This program has been archived.
See program guidelines for contact information.
The Trustworthy Computing Program (TC) envisions a future pervasive cyber infrastructure that supports a wide range of requirements for trustworthy operation, despite known and future threats and an increasingly complex operating environment. Trustworthy operation requires security, reliability, privacy, and usability. Striving for those properties will lead to the levels of availability, dependability, confidentiality and manageability that our systems, software and services must achieve in order to overcome the lack of trust people currently feel about computing and what computing enables.
TC supports all research approaches, from theoretical to experimental to human-centric: theories, models, cryptography, algorithms, methods, architectures, languages, tools, systems and evaluation frameworks. Of particular interest are proposals that address foundations of trustworthy computing (e.g., "science of security" and privacy-preserving algorithms), privacy, and usability. We welcome work that studies the tradeoffs among trustworthy computing properties, e.g., security and privacy, or usability and privacy, as well as work that examines the tension between security and human values such as openness and transparency. We also welcome methods to assess, reason and predict system trustworthiness, including observable metrics, analytical methods, simulation, experimental deployment and, where possible, deployment on live testbeds for experimentation at scale.
TC encourages proposals with new ideas and potentially transformative insights on: adaptive, diverse and continually shifting strategies to increase complexity and costs for attackers; approaches to enable tailored security environments that can support functional and policy requirements across multiple dimensions of trustworthiness; and frameworks to incentivize security deployment and socially responsible behavior and deter cyber crimes. Multi-disciplinary work that undertakes these research challenges in a context that considers legal, social, and ethical implications are strongly encouraged.
Information on projects supported by the Trustworthy Computing program is available at: http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=13451&org=CNS&from=home.
Trustworthy Computing Point of Contact: Carl Landwehr, Point of Contact, Trustworthy Computing Program, Room 1175N, telephone: (703) 292-8338, fax: (703) 292-9010, email: email@example.com
Funding Opportunities for Trustworthy Computing:
CISE Cross-Cutting Programs: FY 2011 NSF 10-575