O; Bryan, Tom W; Hetue, Jackson D; Lake, Katherine A; Ellison, Paul A; Engle, Jonathan W; Barnhart, Todd E; Nickles, Robert J; Williams, Paul H; DeJesus, Onofre T

    2015-01-01

    Ion transport is a fundamental physiological process that can be studied non-invasively in living plants with radiotracer imaging methods. Fluoride is a known phytotoxic pollutant and understanding its transport in plants after leaf absorption is of interest to those in agricultural areas near industrial sources of airborne fluoride. Here we report the novel use of a commercial, high-resolution, animal positron emission tomography (PET) scanner to trace a bolus of [(18)F]fluoride administered via bisected petioles of Brassica oleracea, an established model species, to simulate whole plant uptake of atmospheric fluoride. This methodology allows for the first time mathematical compartmental modeling of fluoride transport in the living plant. Radiotracer kinetics in the stem were described with a single-parameter free- and trapped-compartment model and mean arrival times at different stem positions were calculated from the free-compartment time-activity curves. After initiation of administration at the bisected leaf stalk, [(18)F] radioactivity climbed for approximately 10 minutes followed by rapid washout from the stem and equilibration within leaves. Kinetic modeling of transport in the stem yielded a trapping rate of 1.5 +/- 0.3%/min (mean +/- s.d., n = 3), velocity of 2.2 +/- 1.1 cm/min, and trapping fraction of 0.8 +/- 0.5%/cm. Quantitative assessment of physiologically meaningful transport parameters of fluoride in living plants is possible using standard positron emission tomography in combination with petiolar radiotracer administration. Movement of free fluoride was observed to be consistent with bulk flow in xylem, namely a rapid and linear change in position with respect to time. Trapping, likely in the apoplast, was observed. Future applications of the methods described here include studies of transport of other ions and molecules of interest in plant physiology.

  18. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  19. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  20. Transportation challenges for the new administration : perspectives of past DOT secretaries

    Science.gov (United States)

    2009-01-01

    On January 29, 2009, the RAND Corporation hosted a panel discussion with three former U.S. secretaries of transportation. This wide-ranging discussion, held the week after President : Barack Obamas inauguration and during the congressional debate ...

  1. Transports of radioactive materials. Legal regulations, safety and security concepts, experience; Befoerderung radioaktiver Stoffe. Rechtsvorschriften, Sicherheits- und Sicherungskonzept, Erfahrungen

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Guenther

    2012-07-15

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  2. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Energy Technology Data Exchange (ETDEWEB)

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  3. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    International Nuclear Information System (INIS)

    Dilger, Fred C.; Ballard, James D.; Halstead, Robert J.

    2013-01-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  4. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... preamble, DHS amends Chapter I of Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF...

  5. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... (explosive) material; (3) More than 1 L (1.06 qt.) per package of a material poisonous by inhalation in... controlled; and 6.1 materials poisonous by inhalation. We also proposed to require security plans for any... happens very rapidly, and in the process, the propane combines readily with air to form fuel air mixtures...

  6. Ministerial Decree of 16 February 1976 relating to approval of the model certificate of financial security for the transport of radioactive materials

    International Nuclear Information System (INIS)

    1976-01-01

    This Decree by the Minister of Industry, Commerce and Crafts, in consultation with the Minister of Transport, approves the model certificate of financial security for the transport of nuclear materials. This type of certificate issued by nuclear insurers is intended to provide detailed information on the nature of the financial security for damage likely to be caused by the materials in the course of transport; it is required to supply the certificate according to the Paris Convention on Third Party Liability in the Field of Nuclear Energy, ratified by Italy in 1975. The standardised presentation of this certificate enables it to be used in international transport between countries parties to the Paris Convention as proof of the existence of the financial security. (N.E.A.)

  7. Effects of prolonged recombinant human erythropoietin administration on muscle membrane transport systems and metabolic marker enzymes

    DEFF Research Database (Denmark)

    Juel, C; Thomsen, J J; Rentsch, R L

    2007-01-01

    on the expression of muscle membrane transport proteins. Likewise, improvements in performance may involve upregulation of metabolic enzymes. Since Epo is known to augment performance we tested the effect of rHuEpo on some marker enzymes that are related to aerobic capacity. For these purposes eight subjects...... performance by approximately 54%. Membrane transport systems and carbonic anhydrases involved in pH regulation remained unchanged. Of the Na(+), K(+)-pump isoforms only the density of the alpha2 subunit was decreased (by 22%) after treatment. The marker enzymes cytochrom c and hexokinase remained unchanged......Adaptations to chronic hypoxia involve changes in membrane transport proteins. The underlying mechanism of this response may be related to concomitant occurring changes in erythropoietin (Epo) levels. We therefore tested the direct effects of recombinant human erythropoietin (rHuEpo) treatment...

  8. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  9. Application of information technology to transportation logistics and security at Northern Kentucky University.

    Science.gov (United States)

    2013-02-28

    This research grant provided the opportunity to research and deploy beneficial transportation technologies to support transit needs. Working with the Transit Authority of Northern Kentucky (TANK), solutions were developed that can apply to transit ag...

  10. Forecasting of the radioactive material transport demand for the Brazilian Nuclear Program and the security aspects

    International Nuclear Information System (INIS)

    Meldonian, Nelson Leon

    1979-01-01

    In the nuclear fuel cycle, a lot of radioactive materials are produced. These radioactive materials must be transported in order to promote the integration of the fuel cycle units. Considerations about the transport characteristics of radioactive material were made for each section of the fuel cycle. These considerations were based on the experience of several countries and in accordance with the International Atomic Energy Agency regulations. A prediction of transport demands for the Brazilian Nuclear Program until year 2.010 was made. The prediction refers mainly to the quantity of radioactive material produced in each section of the cycle the quantity of vehicles needed for the transport of these materials. Several safety aspects were considered specially, the accidents predictions for years 2.000 and 2.010. The accident probability in Brazilian railroads and highways was compared with that of the USA. (author)

  11. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  12. Transport and Biodistribution of Dendrimers Across Human Fetal Membranes: Implications for Intravaginal Administration of Dendrimers

    Science.gov (United States)

    Menjoge, Anupa R.; Navath, Raghavendra S.; Asad, Abbas; Kannan, Sujatha; Kim, Chong Jai; Romero, Roberto; Kannan, Rangaramanujam M.

    2010-01-01

    Dendrimers are emerging as promising topical antimicrobial agents, and as targeted nanoscale drug delivery vehicles. Topical intravaginal antimicrobial agents are prescribed to treat the ascending genital infections in pregnant women. The fetal membranes separate the extra-amniotic space and fetus. The purpose of the study is to determine if the dendrimers can be selectively used for local intravaginal application to pregnant women without crossing the membranes into the fetus. In the present study, the transport and permeability of PAMAM (poly(amidoamine)) dendrimers, across human fetal membrane (using a side-by-side diffusion chamber), and its biodistribution (using immunofluorescence) are evaluated ex-vivo. Transport across human fetal membranes (from the maternal side) was evaluated using Fluorescein (FITC), an established transplacental marker (positive control, size~ 400 Da) and fluorophore-tagged G4-PAMAM dendrimers (~ 16 kDa). The fluorophore-tagged G4-PAMAM dendrimers were synthesized and characterized using 1H NMR, MALDI TOF-MS and HPLC analysis. Transfer was measured across the intact fetal membrane (chorioamnion), and the separated chorion and amnion layers. Over a five hour period, the dendrimer transport across all the three membranes was less than transport of FITC was relatively fast with as much as 49% transport across the amnion. The permeability of FITC (7.9 × 10-7 cm2/s) through the chorioamnion was 7-fold higher than that of the dendrimer (5.8 × 10-8 cm2/s). The biodistribution showed that the dendrimers were largely present in interstitial spaces in the decidual stromal cells and the chorionic trophoblast cells (in 2.5 to 4 h) and surprisingly, to a smaller extent internalized in nuclei of trophoblast cells and nuclei and cytoplasm of stromal cells. Passive diffusion and paracellular transport appear to be the major route for dendrimer transport. The overall findings further suggest that entry of drugs conjugated to dendrimers would be

  13. SAFETY AND SECURITY IMPROVEMENT IN PUBLIC TRANSPORTATION BASED ON PUBLIC PERCEPTION IN DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Tri Basuki JOEWONO

    2006-01-01

    Three aspects of an improvement agenda are proposed based on the perception data, namely technology, management, and institution. This agenda is clarified by a set of action plans incorporating the responsible parties and a time frame. The action plan is divided into three terms to define a clear goal for each step. The short-term action focuses on the hardware and on preparing further steps, whereas the medium-term action focuses on developing and improving the standard of safety and security. The long-term action focuses on advancing safety and security practices. The effectiveness of this agenda and action plan rests upon a set of assumptions, such as the degree of seriousness from the authoritative institution, fair distribution of information, the availability of reasonable resources, and coordinated and collaborative action from all parties involved to reach the objective.

  14. Experimental and theoretical study of the transport of silver nanoparticles at their prolonged administration into a mammal organism

    Science.gov (United States)

    Antsiferova, A. A.; Buzulukov, Yu. P.; Kashkarov, P. K.; Kovalchuk, M. V.

    2016-11-01

    The transport of silver nanoparticles in the organism of laboratory animals has been investigated. A mathematical model of the biokinetics of prolonged administration of nonmetabolizable and nonaglomerating pharmaceutical preparations is proposed, and its analytical solution is found. Based on the experimental data on the prolonged introduction and excretion of colloidal silver nanoparticles and the numerical approximation of the solutions to the equations for the proposed model, time dependences of the silver mass content in brain and blood are obtained and some other important biokinetic parameters are determined. It is concluded that both chronic1 and subchronic2 peroral application of these nanoparticles as an biologically active additive or antiseptic is potentially dangerous.

  15. 14 CFR 99.7 - Special security instructions.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Special security instructions. 99.7 Section 99.7 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SECURITY CONTROL OF AIR TRAFFIC General § 99.7 Special...

  16. 46 CFR 308.507 - Security for payment of premiums.

    Science.gov (United States)

    2010-10-01

    ....507 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo Insurance § 308.507 Security for payment of... collateral deposit fund or a surety bond, to secure the payment of the premiums, in an amount which shall at...

  17. Summary of Federal Aviation Administration Responses to National Transportation Safety Board Safety Recommendations.

    Science.gov (United States)

    1981-01-01

    i It: Wo. r (A’I) upr,;cl. ’ Vih t_’o a . hc pre-.ntal, i c ould (1lay a pilot’s t ;f,L..ion to a suit.bl, ba-ckup approach in th- event of radar or...analysis and your recommendation. Since y) ,anigh.ne Bond Admin ist rator 2 Enclosures NATIONAL TRANSPORTATION SAFETY BOARD WASHINGTON, D.C. ISSUED: October

  18. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  19. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  20. AICAR administration affects glucose metabolism by upregulating the novel glucose transporter, GLUT8, in equine skeletal muscle.

    Science.gov (United States)

    de Laat, M A; Robinson, M A; Gruntmeir, K J; Liu, Y; Soma, L R; Lacombe, V A

    2015-09-01

    Equine metabolic syndrome is characterized by obesity and insulin resistance (IR). Currently, there is no effective pharmacological treatment for this insidious disease. Glucose uptake is mediated by a family of glucose transporters (GLUT), and is regulated by insulin-dependent and -independent pathways, including 5-AMP-activated protein kinase (AMPK). Importantly, the activation of AMPK, by 5-aminoimidazole-4-carboxamide-1-D-ribofuranoside (AICAR) stimulates glucose uptake in both healthy and diabetic humans. However, whether AICAR promotes glucose uptake in horses has not been established. It is hypothesized that AICAR administration would enhance glucose transport in equine skeletal muscle through AMPK activation. In this study, the effect of an intravenous AICAR infusion on blood glucose and insulin concentrations, as well as on GLUT expression and AMPK activation in equine skeletal muscle (quantified by Western blotting) was examined. Upon administration, plasma AICAR rapidly reached peak concentration. Treatment with AICAR resulted in a decrease (P change in lactate concentration. The ratio of phosphorylated to total AMPK was increased (P managing IR requires investigation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Stress from an administrative perspective in public transport drivers in Mexico City: Minibus and metrobus

    OpenAIRE

    Fernando Lámbarry; Mara Maricela Trujillo; Cintia Guadalupe Cumbres

    2016-01-01

    El estrés es una de las enfermedades laborales que más afectan a los trabajadores en todo el mundo,perjudicando su productividad y rendimiento tanto propio como de las organizaciones donde laboran,e incluso su salud física y mental. Según la Organización Internacional del Trabajo son los trabajadoresmexicanos quienes mayormente lo padecen a nivel mundial, toda vez que una de las profesiones másestresantes es ser conductor de transporte público. Es por ello que el objetivo de esta investigació...

  2. 3rd Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    International Nuclear Information System (INIS)

    Gregory, Louis

    2014-01-01

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 3rd quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014 in Tables 4 and 5. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report do not include minor volumes of non-radioactive materials that were approved for disposal. Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to differing rounding conventions.

  3. 1st Quarter Transportation Report FY 2015: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    Energy Technology Data Exchange (ETDEWEB)

    Gregory, Louis [National Security Technologies, LLC, Las Vegas, NV (United States)

    2015-02-20

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. This report summarizes the 1st quarter of Fiscal Year (FY) 2015 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. Tabular summaries are provided which include the following: Sources of and carriers for LLW and MLLW shipments to and from the NNSS; Number and external volume of LLW and MLLW shipments; Highway routes used by carriers; and Incident/accident data applicable to LLW and MLLW shipments. In this report shipments are accounted for upon arrival at the NNSS, while disposal volumes are accounted for upon waste burial. The disposal volumes presented in this report include minor volumes of non-radioactive classified waste/material that were approved for disposal (non-radioactive classified or nonradioactive classified hazardous). Volume reports showing cubic feet generated using the Low-Level Waste Information System may vary slightly due to rounding conventions for volumetric conversions from cubic meters to cubic feet.

  4. Transport safety and struggle against malevolent acts: a synergy to be developed - Protecting transports against malevolent acts, Synergies between security and safety: lessons learned from the IAEA international conference, Role of the IRSN transport operational level in the field of safety, Transparency and secret in the field of nuclear material transport

    International Nuclear Information System (INIS)

    Riac, Christian; Flory, Denis; Loiseau, Olivier; Mermaz, Frederic; Demolins, Laurent

    2012-01-01

    The first article proposes an interview with the chief of the security department within the French ministry of Ecology, Sustainable Development, Transports and Housing who comments his missions and his relationships with the ASN and the French Home Office for the protection and control of nuclear materials. A second article discusses the lessons learned from an IAEA international conference about the relationship between the approaches to security and to safety. The third article briefly describes the role of the IRSN transport operational level in the field of safety. The last article discusses how opposite notions like transparency and secret are managed in the case of nuclear material transport

  5. Importance of administration and entrepreneurship in the development of Ukrainian sea transport

    Directory of Open Access Journals (Sweden)

    Nicholas Primachev

    2013-06-01

    Full Text Available The shipping industry is subject to a number of regulations, which in the area of safety and the environment are motivated by the scale of external costs and imperfections in information. There is a clear rationale for governments to establish and maintain adequate standards for maritime safety, as well as protection of the marine environment, which represents a valuable public good. However, certain maritime transport operations are substantially affected by a number of regulations that restrict competition. Because of that, reforms are required to correct mistakes of the government. It is particularly important to strive for reforms that can be effective in providing unrestricted market access for vessels of all flags. Due to the international character of the industry, regulations are reliant on a consensus between nations, without which any regulation would be of limited use. Most of the existing international regulations have been developed by international, intergovernmental organizations.

  6. Compliant tiedown system for securing a cask for transporting radioactive materials to a vehicle

    International Nuclear Information System (INIS)

    Richardson, R.V.

    1991-01-01

    This patent describes a tiedown system for releasably securing a cask having opposing trunnions to a cradle assembly that in turn is mounted onto the deck and frame of a vehicle. The cradle assembly includes at least one cradle member for supporting the weight of the cask, and wherein the cask trunnions are displaceable in opposite vertical directions relative to the cradle member of the cradle assembly when the assembly is torsionally flexed, and the cask rotates relative to the cradle member, about a horizontally oriented axis comprising a compliant linkage means including a tie-bar means operably connected between the trunnions and moveably mounted within the cradle assembly for applying a biasing force on each of the trunnions that remains substantially constant despite the opposite vertical displacement of the trunnions relative to the cradle member that results from the torsional flexing of the vehicle deck

  7. Latching device for securing a closure to a cask for transporting radioactive waste

    International Nuclear Information System (INIS)

    Obermeyer, F.D.; Cruz, R.R.; Bieberbach, G.

    1991-01-01

    This patent describes a latching device for removably securing and sealingly engaging a closure around an opening in a cask defined by an edge of the cask. It comprises: at least three shear key assemblies uniformly spaced around the outer portion of the closure, each of which includes a shear key means having a bolt portion movably mounted in the closure, and a latch portion that is insertable into and retractable out of a slot means in the cask edge in response to the application of a closing and an opening force applied to the bolt portion, at least one drive mechanism located within a cavity in the closure and connected to the bolt portion of the shear key assemblies for applying the closing and opening forces to the bolt portions

  8. 76 FR 36560 - Extension of Agency Information Collection Activity Under OMB Review: Security Threat Assessment...

    Science.gov (United States)

    2011-06-22

    .... The collection involves applicant submission of biometric and biographic information for TSA's... of Information Technology (OIT), TSA-11, Transportation Security Administration, 601 South 12th..., electronic, mechanical, or other technological collection techniques or other forms of information technology...

  9. National Security sUAS Flight Restrictions over Select Facilities - Download data

    Data.gov (United States)

    Department of Transportation — As mandated by the FAA Extension, Safety, and Security Act of 2016 the Federal Aviation Administration has established, at the request of various Government agencies...

  10. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    International Nuclear Information System (INIS)

    2010-01-01

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products. The Area 5 PA model assumes activity disposed in trenches is well mixed within the native alluvium of the trench at the time the facility is closed. Waste containers and waste forms are assumed not to limit the release of radionuclides for transport. In the Area 5 RWMS PA model, the pathways that are considered to bring radioactivity in the waste zone to the surface soils of the closure covers are (1) plant uptake, (2) burrowing animal activity, and (3) advection/dispersion/diffusion in the pore water. Water-phase transport is a minor component of the transport, which is dominated by plant uptake and burrowing animal activity. Because the soil column is mostly dry, upward water flux rates are extremely small, resulting in small advective/dispersive transport of radioactive isotopes in pore water of the unsaturated zone. Reactive transport of radioactive elements in the Area 5 soil pore water are modeled using element-specific partition coefficients (Kds) that partition radioactivity between pore water and soil of the disposal cell, and solubility limits that control the solubility of elements in pore water. Geochemical modeling is not performed in the Area 5 RWMS GoldSim PA model; however, Kds and solubility limits were derived from previous geochemical modeling performed using Area 5 geochemical data. Kds for uranium were developed based on geochemical modeling using the mineral characteristics of soil (alluvium) and the chemical characteristics of water at the site (Carle et al., 2002). In the GoldSim model, uranium Kd is represented with a lognormal distribution with a mean value of 0.8 milliliter per gram (taken from Figure 4.11, Page 4-19 of Carle et al

  11. Public Policy Issues in Transport. Taxes and standards for energy security and greenhouse gas objectives

    Energy Technology Data Exchange (ETDEWEB)

    Eskeland, Gunnar (Cicero, Oslo (Norway))

    2008-07-01

    The direct case for fuel economy standards on a stand alone basis dies in the textbook on the basis of first principles: the fuel tax is a better targeted instrument. In practice, the fuel economy standard, is killed by the 'rebound effect'. Vehicle users will, once they have more fuel efficient vehicles, respond to lower marginal costs by increased vehicle use. If an important part of negative externalities from transport are associated with vehicle kilometres (accidents, congestion, road wear) rather than fuel consumption, the rebound effect increases negative externalities from transport. The more direct way of addressing negative externalities from transport is to increase fuel taxes, and depending on their prior level, this is our first recommendation. But higher fuel taxes often raise political resistance. The fuel efficiency of existing cars is an important way by which people have adapted to present fuel taxes, determining their resistance to increases. A higher fuel efficiency standard is an instrument that faces little political resistance and which - over time - reduces the political resistance to increased fuel taxes. In efforts to reduce the fuel intensity of an economy, this interplay between an activity's fuel intensity, like gallons per vehicle mile, and the activity level, vehicle miles travelled or transported, nicely illustrates some important empirical questions and public policy issues: i) the first best policy proposition to reduce fuel related externalities is fuel taxes. Indeed, at the right level of fuel taxes, the externalities are zero: they are internalized. ii) the part of an economy's ability to shed fuel consumption lies in increased fuel efficiency in the individual activities, and this part can be stimulated with fuel efficiency standards. The other part, the activity level, should then be addressed with fuel tax increases. iv) We speculate that it may be difficult credibly to raise expected fuel taxes more than

  12. Stress from an administrative perspective in public transport drivers in Mexico City: Minibus and metrobus

    Directory of Open Access Journals (Sweden)

    Fernando Lámbarry

    2016-01-01

    Full Text Available El estrés es una de las enfermedades laborales que más afectan a los trabajadores en todo el mundo,perjudicando su productividad y rendimiento tanto propio como de las organizaciones donde laboran,e incluso su salud física y mental. Según la Organización Internacional del Trabajo son los trabajadoresmexicanos quienes mayormente lo padecen a nivel mundial, toda vez que una de las profesiones másestresantes es ser conductor de transporte público. Es por ello que el objetivo de esta investigación esestudiar el estrés laboral en los conductores de autobuses de tránsito rápido y microbuses de la Ciu-dad de México. El método empleado se fundamenta en el análisis estadístico factorial exploratorio. Apartir de lo anterior, se concluye que los factores que más inciden en la aparición de estrés son organi-zacionales, ambientales (físico/individual, intrínsecos del puesto, extraorganizacionales e individuales.Aunque divergentes entre los conductores, son los de minibús los que más lo padecen.

  13. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  14. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  15. Saving lives or saving dollars: The Trump administration rescinds plans to require sleep apnea testing in commercial transportation operators

    Directory of Open Access Journals (Sweden)

    Quan SF

    2017-08-01

    Full Text Available No abstract available. Article truncated at 150 words. In another move favoring business interests and against the common good, the Trump administration’s Department of Transportation announced recently that they are rescinding plans to require testing for obstructive sleep apnea (OSA in train and commercial motor vehicle operators (1. As exemplified by its withdrawal from the Paris climate accords, this decision is another example of how the current administration disregards scientific findings and present-day events in establishing policy that will be detrimental to Americans. Let us step back for a moment and briefly review the evidence that the Trump administration has ignored. •\tIt is well established that obstructive sleep apnea (OSA can result in daytime sleepiness (2 and that sleepiness is detrimental to safe operation of a train or motor vehicle. •\tMany studies have established that persons with OSA have an increased risk of motor vehicle crashes (3. •\tStudies in commercial truck drivers have observed that this population has …

  16. 14 CFR 129.25 - Airplane security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airplane security. 129.25 Section 129.25 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS... AND FOREIGN OPERATORS OF U.S.-REGISTERED AIRCRAFT ENGAGED IN COMMON CARRIAGE General § 129.25 Airplane...

  17. Validation of the Social Security Administration Life Tables (2004-2014) in Localized Prostate Cancer Patients within the Surveillance, Epidemiology, and End Results database.

    Science.gov (United States)

    Preisser, Felix; Bandini, Marco; Mazzone, Elio; Nazzani, Sebastiano; Marchioni, Michele; Tian, Zhe; Saad, Fred; Pompe, Raisa S; Shariat, Shahrokh F; Heinzer, Hans; Montorsi, Francesco; Huland, Hartwig; Graefen, Markus; Tilki, Derya; Karakiewicz, Pierre I

    2018-05-22

    Accurate life expectancy estimation is crucial in clinical decision-making including management and treatment of clinically localized prostate cancer (PCa). We hypothesized that Social Security Administration (SSA) life tables' derived survival estimates closely follow observed survival of PCa patients. To test this relationship, we examined 10-yr overall survival rates in patients with clinically localized PCa and compared it with survival estimates derived from the SSA life tables. Within the Surveillance, Epidemiology, and End Results database (2004), we identified patients aged >50-patients who did not die of disease or other causes. Monte Carlo method was used to define individual survival in years, according to the SSA life tables (2004-2014). Subsequently, SSA life tables' predicted survival was compared with observed survival rates in Kaplan-Meier analyses. Subgroup analyses were stratified according to treatment type and D'Amico risk classification. Overall, 39191 patients with localized PCa were identified. At 10-yr follow-up, the SSA life tables' predicted survival was 69.5% versus 73.1% according to the observed rate (ppatients. Conversely, the smallest differences were recorded for external beam radiotherapy (1.7%) and unknown treatment type (1.6%) patients. Overall, SSA life tables' predicted life expectancy closely approximate observed overall survival rates. However, SSA life tables' predicted rates underestimate by as much as 9.1% the survival in brachytherapy patients, as well as in D'Amico low-risk and radical prostatectomy patients. In these patient categories, an adjustment for the degree of underestimation might be required when counseling is provided in clinical practice. Social Security Administration (SSA) life tables' predicted life expectancy closely approximate observed overall survival rates. However, SSA life tables' predicted rates underestimate by as much as 9.1% the survival in brachytherapy patients, as well as in D'Amico low

  18. Official Position of the American Academy of Clinical Neuropsychology Social Security Administration Policy on Validity Testing: Guidance and Recommendations for Change.

    Science.gov (United States)

    Chafetz, M D; Williams, M A; Ben-Porath, Y S; Bianchini, K J; Boone, K B; Kirkwood, M W; Larrabee, G J; Ord, J S

    2015-01-01

    The milestone publication by Slick, Sherman, and Iverson (1999) of criteria for determining malingered neurocognitive dysfunction led to extensive research on validity testing. Position statements by the National Academy of Neuropsychology and the American Academy of Clinical Neuropsychology (AACN) recommended routine validity testing in neuropsychological evaluations. Despite this widespread scientific and professional support, the Social Security Administration (SSA) continued to discourage validity testing, a stance that led to a congressional initiative for SSA to reevaluate their position. In response, SSA commissioned the Institute of Medicine (IOM) to evaluate the science concerning the validation of psychological testing. The IOM concluded that validity assessment was necessary in psychological and neuropsychological examinations (IOM, 2015 ). The AACN sought to provide independent expert guidance and recommendations concerning the use of validity testing in disability determinations. A panel of contributors to the science of validity testing and its application to the disability process was charged with describing why the disability process for SSA needs improvement, and indicating the necessity for validity testing in disability exams. This work showed how the determination of malingering is a probability proposition, described how different types of validity tests are appropriate, provided evidence concerning non-credible findings in children and low-functioning individuals, and discussed the appropriate evaluation of pain disorders typically seen outside of mental consultations. A scientific plan for validity assessment that additionally protects test security is needed in disability determinations and in research on classification accuracy of disability decisions.

  19. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  20. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  1. Assessing Accessibility and Transport Infrastructure Inequities in Administrative Units in Serbia’s Danube Corridor Based on Multi-Criteria Analysis and Gis Mapping Tools

    Directory of Open Access Journals (Sweden)

    Ana VULEVIC

    2018-02-01

    Full Text Available The Danube Regions, especially the sub-national units of governance, must be ready to play an active role in spatial development policies. A precondition for this is good accessibility and the coordinated development of all transport systems in the Danube corridor. The main contribution of this paper is to provide a multi-criteria model for potential decision making related to the evaluation of transportation accessibility in Serbia’s Danube Corridor. Geographic Information Systems (GIS, based on maps, indicate the existing counties’ transport infrastructures inequities (between well-connected and isolated counties in terms of accessibility to central places. Through the research, relevant indicators have been identifi ed. This provides an outline of transportation perspectives regarding the development achieved and also fosters the increase of transportation accessibility in some peripheral Serbian Danube administrative units – counties (Nomenclature of Territorial Units for Statistics level 3 – NUTS 3.

  2. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  3. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  4. A Secure Automated Elevator Management System and Pressure Sensor based Floor Estimation for Indoor Mobile Robot Transportation

    Directory of Open Access Journals (Sweden)

    Ali Abduljalil Abdulla

    2017-08-01

    Full Text Available In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The LPS25HP pressure sensor attached to an STM32F411 microcontroller is utilized as a height measurement system to estimate the robot’s current floor inside the elevator. The ultrasonic sensor is used to recognize the elevator’s door status. Many challenges have to be solved to realize a stable height measurement system based on pressure sensor readings. The difference of the pressure sensor readings before and after soldering is realized by comparing the reading after soldering with an accurate barometric reading. In addition, the sensor output signal shows oscillation and wide variation of the same floor pressure sensor readings at different times. The oscillation in the output signal has been handled using a first order FIR smoothing filter. The first order filter was selected to balance between the stability and the elapsed time to receive the updated values. An auto-calibration stage is established to maintain the wide variation in the atmospheric pressure readings by calibrating the sensor readings with the robot’s current floor before entering the elevator. An error handling management system is utilized to guarantee a stable automated elevator management system performance. Many experiments to assess and verify the performance of the automated elevator management system and robot’s current floor estimation are reported. The experimental results show that the proposed methods and sub-systems developed for the mobile robot are effective and efficient in providing a transportation service in multiple-floor life sciences laboratories.

  5. 78 FR 24353 - Provisions for Fees Related to Hazardous Materials Endorsements and Transportation Worker...

    Science.gov (United States)

    2013-04-25

    ... Mitchell, Office of Intelligence and Analysis (OIA), TSA-10, Transportation Security Administration, 601... Management System (FDMS) Web page at http://www.regulations.gov ; (2) Accessing the Government Printing...

  6. 77 FR 54646 - Social Security Acquiescence Ruling (AR) 12-1(8); Correction; Petersen v. Astrue, 633 F.3d 633...

    Science.gov (United States)

    2012-09-05

    ... II of the Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security Acquiescence Ruling; Correction. SUMMARY: The Social Security Administration published a document... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR...

  7. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  8. 77 FR 1971 - Supplemental Security Income and Homeless Individuals

    Science.gov (United States)

    2012-01-12

    ... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0087] Supplemental Security Income and Homeless Individuals AGENCY: Social Security Administration. ACTION: Notice; Request for Comments. SUMMARY...

  9. Quarterly report on the activities in Safety Administration Division. The second quarter of 2003

    International Nuclear Information System (INIS)

    Yamamoto, Junta

    2004-08-01

    The activities of Safety Administration Division covers many fields in Tokai-Works such as the management of a safety and health, the crisis management and the security, the safeguards of the nuclear materials, the transport of nuclear materials, and the management of a quality assurance. This report is summary of the activities of Safety Administration Division in July to September in 2003. (author)

  10. Quarterly report on the activities in safety Administration Division. The forth quarter of 2003

    International Nuclear Information System (INIS)

    Yamamoto, Junta

    2005-01-01

    The activities of Safety Administration Division covers many fields in Tokai-works such as the management of a safety and health, the crisis management and the security, the safeguards of the nuclear materials, the transport of nuclear materials, and the management of a quality assurance. This report is summary of the activities of Safety Administration Division in January to March in 2004. (author)

  11. Quarterly report on the activities in Safety Administration Division. The fourth quarter of 2002

    International Nuclear Information System (INIS)

    Yamamoto, Junta

    2003-11-01

    The activities of Safety Administration Division covers many fields in Tokai-Works such as the management of a safety and health, the crisis management and the security, the safeguards of the nuclear materials, the transport of nuclear materials, and the management of a quality assurance. This report is summary of the activities of Safety Administration Division in January to March in 2003. (author)

  12. Safety administration division business report. The second quarter of 2002. Document on present state of affairs

    International Nuclear Information System (INIS)

    Ishibashi, Takashi

    2003-02-01

    The activities of Safety Administration Division covers many fields in Tokai-Works such as the management of a labor safety health, the crisis management and the security, the safeguards of the nuclear materials, the transport of nuclear materials, and the management of a quality assurance. This report is summary of the activities of Safety Administration Division in July to September in 2002. (author)

  13. Quarterly report on the activities in Safety Administration Division. The first quarter of 2003

    International Nuclear Information System (INIS)

    Yamamoto, Junta

    2004-02-01

    The activities of Safety Administration Division covers many fields in Tokai-Works such as the management of a safety and health, the crisis management and the security, the safeguards of the nuclear materials, the transport of nuclear materials, and the management of a quality assurance. This report is summary of the activities of Safety Administration Division in April to June in 2003. (author)

  14. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  15. 46 CFR 390.6 - Administration of the agreement.

    Science.gov (United States)

    2010-10-01

    ... Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS UNDER PUBLIC LAW 91-469 CAPITAL... certified public accountant to the effect that exhibits (see paragraph (b)(5) of this section) composing the... exhibits: (i) “Exhibit A”—a summary of cash, securities and stock on deposit (showing the adjusted basis...

  16. Transport of C-13-labelled linoleic and C-13-labelled caprylic acid in rat plasma after administration of specific structured triacylglycerols

    DEFF Research Database (Denmark)

    Vistisen, Bodil; Høy, Carl-Erik

    2004-01-01

    the transport of dietary C-13-labelled fatty acids in rat plasma to compare the chylomicron fatty acid metabolism after administration of specific structured, long chain and medium chain triacylglycerols. Rats were fed ML*M, M*LM*, L*L*L* or M*M*M* (L=linoleic acid, 18:2n-6, M=caprylic acid, 8:0, * = C-13......-labelled fatty acid) by gavage. A maximum transport of 0.5% of the administered C-13-labelled 18:2n-6 was observed in 1mL rat plasma both after administration of L*L*L* and ML*M, while approximately 0.04% of the administered C-13-labelled 8:0 was detected in 1mL plasma following administration of M......*M*M* or M*LM*. After L*L*L* administration C-13-labelled 20:4n-6 was observed in plasma, probably formed by elongation and desaturation of 18:2n-6 in the enterocyte or liver cells. Furthermore, C-13-labelled 16:0, 48:0, 18: 1n-9 and 20:4n-6 were observed in plasma of rats fed M*M*M* and M*LM* due...

  17. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  18. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  19. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  20. Transportation

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    Here is the decree of the thirtieth of July 1998 relative to road transportation, to trade and brokerage of wastes. It requires to firms which carry out a road transportation as well as to traders and to brokers of wastes to declare their operations to the prefect. The declaration has to be renewed every five years. (O.M.)

  1. Oxygen transport and myocardial function after the administration of albumin 5%, hydroxyethylstarch 6% and succinylated gelatine 4% to rabbits

    NARCIS (Netherlands)

    Himpe, D. G.; de Hert, S. G.; Vermeyen, K. M.; Adriaensen, H. F.

    2002-01-01

    BACKGROUND AND OBJECTIVE: The effects of administering albumin 5%, hydroxyethylstarch 6% and succinylated gelatine 4% on oxygen transport and left ventricular function were prospectively investigated in different experimental conditions: baseline, fluid load, after 10 min of myocardial ischaemia and

  2. Security in transport, storage and disposal of radioactive materials, providing to the department of nuclear medicine in hospitals Rafael Angel Calderon Guardia, San Juan de Dios and Mexico

    International Nuclear Information System (INIS)

    Elizondo Valle, Alejandro; Jimenez Mendez, Christian; Leiton Araya, Christopher; Villalobos Rodriguez, Geovanny; Leal Vega, Olga Maritza; Lopez Gatjens, Santiago

    2010-01-01

    The security is analysed for the transport and storage of radioactive sources and the management of radioactive waste product of practices and interventions in nuclear medicine services in hospitals Calderon Guardia, San Juan de Dios and Mexico. The objective is to assess the compliance with current regulations, the effectiveness and efficiency of the same. The security and compliance with current regulations were considered related to the transport of radioactive sources by the two private companies that provide this service, from the Juan Santamaria airport customs to three hospitals evaluated. Compliance with national and international rules on storage of radioactive sources and waste materials were analyzed. For this has been studied Costa Rican law and the recommendations of international organizations related to the subject matter, in the three nuclear medicine services valued. The national and international background related to radiological accidents occurred with radioactive sources during transport, storage and waste were revised, where highlights that in most cases, these accidents occurred for breach of the regulations established. Studies in Costa Rica on radioactive waste management were analysed, and the current status of nuclear medicine services in terms of radiation safety, which helped with the investigation. The compliance and regulations were analyzed by the result of observation and interviews during development, to finally make a series of findings and provide recommendations that are considered relevant. Various variants and indicators that are defined in the theoretical framework were used; also, the strategy of methodology is described. The purpose of the work has been to provide a scientific nature, and that methodology met the objectives, offering an approach from different angles and the actors involved, and a critical and objective analysis strictly in order to contribute to public health. The research is a valuable tool that provides

  3. 78 FR 9771 - Federal Highway Administration

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Notice of Final Federal Agency Action on Proposed Transportation Project in Illinois and Indiana AGENCY: Federal Highway Administration...., Acting Division Administrator, Federal Highway Administration, 3250 Executive Park Drive, Springfield...

  4. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  5. Transportation

    National Research Council Canada - National Science Library

    Allshouse, Michael; Armstrong, Frederick Henry; Burns, Stephen; Courts, Michael; Denn, Douglas; Fortunato, Paul; Gettings, Daniel; Hansen, David; Hoffman, D. W; Jones, Robert

    2007-01-01

    .... The ability of the global transportation industry to rapidly move passengers and products from one corner of the globe to another continues to amaze even those wise to the dynamics of such operations...

  6. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  7. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  8. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  9. Legal and security requirements for the air transportation of cyanotoxins and toxigenic cyanobacterial cells for legitimate research and analytical purposes.

    Science.gov (United States)

    Metcalf, J S; Meriluoto, J A O; Codd, G A

    2006-05-25

    Cyanotoxins are now recognised by international and national health and environment agencies as significant health hazards. These toxins, and the cells which produce them, are also vulnerable to exploitation for illegitimate purposes. Cyanotoxins are increasingly being subjected to national and international guidelines and regulations governing their production, storage, packaging and transportation. In all of these respects, cyanotoxins are coming under the types of controls imposed on a wide range of chemicals and other biotoxins of microbial, plant and animal origin. These controls apply whether cyanotoxins are supplied on a commercial basis, or stored and transported in non-commercial research collaborations and programmes. Included are requirements concerning the transportation of these toxins as documented by the United Nations, the International Air Transport Association (IATA) and national government regulations. The transportation regulations for "dangerous goods", which by definition include cyanotoxins, cover air mail, air freight, and goods checked in and carried on flights. Substances include those of determined toxicity and others of suspected or undetermined toxicity, covering purified cyanotoxins, cyanotoxin-producing laboratory strains and environmental samples of cyanobacteria. Implications of the regulations for the packaging and air-transport of dangerous goods, as they apply to cyanotoxins and toxigenic cyanobacteria, are discussed.

  10. Acute administration of haloperidol does not influence 123I-FP-CIT binding to the dopamine transporter

    NARCIS (Netherlands)

    Booij, Jan; van Loon, Guus; de Bruin, Kora; Voorn, Pieter

    2014-01-01

    A recent (123)I-FP-CIT ((123)-I-N-ω-fluoropropyl-2β-carbomethoxy-3β-(4-iodophenyl)nortropane) SPECT study on rats suggested that a single 1 mg/kg dose of the antipsychotic haloperidol induces enough dopamine release to compete with (123)I-FP-CIT for binding to the dopamine transporter. Taking into

  11. Transport and biodistribution of dendrimers across human fetal membranes: implications for intravaginal administration of dendrimer-drug conjugates.

    Science.gov (United States)

    Menjoge, Anupa R; Navath, Raghavendra S; Asad, Abbas; Kannan, Sujatha; Kim, Chong J; Romero, Roberto; Kannan, Rangaramanujam M

    2010-06-01

    Dendrimers are emerging as promising topical antimicrobial agents, and as targeted nanoscale drug delivery vehicles. Topical intravaginal antimicrobial agents are prescribed to treat the ascending genital infections in pregnant women. The fetal membranes separate the extra-amniotic space and fetus. The purpose of the study is to determine if the dendrimers can be selectively used for local intravaginal application to pregnant women without crossing the membranes into the fetus. In the present study, the transport and permeability of PAMAM (poly (amidoamine)) dendrimers, across human fetal membrane (using a side by side diffusion chamber), and its biodistribution (using immunofluorescence) are evaluated ex-vivo. Transport across human fetal membranes (from the maternal side) was evaluated using Fluorescein (FITC), an established transplacental marker (positive control, size approximately 400 Da) and fluorophore-tagged G(4)-PAMAM dendrimers (approximately 16 kDa). The fluorophore-tagged G(4)-PAMAM dendrimers were synthesized and characterized using (1)H NMR, MALDI TOF MS and HPLC analysis. Transfer was measured across the intact fetal membrane (chorioamnion), and the separated chorion and amnion layers. Over a 5 h period, the dendrimer transport across all the three membranes was less than dendrimer (5.8 x 10(-8) cm(2)/s). The biodistribution showed that the dendrimers were largely present in interstitial spaces in the decidual stromal cells and the chorionic trophoblast cells (in 2.5-4 h) and surprisingly, to a smaller extent internalized in nuclei of trophoblast cells and nuclei and cytoplasm of stromal cells. Passive diffusion and paracellular transport appear to be the major route for dendrimer transport. The overall findings further suggest that entry of drugs conjugated to dendrimers would be restricted across the human fetal membranes when administered topically by intravaginal route, suggesting new ways of selectively delivering therapeutics to the mother

  12. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  13. Fragmentation in the Public Administration for Climate Change Mitigation: A Major Institutional Constraint for Energy Policy in the Transportation Sector of Thailand

    Directory of Open Access Journals (Sweden)

    Ratchaphong Klinsrisuk

    2013-07-01

    Full Text Available This paper focuses on how fragmentation in public administration has become a major institutional constraint on CO2 emission mitigation policies in Thailand, particularly for energy policy in the transportation sector. Most of our data are narratives and descriptions derived from in-depth interviews with various governmental agencies and academics. It was found that in practice, the environmental policy link between separated sectors continues to be weak because of the lack of appropriate institutional structure for integration. We conclude that the institutions tend to be independent, fragmented, and working on relatively narrow mandates. The closed decision-making processes and the organizational structures strongly bias the different administrative units towards their respective interests.

  14. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  15. Quarterly report on the activities in safety administration division. The third quarter of 2002. Document on present state of affairs

    International Nuclear Information System (INIS)

    Ishibashi, Takashi

    2003-06-01

    The activities of Safety Administration Division covers many fields in Tokai-Works such as the management of a labor safety health, the crisis management and the security, the safeguards of the nuclear materials, the transport of nuclear materials, and the management of a quality assurance. This report is summary of the activities of Safety Administration Division in October to December in 2002. (author)

  16. 48 CFR 3028.106 - Administration.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Administration. 3028.106 Section 3028.106 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... 3028.106 Administration. ...

  17. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  18. Comparative International Air Cargo Solutions: The Pathway to a Resilient, Adaptable, Balanced and Sustainable Secure Global Air Cargo Supply Chain

    Science.gov (United States)

    2013-12-01

    counterfeit merchandise smugglers, and remains the weakest link in the air cargo transportation chain. The TSA and CBP continue to seek administrative...been exploited by narcotics, human and counterfeit merchandise smugglers for centuries, remains the weakest link in the air cargo transportation chain... visual depiction of the European Union 3rd country security processes. 96 Official Journal of the

  19. Veterans Health Administration (VHA)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSNs and other identifying information for the Department of Veterans Affairs, VHA. DVA will use the information...

  20. Transportation

    Science.gov (United States)

    2007-01-01

    Faculty ii INDUSTRY TRAVEL Domestic Assistant Deputy Under Secretary of Defense (Transportation Policy), Washington, DC Department of...developed between the railroad and trucking industries. Railroads: Today’s seven Class I freight railroad systems move 42% of the nation’s intercity ...has been successfully employed in London to reduce congestion and observed by this industry study during its travels . It is currently being

  1. Transportation of nuclear material in France: regulatory and technical aspects

    International Nuclear Information System (INIS)

    Flory, D.; Renard, C.

    1995-01-01

    Legislative and regulatory documentation define responsibilities in the field of security and physical protection for transportation of nuclear material. Any transportation activity has to conform to an advance authorization regime delivered by the Ministry of Industry. Responsibility for physical protection of nuclear material rests with the carrier under control of the public authority. Penalties reinforce this administrative regime. Operational responsibility for management and control of transport operations has been entrusted by the ministry to the operational transport unit (Echelon Operationnel des Transports - EOT) of IPSN (Institute for Nuclear Protection and Safety). To guarantee en efficient protection of transport operations, the various following means are provided for: -specialized transport means; - devices for real time tracking of road vehicles; - administrative authorization and declaration procedures; -intervention capacities in case of sabotage... This set of technical means and administrative measures is completed by the existence of a body of inspectors who may control every step of the operations. (authors). 3 tabs

  2. 78 FR 46309 - Rules of Administrative Finality

    Science.gov (United States)

    2013-07-31

    ...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA 2013-0011] Rules of Administrative Finality AGENCY: Social Security Administration (SSA) ACTION: Notice and request for comments...

  3. The ALMT Family of Organic Acid Transporters in Plants and Their Involvement in Detoxification and Nutrient Security.

    Science.gov (United States)

    Sharma, Tripti; Dreyer, Ingo; Kochian, Leon; Piñeros, Miguel A

    2016-01-01

    About a decade ago, members of a new protein family of anion channels were discovered on the basis of their ability to confer on plants the tolerance toward toxic aluminum ions in the soil. The efflux of Al 3+ -chelating malate anions through these channels is stimulated by external Al 3+ ions. This feature of a few proteins determined the name of the entire protein family as Aluminum-activated Malate Transporters (ALMT). Meanwhile, after several years of research, it is known that the physiological roles of ALMTs go far beyond Al-detoxification. In this review article we summarize the current knowledge on this transporter family and assess their involvement in diverse physiological processes.

  4. The ALMT family of organic acid transporters in plants and their involvement in detoxification and nutrient security

    Directory of Open Access Journals (Sweden)

    Tripti Sharma

    2016-10-01

    Full Text Available About a decade ago, members of a new protein family of anion channels were discovered on the basis of their ability to confer on plants the tolerance towards toxic aluminum ions in the soil. The efflux of Al3+-chelating malate anions through these channels is stimulated by external Al3+ ions. This feature of a few proteins determined the name of the entire protein family as Aluminum-activated Malate Transporters (ALMT. Meanwhile, after several years of research, it is known that the physiological roles of ALMTs go far beyond Al-detoxification. In this review article we summarize the current knowledge on this transporter family and assess their involvement in diverse physiological processes.

  5. L-Theanine Administration Modulates the Absorption of Dietary Nutrients and Expression of Transporters and Receptors in the Intestinal Mucosa of Rats

    Directory of Open Access Journals (Sweden)

    Qiongxian Yan

    2017-01-01

    Full Text Available L-theanine has various advantageous functions for human health; whether or not it could mediate the nutrients absorption is unknown yet. The effects of L-theanine on intestinal nutrients absorption were investigated using rats ingesting L-theanine solution (0, 50, 200, and 400 mg/kg body weight per day for two weeks. The decline of insulin secretion and glucose concentration in the serum was observed by L-theanine. Urea and high-density lipoprotein were also reduced by 50 mg/kg L-theanine. Jejunal and ileac basic amino acids transporters SLC7a1 and SLC7a9, neutral SLC1a5 and SLC16a10, and acidic SLC1a1 expression were upregulated. The expression of intestinal SGLT3 and GLUT5 responsible for carbohydrates uptake and GPR120 and FABP2 associated with fatty acids transport were inhibited. These results indicated that L-theanine could inhibit the glucose uptake by downregulating the related gene expression in the small intestine of rats. Intestinal gene expression of transporters responding to amino acids absorption was stimulated by L-theanine administration.

  6. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  7. Adolescent Atomoxetine Treatment in a Rodent Model of ADHD: Effects on Cocaine Self-Administration and Dopamine Transporters in Frontostriatal Regions

    Science.gov (United States)

    Somkuwar, Sucharita S; Jordan, Chloe J; Kantak, Kathleen M; Dwoskin, Linda P

    2013-01-01

    Cocaine abuse and attention deficit/hyperactivity disorder (ADHD) are often comorbid. Preclinical research indicates that medial prefrontal (mPFC) and orbitofrontal (OFC) cortices are important neural substrates for both disorders. Using the spontaneously hypertensive rat (SHR) model of ADHD, we reported that adolescent treatment with the stimulant methylphenidate, a dopamine (DAT) and norepinephrine (NET) transporter inhibitor, enhanced cocaine self-administration during adulthood, and was associated with increased DAT function in mPFC. This study investigates the effects of atomoxetine ((R)-N-methyl-γ-(2-methylphenoxy)-benzenepropanamine hydrochloride) treatment, a selective NET inhibitor, during adolescence on cocaine self-administration and on DAT function and cell-surface expression in mPFC and OFC during adulthood. SHR acquired cocaine self-administration faster than Wistar–Kyoto and Wistar. Across cocaine doses, SHR earned more cocaine infusions and had higher progressive-ratio breakpoints than Wistar–Kyoto and Wistar, demonstrating that the SHR phenotype models comorbid ADHD and cocaine abuse. Prior atomoxetine treatment did not augment cocaine self-administration in SHR, but acquisition was enhanced in Wistar–Kyoto. No strain differences were found for DAT kinetic parameters or cellular localization in the vehicle controls. Atomoxetine did not alter DAT kinetic parameters or localization in SHR mPFC. Rather, atomoxetine decreased Vmax and DAT cell surface expression in SHR OFC, indicating that inhibition of NET by atomoxetine treatment during adolescence indirectly reduced DAT function and trafficking to the cell surface in OFC, specifically in the ADHD model. Thus, atomoxetine, unlike methylphenidate, does not enhance vulnerability to cocaine abuse in SHR and may represent an important alternative for teens with ADHD when drug addiction is a concern. PMID:23822950

  8. 49 CFR 8.31 - Industrial security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... industrial security services for the Department of Transportation. Regulations prescribed by the Secretary of...

  9. Security vs. Safety.

    Science.gov (United States)

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  10. Life cycle GHG emissions from Malaysian oil palm bioenergy development: The impact on transportation sector's energy security

    International Nuclear Information System (INIS)

    Hassan, Mohd Nor Azman; Jaramillo, Paulina; Griffin, W. Michael

    2011-01-01

    Malaysia's transportation sector accounts for 41% of the country's total energy use. The country is expected to become a net oil importer by the year 2011. To encourage renewable energy development and relieve the country's emerging oil dependence, in 2006 the government mandated blending 5% palm-oil biodiesel in petroleum diesel. Malaysia produced 16 million tonnes of palm oil in 2007, mainly for food use. This paper addresses maximizing bioenergy use from oil-palm to support Malaysia's energy initiative while minimizing greenhouse-gas emissions from land-use change. When converting primary and secondary forests to oil-palm plantations between 270-530 and 120-190 g CO 2 -equivalent per MJ of biodiesel produced, respectively, is released. However, converting degraded lands results in the capture of between 23 and 85 g CO 2 -equivalent per MJ of biodiesel produced. Using various combinations of land types, Malaysia could meet the 5% biodiesel target with a net GHG savings of about 1.03 million tonnes (4.9% of the transportation sector's diesel emissions) when accounting for the emissions savings from the diesel fuel displaced. These findings are used to recommend policies for mitigating GHG emissions impacts from the growth of palm oil use in the transportation sector. - Research highlights: → We modeled greenhouse gas emissions in the production of palm-biodiesel. → Five land types were included to model emissions associated with land-use change. → Land-use change has the biggest impact on the emissions in making palm-biodiesel. → Emissions from fertilizer use and effluent treatment are still significant. → At 5% biodiesel grown on suitable lands Malaysia would obtain an emissions savings.

  11. Life cycle GHG emissions from Malaysian oil palm bioenergy development: The impact on transportation sector's energy security

    Energy Technology Data Exchange (ETDEWEB)

    Hassan, Mohd Nor Azman, E-mail: mohdnorh@andrew.cmu.ed [Department of Engineering and Public Policy, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States); Jaramillo, Paulina [Department of Engineering and Public Policy, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States); Griffin, W. Michael [Department of Engineering and Public Policy, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States); Tepper School of Business, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15203 (United States)

    2011-05-15

    Malaysia's transportation sector accounts for 41% of the country's total energy use. The country is expected to become a net oil importer by the year 2011. To encourage renewable energy development and relieve the country's emerging oil dependence, in 2006 the government mandated blending 5% palm-oil biodiesel in petroleum diesel. Malaysia produced 16 million tonnes of palm oil in 2007, mainly for food use. This paper addresses maximizing bioenergy use from oil-palm to support Malaysia's energy initiative while minimizing greenhouse-gas emissions from land-use change. When converting primary and secondary forests to oil-palm plantations between 270-530 and 120-190 g CO{sub 2}-equivalent per MJ of biodiesel produced, respectively, is released. However, converting degraded lands results in the capture of between 23 and 85 g CO{sub 2}-equivalent per MJ of biodiesel produced. Using various combinations of land types, Malaysia could meet the 5% biodiesel target with a net GHG savings of about 1.03 million tonnes (4.9% of the transportation sector's diesel emissions) when accounting for the emissions savings from the diesel fuel displaced. These findings are used to recommend policies for mitigating GHG emissions impacts from the growth of palm oil use in the transportation sector. - Research highlights: {yields} We modeled greenhouse gas emissions in the production of palm-biodiesel. {yields} Five land types were included to model emissions associated with land-use change. {yields} Land-use change has the biggest impact on the emissions in making palm-biodiesel. {yields} Emissions from fertilizer use and effluent treatment are still significant. {yields} At 5% biodiesel grown on suitable lands Malaysia would obtain an emissions savings.

  12. DOT Cyber Security Assessment Management -

    Data.gov (United States)

    Department of Transportation — This data set contains information about the security and compliance status of FISMA systems within the Department. The information contains detailed descriptions of...

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. 76 FR 77302 - Federal Transit Administration

    Science.gov (United States)

    2011-12-12

    ... DEPARTMENT OF TRANSPORTATION Federal Transit Administration FY 2011 Discretionary Sustainability... Administration (FTA), DOT. ACTION: FTA Sustainability Program Funds: Announcement of Project Selections. SUMMARY: The U.S. Department of Transportation's (DOT) Federal Transit Administration (FTA) announces the...

  15. Short-term and long-term ethanol administration inhibits the placental uptake and transport of valine in rats

    International Nuclear Information System (INIS)

    Patwardhan, R.V.; Schenker, S.; Henderson, G.I.; Abou-Mourad, N.N.; Hoyumpa, A.M. Jr.

    1981-01-01

    Ethanol ingestion during pregnancy causes a pattern of fetal/neonatal dysfunction called the FAS. The effects of short- and long-term ethanol ingestion on the placental uptake and maternal-fetal transfer of valine were studied in rats. The in vivo placental uptake and fetal uptake were estimated after injection of 0.04 micromol of /sub 14/C-valine intravenously on day 20 of gestation in Sprague-Dawley rats. Short-term ethanol ingestion (4 gm/kg) caused a significant reduction in the placental uptake of /sub 14/C-valine by 33%, 60%, and 30%, and 31% at 2.5, 5, 10, and 15 min after valine administration, respectively (p less than 0.01), and a similar significant reduction occurred in the fetal uptake of /sub 14/C-valine (p less than 0.01). Long-term ethanol ingestion prior to and throughout gestation resulted in a 47% reduction in placental valine uptake (p less than 0.01) and a 46% reduction in fetal valine uptake (p less than 0.01). Long-term ethanol feeding from day 4 to day 20 of gestation caused a 32% reduction in placental valine uptake (p less than 0.01) and a 26% reduction in fetal valine uptake (p less than 0.01). We conclude that both short- and long-term ingestion of ethanol inhibit the placental uptake and maternal-fetal transfer of an essential amino acid--valine. An alteration of placental function may contribute to the pathogenesis of the FAS

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. How Should Public Administration Education Curriculum Within Indiana Higher Education Institutions Evolve to Reflect the Complex Homeland Security Issues Faced by Future Public Sector Employees?

    Science.gov (United States)

    2012-03-01

    Administration Research and Theory, 25–57. O’Leary, R. (2010). Traditions, ideas, spirits, event, challenge. Journal of Public Adminstration , 1–36. Purdue...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited HOW SHOULD PUBLIC ... PUBLIC SECTOR EMPLOYEES? by Bryant S. Lucas March 2012 Thesis Advisor: Christopher Bellavita Second Reader: Lauren Wollman THIS PAGE

  18. Effect of maternal lipopolysaccharide administration on the development of dopaminergic receptors and transporter in the rat offspring.

    Directory of Open Access Journals (Sweden)

    Moogeh Baharnoori

    Full Text Available Epidemiological evidence supports that maternal infection during gestation are notable risk factors for developmental mental illnesses including schizophrenia and autism. In prenatal lipopolysaccharide (LPS model of immune activation in rats, the offspring exhibit significant impairments in behaviors mediated by central dopamine (DA system. This study aimed to examine the temporal and regional pattern of postnatal DA development in the male offspring of pregnant Sprague-Dawley rats administered with 100 µg/kg LPS or saline at gestational days 15/16. Using ligand autoradiography, D1 and D2 dopamine receptors (D1R, D2R and dopamine transporter (DAT binding levels were measured in the prefrontal cortex (PFC and sub cortical regions (dorsal striatum and nucleus accumbens core and shell at pre pubertal (P35 and post pubertal ages (P60. We found a significant decrease in D2R ligand [(3H] YM-90151-2 binding in the medial PFC (mPFC in prenatal LPS-treated animals at P35 and P60 compared to respective saline groups. The decrease in D2R levels was not observed in the striatum or accumbens of maternal LPS-treated animals. No significant changes were observed in [(3H] SCH23390 binding to D1R. However, the level of [(125I] RTI-121 binding to DAT was selectively reduced in the nucleus accumbens core and shell at P35 in the prenatal LPS group. Immunohistochemical analysis showed that number of D2R immunopositive cells in infralimbic/prelimbic (IL/PL part of mPFC was significantly reduced in the LPS group at P60. Prenatal LPS treatment did not significantly affect either the total number of mature neurons or parvalbumin (PV-immunopositive interneurons in this region. However the number of PV and D2R co-labeled neurons was significantly reduced in the IL/PL subregion of PFC of LPS treated animals. Our data suggests D2R deficit in the PFC and PV interneurons may be relevant to understanding mechanisms of cortical dysfunctions described in prenatal infection

  19. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  20. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  1. Analysis of selected energy security issues related to US crude oil and natural gas exploration, development, production, transportation and processing

    International Nuclear Information System (INIS)

    1990-10-01

    In July 1989, President Bush directed the Secretary of Energy to initiate the development of a comprehensive National Energy Strategy (NES) built upon a national consensus. The overall principle for the NES, as defined by the President and articulated by the Economic Policy Council (EPC), is the continuation of the successful policy of market reliance, consistent with the following goals: Balancing of energy, economic, and environmental concerns; and reduced dependence by the US and its friends and allies on potentially unreliable energy suppliers. The analyses presented in this report draw upon a large body of work previously conducted for DOE/Office of Fossil Energy, the US Department of Interior/Minerals Management Service (DOI/MMS), and the Gas Research Institute (GRI), referenced throughout the text of this report. This work includes assessments in the following areas: the potential of advanced oil and gas extraction technologies as improved through R ampersand D, along with the successful transfer of these technologies to the domestic petroleum industry; the economic and energy impacts of environmental regulations on domestic oil and gas exploration, production, and transportation; the potential of tax incentives to stimulate domestic oil and gas development and production; the potential environmental costs associated with various options for leasing for US oil and gas resources in the Outer Continental Shelf (OCS); and the economic impacts of environmental regulations affecting domestic crude oil refining

  2. GHG Emissions and Costs of Developing Biomass Energy in Malaysia: Implications on Energy Security in the Transportation and Electricity Sector

    Science.gov (United States)

    Hassan, Mohd Nor Azman

    Malaysia's transportation sector accounts for 48% of the country's total energy use. The country is expected to become a net oil importer by the year 2011. To encourage renewable energy development and relieve the country's emerging oil dependence, in 2006 the government mandated blending 5% palm-oil biodiesel in petroleum diesel. Malaysia produced 16 million tonnes of palm oil in 2007, mainly for food use. This study addresses maximizing bioenergy use from oil-palm to support Malaysia's energy initiative while minimizing greenhouse gas emissions from land use change. When converting primary and secondary forests to oil-palm plantations between 270 - 530 g and 120 -190 g CO2 equivalent (CO2-eq) per MJ of biodiesel produced, respectively, is released. However, converting degraded lands results in the capture of between 23 to 85 g CO2-eq per MJ of biodiesel produced. Using various combinations of land types, Malaysia could meet the 5% biodiesel target with a net GHG savings of about 1.03 million tonnes (4.9% of the transportation sector's diesel emissions) when accounting for the emissions savings from the diesel fuel displaced. Fossil fuels contributed about 93% to Malaysia's electricity generation mix and emit about 65 million tonnes (Mt) or 36% of the country's 2010 Greenhouse Gas (GHG) emissions. The government has set a target to install 330 MW biomass electricity by 2015, which is hoped to avoid 1.3 Mt of GHG emissions annually. The availability of seven types of biomass residues in Peninsular Malaysia is estimated based on residues-to-product ratio, recoverability and accessibility factor and other competing uses. It was found that there are approximately 12.2 Mt/yr of residues. Oil-palm residues contribute about 77% to the total availability with rice and forestry residues at 17%. Electricity from biomass can be produced via direct combustion in dedicated power plants or co-fired with coal. The co-firing of the residues at four existing coal plants in

  3. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  4. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  5. State Transportation Statistics 2012

    Science.gov (United States)

    2013-08-15

    The Bureau of Transportation Statistics (BTS), a part of the U.S. Department of Transportation's (USDOT) Research and Innovative Technology Administration (RITA), presents State Transportation Statistics 2012, a statistical profile of transportation ...

  6. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  7. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  8. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    International Nuclear Information System (INIS)

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST's wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots

  9. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  10. The sigma-1 receptor modulates dopamine transporter conformation and cocaine binding and may thereby potentiate cocaine self-administration in rats.

    Science.gov (United States)

    Hong, Weimin Conrad; Yano, Hideaki; Hiranita, Takato; Chin, Frederick T; McCurdy, Christopher R; Su, Tsung-Ping; Amara, Susan G; Katz, Jonathan L

    2017-07-07

    The dopamine transporter (DAT) regulates dopamine (DA) neurotransmission by recapturing DA into the presynaptic terminals and is a principal target of the psychostimulant cocaine. The sigma-1 receptor (σ 1 R) is a molecular chaperone, and its ligands have been shown to modulate DA neuronal signaling, although their effects on DAT activity are unclear. Here, we report that the prototypical σ 1 R agonist (+)-pentazocine potentiated the dose response of cocaine self-administration in rats, consistent with the effects of the σR agonists PRE-084 and DTG (1,3-di- o -tolylguanidine) reported previously. These behavioral effects appeared to be correlated with functional changes of DAT. Preincubation with (+)-pentazocine or PRE-084 increased the B max values of [ 3 H]WIN35428 binding to DAT in rat striatal synaptosomes and transfected cells. A specific interaction between σ 1 R and DAT was detected by co-immunoprecipitation and bioluminescence resonance energy transfer assays. Mutational analyses indicated that the transmembrane domain of σ 1 R likely mediated this interaction. Furthermore, cysteine accessibility assays showed that σ 1 R agonist preincubation potentiated cocaine-induced changes in DAT conformation, which were blocked by the specific σ 1 R antagonist CM304. Moreover, σ 1 R ligands had distinct effects on σ 1 R multimerization. CM304 increased the proportion of multimeric σ 1 Rs, whereas (+)-pentazocine increased monomeric σ 1 Rs. Together these results support the hypothesis that σ 1 R agonists promote dissociation of σ 1 R multimers into monomers, which then interact with DAT to stabilize an outward-facing DAT conformation and enhance cocaine binding. We propose that this novel molecular mechanism underlies the behavioral potentiation of cocaine self-administration by σ 1 R agonists in animal models. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  11. Alterations in brain extracellular dopamine and glycine levels following combined administration of the glycine transporter type-1 inhibitor Org-24461 and risperidone.

    Science.gov (United States)

    Nagy, Katalin; Marko, Bernadett; Zsilla, Gabriella; Matyus, Peter; Pallagi, Katalin; Szabo, Geza; Juranyi, Zsolt; Barkoczy, Jozsef; Levay, Gyorgy; Harsing, Laszlo G

    2010-12-01

    The most dominant hypotheses for the pathogenesis of schizophrenia have focused primarily upon hyperfunctional dopaminergic and hypofunctional glutamatergic neurotransmission in the central nervous system. The therapeutic efficacy of all atypical antipsychotics is explained in part by antagonism of the dopaminergic neurotransmission, mainly by blockade of D(2) dopamine receptors. N-methyl-D-aspartate (NMDA) receptor hypofunction in schizophrenia can be reversed by glycine transporter type-1 (GlyT-1) inhibitors, which regulate glycine concentrations at the vicinity of NMDA receptors. Combined drug administration with D(2) dopamine receptor blockade and activation of hypofunctional NMDA receptors may be needed for a more effective treatment of positive and negative symptoms and the accompanied cognitive deficit in schizophrenia. To investigate this type of combined drug administration, rats were treated with the atypical antipsychotic risperidone together with the GlyT-1 inhibitor Org-24461. Brain microdialysis was applied in the striatum of conscious rats and determinations of extracellular dopamine, DOPAC, HVA, glycine, glutamate, and serine concentrations were carried out using HPLC/electrochemistry. Risperidone increased extracellular concentrations of dopamine but failed to influence those of glycine or glutamate measured in microdialysis samples. Org-24461 injection reduced extracellular dopamine concentrations and elevated extracellular glycine levels but the concentrations of serine and glutamate were not changed. When risperidone and Org-24461 were added in combination, a decrease in extracellular dopamine concentrations was accompanied with sustained elevation of extracellular glycine levels. Interestingly, the extracellular concentrations of glutamate were also enhanced. Our data indicate that coadministration of an antipsychotic with a GlyT-1 inhibitor may normalize hypofunctional NMDA receptor-mediated glutamatergic neurotransmission with reduced

  12. Flexible Land Administration

    DEFF Research Database (Denmark)

    Enemark, Stig

    2014-01-01

    Security of tenure is widely considered to be the missing piece of the puzzle when it comes to eradication of poverty. And, as explained in the previous issue of Geoinformatics, the European Union is now placing land rights at the heart of EU development policy. This article presents a way forwar...... in terms of building flexible and "fit-for-purpose" land administration systems in developing countries. This will ensure security of tenure for all and sustainable management of the use of land....

  13. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  14. Repeated administration of D-amphetamine induces loss of [{sup 123}I]FP-CIT binding to striatal dopamine transporters in rat brain: a validation study

    Energy Technology Data Exchange (ETDEWEB)

    Booij, Jan [Department of Nuclear Medicine, Academic Medical Center, 1105 AZ Amsterdam (Netherlands)]. E-mail: j.booij@amc.uva.nl; Bruin, Kora de [Department of Nuclear Medicine, Academic Medical Center, 1105 AZ Amsterdam (Netherlands); Gunning, W. Boudewijn [Department of Neurology, Epilepsy Centre Kempenhaeghe, 5590 AB Heeze (Netherlands)

    2006-04-15

    In recent years, several PET and SPECT studies have shown loss of striatal dopamine transporter (DAT) binding in amphetamine (AMPH) users. However, the use of DAT SPECT tracers to detect AMPH-induced changes in DAT binding has not been validated. We therefore examined if repeated administration of D-AMPH or methamphetamine (METH) may induce loss of binding to striatal DATs in rats by using an experimental biodistribution study design and a SPECT tracer for the DAT ([{sup 123}I]FP-CIT). Methods: Groups of male rats (n=10 per group) were treated with D-AMPH (10 mg/kg body weight), METH (10 mg/kg body weight), or saline, twice a day for 5 consecutive days. Five days later, [{sup 123}I]FP-CIT was injected intravenously, and 2 h later, the rats were sacrificed and radioactivity was assayed. Results: In D-AMPH but not METH-treated rats, striatal [{sup 123}I]FP-CIT uptake was significantly lower (approximately 17%) than in the control group. Conclusion: These data show that [{sup 123}I]FP-CIT can be used to detect AMPH-induced changes in DAT binding and may validate the use of DAT radiotracers to study AMPH-induced changes in striatal DAT binding in vivo.

  15. Repeated administration of D-amphetamine induces loss of [123I]FP-CIT binding to striatal dopamine transporters in rat brain: a validation study

    International Nuclear Information System (INIS)

    Booij, Jan; Bruin, Kora de; Gunning, W. Boudewijn

    2006-01-01

    In recent years, several PET and SPECT studies have shown loss of striatal dopamine transporter (DAT) binding in amphetamine (AMPH) users. However, the use of DAT SPECT tracers to detect AMPH-induced changes in DAT binding has not been validated. We therefore examined if repeated administration of D-AMPH or methamphetamine (METH) may induce loss of binding to striatal DATs in rats by using an experimental biodistribution study design and a SPECT tracer for the DAT ([ 123 I]FP-CIT). Methods: Groups of male rats (n=10 per group) were treated with D-AMPH (10 mg/kg body weight), METH (10 mg/kg body weight), or saline, twice a day for 5 consecutive days. Five days later, [ 123 I]FP-CIT was injected intravenously, and 2 h later, the rats were sacrificed and radioactivity was assayed. Results: In D-AMPH but not METH-treated rats, striatal [ 123 I]FP-CIT uptake was significantly lower (approximately 17%) than in the control group. Conclusion: These data show that [ 123 I]FP-CIT can be used to detect AMPH-induced changes in DAT binding and may validate the use of DAT radiotracers to study AMPH-induced changes in striatal DAT binding in vivo

  16. Transportation of nuclear materials

    International Nuclear Information System (INIS)

    Brobst, W.A.

    1977-01-01

    Twenty years of almost accident-free transport of nuclear materials is pointed to as evidence of a fundamentally correct approach to the problems involved. The increased volume and new technical problems in the future will require extension of these good practices in both regulations and packaging. The general principles of safety in the transport of radioactive materials are discussed first, followed by the transport of spent fuel and of radioactive waste. The security and physical protection of nuclear shipments is then treated. In discussing future problems, the question of public understanding and acceptance is taken first, thereafter transport safeguards and the technical bases for the safety regulations. There is also said to be a need for a new technology for spent fuel casks, while a re-examination of the IAEA transport standards for radiation doses is recommended. The IAEA regulations regarding quality assurance are said to be incomplete, and more information is required on correlations between engineering analysis, scale model testing and full scale crash testing. Transport stresses on contents need to be considered while administrative controls have been neglected. (JIW)

  17. 20 CFR 416.105 - Administration.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Administration. 416.105 Section 416.105 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Introduction, General Provisions and Definitions § 416.105 Administration. The Supplemental...

  18. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  19. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  20. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  1. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  2. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  3. SELinux policy administration

    CERN Document Server

    Vermeulen, Sven

    2013-01-01

    A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.

  4. 49 CFR 193.2913 - Security monitoring.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  5. 14 CFR 129.28 - Flightdeck security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  6. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  7. Disability Case Review of Administrative Law Judge Hearing Decisions

    Data.gov (United States)

    Social Security Administration — The Disability Case Review is a post-effectuation quality review of administrative law judge (ALJ) disability hearing decisions. This dataset includes results from...

  8. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  9. Practical Unix and Internet Security

    CERN Document Server

    Garfinkel, Simson; Spafford, Gene

    2003-01-01

    When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix varia

  10. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  11. Security in Logistics

    Science.gov (United States)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  14. Case and Administrative Support Tools

    Data.gov (United States)

    U.S. Environmental Protection Agency — Case and Administrative Support Tools (CAST) is the secure portion of the Office of General Counsel (OGC) Dashboard business process automation tool used to help...

  15. US Fire Administration Fire Statistics

    Data.gov (United States)

    Department of Homeland Security — The U.S. Fire Administration collects data from a variety of sources to provide information and analyses on the status and scope of the fire problem in the United...

  16. The Land Administration Domain Model

    NARCIS (Netherlands)

    Lemmen, C.; Van Oosterom, P.J.M.; Bennett, R.

    2015-01-01

    Societal drivers including poverty eradication, gender equality, indigenous recognition, adequate housing, sustainable agriculture, food security, climate change response, and good governance, influence contemporary land administration design. Equally, the opportunities provided by technological

  17. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security Information...

  18. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  19. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  20. National transportation statistics 2010

    Science.gov (United States)

    2010-01-01

    National Transportation Statistics presents statistics on the U.S. transportation system, including its physical components, safety record, economic performance, the human and natural environment, and national security. This is a large online documen...

  1. State Transportation Statistics 2010

    Science.gov (United States)

    2011-09-14

    The Bureau of Transportation Statistics (BTS), a part of DOTs Research and Innovative Technology Administration (RITA), presents State Transportation Statistics 2010, a statistical profile of transportation in the 50 states and the District of Col...

  2. State transportation statistics 2009

    Science.gov (United States)

    2009-01-01

    The Bureau of Transportation Statistics (BTS), a part of DOTs Research and : Innovative Technology Administration (RITA), presents State Transportation : Statistics 2009, a statistical profile of transportation in the 50 states and the : District ...

  3. State Transportation Statistics 2011

    Science.gov (United States)

    2012-08-08

    The Bureau of Transportation Statistics (BTS), a part of DOTs Research and Innovative Technology Administration (RITA), presents State Transportation Statistics 2011, a statistical profile of transportation in the 50 states and the District of Col...

  4. State Transportation Statistics 2013

    Science.gov (United States)

    2014-09-19

    The Bureau of Transportation Statistics (BTS), a part of the U.S. Department of Transportations (USDOT) Research and Innovative Technology Administration (RITA), presents State Transportation Statistics 2013, a statistical profile of transportatio...

  5. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  6. 34 CFR 668.36 - Social security number.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Social security number. 668.36 Section 668.36 Education... Islands, and the Republic of Palau, the Secretary attempts to confirm the social security number a student... Security Administration. If the Social Security Administration confirms that number, the Secretary notifies...

  7. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  8. Interagency Security Classification Appeals Panel (ISCAP) Decisions

    Data.gov (United States)

    National Archives and Records Administration — This online collection includes documents decided upon by the Interagency Security Classification Appeals Panel (ISCAP) starting in Fiscal Year 2012. The documents...

  9. Investments secure supply security

    International Nuclear Information System (INIS)

    Van Baarle, D.

    2006-01-01

    In order to guarantee the supply of energy considerable investment must be made to improve the infrastructure (e.g. capacity for LNG-transport and -storage) and ties with the natural gas supplier in the Russian Federation must be intensified [nl

  10. 76 FR 78966 - Federal Aviation Administration

    Science.gov (United States)

    2011-12-20

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Approval of Noise Compatibility Program for Kona International Airport at Keahole, Keahole, North Kona, HI AGENCY: Federal Aviation Administration, DOT. ACTION: Notice. SUMMARY: The Federal Aviation Administration (FAA) announces its findings on...

  11. 75 FR 6433 - Federal Aviation Administration

    Science.gov (United States)

    2010-02-09

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Notice of Availability of a Draft... 9, West Chicago, IL AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of... Surveillance Radar, Model 9, West Chicago, Illinois. SUMMARY: The Federal Aviation Administration (FAA...

  12. 78 FR 25524 - Federal Aviation Administration

    Science.gov (United States)

    2013-05-01

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Notice of Request To Release Airport Property AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Intent to Rule on Request to... address: Lynn D. Martin, Airports Compliance Specialist, Federal Aviation Administration, Airports...

  13. 75 FR 12809 - Federal Aviation Administration

    Science.gov (United States)

    2010-03-17

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Notice of Intent To Rule on Request...: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Request to Release Airport Property. SUMMARY... Nicely, Manager, Federal Aviation Administration, Southwest Region, Airports Division, Texas Airports...

  14. 75 FR 18014 - Federal Highway Administration

    Science.gov (United States)

    2010-04-08

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration AGENCY: Federal Highway Administration (FHWA), DOT. ACTION: Notice of Availability regarding a Finding of No Significant Impact (FONSI): U.S.... FOR FURTHER INFORMATION CONTACT: Federal Highway Administration, Kentucky Division: Mr. Greg Rawlings...

  15. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  16. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  17. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  18. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  19. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  20. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  1. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  2. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  3. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  4. Rail security : some actions taken to enhance passenger and freight rail security, but significant challenges remain : testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate

    Science.gov (United States)

    2004-03-23

    Passenger and freight rail services are important links in the nation's transportation system. Terrorist attacks on passenger and/or freight rail services have the potential to cause widespread injury, loss of life, and economic disruption. The recen...

  5. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  6. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  7. 78 FR 24309 - Pipeline and Hazardous Materials Safety Administration

    Science.gov (United States)

    2013-04-24

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration List of Special Permit Applications Delayed AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA..., Pipeline and Hazardous Materials Safety Administration, U.S. Department of Transportation, East Building...

  8. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  9. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  10. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  11. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  12. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  13. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  14. 78 FR 18534 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Science.gov (United States)

    2013-03-27

    ... Security Administration (TSA) established the TWIC program to address identity management shortcomings and... http://www.regulations.gov on or before May 21, 2013, or reach the Docket Management Facility by that...) Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor...

  15. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  16. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  17. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  18. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  19. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  20. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  1. 36 CFR 1275.22 - Security.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...

  2. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  3. 7 CFR 1738.22 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Loan Purposes and Basic Policies § 1738.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...

  4. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  5. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  6. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  7. Administrating Solr

    CERN Document Server

    Mohan, Surendra

    2013-01-01

    A fast-paced, example-based guide to learning how to administrate, monitor, and optimize Apache Solr.""Administrating Solr"" is for developers and Solr administrators who have a basic knowledge of Solr and who are looking for ways to keep their Solr server healthy and well maintained. A basic working knowledge of Apache Lucene is recommended, but this is not mandatory.

  8. Administrative Synergy

    Science.gov (United States)

    Hewitt, Kimberly Kappler; Weckstein, Daniel K.

    2012-01-01

    One of the biggest obstacles to overcome in creating and sustaining an administrative professional learning community (PLC) is time. Administrators are constantly deluged by the tyranny of the urgent. It is a Herculean task to carve out time for PLCs, but it is imperative to do so. In this article, the authors describe how an administrative PLC…

  9. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling...

  10. rHDL administration increases reverse cholesterol transport in mice, but is not additive on top of ezetimibe or cholestyramine treatment

    NARCIS (Netherlands)

    Maugeais, Cyrille; Annema, Wijtske; Blum, Denise; Mary, Jean-Luc; Tietge, Uwe J. F.

    Objective: Promoting reverse cholesterol transport (RCT) is a major atheroprotective property of HDL. The present study explored the effect of stimulating the first step of RCT (cholesterol efflux from macrophages) alone or in combination with stimulating the last step of RCT (fecal sterol

  11. Security programs for Category I or II nuclear material or certain nuclear facilities. Regulatory guide G-274

    International Nuclear Information System (INIS)

    2003-03-01

    The purpose of this regulatory guide is to help applicants for a Canadian Nuclear Safety Commission (CNSC) licence in respect of Category I or II nuclear material - other than a licence to transport - , or a nuclear facility consisting of a nuclear reactor that may exceed 10 MW thermal power during normal operation, prepare and submit the security information to be included with the application, pursuant to the Nuclear Safety and Control Act (NSCA). Category I and II nuclear material are defined in Appendix B to this guide. This guide describes: the security information that should typically be included with the application for any licence referred to above; how the security information may be organized and presented in a separate document (hereinafter 'the security program description'), in order to assist CNSC review and processing of the application; and, the administrative procedures to be followed when preparing, submitting or revising the security program description. (author)

  12. Administrative Circulars

    CERN Document Server

    Département des Ressources humaines

    2004-01-01

    Administrative Circular N° 2 (Rev. 2) - May 2004 Guidelines and procedures concerning recruitment and probation period of staff members This circular has been revised. It cancels and replaces Administrative Circular N° 2 (Rev. 1) - March 2000. Administrative Circular N° 9 (Rev. 3) - May 2004 Staff members contracts This circular has been revised. It cancels and replaces Administrative Circular N° 9 (Rev. 2) - March 2000. Administrative Circular N° 26 (Rev. 4) - May 2004 Procedure governing the career evolution of staff members This circular has also been revised. It Administrative Circulars Administrative Circular N° 26 (Rev. 3) - December 2001 and brings up to date the French version (Rev. 4) published on the HR Department Web site in January 2004. Operational Circular N° 7 - May 2004 Work from home This circular has been drawn up. Operational Circular N° 8 - May 2004 Dealing with alcohol-related problems...

  13. Federal Coal Mine Health and Safety Act of 1969, Title IV, as amended (The Black Lung Benefits Act); payment of benefits--withholding Part B benefits where Part C payments are made for the same period. Social Security Administration. Final rule.

    Science.gov (United States)

    1982-05-04

    This regulation confirms the interim rule authorizing the Social Security Administration to withhold payment of Part B Black Lung benefits where Part C Black Lung benefits administered by the Dept. of Labor are paid for the same period. We are doing this by expanding the definition of "overpayment" in 20 CFR 410.560(a) to include these duplicate payments under Part C. This regulation provides a quick and efficient means of avoiding unjustified duplicate payments.

  14. 6 CFR 13.44 - Right to administrative offset.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Right to administrative offset. 13.44 Section 13.44 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.44 Right to administrative offset. The amount of any penalty or assessment that has become...

  15. 78 FR 41183 - Federal Aviation Administration

    Science.gov (United States)

    2013-07-09

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Meeting: RTCA Program Management Committee AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION... Operations Group, Federal Aviation Administration. [FR Doc. 2013-16464 Filed 7-8-13; 8:45 am] BILLING CODE...

  16. Security of M-Commerce transactions

    OpenAIRE

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  17. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  18. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  19. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  20. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  1. 75 FR 4449 - Requested Administrative Waiver of the Coastwise Trade Laws; Correction

    Science.gov (United States)

    2010-01-27

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2010-0001] Requested Administrative Waiver of the Coastwise Trade Laws; Correction AGENCY: Maritime Administration, Department of Transportation. ACTION: Notice; correction. SUMMARY: On January 15, 2010, the Maritime Administration published...

  2. 75 FR 4449 - Requested Administrative Waiver of the Coastwise Trade Laws

    Science.gov (United States)

    2010-01-27

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2010-0002] Requested Administrative Waiver of the Coastwise Trade Laws AGENCY: Maritime Administration, Department of Transportation. ACTION: Notice; correction. SUMMARY: On January 15, 2010, the Maritime Administration published notice of...

  3. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  4. Administrative Reform

    DEFF Research Database (Denmark)

    Plum, Maja

    Through the example of a Danish reform of educational plans in early childhood education, the paper critically addresses administrative educational reforms promoting accountability, visibility and documentation. Drawing on Foucaultian perspectives, the relation between knowledge and governing...... of administrative technology, tracing how the humanistic values of education embed and are embedded within ‘the professional nursery teacher' as an object and subject of administrative practice. Rather than undermining the humanistic potential of education, it is argued that the technology of accounting...

  5. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    ...) as a primary personal identifier. Originally intended for the very limited purpose of tracking social security benefits, the value of the SSN as a unique identifier was quickly recognized, and its use rapidly grew...

  6. 26 CFR 301.7701-11 - Social security number.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...

  7. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...

  8. Coal Mines Security System

    OpenAIRE

    Ankita Guhe; Shruti Deshmukh; Bhagyashree Borekar; Apoorva Kailaswar; Milind E.Rane

    2012-01-01

    Geological circumstances of mine seem to be extremely complicated and there are many hidden troubles. Coal is wrongly lifted by the musclemen from coal stocks, coal washeries, coal transfer and loading points and also in the transport routes by malfunctioning the weighing of trucks. CIL —Coal India Ltd is under the control of mafia and a large number of irregularities can be contributed to coal mafia. An Intelligent Coal Mine Security System using data acquisition method utilizes sensor, auto...

  9. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  10. 10 CFR 725.24 - Administration.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Administration. 725.24 Section 725.24 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA Permits § 725.24 Administration. With respect to each permit... designate a DOE or National Nuclear Security Administration office which will: (a) Process all personnel...

  11. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  12. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  13. Resolution 2/2004 Guidelines for the implementation of regulations for the safe transport of radioactive materials

    International Nuclear Information System (INIS)

    2004-01-01

    This guide is intended to supplement the provisions of Resolution no. 121/2000 of the Ministry of Science Technology and Environment Regulations the Security of Radioactive Materials Transport, hereinafter Regulation, Regarding the administrative requirements for the application process Certificates of Approval for the shipments of radioactive material and for Special arrangements.

  14. 49 CFR 8.9 - Information Security Review Committee.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  15. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  16. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  17. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  18. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  19. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  20. 14 CFR 1203.201 - Information security objectives.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  1. National Transportation Atlas Databases : 2013.

    Science.gov (United States)

    2013-01-01

    The National Transportation Atlas Databases 2013 (NTAD2013) is a set of nationwide geographic datasets of transportation facilities, transportation networks, associated infrastructure, and other political and administrative entities. These datasets i...

  2. National Transportation Atlas Databases : 2015.

    Science.gov (United States)

    2015-01-01

    The National Transportation Atlas Databases 2015 (NTAD2015) is a set of nationwide geographic datasets of transportation facilities, transportation networks, associated infrastructure, and other political and administrative entities. These datasets i...

  3. National Transportation Atlas Databases : 2014.

    Science.gov (United States)

    2014-01-01

    The National Transportation Atlas Databases 2014 (NTAD2014) is a set of nationwide geographic datasets of transportation facilities, transportation networks, associated infrastructure, and other political and administrative entities. These datasets i...

  4. Pocket Guide to Transportation 2012

    Science.gov (United States)

    2012-01-01

    The Bureau of Transportation Statistics (BTS) of the Research and Innovative Technology Administration produces the Pocket Guide to Transportation as a compact resource that provides snapshots of the U.S. transportation system and highlights major tr...

  5. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  6. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  7. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M. [Battelle Memorial Inst., Columbus, OH (United States); Abkowitz, M. [Dept. of Civil Engineering, Vanderbilt Univ., Nashville, TN (United States)

    2004-07-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort.

  8. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    International Nuclear Information System (INIS)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M.; Abkowitz, M.

    2004-01-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort

  9. 78 FR 25337 - Federal Aviation Administration

    Science.gov (United States)

    2013-04-30

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Agency Information Collection Activities: Requests for Comments; Clearance of Renewed Approval of Information Collection: Operations Specifications AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice and request for comments...

  10. 76 FR 2745 - Federal Aviation Administration

    Science.gov (United States)

    2011-01-14

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Eighty-Fourth Meeting: RTCA Special Committee 159: Global Positioning System (GPS) AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 159 meeting: Global Positioning System (GPS). SUMMARY: The FAA is...

  11. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  12. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  13. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  14. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  15. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  16. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  17. High security ion-lithium batteries with rapid recharge for the terrestrial transport and energy storage; Batteries de type ion-lithium de haute securite a recharge rapide pour le transport terrestre et le stockage d'energie

    Energy Technology Data Exchange (ETDEWEB)

    Zaghib, Karim; Dontigny, M.; Charest, P.; Guerfi, A.; Trotier, J.; Mathieu, M.C.; Zhu, W.; Petitclerc, M.; Veillette, R.; Serventi, A.; Hovington, P.; Lagace, M.; Trudeau, M.; Vijh, A.

    2010-09-15

    Electrical terrestrial transport is today a hub of innovation and growth for Hydro-Quebec. In the perspective of electrification of terrestrial transports, battery remains the critical factor of future success of rechargeable electrical vehicles. For nearly 20 years, Hydro-Quebec, via its research institute, has worked at developing battery material for the lithium-ion technology. Two types of Li-ion batteries have been developed: the energy battery and the power battery. [French] Le transport terrestre electrique est aujourd'hui un pole d'innovation et de croissance pour Hydro-Quebec. Dans la perspective de l'electrification des transports terrestres, la batterie demeure le facteur critique du succes futur des vehicules electriques rechargeables. Depuis pres de 20 ans, Hydro-Quebec, par le biais de son Institut de recherche, travaille au developpement de materiaux de batteries destinees a la technologie lithium-ion. Deux types de batteries Li-ion ont ete mises au point : la batterie d'energie et la batterie de puissance.

  18. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  19. LANSCE radiation security system (RSS)

    International Nuclear Information System (INIS)

    Gallegos, F.R.

    1996-01-01

    The Radiation Security System (RSS) is an engineered safety system which automatically terminates transmission of accelerated ion beams in response to pre-defined abnormal conditions. It is one of the four major mechanisms used to protect people from radiation hazards induced by accelerated pulsed ion beams at the Los Alamos Neutron Science Center (LANSCE). The others are shielding, administrative policies and procedures, and qualified, trained personnel. Prompt radiation hazards at the half-mile long LANSCE accelerator exist due to average beam intensities ranging from 1 milli-amp for H + beam to 100 micro-amps for the high intensity H - beam. Experimental programs are supplied with variable energy (maximum 800 MeV), pulse-width (maximum 1 msec), and pulse frequency (maximum 120 Hz) ion beams. The RSS includes personnel access control systems, beam spill monitoring systems, and beam current level limiting systems. It is a stand-alone system with redundant logic chains. A fault of the RSS will cause the insertion of fusible beam plugs in the accelerator low energy beam transport. The design philosophy, description, and operation of the RSS are described in this paper

  20. Transport of MOX fuel

    International Nuclear Information System (INIS)

    Porter, I.R.; Carr, M.

    1997-01-01

    The regulatory framework which governs the transport of MOX fuel is set out, including packages, transport modes and security requirements. Technical requirements for the packages are reviewed and BNFL's experience in plutonium and MOX fuel transport is described. The safety of such operations and the public perception of safety are described and the question of gaining public acceptance for MOX fuel transport is addressed. The paper concludes by emphasising the need for proactive programmes to improve the public acceptance of these operations. (Author)

  1. Radioactive materials transport

    International Nuclear Information System (INIS)

    Talbi, B.

    1996-01-01

    The development of peaceful applications of nuclear energy results in the increase of transport operations of radioactive materials. Therefore strong regulations on transport of radioactive materials turns out to be a necessity in Tunisia. This report presents the different axes of regulations which include the means of transport involved, the radiation protection of the carriers, the technical criteria of security in transport, the emergency measures in case of accidents and penalties in case of infringement. (TEC). 12 refs., 1 fig

  2. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  3. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  4. FAA computer security : recommendations to address continuing weaknesses

    Science.gov (United States)

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  5. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  6. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    In an effort to assist with the first Presidential administration transition of the Department of Homeland Security, the Homeland Security Advisory Council has identified ten key challenges that will...

  7. Protecting the Privacy and Security of Your Health Information

    Science.gov (United States)

    ... can be used and shared with others. The Security Rule sets rules for how your health information must be kept secure with administrative, technical, and physical safeguards. You may have additional protections and health information rights under your State's laws. ...

  8. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  9. Title XVI / Supplemental Security Record Point In Time (SSRPT)

    Data.gov (United States)

    Social Security Administration — This is the point-in-time database to house temporary Supplemental Security Record (SSR) images produced during the course of the operating day before they can be...

  10. Offentlig administration

    DEFF Research Database (Denmark)

    Nielsen, Elof Nellemann; Rehr, Preben René

    En undervisningsbog der henvender sig til administrationsbacheloruddannelsen. Kapitlerne er inddelt efter modulerne på uddannelsen og indeholder derfor elementer af administration, forvaltning, økonomistyring, innovation, samfundsvidenskabelige metoder og politisk styrede organisationer.......En undervisningsbog der henvender sig til administrationsbacheloruddannelsen. Kapitlerne er inddelt efter modulerne på uddannelsen og indeholder derfor elementer af administration, forvaltning, økonomistyring, innovation, samfundsvidenskabelige metoder og politisk styrede organisationer....

  11. SAT administrator

    International Nuclear Information System (INIS)

    Havas, A.

    1998-01-01

    SAT Administrator is the Information System for Nuclear Power Plant Personnel Training Program Design. It supports the design of training programs in the following phases: job analysis; task analysis; competency analysis; task competency association; definition of learning objectives to competencies; training program design; definition of test items. The general structure of the database and management software supports application of the SAT Administrator in any nuclear power installation

  12. 76 FR 8400 - National Highway Traffic Safety Administration

    Science.gov (United States)

    2011-02-14

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety Administration (NHTSA) Department of Transportation (DOT). ACTION: Grant of petition for exemption. SUMMARY: This...

  13. TxDOT administration research : tasks completed in FY2009.

    Science.gov (United States)

    2010-01-01

    Texas Department of Transportation (TxDOT) Project 0-6581-TI, TxDOT Administration : Research, encompasses multiple tasks that explore and support administrative aspects of : transportation research. : The project term began in October 2008 and has b...

  14. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  15. 77 FR 71474 - Commercial Space Transportation Advisory Committee-Charter Renewal

    Science.gov (United States)

    2012-11-30

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Commercial Space Transportation... Transportation (DOT). ACTION: Announcement of Charter Renewal of the Commercial Space Transportation Advisory... Administrator of the Federal Aviation Administration (FAA) on the critical matters facing the U.S. commercial...

  16. Safety administration division business report. The first quarter of 2002

    International Nuclear Information System (INIS)

    Ishibashi, Takashi

    2002-09-01

    The business of the Safety administration Division became a wide range such as the management of a labor safety health, the crisis management, the security and the management of an entrance, and the business of the following concerning the Tokai Works, the protection of nuclear materials, the business of the sanction, the nuclear material safeguards, the transport of nuclear materials and the business of a quality assurance. For the purpose of summarizing these businesses and utilizing the data concerning the businesses, the report about the businesses achievement has been periodically drawn up as quarter news since 2001, when the Safety Administration Division was established. This report describes about the business achievement of the first quarter news from April to June in 2002. (author)

  17. Safety administration division business report. The second quarter of 2001

    International Nuclear Information System (INIS)

    Kanamori, Masashi

    2001-12-01

    The business of the Safety administration Division became a wide range such as the management of a labor safety health, the crisis management, the security and the management of an entrance, and the business of the following concerning the Tokai Works, the protection of nuclear materials, the business of the sanction, the nuclear material safeguards, the transport of nuclear materials and the business of a quality assurance. For the purpose of summarizing these business and utilizing the data concerning the businesses, the report about the businesses achievement has been periodically drawn up as quarter news since 2001, when the Safety Administration Division was established. This report describes about the business achievement of the second quarter news from July to September in 2001. (author)

  18. Political-administrative approaches towards energy-environment issues

    International Nuclear Information System (INIS)

    Degli Espinosa, P.

    1992-01-01

    A discussion is made of how Italian regional administrations could best approach the implementation of environmental strategies mirroring those proposed by the United Nations, especially those calling for a rapid reduction in carbon dioxide emissions to abate the risk of greenhouse gas induced climate change. Citing the current difficulties being had by the Italian national government in securing adequate funding to allow the fulfillment of already legislated and urgently needed energy conservation/environmental protection proposals, this paper calls for greater involvement and high level of social awareness on the part of regional governments. It is noted that, within the Italian context, the best approach towards the cost effective implementation of energy conservation/environmental protection strategies is to have a combined effort, involving municipally run power and gas utilities and transport departments acting together with concerned citizens, under the direct management of regional administrations

  19. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  20. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...