Authentication Procedures - The Procedures and Integration Working Group | |
Kouzes, Richard T. ; Bratcher, Leigh ; Gosnell, Tom ; Langner, Diana ; MacArthur, D. ; Mihalczo, John T. ; Pura, Carolyn ; Riedy, Alex ; Rexroth, Paul ; Scott, Mary ; Springarn, Jay | |
Pacific Northwest National Laboratory (U.S.) | |
关键词: Calibration; 98 Nuclear Disarmament, Safeguards, And Physical Protection; Storage; Testing; Monitoring; | |
DOI : 10.2172/969754 RP-ID : PNNL-13550 RP-ID : AC05-76RL01830 RP-ID : 969754 |
|
美国|英语 | |
来源: UNT Digital Library | |
【 摘 要 】
Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
969754.pdf | 114KB | download |