text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation
 
Funding
design element
Find Funding
A-Z Index of Funding Opportunities
Recent Funding Opportunities
Upcoming Due Dates
Advanced Funding Search
How to Prepare Your Proposal
About Funding
Proposals and Awards
Proposal and Award Policies and Procedures Guide
  Introduction
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Other Types of Proposals
Merit Review
NSF Outreach
Policy Office
Related
Grants.gov logo

Division of Computer and Network Systems

Trusted Computing  (TC)

CONTACTS

See program guidelines for contact information.

PROGRAM GUIDELINES

Announcement  01-160

DUE DATES

Archived

SYNOPSIS

This program seeks to establish a sound scientific foundation and technological basis for managing privacy and security in a world linked through computing and communication technology. This research is necessary to build the secure and reliable systems required for a highly interconnected, information technology enabled society. The program supports innovative research in all aspects of secure, reliable information systems, including methods for assessing the trustworthiness of systems. Some specific areas in which research is needed include:

  • Component technologies: specification, design, development, test, verification methods to provide quantifiable assurance that specified properties are met. Ideally, such technologies should be flexible, so that they can be applied in accordance with the degree of trustworthiness required and the resources available. Methods are needed to identify particular components that provide a good basis on which to construct trustworthy systems.
  • Composition methods: Assembling components into subsystems and systems with known and quantifiable trustworthiness. Identifying and minimizing the security assumptions made in a given security design. Exploiting the existence of large numbers of untrustworthy computing platforms effectively to create secure or trustworthy multiparty computations.
  • Methods for maintaining trustworthiness as systems adapt and evolve.
  • Methods for improving human understanding of critical system behavior and control.
  • Methods for assessing tradeoffs in trustworthy system design, for example between security and performance.
  • Techniques for modeling, analyzing, and predicting trust properties of systems and components.

THIS PROGRAM IS PART OF

Computer Systems Cluster


Discoveries



Print this page
Back to Top of page
  Web Policies and Important Links | Privacy | FOIA | Help | Contact NSF | Contact Webmaster | SiteMap  
National Science Foundation
The National Science Foundation, 4201 Wilson Boulevard, Arlington, Virginia 22230, USA
Tel:  (703) 292-5111, FIRS: (800) 877-8339 | TDD: (800) 281-8749
Last Updated:
August 26, 2002
Text Only


Last Updated: August 26, 2002