text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation
Funding
design element
Find Funding
A-Z Index of Funding Opportunities
Recent Funding Opportunities
Upcoming Due Dates
Advanced Funding Search
Interdisciplinary Research
How to Prepare Your Proposal
About Funding
Proposals and Awards
Proposal and Award Policies and Procedures Guide
  Introduction
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Other Types of Proposals
Merit Review
NSF Outreach
Policy Office
Related
Grants.gov logo

Email this pagePrint this page
Directorate for Computer & Information Science & Engineering

Trustworthy Computing

This program has been archived.

CONTACTS

See program guidelines for contact information.

SYNOPSIS

The Trustworthy Computing Program (TC) envisions a future pervasive cyber infrastructure that supports a wide range of requirements for trustworthy operation, despite known and future threats and an increasingly complex operating environment.  Trustworthy operation requires security, reliability, privacy, and usability.  Striving for those properties will lead to the levels of availability, dependability, confidentiality and manageability that our systems, software and services must achieve in order to overcome the lack of trust people currently feel about computing and what computing enables.

TC supports all research approaches, from theoretical to experimental to human-centric: theories, models, cryptography, algorithms, methods, architectures, languages, tools, systems and evaluation frameworks.  Of particular interest are proposals that address foundations of trustworthy computing (e.g., "science of security" and privacy-preserving algorithms), privacy, and usability.  We welcome work that studies the tradeoffs among trustworthy computing properties, e.g., security and privacy, or usability and privacy, as well as work that examines the tension between security and human values such as openness and transparency.  We also welcome methods to assess, reason and predict system trustworthiness, including observable metrics, analytical methods, simulation, experimental deployment and, where possible, deployment on live testbeds for experimentation at scale.

TC encourages proposals with new ideas and potentially transformative insights on: adaptive, diverse and continually shifting strategies to increase complexity and costs for attackers; approaches to enable tailored security environments that can support functional and policy requirements across multiple dimensions of trustworthiness; and frameworks to incentivize security deployment and socially responsible behavior and deter cyber crimes. Multi-disciplinary work that undertakes these research challenges in a context that considers legal, social, and ethical implications are strongly encouraged.

Information on projects supported by the Trustworthy Computing program is available at: http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=13451&org=CNS&from=home.

Trustworthy Computing Point of Contact:  Carl Landwehr, Point of Contact, Trustworthy Computing Program, Room 1175N, telephone: (703) 292-8338, fax: (703) 292-9010, email: clandweh@nsf.gov

Funding Opportunities for Trustworthy Computing:

CISE Cross-Cutting Programs: FY 2011   NSF 10-575

News



Email this pagePrint this page
Back to Top of page