Office of Advanced Cyberinfrastructure (OAC)
group_project
Submitted by Yuan Xue on Tue, 08/27/2019 - 3:52pm
Trustworthiness of cyberphysical systems (CPS) is an essential concern since such systems are routinely employed in critical settings. Currently many components of CPS are built without sufficiently formalized and analyzed properties and guarantees. Such inadequacies in the system design phase can lead to catastrophic consequences in operations, as they are interconnected to open networks and become increasingly exposed to security attacks.
group_project
Submitted by John Hamilton on Tue, 08/27/2019 - 12:49pm
This proposal offers to teams Mississippi State University?s (MSU) Southeast Region Regional Forensics Training Center and its Center for Critical Infrastructure Protection with collaborators at Auburn University and Tuskegee University to provide tactical level occupational training to America?s veterans by collaborating with the U.S. Department of Veterans Affairs (VA) and offering no-cost training at or near VA hospitals.
group_project
Submitted by Jim Basney on Tue, 08/27/2019 - 11:48am
Science gateways broaden and simplify access to cyberinfrastructure (CI) by providing Web-based interfaces to collaboration, analysis, data management, and other tools for students and researchers. In a recent survey of 5,000 NSF PIs, NSF's Campus Bridging Task Force found that "the most common method of accessing CI across the entire dimension of providers is via Web browser/portal." As these science gateway interfaces to cyberinfrastructure grow in popularity, Web portal developers adopt ad hoc approaches to the security challenges of authentication, authorization, and delegation.
group_project
Submitted by Wei-Shinn Ku on Wed, 02/07/2018 - 4:50pm
Cloud computing provides many clear benefits for users, including scalability and reduced system acquisition cost. However, data security, integrity and privacy are becoming major concerns for scientific researchers when they access data from the cloud to conduct experiments or analytics. In addition, data owners may not want to reveal their data to cloud service providers either because of the sensitivity of the data (e.g., medical records) or because of its value.
group_project
Submitted by ragibhasan on Wed, 02/07/2018 - 4:42pm
Cloud computing provides many clear benefits for users, including scalability and reduced system acquisition cost. However, data security, integrity and privacy are becoming major concerns for scientific researchers when they access data from the cloud to conduct experiments or analytics. In addition, data owners may not want to reveal their data to cloud service providers either because of the sensitivity of the data (e.g., medical records) or because of its value.
group_project
Submitted by David Cok on Thu, 12/21/2017 - 12:35pm
Both sound software verification techniques and heuristic software flaw-finding tools benefit from the presence of software annotations that describe the behavior of software components. Function summaries (in the form of logical annotations) allow modular checking of software and more precise reasoning. However, such annotations are difficult to write and not commonly produced by software developers, despite their benefits to static analysis. The Crowdsourcing Annotations project will address this deficiency by encouraging software-community-based crowd-sourced generation of annotations.
group_project
Submitted by Von Welch on Mon, 12/18/2017 - 2:50pm
The National Science Foundation funds over seven billion dollars of research annually, nearly all of which relies heavily on information technology. The digital data produced and computing systems used by that research are subject to the same risks as other data and computing systems on the Internet. Appropriate cybersecurity is necessary both to make today's scientific discoveries possible and to ensure that the science is trustworthy. However, NSF science is often necessarily performed in open, collaborative environments that span organizational and national boundaries.
group_project
Submitted by Phil P on Wed, 10/11/2017 - 12:51pm
Software defined networking (SDN) has emerged as a topic of exploration for addressing the growing challenges in complex traffic and topology management in environments such as large-scale data centers, private wide-area networks (WANs), and virtual hosting environments. Unfortunately, little is understood regarding the security challenges that SDN-enabled WANs introduce.