Abstract collage of science-related imagery

Trustworthy Computing

Status: Archived

Archived funding opportunity

This document has been archived.

Important information about NSF’s implementation of the revised 2 CFR

NSF Financial Assistance awards (grants and cooperative agreements) made on or after October 1, 2024, will be subject to the applicable set of award conditions, dated October 1, 2024, available on the NSF website. These terms and conditions are consistent with the revised guidance specified in the OMB Guidance for Federal Financial Assistance published in the Federal Register on April 22, 2024.

Important information for proposers

All proposals must be submitted in accordance with the requirements specified in this funding opportunity and in the NSF Proposal & Award Policies & Procedures Guide (PAPPG) that is in effect for the relevant due date to which the proposal is being submitted. It is the responsibility of the proposer to ensure that the proposal meets these requirements. Submitting a proposal prior to a specified deadline does not negate this requirement.

Synopsis

The Trustworthy Computing Program (TC) envisions a future pervasive cyber infrastructure that supports a wide range of requirements for trustworthy operation, despite known and future threats and an increasingly complex operating environment.  Trustworthy operation requires security, reliability, privacy, and usability.  Striving for those properties will lead to the levels of availability, dependability, confidentiality and manageability that our systems, software and services must achieve in order to overcome the lack of trust people currently feel about computing and what computing enables.

TC supports all research approaches, from theoretical to experimental to human-centric: theories, models, cryptography, algorithms, methods, architectures, languages, tools, systems and evaluation frameworks.  Of particular interest are proposals that address foundations of trustworthy computing (e.g., "science of security" and privacy-preserving algorithms), privacy, and usability.  We welcome work that studies the tradeoffs among trustworthy computing properties, e.g., security and privacy, or usability and privacy, as well as work that examines the tension between security and human values such as openness and transparency.  We also welcome methods to assess, reason and predict system trustworthiness, including observable metrics, analytical methods, simulation, experimental deployment and, where possible, deployment on live testbeds for experimentation at scale.

TC encourages proposals with new ideas and potentially transformative insights on: adaptive, diverse and continually shifting strategies to increase complexity and costs for attackers; approaches to enable tailored security environments that can support functional and policy requirements across multiple dimensions of trustworthiness; and frameworks to incentivize security deployment and socially responsible behavior and deter cyber crimes. Multi-disciplinary work that undertakes these research challenges in a context that considers legal, social, and ethical implications are strongly encouraged.

Information on projects supported by the Trustworthy Computing program is available at: http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=13451&org=CNS&from=home.

Trustworthy Computing Point of Contact:  Carl Landwehr, Point of Contact, Trustworthy Computing Program, Room 1175N, telephone: (703) 292-8338, fax: (703) 292-9010, email: clandweh@nsf.gov

Funding Opportunities for Trustworthy Computing:

CISE Cross-Cutting Programs: FY 2011   NSF 10-575

Program contacts