text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation Home National Science Foundation - Computer & Information Science & Engineering (CISE)
Computer and Network Systems (CNS)
design element
CNS Home
About CNS
Funding Opportunities
Awards
News
Events
Discoveries
Publications
Career Opportunities
View CNS Staff
CISE Organizations
Advanced Cyberinfrastructure (ACI)
Computing and Communication Foundations (CCF)
Computer and Network Systems (CNS)
Information & Intelligent Systems (IIS)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
  Introduction
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Other Types of Proposals
Merit Review
NSF Outreach
Policy Office
Other Site Features
Special Reports
Research Overviews
Multimedia Gallery
Classroom Resources
NSF-Wide Investments

Email this pagePrint this page

Trustworthy Computing

This program has been archived.

CONTACTS

See program guidelines for contact information.

SYNOPSIS

The Trustworthy Computing Program (TC) envisions a future pervasive cyber infrastructure that supports a wide range of requirements for trustworthy operation, despite known and future threats and an increasingly complex operating environment.  Trustworthy operation requires security, reliability, privacy, and usability.  Striving for those properties will lead to the levels of availability, dependability, confidentiality and manageability that our systems, software and services must achieve in order to overcome the lack of trust people currently feel about computing and what computing enables.

TC supports all research approaches, from theoretical to experimental to human-centric: theories, models, cryptography, algorithms, methods, architectures, languages, tools, systems and evaluation frameworks.  Of particular interest are proposals that address foundations of trustworthy computing (e.g., "science of security" and privacy-preserving algorithms), privacy, and usability.  We welcome work that studies the tradeoffs among trustworthy computing properties, e.g., security and privacy, or usability and privacy, as well as work that examines the tension between security and human values such as openness and transparency.  We also welcome methods to assess, reason and predict system trustworthiness, including observable metrics, analytical methods, simulation, experimental deployment and, where possible, deployment on live testbeds for experimentation at scale.

TC encourages proposals with new ideas and potentially transformative insights on: adaptive, diverse and continually shifting strategies to increase complexity and costs for attackers; approaches to enable tailored security environments that can support functional and policy requirements across multiple dimensions of trustworthiness; and frameworks to incentivize security deployment and socially responsible behavior and deter cyber crimes. Multi-disciplinary work that undertakes these research challenges in a context that considers legal, social, and ethical implications are strongly encouraged.

Information on projects supported by the Trustworthy Computing program is available at: http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=13451&org=CNS&from=home.

Trustworthy Computing Point of Contact:  Carl Landwehr, Point of Contact, Trustworthy Computing Program, Room 1175N, telephone: (703) 292-8338, fax: (703) 292-9010, email: clandweh@nsf.gov

Funding Opportunities for Trustworthy Computing:

CISE Cross-Cutting Programs: FY 2011   NSF 10-575

News



Email this pagePrint this page
Back to Top of page