This grant program is open to all which means that any one (or business) can apply.
People depend on computers and communication, ranging from the networks for electronic mail, to systems that monitor the nation's critical infrastructure, to embedded RFID devices for tracking in transportation systems. These systems are expected to work and work as intended without placing people at needless risks. Unfortunately, vulnerabilities still exist that allow attackers to corrupt or commandeer systems, including those that provide support for critical societal infrastructure. Moreover, many systems are vulnerable to actions that can inhibit operation, corrupt valuable data or expose private information. In fact, the news is replete with stories of vulnerabilities that were exploited for ill. Future advances in computing promise substantial benefits for society and individuals; yet, unless trust in computing and communications can be assured, these benefits are at risk.This grant program promotes a vision of a society where trust enables technologies to support individual and societal needs without violating confidences and exacerbating public risks. It is a vision of cyber space that is supportive of our basic principles of fairness and safe information access. The goal of this grant program is to develop new insights and fundamental scientific principles that lead to software and hardware technologies on which people can justifiably rely. To achieve the vision and simultaneously improve the nation's cybersecurity posture, this grant program will support a portfolio of projects that:
- Contribute to the cybersecurity knowledge base, strengthen the foundations of cyber trust, and advance cybersecurity technologies
- Define cyber trust broadly to include security, privacy, dependability, reliability, and usability
- Address trustworthiness at all levels of system design, implementation, and use
- Begin to integrate the technology produced by the research community, for example through novel security architectures
- Consider social, economic, organizational and legal factors influencing cybersecurity
- Validate theory through analysis, formal verification, experimentation and rigorous measurement
- Explore innovative new concepts anticipating advances in technology and society
- encourage international collaborations
- educate and train a diverse workforce in cybersecurity and software technologies.
Proposals funded will cover a broad range of disciplines contributing to this grant program's vision.
Four types of projects will be supported, as defined below.
Exploratory Research projects typically explore new and untested ideas, have budgets of up to $200,000 total, and have durations of up to 2 years
Single Investigator and Small Group projects typically involve 1-2 PIs and their students, have budgets of up to $500,000 total, and have durations of up to 3 years
Medium projects demonstrate an active collaboration that brings together 2 or more PIs with complementary expertise to explore a common research problem, have budgets of up to $1,500,000 total, and have durations of up to 3 years
Large projects must focus on achieving a common goal or set of goals, articulate an effective collaboration and management plan, have budgets of up to $3,000,000 total, and have durations of up to 3 years.
A link to the full announcement of this grant program can be found on the government's website.
If you have difficulty accessing the full announcement electronically, please contact the government's grant support via email.
Original Closing Date for Applications: Dec 09, 2009
Full Proposal Deadline(s): March 24, 2008 December 09, 2009 Second Wednesday in December, Annually Thereafter
Current Closing Date for Applications: Mar 24, 2008
Full Proposal Deadline(s): March 24, 2008 December 09, 2009 Second Wednesday in December, Annually Thereafter
Funding Instrument Type: Grant
Expected Number of Awards: 87
Estimated Total Program Funding: $34,000,000
Cost Sharing or Matching Requirement: No
Eligible Applicants
Unrestricted (i.e., open to any type of entity above), subject to any clarification in text field entitled "Additional Information on Eligibility"
No comments:
Post a Comment