1.

Record Nr.

UNINA9910711380103321

Autore

Sallaska A. L

Titolo

Methods for characterizing a radiation detector for specifying radiation fields during testing against standards for homeland security applications / / A. L. Sallaska; L. Pibida; B. Minniti; C. M. O Brien

Pubbl/distr/stampa

Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016

Descrizione fisica

1 online resource (17 pages) : illustrations (color)

Collana

NIST technical note ; ; 1916

Altri autori (Persone)

MinnitiB

O'BrienC. M (Carl M.)

PibidaLeticia

SallaskaA. L

Soggetti

Detection

Homeland security

Radiation

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

April 2016.

Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.

Title from PDF title page (viewed April 30, 2016).

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

A wide variability exists among commercial radiation detection instruments used to measure exposure rate or ambient dose equivalent rate. These instruments are used to measure both the radiation background and the radiation field produced by radioactive sources that are used to test other types of radiation detection systems against different consensus document standards. Most radiation fields specified in the ANSI standard are quite low, ranging from 0.05 Sv/h to 0.5 Sv/h above background. Due to the radiation fields being so low in intensity, the uncertainty of the measurements made with these instruments can be potentially quite large. As a result of these large uncertainties, it is possible that the response of the various parameters being tested by the standards (e.g., alarm indication, radionuclide



identification) will be dependent on the specific radiation detector employed by the testing laboratory. In this work, we used two different methods to set the radiation fields to analyze the differences that can be expected. One method is based on measurements performed with a high pressure ion chamber while the second method is based on calculating the radiation fields from a known source activity using a point source estimate. The sources of uncertainties in both methods are identified and are reflected in the differences that can be expected in setting the radiation fields. In order to achieve consistency across different testing laboratories in setting radiation fields, we provide insight to what are the most relevant factors that affect the determination of the field using either one of the two methods.

2.

Record Nr.

UNINA9910768186303321

Titolo

Computer Security - ESORICS 2003 : 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings / / edited by Einar Snekkenes, Dieter Gollmann

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003

ISBN

3-540-39650-0

Edizione

[1st ed. 2003.]

Descrizione fisica

1 online resource (X, 350 p.)

Collana

Lecture Notes in Computer Science, , 0302-9743 ; ; 2808

Disciplina

005.8

Soggetti

Data encryption (Computer science)

Computer networks

Operating systems (Computers)

Database management

Computers and civilization

Management information systems

Computer science

Cryptology

Computer Communication Networks

Operating Systems

Database Management

Computers and Society

Management of Computing and Information Systems

Lingua di pubblicazione

Inglese



Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references at the end of each chapters and index.

Nota di contenuto

Signature and Access Control Policies for XML Documents -- Authorization and Access Control in Adaptive Workflows -- Flexible Regulation of Distributed Coalitions -- Initiator-Resilient Universally Composable Key Exchange -- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing -- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches -- Passive Attack Analysis for Connection-Based Anonymity Systems -- Rapid Mixing and Security of Chaum’s Visual Electronic Voting -- Towards Accountable Management of Privacy and Identity Information -- A Toolkit for Managing Enterprise Privacy Policies -- Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card -- Hardware Encapsulation of Security Services -- A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management -- Bridging Model-Based and Language-Based Security -- An On-the-Fly Model-Checker for Security Protocol Analysis -- Symmetric Authentication within a Simulatable Cryptographic Library -- An Improved Reference Flow Control Model for Policy-Based Intrusion Detection -- Visualisation for Intrusion Detection -- On the Detection of Anomalous System Call Arguments.

Sommario/riassunto

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13–15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.