Skip to main content

Home/ OARS funding Computer/ Group items tagged secure

Rss Feed Group items tagged

MiamiOH OARS

Cybersecurity Innovation for Cyberinfrastructure (CICI) (nsf21512) | NSF - National Sci... - 0 views

  •  
    The objective of the Cybersecurity Innovation for Cyberinfrastructure (CICI) program is to develop, deploy and integrate solutions that benefit the broader scientific community by securing science data, workflows, and infrastructure. CICI recognizes the unique nature of modern, rapid collaborative science and the breadth of security expertise, infrastructure and requirements among different practitioners, researchers, and scientific projects. CICI seeks projects in three program areas: Usable and Collaborative Security for Science (UCSS): Projects in this program area should support novel and applied security and usability research that facilitates scientific collaboration, encourages the adoption of security into the scientific workflow, and helps create a holistic, integrated security environment that spans the entire scientific CI ecosystem. Reference Scientific Security Datasets (RSSD):Projects in this program area should capture the unique properties of scientific workflows and workloads as reference data artifacts to support reproducible security research and protect the scientific process. Scientific Infrastructure Vulnerability Discovery (SIVD): Projects in this program area should develop and apply techniques to proactively discover vulnerabilities and weaknesses in scientific infrastructure.
MiamiOH OARS

Cybersecurity Innovation for Cyberinfrastructure | NSF - National Science Foundation - 0 views

  •  
    The objective of the Cybersecurity Innovation for Cyberinfrastructure (CICI) program is to develop, deploy and integrate security solutions that benefit the scientific community by ensuring the integrity, resilience and reliability of the end-to-end scientific workflow. CICI seeks three categories of projects: 1. Secure Scientific Cyberinfrastructure: These awards seek to secure the scientific workflow by encouraging novel and trustworthy architectural and design approaches, models and frameworks for the creation of a holistic, integrated security environment that spans the entire scientific CI ecosystem; 2. Collaborative Security Response Center: This single award targets the development of a community resource to provide security monitoring, analysis, expertise, and resources Research & Education (R&E) cyberinfrastructure staff, regardless of physical location or organization; and 3. Research Data Protection: These awards provide solutions that both ensure the provenance of research data and reduce the complexity of protecting research data sets regardless of funding source.
MiamiOH OARS

Cybersecurity Innovation for Cyberinfrastructure | NSF - National Science Foundation - 0 views

  •  
    The objective of the Cybersecurity Innovation for Cyberinfrastructure (CICI) program is to develop, deploy and integrate security solutions that benefit the scientific community by ensuring the integrity, resilience and reliability of the end-to-end scientific workflow. CICI seeks three categories of projects: 1. Secure Scientific Cyberinfrastructure: These awards seek to secure the scientific workflow by encouraging novel and trustworthy architectural and design approaches, models and frameworks for the creation of a holistic, integrated security environment that spans the entire scientific CI ecosystem; 2. Collaborative Security Response Center: This single award targets the development of a community resource to provide security monitoring, analysis, expertise, and resources Research & Education (R&E) cyberinfrastructure staff, regardless of physical location or organization; and 3. Research Data Protection: These awards provide solutions that both ensure the provenance of research data and reduce the complexity of protecting research data sets regardless of funding source.
MiamiOH OARS

CyberCorps® Scholarship for Service (SFS) (nsf19521) | NSF - National Science... - 0 views

  •  
    Cyberspace has transformed the daily lives of people. Society's overwhelming reliance on cyberspace, however, has exposed its fragility and vulnerabilities: corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The Cybersecurity Enhancement Act of 2014, as amended by the National Defense Authorization Act for FY 2018, authorizes the National Science Foundation, in coordination with the Office of Personnel Management and the Department of Homeland Security, to offer a scholarship program to recruit and train the next generation of information technology professionals, industry control system security professionals and security managers to meet the needs of the cybersecurity mission for federal, state, local, and tribal governments.
MiamiOH OARS

Cyber Safe East India - Workshops on Cyber Security for E-Businesses - 0 views

  •  
    PAS Kolkata seeks proposals for the project titled "Cyber Safe East India-Workshops on Cyber Security for E-Businesses." Based on funding availability, the Recipient organization will organize a series of workshops for business practitioners in Ranchi, Jamshedpur, and Guwahati. The workshops will be devised and implemented by the grantee with the help of U.S. cyber security and data protection experts. The goal of the workshops is to connect American and Indian cyber security experts to help small and medium businesses adopt safer business practices, ultimately ensuring the shared prosperity between the U.S. and India. The grantee will solicit participation from local and American cyber security experts, academics, chamber of commerce representatives, cyber law enforcing agency officials, and other relevant stakeholders to conduct a needs assessment of local business owners regarding web-based business tools. Collaborations should start early and virtually and will continue in-person during the workshops. The experts, in tandem with the grantee, will design the curriculum for a series of three workshops that help business owners mitigate e-business risks. The curriculum should be practical and relevant to a wide spectrum of businesses.The workshops should be conducted in Ranchi, Jamshedpur, and Guwahati. Other workshop locations are a possibility depending on the findings of the needs assessments conducted by the grantee as a pre- workshop survey. Workshop duration and the number of participants at each city will be determined by the grantee and experts in close consultation with PAS Kolkata.
MiamiOH OARS

Transparent, Integrated, Autonomous Multi-Level Access and Transfer (TIAMAT) - Federal ... - 0 views

  •  
    The Cross Domain Innovation & Science (CDIS) group of the Air Force Research Laboratory's Information Directorate is interested in new innovative technologies and capabilities within the Multi-Level Security (MLS) and cyber security environments, that promote the state of the art for secure, accreditable resilient and reactive capabilities to enhance the sharing of information between multiple security domains within both enterprise and mobile/tactical environments.
MiamiOH OARS

Cyber-Physical Systems - 0 views

  •  
    Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability that will far exceed the simple embedded systems of today. CPS technology will transform the way people interact with engineered systems -- just as the Internet has transformed the way people interact with information. New smart CPS will drive innovation and competition in sectors such as agriculture, energy, transportation, building design and automation, healthcare, and manufacturing. The December 2010 report of the President's Council of Advisors on Science and Technology (PCAST) titled Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technologycalls for continued investment in CPS research because of its scientific and technological importance as well as its potential impact on grand challenges in a number of sectors critical to U.S. security and competitiveness such as the ones noted above. These challenges and technology gaps are further described in aCPS Vision Statementpublished in 2012 by the federal Networking and Information Technology Research and Development (NITRD) CPS Senior Steering Group. Tremendous progress has been made in advancing CPS technology over the last five-plus years. We have explored foundational technologies that have spanned an ever-growing set of application domains, enabling breakthrough achievements in many of these fields. At the same time, the demand for innovation in these domains continues to grow, and is driving the need to accelerate fundamental research to
MiamiOH OARS

Office of Naval Research (ONR) Navy and Marine Corps Department of Defense University R... - 0 views

  •  
    1. Lithium-ion Battery Safety. Safety concerns continue to hamper full adoption of lithium-ion batteries for defense systems, despite significant research investments by the government and the private sector. This Defense initiative will advance promising lithium-ion battery safety technologies at university research laboratories into early laboratory prototypes and potentially minimum viable products for adoption by the defense and commercial sectors via early startups, small businesses and non-traditional defense contractors. Specific technical areas of interest include, but are not limited to, the following: improved electrolytes; stable high-energy anodes and cathodes; cell components and structures that enhance safety and reliability (e.g. use of electrode coatings and electrolyte additives); safety optimization through battery and battery module design and packaging; and battery management and state of health techniques that prevent and/or mitigate catastrophic failure. 2. Electrical Grid Reliability, Resiliency and Security. Both the defense and commercial sectors recognize the ever-growing criticality to enhance electrical grid reliability, resiliency and security through innovation at the component and system levels. This Defense initiative will advance relevant electrical grid innovations at university research laboratories into early laboratory prototypes and potentially minimum viable products for adoption by the defense and commercial sectors via early startups, small businesses and non-traditional defense contractors. Specific technical areas of interest include, but are not limited to, the following: advanced electrical power generation, transmission and distribution hardware and software; physical cyber secured industrial controls hardware and software; effective control of microgrids supporting high-dynamic loads; electrical grid protocols and controls to maintain secured operations of critical infrastructure under adverse conditions; hardening of e
MiamiOH OARS

Secure and Trustworthy Cyberspace - 0 views

  •  
    Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The goals of the SaTC program are aligned with theFederal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy.The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.
MiamiOH OARS

Secure and Trustworthy Cyberspace Frontiers - 0 views

  •  
    Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.
MiamiOH OARS

Secure and Trustworthy Cyberspace - 0 views

  •  
    In today's increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity. The goals of the SaTC program are aligned with theNational Science and Technology Council's (NSTC) Federal Cybersecurity Research and Development Strategic Plan (RDSP) and National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy.
MiamiOH OARS

Innovative Cross-Domain Cyber Reactive Information Sharing (ICCyRIS) - Federal Business... - 0 views

  •  
    This BAA focuses on developing new technologies to allow secure data sharing; trusted computing; smart routing; cyber defense; Multi-Level Security (MLS) trust at the tactical edge; and a comprehensive, multi-security domain, user-defined operational picture to effectively and efficiently improve the state-of-the-art for defense enterprise, cloud, and mobile/tactical computing/operations.
MiamiOH OARS

Critical Resilient Interdependent Infrastructure Systems and Processes - 0 views

  •  
    Critical infrastructures are the mainstay of our nation's economy, security and health. These infrastructures are interdependent. They are linked to individual preferences and community needs. For example, the electrical power system depends on the delivery of fuels to power generating stations through transportation services, the production of those fuels depends in turn on the use of electrical power, and those fuels are needed by the transportation services. Social networks, interactions, and policies can enable or hinder the successful creation of resilient complex adaptive systems. The goals of the Critical Resilient Interdependent Infrastructure Systems and Processes (CRISP) solicitation are to: (1) foster an interdisciplinary research community of engineers, computer and computational scientists and social and behavioral scientists, that creates new approaches and engineering solutions for the design and operation of infrastructures as processes and services; (2) enhance the understanding and design of interdependent critical infrastructure systems (ICIs) and processes that provide essential goods and services despite disruptions and failures from any cause, natural, technological, or malicious; (3) create the knowledge for innovation in ICIs so that they safely, securely, and effectively expand the range of goods and services they enable; and (4) improve the effectiveness and efficiency with which they deliver existing goods and services.
  •  
    Critical infrastructures are the mainstay of our nation's economy, security and health. These infrastructures are interdependent. They are linked to individual preferences and community needs. For example, the electrical power system depends on the delivery of fuels to power generating stations through transportation services, the production of those fuels depends in turn on the use of electrical power, and those fuels are needed by the transportation services. Social networks, interactions, and policies can enable or hinder the successful creation of resilient complex adaptive systems. The goals of the Critical Resilient Interdependent Infrastructure Systems and Processes (CRISP) solicitation are to: (1) foster an interdisciplinary research community of engineers, computer and computational scientists and social and behavioral scientists, that creates new approaches and engineering solutions for the design and operation of infrastructures as processes and services; (2) enhance the understanding and design of interdependent critical infrastructure systems (ICIs) and processes that provide essential goods and services despite disruptions and failures from any cause, natural, technological, or malicious; (3) create the knowledge for innovation in ICIs so that they safely, securely, and effectively expand the range of goods and services they enable; and (4) improve the effectiveness and efficiency with which they deliver existing goods and services.
MiamiOH OARS

Secure Data Sharing Tool to Support De-duplication of Cases in the National HIV Surveil... - 0 views

  •  
    The purpose of this FOA is to support a more efficient method for jurisdictions to de-duplicate the National HIV Surveillance System. The applicant will develop a privacy data-sharing tool capable of identifying potential duplicates across jurisdictions. Activities will include acquiring a Security Assessment and Authorization, negotiating with the 59 jurisdictions to obtain their participation, providing a data sharing tool that will allow for secure, encrypted submission and matching of person-level HIV surveillance data, and providing a report back to jurisdictions on matching levels.
MiamiOH OARS

Global Biosecurity Engagement Activities - 0 views

  •  
    The Office of Cooperative Threat Reduction (CTR), part of the Department's Bureau of International Security and Nonproliferation (ISN), sponsors foreign assistance activities funded by the Nonproliferation, Anti-terrorism, Demining and Related Programs (NADR) account, and focuses on mitigating proliferation risk in frontline states and regions where the terrorist threat is on the rise, such as South Asia, the Middle East, and North Africa. ISN/CTR administers the Biosecurity Engagement Program (BEP) program as part of the Global Threat Reduction (GTR) portfolio. BEP's mission involves institutionalizing biorisk management best practices, securing life science institutions and dangerous pathogens, decreasing the risk that scientists with dual-use expertise will misuse pathogens, and promoting adoption of and compliance with comprehensive international frameworks that advance U.S. biological nonproliferation objectives, including United Nations Security Council Resolution (UNSCR) 1540, the Biological Weapons Convention (BWC), the World Health Organization's International Health Regulations, and the European Committee for Standardization (CEN) / International Organization for Standardization (ISO) standards. BEP generally funds activities in three priority pillars and has a focus on long-term sustainability.
MiamiOH OARS

OTF | Core Infrastructure Fund - 0 views

  •  
    The Core Infrastructure Fund (CIF) strives to uphold and increase capacity for individuals, organizations, and companies working to fortify the foundational components of demonstrably important technology relied upon by people in repressive countries. Ideal applications are: open in nature, collaborative, promote a broader understanding of existing challenges and limitations, are preemptive in approach, and/or exist at the core of the Internet's ecosystem. Common applicants come from the community of developers and organizers working on open-source projects recognized as critical dependencies of one or more active platforms or tools strengthening Internet freedom and digital security. Ideal applications for this fund focus on supporting: Key developers or organizers so they can work full time on crucial core efforts in need of additional support; New developers or organizers focused on improving security standards, quality assurance, and best practices within core infrastructure projects; Developers, authors, or organizers drafting or promoting digital security and civil society needs within standards and protocols; Researchers exploring new methods of circumvention that would improve the resiliency of widely utilized tools; Specific outcomes, such as the necessary maintenance and upgrades to existing open source projects (database, hosting, or other tool migration; rewriting test suites; major new features); Efforts that make existing projects more accessible and easier to contribute to (ex. documentation, tool migration, refactoring code, testing); Efforts that develop new or evolve existing organizational and governance structures and sustainability models beyond work-for-hire; Efforts that increase the understanding and awareness of relevant actors in this space, their roles, and how they contribute to maintaining the Internet's core ecosystem;
MiamiOH OARS

Secure and Trustworthy Cyberspace (SaTC) | NSF - National Science Foundation - 0 views

  •  
    The goals of the Secure and Trustworthy Cyberspace (SaTC) program are aligned with the Federal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The RDSP identified six areas critical to successful cybersecurity R&D: (1) scientific foundations; (2) risk management; (3) human aspects; (4) transitioning successful research into practice; (5) workforce development; and (6) enhancing the research infrastructure. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.
MiamiOH OARS

Safe Documents (SafeDocs) - 0 views

  •  
    DARPA is soliciting innovative research proposals in the area of secure processing of untrusted electronic data. Proposed research should investigate innovative approaches that radically improve software's ability to recognize and safely reject invalid and maliciously crafted input data, while preserving essential functionality of legacy electronic data formats. Proposed research should build on an existing base of knowledge of electronic document, message, and streaming formats and the nature of security vulnerabilities associated with these formats.
MiamiOH OARS

Secure and Trustworthy Cyberspace Frontiers (SaTC Frontiers) (nsf19572) | NSF - Nationa... - 0 views

  •  
    In today's increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.
MiamiOH OARS

Secure and Trustworthy Cyberspace (SaTC) (nsf17576) | NSF - National Science Foundation - 0 views

  •  
    In today's increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. However, society's overwhelming reliance on this complex cyberspace has exposed its fragility and vulnerabilities: corporations, agencies, national infrastructure and individuals have been victims of cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that arise from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.
1 - 20 of 122 Next › Last »
Showing 20 items per page