Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security classifications

The exact status of the development of the AVLIS process is subject to security classification. It is beHeved that the process is ready for transition to an industrial operator for commercial development. [Pg.19]

In the world of documents there are two categories those that are controlled and those that are not controlled. A controlled document is one where requirements have been specified for its development, approval, issue, revision, distribution, maintenance, use, storage, security, obsolescence, or disposal. You do not need to exercise control over each of these elements for a document to be designated a controlled document. Controlling documents may be limited to controlling their revision. On the other hand, you cannot control the revision of national standards but you can control their use, their storage, their obsolescence, etc. Even memoranda can become controlled documents if you impose a security classification upon them. [Pg.281]

As said previously, records are the property of the organization and not personal property so their destruction should be controlled. The controls should ensure that records are not destroyed without prior authorization and, depending on the medium on which data is recorded and the security classification of the data, you may also need to specify the method of disposal. The management would not be pleased to read details in the national press of the organization s performance, collected from a waste disposal site by a zealous newspaper reporter ... [Pg.499]

F3CIO was discovered in 1965 but not published until 1972 because of US security classification. It has low kinetic stability and is an extremely powerful fluorinating and oxidizing agent. It can be made in yields of up to 80% by fluorination of CI2O in the presence of metal fluorides, e.g. NaF ... [Pg.876]

EMPLOYING AGENCY National Defense Research Committee (NDRC) SECURITY CLASSIFICATION Confidential ... [Pg.29]

The TID issues a Technical Information Pilot (TIP) periodically, containing abstracts of all reports received it is issued in four security classifications including unclassified. There is an annual index. TIP catalog cards are also available to qualified agencies and contractors for convenience in cataloging the reports these cards contain abstracts identical with those appearing in TIP. [Pg.155]

At the time, N was probably the greatest Allied secret of the war after the atomic bomb. All documents connected with it carried the highest security classification Top Secret Guard (which the Americans jokingly translated as Destroy Before Reading ). In February 1944, when Lord Cherwell, Churchill s scientific advisor, wrote the Prime Minister an account of N, the official typist left blanks in the typescript which Cherwell went through and filled in by hand. [Pg.59]

Discussion of processes for industrial separation of uranium isotopes cannot be as complete as the discussion of deuterium separation in Chap. 13. The detailed technology of the most economical and most promising processes is subject to security classification and to proprietary restrictions. Nevertheless, processes for enriching uranium can be described in sufficient detail to make their principles clear and to illustrate the similarities and differences between them and processes for separating isotopes of light elements. [Pg.812]

Diffusion barrier characteristics. Because of security classification, quantitative information on barrier characteristics is scarce. The most comprehensive report in the open literature was made... [Pg.829]

Although the Wilson memorandum was a landmark document in its recognition of the legal and ethical validity of the Code, scholars have tended to assume that its security classification delayed and possibly even prevented its circulation and efficient implementation by experimental scientists. This is likely to have been one of the factors, yet the introduction... [Pg.205]

Praxis Critical Systems developed the Certification Authority (CA) for the MUL-TOS [MULTOS] smart card scheme on behalf of Mondex International. The approach taken is detailed in [Hall 2002a] and [Hall 2(X)2b]. Unlike some of the other example projects the MULTOS CA is security critical rather than safety critical and was developed to meet the requirements of ITSEC E6, a security classification broadly equivalent to SIL4 in the safety world [ITSEC 1991]. The system was COTS based and incorporated C++ (for the user interface GUI) C (for interfaces to specialized encryption hardware) an SQL database Ada 95 and SPARK (for the key security-critical functions). [Pg.8]

Consolidation is starting to take place in secure systems through the adoption of the MILS architecture to support multiple applications at different security classifications, where multiple processor platforms with air-gap security have been used previously. However, there are a number of challenges which need to be addressed in order to use multicore processors in secure systems. Many of these apply to safety-critical systems, as discussed earlier, but there the adoption of multicore also presents a challenge which is unique to security, that of covert channels of communication. [Pg.229]

Part 1 is a numerical listing of NAVORD OS numbers issued, including security classification, document number, latest revision, title, and Federal Supply Class (FSC) number when known. [Pg.381]

Finally, the plant and business systems should be graded according to the potential impact of cyber-attacks. Within the nuclear industry, the International Atomic Energy Agency s (IAEA) publication 1527 makes reconunendations for minimum countermeasures according to security classification. A simplified version of the IAEA s classification is as shown in Table 3.4. [Pg.52]

The standard bibliographic fields of accession number, author, title, date issued or publication date, and abstract text are present. Special fields include the home department number, which is assigned to the document by the issuing source, project codes, period covered (time during which the work was done), site at which the work was performed, and the security classification for the document. Date fields were designed to accommodate a four-digit year. [Pg.154]


See other pages where Security classifications is mentioned: [Pg.191]    [Pg.194]    [Pg.24]    [Pg.82]    [Pg.282]    [Pg.335]    [Pg.9]    [Pg.14]    [Pg.34]    [Pg.58]    [Pg.284]    [Pg.330]    [Pg.221]    [Pg.621]    [Pg.1755]    [Pg.235]    [Pg.158]    [Pg.23]    [Pg.547]    [Pg.57]   
See also in sourсe #XX -- [ Pg.58 , Pg.319 ]




SEARCH



© 2024 chempedia.info