科技报告详细信息
Authentication Procedures - The Procedures and Integration Working Group
Kouzes, Richard T. ; Bratcher, Leigh ; Gosnell, Tom ; Langner, Diana ; MacArthur, D. ; Mihalczo, John T. ; Pura, Carolyn ; Riedy, Alex ; Rexroth, Paul ; Scott, Mary ; Springarn, Jay
Pacific Northwest National Laboratory (U.S.)
关键词: Calibration;    98 Nuclear Disarmament, Safeguards, And Physical Protection;    Storage;    Testing;    Monitoring;   
DOI  :  10.2172/969754
RP-ID  :  PNNL-13550
RP-ID  :  AC05-76RL01830
RP-ID  :  969754
美国|英语
来源: UNT Digital Library
PDF
【 摘 要 】

Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

【 预 览 】
附件列表
Files Size Format View
969754.pdf 114KB PDF download
  文献评价指标  
  下载次数:7次 浏览次数:30次