The IT Law Wiki

Trustworthy Computing Program

32,081pages on
this wiki
Add New Page
Add New Page Talk0

Overview Edit

The National Science Foundation’s main cybersecurity R&D program is known as the Trustworthy Computing Program.

The Trustworthy Computing Program (TC) envisions a future pervasive cyber infrastructure that supports a wide range of requirements for trustworthy operation, despite known and future threats and an increasingly complex operating environment. Trustworthy operation requires security, reliability, privacy, and usability. Striving for those properties will lead to the levels of availability, dependability, confidentiality and manageability that systems, software and services must achieve in order to overcome the lack of trust people currently feel about computing and what computing enables.

The program supports all research approaches, from theoretical to experimental to human-centric: theories, models, cryptography, algorithms, methods, architectures, languages, tools, systems and evaluation frameworks. Of particular interest are proposals that address foundations of trustworthy computing (e.g., "science of security" and privacy-preserving algorithms), privacy, and usability.

The program encourages proposals with new ideas and potentially transformative insights on: adaptive, diverse and continually shifting strategies to increase complexity and costs for attackers; approaches to enable tailored security environments that can support functional and policy requirements across multiple dimensions of trustworthiness; and frameworks to incentivize security deployment and socially-responsible behavior and deter cybercrimes. Multi-disciplinary work that undertakes these research challenges in a context that considers legal, social, and ethical implications are strongly encouraged.

Also on Fandom

Random Wiki