scholarly journals FY 18 Status Report on the Computing Systems for the Yucca Mountain Project TSPA-LA Models and Inventory of Software used for Process Models.

2018 ◽  
Author(s):  
Teklu Hadgu ◽  
Brandon Keith Reynolds ◽  
Gordon John Appel ◽  
Jason P. Garland



2017 ◽  
Author(s):  
Gordon John Appel ◽  
Teklu Hadgu ◽  
Gordon John Appel ◽  
John Thomas Reynolds ◽  
Jason P. Garland


2006 ◽  
Vol 932 ◽  
Author(s):  
Joe H. Payer

ABSTRACTIn this paper, the proposed Yucca Mountain Repository is viewed from a corrosion perspective. A major component of the long-term strategy for safe disposal of nuclear waste at the Yucca Mountain Repository is first to completely isolate the radionuclides in the waste packages for long times and to greatly retard the egress and transport of radionuclides from penetrated packages. Therefore, long-lived waste packages are important. The corrosion resistance of the waste package outer canister is reviewed, and a framework for the analysis of localized corrosion processes is presented. An overview is presented of the Materials Performance targeted thrust of the U.S. Department of Energy/Office of Civilian Radioactive Waste Management's Office of Science and Technology and International. The thrust program strives for increased scientific understanding, enhanced process models and advanced technologies for corrosion control.



2015 ◽  
Author(s):  
Teklu Hadgu ◽  
Gordon John Appel ◽  
Alexey E. Malashev ◽  
Clay Payne


2009 ◽  
pp. 2744-2759
Author(s):  
Mohammad Zulkernine ◽  
Sheikh I. Ahamed

The rapid development and expansion of network based applications have changed the computing world in the last decade. However, this overwhelming success has an Achilles’ heel: almost every software controlled system faces threats from potential adversaries both from internal and external users of the highly connected computing systems. These software systems must be engineered with reliable protection mechanisms, while still delivering the expected value of the software to their customers within the budgeted time and cost. The principal obstacle in achieving the above two different but interdependent objectives is that current software engineering processes do notprovide enough support for the software developers to achieve security goals. In this chapter, we reemphasize the principal objectives of both software engineering and security engineering, and strive to identify the major steps of a software security engineering process that will be useful for building secure software systems. Both software engineering and security engineering are ever evolving disciplines, and software security engineering is still in its infancy. This chapter proposes a unification of the process models of software engineering and security engineering in order to improve the steps of the software life cycle that would better address the underlying objectives of both engineering processes. This unification will facilitate the incorporation of the advancement of the features of one engineering process into the other. The chapter also provides a brief overview and survey of the current state of the art of software engineering and security engineering with respect to computer systems.



Sign in / Sign up

Export Citation Format

Share Document