University of Southern California

Research

NSF-16-533: Cybersecurity Innovation for Cyberinfrastructure

Slots:                                                   Two                     
LOI:                                                     Not required                       
Internal Deadline:                           February 26, 2016, 5pm
External Deadline:                         April 19, 2016, 5pm
Award Information:                       

Type: Grant / Cooperative Agreement
Estimated Number of Awards: 7 to 9
Anticipated Amount: $7,000,000

Total funding for the CICI program is $7,000,000, subject to the availability of funds. Secure and Resilient Architecture awards will be supported at up to $1,000,000 total per award for up to three years. Regional Cybersecurity Collaboration awards will be supported at up to $500,000 total per award for up to two years.

Cost Sharing:                                   Inclusion of voluntary committed cost sharing is prohibited.

Submission Process:                    PIs must submit their application as a Limited Submission through the Office of Research Application Portal: https://app.wizehive.com/webform/USCgrants

Materials to submit:

Link to Award: http://www.nsf.gov/pubs/2016/nsf16533/nsf16533.htm

Who May Serve as PI:                  

Purpose:

The objective of the Cybersecurity Innovation for Cyberinfrastructure (CICI) program is to develop and deploy security solutions that benefit the scientific community by ensuring the integrity and reliability of the end-to-end scientific workflow. This solicitation seeks unique ways to protect scientific instruments, resources, cyberinfrastructure and data that extend beyond building better perimeters and point solutions. As funding agencies move toward providing openly accessible data, the possibilities for scientists and engineers to use data sources beyond those created by their own community grow.

The scope of the workflow encompasses instruments, processing software, analysis tools, computing and storage resources as well as information repositories and data archives. In order to produce accurate results, each data source must be identifiable and trustworthy. Systems must guarantee that data sets cannot be altered, which could potentially modify the analytic outcomes.

Visit our Institutionally Limited Submission webpage for updates and other announcements.