Office of Advanced Cyberinfrastructure (OAC)

group_project

Visible to the public SDCI: Integrated Simulation and Emulation Platform for Security Experimentation

Trustworthiness of cyberphysical systems (CPS) is an essential concern since such systems are routinely employed in critical settings. Currently many components of CPS are built without sufficiently formalized and analyzed properties and guarantees. Such inadequacies in the system design phase can lead to catastrophic consequences in operations, as they are interconnected to open networks and become increasingly exposed to security attacks.

group_project

Visible to the public Collaborative Project: CI-TEAM Implementation Project: A Digital Forensics Cyberinfrastructure Workforce Training Initiative for America's Veterans

This proposal offers to teams Mississippi State University?s (MSU) Southeast Region Regional Forensics Training Center and its Center for Critical Infrastructure Protection with collaborators at Auburn University and Tuskegee University to provide tactical level occupational training to America?s veterans by collaborating with the U.S. Department of Veterans Affairs (VA) and offering no-cost training at or near VA hospitals.

group_project

Visible to the public SDCI Sec: Distributed Web Security for Science Gateways

Science gateways broaden and simplify access to cyberinfrastructure (CI) by providing Web-based interfaces to collaboration, analysis, data management, and other tools for students and researchers. In a recent survey of 5,000 NSF PIs, NSF's Campus Bridging Task Force found that "the most common method of accessing CI across the entire dimension of providers is via Web browser/portal." As these science gateway interfaces to cyberinfrastructure grow in popularity, Web portal developers adopt ad hoc approaches to the security challenges of authentication, authorization, and delegation.

group_project

Visible to the public Collaborative Research: CICI: Secure and Resilient Architecture: Data Integrity Assurance and Privacy Protection Solutions for Secure Interoperability of Cloud Resources

Cloud computing provides many clear benefits for users, including scalability and reduced system acquisition cost. However, data security, integrity and privacy are becoming major concerns for scientific researchers when they access data from the cloud to conduct experiments or analytics. In addition, data owners may not want to reveal their data to cloud service providers either because of the sensitivity of the data (e.g., medical records) or because of its value.

group_project

Visible to the public Collaborative Research: CICI: Secure and Resilient Architecture: Data Integrity Assurance and Privacy Protection Solutions for Secure Interoperability of Cloud Resources

Cloud computing provides many clear benefits for users, including scalability and reduced system acquisition cost. However, data security, integrity and privacy are becoming major concerns for scientific researchers when they access data from the cloud to conduct experiments or analytics. In addition, data owners may not want to reveal their data to cloud service providers either because of the sensitivity of the data (e.g., medical records) or because of its value.

group_project

Visible to the public TTP: Medium: Crowd Sourcing Annotations

Both sound software verification techniques and heuristic software flaw-finding tools benefit from the presence of software annotations that describe the behavior of software components. Function summaries (in the form of logical annotations) allow modular checking of software and more precise reasoning. However, such annotations are difficult to write and not commonly produced by software developers, despite their benefits to static analysis. The Crowdsourcing Annotations project will address this deficiency by encouraging software-community-based crowd-sourced generation of annotations.

group_project

Visible to the public CICI: Center of Excellence: Center for Trustworthy Scientific Cyberinfrastructure

The National Science Foundation funds over seven billion dollars of research annually, nearly all of which relies heavily on information technology. The digital data produced and computing systems used by that research are subject to the same risks as other data and computing systems on the Internet. Appropriate cybersecurity is necessary both to make today's scientific discoveries possible and to ensure that the science is trustworthy. However, NSF science is often necessarily performed in open, collaborative environments that span organizational and national boundaries.

group_project

Visible to the public EAGER: ACI: A Software-Defined Network (SDN) WAN Security Testbed

Software defined networking (SDN) has emerged as a topic of exploration for addressing the growing challenges in complex traffic and topology management in environments such as large-scale data centers, private wide-area networks (WANs), and virtual hosting environments. Unfortunately, little is understood regarding the security challenges that SDN-enabled WANs introduce.