Skip to main content

Home/ OARS funding Computer/ Group items tagged privacy

Rss Feed Group items tagged

MiamiOH OARS

US NSF - Dear Colleague Letter: Research on Privacy in Today's Networked World (nsf14021) - 0 views

  •  
    The directorates for Social, Behavioral, and Economic Sciences (SBE) and Computer and Information Science and Engineering (CISE) invite investigators to submit proposals that address the need to develop new and deeper understandings of privacy in today's networked world. Our interest spans both disciplinary and interdisciplinary research in an array of SBE sciences. Proposals for workshops to explore novel and interdisciplinary SBE and SBE/CISE approaches to privacy are also welcome. Below are some examples of the types of topics that SBE scientists or teams of SBE and CISE scientists could conceivably propose under this Dear Colleague Letter. The list is not exhaustive and is meant to suggest the broad spectrum of possibilities for research in this area. Topics might include, but are by no means limited to the following: The social and psychological functions of privacy The relationship between technical and psychological conceptualizations of privacy and trust Factors encouraging attention or inattention to privacy, including the role of technology The psychological or social consequences of privacy violations, especially those involving technology Institutional engagement with privacy-invading technologies, including adaptation to, utilization and avoidance The contextual nature of privacy and understanding what constitutes privacy or privacy violations in different social, political, cultural or technical contexts Privacy issues and impacts across different levels of analysis (e.g., the individual, dyad, group, organization, sector, or societal level) and with different kinds of technologies
MiamiOH OARS

Secure and Trustworthy Cyberspace (SaTC) | NSF - National Science Foundation - 0 views

  •  
    The goals of the Secure and Trustworthy Cyberspace (SaTC) program are aligned with the Federal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The RDSP identified six areas critical to successful cybersecurity R&D: (1) scientific foundations; (2) risk management; (3) human aspects; (4) transitioning successful research into practice; (5) workforce development; and (6) enhancing the research infrastructure. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.
MiamiOH OARS

Secure and Trustworthy Cyberspace - 0 views

  •  
    The goals of the Secure and Trustworthy Cyberspace (SaTC) program are aligned with theFederal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The RDSP identified six areas critical to successful cybersecurity R&D: (1) scientific foundations; (2) risk management; (3) human aspects; (4) transitioning successful research into practice; (5) workforce development; and (6) enhancing the research infrastructure. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations.
MiamiOH OARS

Secure and Trustworthy Cyberspace - 0 views

  •  
    Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The goals of the SaTC program are aligned with theFederal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy.The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.
MiamiOH OARS

Secure and Trustworthy Cyberspace Frontiers - 0 views

  •  
    Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.
MiamiOH OARS

Secure and Trustworthy Cyberspace - 0 views

  •  
    In today's increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The goals of the SaTC program are aligned with theNational Science and Technology Council's (NSTC) Federal Cybersecurity Research and Development Strategic Plan (RDSP) and National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy.
MiamiOH OARS

Grants.gov - Find Grant Opportunities - Opportunity Synopsis - 0 views

  •  
    NIST invites applications from eligible applicants to pilot on-line identity solutions for accessing government services that embrace and advance the NSTIC vision: that individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity credentials to access online services in a manner that promotes confidence, privacy, choice, and innovation. Specifically, the Federal government seeks to initiate and support pilots that address the needs of individuals, private sector organizations, and all levels of government in accordance with the NSTIC Guiding Principles that identity solutions will be (1) privacy-enhancing and voluntary, (2) secure and resilient, (3) interoperable, and (4) cost-effective and easy-to-use. NIST will fund projects that are intended to test or demonstrate the effectiveness of solutions for enabling individuals to better access government services that either do not exist or are not widely adopted in the marketplace today. To demonstrate that the solution meets the program's goals, NSTIC will be looking for the following characteristics in applications: i. At least two government programs, including state-administered human services programs, w
MiamiOH OARS

Grants.gov - Find Grant Opportunities - Opportunity Synopsis - 0 views

  •  
    NIST is soliciting proposals from eligible applicants to pilot on-line identity solutions that embrace and advance the NSTIC vision: that individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity credentials to access online services in a manner that promotes confidence, privacy, choice, and innovation. Specifically, the Federal government seeks to initiate and support pilots that address the needs of individuals, private sector organizations, and all levels of government in accordance with the NSTIC Guiding Principles that identity solutions will be (1) privacy-enhancing and voluntary, (2) secure and resilient, (3) interoperable, and (4) cost-effective and eas
MiamiOH OARS

Secure and Trustworthy Cyberspace | NSF - National Science Foundation - 0 views

  •  
    The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.
MiamiOH OARS

National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilots Cooperative Agree... - 0 views

  •  
    NIST is soliciting applications from eligible applicants to pilot online identity solutions that embrace and advance the NSTIC vision: that individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity credentials to access online services in a manner that promotes confidence, privacy, choice, and innovation. Specifically, the Federal government seeks to initiate and support pilots that address the needs of individuals, private sector organizations, and all levels of government in accordance with the NSTIC Guiding Principles that identity solutions will be (1) privacy-enhancing and voluntary, (2) secure and resilient, (3) interoperable, and (4) cost-effective and easy-to-use. NIST will fund projects that are intended to test or demonstrate new solutions, models, and frameworks that either do not exist or are not widely adopted in the marketplace today.
MiamiOH OARS

Principles and Practice of Scalable Systems | NSF - National Science Foundation - 0 views

  •  
    A key focus of the design of modern computing systems is performance and scalability, particularly in light of the limits of Moore's Law and Dennard scaling. To this end, systems are increasingly being implemented by composing heterogeneous computing components and continually changing memory systems as novel, performant hardware surfaces. Applications fueled by rapid strides in machine learning, data analysis, and extreme-scale simulation are becoming more domain-specific and highly distributed. In this scenario, traditional boundaries between hardware-oriented and software-oriented disciplines increasingly are blurred. Achieving scalability of systems and applications will therefore require coordinated progress in multiple disciplines such as computer architecture, high-performance computing (HPC), programming languages and compilers, security and privacy, systems, theory, and algorithms. Cross-cutting concerns such as performance (including, but not limited to, time, space, and communication resource usage and energy efficiency), correctness and accuracy (including, but not limited to, emerging techniques for program analysis, testing, debugging, probabilistic reasoning and inference, and verification), security and privacy, robustness and reliability,  domain-specific design, and heterogeneity must be taken into account from the outset in all aspects of systems and application design and implementation. 
MiamiOH OARS

Principles and Practice of Scalable Systems (PPoSS) ... - 0 views

  •  
    A key focus of the design of modern computing systems is performance and scalability, particularly in light of the limits of Moore's Law and Dennard scaling. To this end, systems are increasingly being implemented by composing heterogeneous computing components and continually changing memory systems as novel, performant hardware surfaces. Applications fueled by rapid strides in machine learning, data analysis, and extreme-scale simulation are becoming more domain-specific and highly distributed. In this scenario, traditional boundaries between hardware-oriented and software-oriented disciplines increasingly are blurred. Achieving scalability of systems and applications will therefore require coordinated progress in multiple disciplines such as computer architecture, high-performance computing (HPC), programming languages and compilers, security and privacy, systems, theory, and algorithms. Cross-cutting concerns such as performance (including, but not limited to, time, space, and communication resource usage and energy efficiency), correctness and accuracy (including, but not limited to, emerging techniques for program analysis, testing, debugging, probabilistic reasoning and inference, and verification), security and privacy, robustness and reliability, domain-specific design, and heterogeneity must be taken into account from the outset in all aspects of systems and application design and implementation.
MiamiOH OARS

Principles and Practice of Scalable Systems (PPoSS) (nsf21513) | NSF - National Science... - 0 views

  •  
    A key focus of the design of modern computing systems is performance and scalability, particularly in light of the limits of Moore's Law and Dennard scaling. To this end, systems are increasingly being implemented by composing heterogeneous computing components and continually changing memory systems as novel, performant hardware surfaces. Applications fueled by rapid strides in machine learning, data analysis, and extreme-scale simulation are becoming more domain-specific and highly distributed. In this scenario, traditional boundaries between hardware-oriented and software-oriented disciplines increasingly are blurred. Achieving scalability of systems and applications will therefore require coordinated progress in multiple disciplines such as computer architecture, high-performance computing (HPC), programming languages and compilers, security and privacy, systems, theory, and algorithms. Cross-cutting concerns such as performance (including, but not limited to, time, space, and communication resource usage and energy efficiency), correctness and accuracy (including, but not limited to, emerging techniques for program analysis, testing, debugging, probabilistic reasoning and inference, and verification), security and privacy, robustness and reliability, domain-specific design, and heterogeneity must be taken into account from the outset in all aspects of systems and application design and implementation.
MiamiOH OARS

CyberCorps® Scholarship for Service (SFS) (nsf19521) | NSF - National Science... - 0 views

  •  
    Cyberspace has transformed the daily lives of people. Society's overwhelming reliance on cyberspace, however, has exposed its fragility and vulnerabilities: corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The Cybersecurity Enhancement Act of 2014, as amended by the National Defense Authorization Act for FY 2018, authorizes the National Science Foundation, in coordination with the Office of Personnel Management and the Department of Homeland Security, to offer a scholarship program to recruit and train the next generation of information technology professionals, industry control system security professionals and security managers to meet the needs of the cybersecurity mission for federal, state, local, and tribal governments.
MiamiOH OARS

Dear Colleague Letter: Enabling US-Brazil Collaboration on Cybersecurity Research (nsf1... - 0 views

  •  
    NSF and RNP/CTIC request joint research proposals submitted separately to both NSF and RNP/CTIC using the proposal submission process specific to each agency. Research topics of special interest to NSF and RNP/CTIC are: (1) security and privacy in networks; (2) the Internet of Things and cyber-physical human systems; and (3) malware detection. These topics that are of considerable mutual interest recognize the emerging threat and new opportunity in an increasingly networked world of people and smart technologies as well as the urgent need to address the societal challenge of cybersecurity. NSF strongly encourages new collaborations pursuant to this DCL.
MiamiOH OARS

Software Infrastructure for Sustained Innovation - S2I2 - 0 views

  •  
    SoftwareInfrastructure for Sustained Innovation (SI2) is a long-term investment focused on realizing a portion of the Cyberinfrastructure Framework for 21st Century Science and Engineering (CIF21, http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504730) vision and catalyzing new thinking, paradigms and practices in science and engineering. CIF21 envisions a linked cyberinfrastructure architecture that integrates large-scale computing, high-speed networks, massive data archives, instruments and major facilities, observatories, experiments, and embedded sensors and actuators, across the nation and the world, and that enables research at unprecedented scales, complexity, resolution, and accuracy by integrating computation, data, and experiments in novel ways. Software is a primary modality through which CIF21 innovation and discovery will be realized. It permeates all aspects and layers of cyberinfrastructure (from application codes and frameworks, programming systems, libraries and system software, to middleware, operating systems, networking and the low-level drivers). The CIF21 software infrastructure must address the complexity of this cyberinfrastructure, accommodating: disruptive hardware trends; ever-increasing data volumes; data integrity, privacy, and confidentiality; security; complex application structures and behaviors; and emerging concerns such as fault-tolerance and energy efficiency. The programs must focus on building robust, reliable and sustainable software that will support and advance sustained scientific innovation and discovery.
 The Division of Advanced Cyberinfrastructure in the Computer & Information Science & Engineering Directorate (CISE/ACI) is partnering with Directorates and Offices across the NSF to support SI2, a long-term comprehensive program focused on realizing a sustained software infrastructure that is an integral part of CIF21.
MiamiOH OARS

Internet Freedom Core Support for Anti-Censorship Technology - 0 views

  •  
    The U.S. Department of State, Bureau of Democracy, Human Rights, and Labor (DRL) announces an open competition for organizations interested in submitting applications for long-term, core support for proven anti-censorship technologies. In support of the U.S. government's policy to "promote an open, interoperable, reliable, and secure internet that fosters efficiency, innovation, communication, and economic prosperity, while respecting privacy and guarding against disruption, fraud, and theft," as described in E.O. 13800, DRL supports efforts to enable civil society actors to safely achieve access to the uncensored Internet through support for anti-censorship technologies. DRL invites organizations interested in potential funding to submit proposals outlining program concepts that reflect this goal.
MiamiOH OARS

Secure Data Sharing Tool to Support De-duplication of Cases in the National HIV Surveil... - 0 views

  •  
    The purpose of this FOA is to support a more efficient method for jurisdictions to de-duplicate the National HIV Surveillance System. The applicant will develop a privacy data-sharing tool capable of identifying potential duplicates across jurisdictions. Activities will include acquiring a Security Assessment and Authorization, negotiating with the 59 jurisdictions to obtain their participation, providing a data sharing tool that will allow for secure, encrypted submission and matching of person-level HIV surveillance data, and providing a report back to jurisdictions on matching levels.
MiamiOH OARS

Secure and Trustworthy Cyberspace Frontiers (SaTC Frontiers) (nsf19572) | NSF - Nationa... - 0 views

  •  
    In today's increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.
MiamiOH OARS

Best Practices for the Use of Text and Chat-Based Technology in Child Maltreatment Repo... - 0 views

  •  
    : The purpose of this Funding Opportunity Announcement (FOA) is to solicit proposals for a grant to develop and expand text and chat-based capabilities for child maltreatment prevention, resource sharing, detection, and reporting. In doing this work, the grantee is required to (1) Determine best practices and protocols pertaining to the use of text and chat-based technology within the child abuse and neglect reporting context; (2) Identify effective strategies for appropriate communication, identity verification, and privacy protection for youth who may be victims of maltreatment; and (3) Develop strategies for effectively sharing resources with youth who may be experiencing maltreatment. The protocols and strategies should be widely disseminated and applicable to national hotline environments. Applicants must possess the capacity to coordinate with hotlines administered by the Administration for Children and Families (ACF) such as the National Domestic Violence Hotline and the National Human Trafficking Hotline. This grant will be for one 24-month project period.
1 - 20 of 27 Next ›
Showing 20 items per page