Division of Computer and Network Systems
Trusted Computing
(TC)
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/greenline.jpg)
CONTACTS
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/bluefade.jpg)
See program guidelines for contact information.
PROGRAM GUIDELINES
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/bluefade.jpg)
Announcement
01-160
DUE DATES
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/bluefade.jpg)
Archived
SYNOPSIS
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/bluefade.jpg)
This program seeks to establish a sound scientific foundation
and technological basis for managing privacy and security in a
world linked through computing and communication technology. This
research is necessary to build the secure and reliable systems
required for a highly interconnected, information technology
enabled society. The program supports innovative research in all
aspects of secure, reliable information systems, including methods
for assessing the trustworthiness of systems. Some specific areas
in which research is needed include:
- Component technologies: specification, design, development,
test, verification methods to provide quantifiable assurance that
specified properties are met. Ideally, such technologies should be
flexible, so that they can be applied in accordance with the degree
of trustworthiness required and the resources available. Methods
are needed to identify particular components that provide a good
basis on which to construct trustworthy systems.
- Composition methods: Assembling components into subsystems and
systems with known and quantifiable trustworthiness. Identifying
and minimizing the security assumptions made in a given security
design. Exploiting the existence of large numbers of untrustworthy
computing platforms effectively to create secure or trustworthy
multiparty computations.
- Methods for maintaining trustworthiness as systems adapt and
evolve.
- Methods for improving human understanding of critical system
behavior and control.
- Methods for assessing tradeoffs in trustworthy system design,
for example between security and performance.
- Techniques for modeling, analyzing, and predicting trust
properties of systems and components.
THIS PROGRAM IS PART OF
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/bluefade.jpg)
Computer Systems Cluster
![](https://webarchive.library.unt.edu/eot2008/20081106002251im_/http://www.nsf.gov/images/x.gif)
Discoveries
|