Call For Papers
CPS Security & Privacy 2016 : Call for Book Chapter Proposals for Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley)
Submission Deadline Aug 31, 2015
Notification Due Sep 15, 2015
Final Version Due Nov 30, 2015
Dear Colleague,
We would like to cordially invite you to contribute a book chapter to a forthcoming book entitled "Security and Privacy in Cyber-Physical Systems: Foundations and Applications" which will be published by Wiley.
Call for Chapters
Chapter Proposal Submission by August 31, 2015.
Submission Procedure:
Please email your abstract (max. 500 words) by August 31, 2015 to cps.wiley@gmail.com and indicate the specific chapter where your work best fits or propose your own topic relevant to the theme of the book.
Please provide the following points in your proposals/abstracts:
1. Title of the contribution,
2. Title of the chapter (of the tentative TOC) if the contribution refers to one of them,
3. Name of author, co-authors, institution, email-address,
4. Content/mission of the proposed article.
Authors of accepted proposals will be notified by the given deadline about the status of their proposals and sent chapter guidelines.
The topics of interest include but are not limited to:
Part I: Foundations and Principles
Chapter 1. Cybersecurity and Privacy: Past, Present and Future
Chapter 2. The interplay of Cyber, Physical, and Human elements in CPS
Chapter 3. Adaptive attack mitigation for CPS
Chapter 4. Authentication and access control for CPS
Chapter 5. Availability, recovery and auditing for CPS
Chapter 6. Data security and privacy for CPS
Chapter 7. Intrusion detection for CPS
Chapter 8. Key management in CPS
Chapter 9. Legacy CPS system protection
Chapter 10. Lightweight crypto and security
Chapter 11. Threat modeling for CPS
Chapter 12. Vulnerability analysis for CPS
Part II: Application Domains
Chapter 13. Energy
Chapter 14. Medical
Chapter 15. Transportation
Chapter 16. Physical Infrastructure
Chapter 17. Manufacturing
Chapter 18. Building
Chapter 19. Agriculture
Chapter 20. Robotics
Chapter 21. Unmanned Aerial Vehicles
Chapter 22. Smart Cities
Editors:
- Houbing Song, West Virginia University, USA (Houbing.Song@mail.wvu.edu)
- Glenn A. Fink, Pacific Northwest National Laboratory, USA (Glenn.Fink@pnnl.gov)
- Sabina Jeschke, RWTH Aachen University, Germany (sabina.jeschke@ima-zlw-ifu.rwth-aachen.de)
- Gilad L. Rosner, Internet of Things Privacy Forum, UK (gilad@giladrosner.com)
http://www.nsf.gov/pubs/2015/nsf15575/nsf15575.htm
Program Title: Secure and Trustworthy Cyberspace (SaTC)
Synopsis of Program:
Cyberspace has transformed the daily lives of people for the better. The rush to adopt cyberspace, however, has exposed its fragility and vulnerabilities: corporations, agencies, national infrastructure and individuals have been victims of cyber-attacks. In December 2011, the National Science and Technology Council (NSTC) with the cooperation of NSF issued a broad, coordinated Federal strategic plan for cybersecurity research and development to "change the game," minimize the misuses of cyber technology, bolster education and training in cybersecurity, establish a science of cybersecurity, and transition promising cybersecurity research into practice. This challenge requires a dedicated approach to research, development, and education that leverages the disciplines of mathematics and statistics, the social sciences, and engineering together with the computing, communications and information sciences.
The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address cybersecurity from:
- a Trustworthy Computing Systems (TWC) perspective and/or a Social, Behavioral and Economic Sciences (SBE) perspective;
- the Secure, Trustworthy, Assured and Resilient Semiconductors and Systems (STARSS) perspective; or
- the Transition to Practice (TTP) perspective.
In addition, we welcome proposals that integrate research addressing all of these perspectives (see the Program Description below). Proposals may be submitted in one of the following three project classes (plus Cybersecurity Education; see below):
- Small projects: up to $500,000 in total budget, with durations of up to three years;
- Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years; or
- Large projects: $1,200,001 to $3,000,000 in total budget, with durations of up to five years.
12th International Conference on integrated Formal Methods, iFM 2016
http://ifm2016.ru.is | June 1-5, 2016 - Reykjavík, Iceland
CALL FOR AFFILIATED WORKSHOPS
Prospective workshop organizers are invited to submit proposals for workshops to be affiliated to iFM 2016, on topics related to the conferences main subjects.
About iFM
iFM 2016 is concerned with how the application of formal methods may involve modelling different aspects of a system which are best expressed using different formalisms. Correspondingly, different analysis techniques may be used to examine different system views, different kinds of properties, or simply in order to cope with the sheer complexity of the system. The iFM conference series seeks to further research into hybrid approaches to formal modelling and analysis; i.e., the combination of (formal and semi-formal) methods for system development, regarding modelling and analysis, and covering all aspects from language design through verification and analysis techniques to tools and their integration into software engineering practice.
One day workshops will be held in conjunction with the main events. Prospective workshop organizers are requested to follow the guidelines below and are encouraged to contact the workshop chairs if any questions arise.
The purpose of the workshops is to provide participants with a,friendly, interactive atmosphere for presenting novel ideas and.discussing their application.
The workshops take place on June 4-5, 2016.
Important Dates
- Submission of workshop proposals: by July 20, 2015
- Notification: by August 3, 2015
- Workshops: June 4-5, 2016
Submission via e-mail
Marcel Kyas <marcel@ru.is> - Workshop chair
Proposal and Submission Guidelines
Workshop proposals must be written in English, not exceed 5 pages with a reasonable font and margins, and be submitted in PDF format via email to Marcel Kyas (marcel@ru.is).
Proposals should include:
- The name and the preferred date of the proposed workshop
- A short description of the workshop.
- If applicable, a description of past versions of the workshop, including dates, organizers, submission and acceptance counts, and attendance.
- The publicity strategy that will be used by the workshop organizers to promote the workshop.
- The participant solicitation and selection process.
- The target audience and expected number of participants.
- Approximate budget proposal (see section Budget below for details).
- The equipment and any other resource necessary for the organization of the workshop.
- The name and short CV of the organizer(s).
- The publication plan (only invited speakers, no published proceedings, pre-/post-proceedings published with EPTCS/ENTCS/...).
Organizers Responsibilities
The scientific responsibility of organizing a workshop goes to the workshop organizers. In particular, they are responsible for the following items:
- A workshop description (200 words) for inclusion n the iFM site.
- Hosting and maintaining web pages to be linked from the iFM site. Workshop organizers can integrate their pages into the main iFM pages.
- Workshop proceedings, if any. If there is sufficient interest, the organizer of iFM 2016 may contact the editor-in-chief of the Electronic Proceedings in Theoretical Computer Science (http://info.eptcs.org/) for having a common volume dedicated to the workshops of iFM 2016.
- Workshop publicity (possibly including call for papers, submission and review process).
- Scheduling workshop activities in collaboration with the iFM workshop chair.
Budget
The iFM organization will provide registration and organizational support for the workshops (including link from the conferences web sites, set-up of meeting space, on-line and on-site registration). Registration fees must be paid for all participants, including organizers and invited guests.
To cover lunches, coffee breaks and basic organizational expenses, all workshops will be required to charge a minimum participation fee (the precise amount is still to be determined). Each workshop may increase this fee to cover additional expenses such as publication charges, student scholarships, costs for invited speakers, etc. All fees will be collected by the iFM organizers as part of the registration, then additional funds will be redistributed to the individual workshop organizers.
Evaluation Process
The proposals will be evaluated by the iFM organizing committee on the basis of their assessed benefit for prospective participants of iFM 2016. Prospective organizers may wish to consult the web pages of previous satellite events as examples:
- iFM 2014: http://ifm2014.cs.unibo.it/workshops.html
- iFM 2013: http://www.it.abo.fi/iFM2013/workshops_and_tutorials.php
- iFM 2012: http://ifm-abz.isti.cnr.it/styled-4/speakers.html
- iFM 2010: http://ifm2010.loria.fr/satellite.html
- iFM 2009: http://www.formal-methods.de/ifm09/workshops.html
Venue
iFM 2016 will take place at the Campus of Reykjavík University, Iceland. The campus at Reykjavík University is set in one of the most beautiful areas next to Iceland's only geothermal beach. The building has well equipped classrooms.
Further Information and Enquiries
Please contact the workshop chair Marcel Kyas <marcel@ru.is>
HIPEAC Conference 2016: Call for Workshop/Tutorial Proposals
Submission Deadline: June 15th, 2015
The success of the workshops and tutorials of the previous years’ HiPEAC Conferences in Vienna and Amsterdam with more than 30 events each encouraged the HiPEAC 2015 organizers to try following this success story again. Hence, in conjunction with the 11th HiPEAC Conference in Prague, Czech Republic, January 18-20, 2016 (see http://www.hipeac.net/conference), we will organize parallel workshops and tutorials. Proposals for workshops and tutorials covering at least one of the following topics are welcome:
- High performance computer architecture (processor architecture, multi-/many-core system design, reconfigurable architectures)
- Software development for high performance parallel systems (development patterns/automatic techniques for parallel and reconfigurable architectures)
- Tools for compilation, evaluation, optimization as well as synthesis of high performance parallel systems (compiler support, tracing, and debugging for parallel and reconfigurable architectures, high-level synthesis tools)
- Embedded (parallel) computer architectures (embedded homogeneous and heterogeneous multicore architectures, embedded reconfigurable architectures, embedded real-time systems, mixed criticality system support, dependable systems)
- Software support for embedded architectures (Tracing and real-time analysis of embedded applications, runtime software)
- (Real-Time) Operating and runtime systems for embedded parallel computer architectures
- Crazy architectural ideas (any idea to solve computational problems away from the conventional concepts)
- Low-Power Solutions (Software, Runtime, Compilation, Hardware, Error-Aware Computation, Sub-Threshold operation, Approximate Computing, Reversible Computing)
- Future Scalable Memory Architectures (Processing-In-Memory, Near-Memory Computing, Intelligent Memory, etc.)
- Green Data Centers / Microserver (System architecture, Software tools)
We also appreciate industrial and EC project based workshops that fit into one of the mentioned focuses.
A workshop proposal should contain the following items:
- Title of the workshop (including abbreviation)
- Organizers and their affiliations
- Main topics
- Preliminary deadlines
- Expected duration and format of the workshop (half or full day, keynote, talks, panel)
- Expected number of talks and attendance and, if the workshop took place before, location and time
- Please indicate if you plan to publish an open CFP or if you plan to have invited talks only.
For a tutorial proposal please include the following information:
- Title of the tutorial
- Organizers and presenters with affiliations and a short biography
- Abstract of the tutorial and a list of the covered topics
- Some related bibliography
- Expected duration and format (half or full day, talk with demo or talk only)
- Expected attendance and, if the tutorial was held before, location and time
If the proposed event is sponsored by a third party (e.g. industry), please indicate that in the proposal.
Please submit a one page PDF with your proposal by email to the workshop and tutorial chairs
Diana Goehringer (diana.goehringer@rub.de) and Pedro Trancoso (pedro@cs.ucy.ac.cy)
not later than June 15th, 2015.
ICCD 2015: Call for Special Sessions
The International Conference on Computer Design (ICCD) encompasses a wide range of topics in the research, design, and implementation of computer systems and their components. ICCD's multi-disciplinary emphasis provides an ideal environment for developers and researchers to discuss practical and theoretical work covering system and computer architecture, test, verification and security, design and technology, and tools and methodologies.
ICCD 2015 will be held in New York City, NY, USA (October 19-21, 2015).
Researchers both from academia and industry are invited to submit proposals for special sessions. A special session could consists of a set of individual presentations or a panel. The special sessions should aim at providing a complementary experience with respect to the regular sessions. Hence, sessions focusing on hot topics of interest to the community that may also go beyond disciplines traditionally represented at ICCD are particularly welcome.
The theme for ICCD 2015 is "Hardware and Embedded Security".
Organizers are encouraged to incorporate this theme into the rationale for their proposals.
Submission details:
A single PDF file including the following information:
- Title of the special session.
- Rationale of the need for the special session at ICCD. The rationale should stress the novelty of the topic and/or its multidisciplinary flavor, and must explain how it is different from the subjects covered by the regular sessions.
- Short biography of the organizers.
- List of three (3) contributed presentations (including titles, presenters, contact information of the corresponding presenter, and an abstract of each contribution). For panel proposals, list three to five panelists and their area of expertise.
Proposals are due on or before June 21, 2015 11:59pm and should be sent via e-mail to both ICCD-2015 Special Session Chairs:
- Luca Carloni, Columbia University, US, <luca@cs.columbia.edu>
- Christian Pilato, Columbia University, US, <pilato@cs.columbia.edu>
Each presenter of accepted special sessions will have the opportunity to submit a 4-page paper to be included in the proceedings.
Important dates:
- Special Session proposal due: June 21, 2015
- Acceptance notification: July 21, 2015
- Camera-ready version due: August 22, 2015
For more information, contact the Special Session Chairs and visit the ICCD website: http://www.iccd-conf.org
Cybersecurity Innovation for Cyberinfrastructure (CICI)
PROGRAM SOLICITATION
NSF 15-549
NSF Logo
National Science Foundation
Directorate for Computer & Information Science & Engineering
Division of Advanced Cyberinfrastructure
Full Proposal Deadline(s) (due by 5 p.m. proposer's local time):
June 02, 2015
IMPORTANT INFORMATION AND REVISION NOTES
Any proposal submitted in response to this solicitation should be submitted in accordance with the revised NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 15-1), which is effective for proposals submitted, or due, on or after December 26, 2014. The PAPPG is consistent with, and, implements the new Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (Uniform Guidance) (2 CFR § 200).
SUMMARY OF PROGRAM REQUIREMENTS
General Information
Program Title:
Cybersecurity Innovation for Cyberinfrastructure (CICI)
Synopsis of Program:
Advancements in data-driven scientific research depend on trustworthy and reliable cyberinfrastructure. Researchers rely on a variety of networked technologies and software tools to achieve their scientific goals. These may include local or remote instruments, wireless sensors, software programs, operating systems, database servers, high-performance computing, large-scale storage arrays, and other critical infrastructure connected by high-speed networking. This complex, distributed, interconnected global cyberinfrastructure ecosystem presents unique cybersecurity challenges. NSF-funded scientific instruments are specialized, highly visible assets that present attractive targets for both unintentional errors and malicious activity; untrustworthy software or a loss of integrity of the data collected by a scientific instrument may mean corrupt, skewed or incomplete results. Furthermore, often data-driven research, e.g., in the medical field or in the social sciences, requires access to private information, and exposure of such data may cause financial, reputational and/or other damage.
Therefore, an increasing area of focus for NSF is the development and deployment of hardware and software technologies and techniques to protect research cyberinfrastructure across every stage of the scientific workflow.
Cognizant Program Officer(s):
Please note that the following information is current at the time of publishing. See program website for any updates to the points of contact.
Anita Nikolich, telephone: (703) 292-4551, email: anikolic@nsf.gov
Applicable Catalog of Federal Domestic Assistance (CFDA) Number(s):
47.070 --- Computer and Information Science and Engineering
Award Information
Anticipated Type of Award: Standard Grant or Continuing Grant or Cooperative Agreement
Estimated Number of Awards: 13
Anticipated Funding Amount: $11,000,000
total funding for the CICI program, dependent upon the availability of funds. Secure Architecture Design awards will be supported at up to $500,000 total per award for up to three years. Data Provenance for Cybersecurity awards will be supported at up to $500,000 total per award for up to three years. A Cybersecurity Center of Excellence award will be supported at up to $5,000,000 total for up to three years.
Eligibility Information
Who May Submit Proposals:
Proposals may only be submitted by the following:
Universities and Colleges - Universities and two- and four-year colleges (including community colleges) accredited in, and having a campus located in, the US acting on behalf of their faculty members. Such organizations also are referred to as academic institutions.
Non-profit, non-academic organizations: Independent museums, observatories, research labs, professional societies and similar organizations in the U.S. associated with educational or research activities.
Who May Serve as PI:
There are no restrictions or limits.
Limit on Number of Proposals per Organization:
There are no restrictions or limits.
Limit on Number of Proposals per PI or Co-PI:
There are no restrictions or limits.
Proposal Preparation and Submission Instructions
A. Proposal Preparation Instructions
Letters of Intent: Not required
Preliminary Proposal Submission: Not required
Full Proposals:
Full Proposals submitted via FastLane: NSF Proposal and Award Policies and Procedures Guide, Part I: Grant Proposal Guide (GPG) Guidelines apply. The complete text of the GPG is available electronically on the NSF website at: http://www.nsf.gov/publications/pub_summ.jsp?ods_key=gpg.
Full Proposals submitted via Grants.gov: NSF Grants.gov Application Guide: A Guide for the Preparation and Submission of NSF Applications via Grants.gov Guidelines apply (Note: The NSF Grants.gov Application Guide is available on the Grants.gov website and on the NSF website at: http://www.nsf.gov/publications/pub_summ.jsp?ods_key=grantsgovguide)
B. Budgetary Information
Cost Sharing Requirements: Inclusion of voluntary committed cost sharing is prohibited.
Indirect Cost (F&A) Limitations: Not Applicable
Other Budgetary Limitations: Not Applicable
C. Due Dates
Full Proposal Deadline(s) (due by 5 p.m. proposer's local time):
June 02, 2015
Proposal Review Information Criteria
Merit Review Criteria: National Science Board approved criteria. Additional merit review considerations apply. Please see the full text of this solicitation for further information.
Award Administration Information
Award Conditions: Standard NSF award conditions apply.
Reporting Requirements: Standard NSF reporting requirements apply.
TABLE OF CONTENTS
Summary of Program Requirements
Introduction
Program Description
Award Information
Eligibility Information
Proposal Preparation and Submission Instructions
Proposal Preparation Instructions
Budgetary Information
Due Dates
FastLane/Grants.gov Requirements
NSF Proposal Processing and Review Procedures
Merit Review Principles and Criteria
Review and Selection Process
Award Administration Information
Notification of the Award
Award Conditions
Reporting Requirements
Agency Contacts
Other Information
I. INTRODUCTION
The integrity of the scientific workflow from the point of data observation and collection through distribution and analysis and finally, in an archived state, is essential to the success of the scientific process. Network-connected scientific instruments such as telescopes, microscopes and sensing devices collect a tremendous amount of raw information, yet remain vulnerable. They often receive less attention than enterprise systems within a campus or institution. However, unprotected research cyberinfrastructure (CI) and repositories of scientific data, which - especially when compiled - are valuable and vulnerable to theft, present an attractive target of opportunity for attack and compromise. As broader, open access is provided to data repositories and analytic technologies, malicious actors and misuse of databases - particularly those with one-of-a-kind data - can abound. Protection of databases and analytic software tools from deliberate misuse is essential. This solicitation addresses the protection, integrity and reliability of research processes and the resulting information.
II. PROGRAM DESCRIPTION
The objective of the Cybersecurity Innovation for Cyberinfrastructure (CICI) program is to develop and deploy security solutions that benefit the scientific community by ensuring the integrity and reliability of the end-to-end scientific workflow. This solicitation seeks unique ways to protect scientific instruments, resources, cyberinfrastructure and data that extend beyond building better perimeters and point solutions. As funding agencies move toward providing openly accessible data, the possibilities for scientists and engineers to use data sources beyond those created by their own community grow.
The scope of the workflow encompasses instruments, processing software, analysis tools, computing and storage resources as well as information repositories and archives of data. In order to produce accurate results, each data source must be identifiable and trustworthy. Systems must guarantee that data sets cannot be altered, which could potentially modify the analytic outcomes.
CICI comprises three Program Areas outlined below:
1. Secure Architecture Design
As campuses augment their existing research infrastructure with cloud-provided, commercial computing resources or institutionally-shared computing and network resources, it becomes difficult to monitor and control the end-to-end environment.
Collaborative scientific experiments are complex and may include participants from multiple institutions, national labs or organizations physically distributed across campuses, sites or countries. Legitimate users often arrive at scientific experiments and collaborations from a multitude of institutions and with complex access relationships. Complex technical relationships may exist between experiments, institutions and information technology service providers, but security is a shared requirement.
This program area seeks to reduce this complexity by encouraging novel architectural and design approaches, models and frameworks for the creation of a holistic, integrated security environment that spans the entire CI ecosystem. Projects should demonstrate strong security architecture and systems security engineering generalizable across a diverse scientific workflow. Technical solutions should be driven by a scientific community or project.
Proposals are encouraged to include a technical proof-of-concept implementation for the proposed approach.
Some areas of interest include, but are not limited to:
Technologically innovative uses of the Software Defined Networking (SDN) framework for enhanced network-based security functions across the cyberinfrastructure ecosystem. SDN offers potentially fine-grained control over network functions. Resulting technical implementations are expected to comprehensively address a systems security challenge or improve access control and authentication. Note: This area is not focused on developing SDN security standards; however, implementations that lend themselves to securing elements of the SDN environment are welcome.
Identity and Access Management (IdAM) systems that ensure trustworthiness. More intuitive, user-friendly methods of providing access are needed as users have grown accustomed to using their social networking identities outside that space. This includes process solutions that require unique technological implementations.
More robust, efficient and secure transfer of data. With the growing amount of remote instruments and the increasing amount of data being collected from multiple, often remote, wireless and mobile sensors, science is increasingly distributed and virtual.
New approaches that demonstrate substantive operational improvements in network infrastructure. Key infrastructure services include naming/DNS, secure routing, and other services such as network time synchronization. For all these areas, security standards are available, but few organizations have chosen to adopt and implement them in their networks. As a result, communication may be misdirected to the wrong data location, a man-in-the-middle attack may modify data in transit, or key data aspects such as timestamps may be invalid.
Secure interoperability of "cloud", campus and national cyberinfrastructure resources. The research ecosystem may include commercially-managed solutions. Data moves between the three, often onto machines not controlled by researchers or their institutions. This program area seeks solutions that maximally ensure data integrity in hybrid cloud and on-premises systems.
Proposals must include (a) Systems Architecture diagram(s) of the proposed system. Proposers should document both the logical and physical architectures of the proposed system and describe the system components and interrelationships.
Proposals in this area should be driven by the needs of the science and engineering communities and serve to advance scientific discoveries, collaborations and innovations. Proposers must document explicit partnerships or collaborations with one or more domain scientists, research groups or IT support organizations.
Proposals addressing the area of interest of Identity and Access Management (IdAM) should indicate how they will leverage existing IdAM systems.
Proposals must include as a Supplementary Document a Project Plan of up to 5 pages addressing the goals and milestones for development of the resulting system or framework.
Additional proposal preparation guidance for this category can be found in Section V.A. Proposal Preparation Instructions.
2. Data Provenance for Cybersecurity
The highly distributed nature of international scientific collaborations presents a challenge to ensuring data integrity. The entire chain of data provenance from the point of data collection through processing protocols and software to analytic strategies and results interpretations has become increasingly complex. Because data often come from disparate data sources, securing the provenance from manipulation presents a challenge. As the volume of data from heterogeneous sources continues to grow, the reliability of the data and its associated sources becomes a significant factor in ensuring confidence in the results and reproducibility of experiments. Whereas provenance-aware systems track workflow information, the data itself lack security and privacy controls. Challenges still exist in some basic underlying capabilities to formalizing authenticity of data modified by many parties.
Topics of Interest include:
A technical proof-of-concept implementation demonstrating assurance that unauthorized parties are prevented from modifying data.
Provenance schemas that encompass the entire scientific workflow, including collaborative provenance. In particular, an ability to document any action taken upon data by software or hardware in addition to physical and logical or virtual locations the data has traversed is of interest.
Methods to improve quality checking of citizen science-generated data. The domain of scientists has been extended further as more projects accept input from a wider array of sources. Many scientific projects now include both a general data and a citizen science component. Currently, data from citizen scientists often receive only a cursory quality check.
Proposals must include (a) Systems Architecture diagram(s) of the proposed system. Proposers should document both the logical and physical architectures of the proposed system and describe the system components and interrelationships.
Proposals in this area should be driven by the needs of the science and engineering communities and serve to advance scientific discoveries, collaborations and innovations. Proposers must document explicit partnerships or collaborations with one or more domain scientists, research groups or IT support organizations.
Proposals must include as a Supplementary Document a Project Plan of up to 5 pages addressing the goals and milestones for development of the resulting system or framework.
Additional proposal preparation guidance for this category can be found in Section V.A. Proposal Preparation Instructions.
3. Cybersecurity Center of Excellence
NSF-funded cyberinfrastructure presents unique challenges for operational security personnel. The research environment is purposefully built as an "open" one, in which data is freely accessed among collaborators. As such, sites, centers, campuses and institutions that host cyberinfrastructure must find the right balance of security, privacy and usability while maintaining an environment in which data are openly shared. Many research organizations lack expertise in technical and policy security and could benefit from an independent, shared security resource pool.
A Cybersecurity Center of Excellence must:
Provide leadership to the NSF research community in the continuous building and distribution of a body of knowledge on the topic of trustworthy cyberinfrastructure;
Conduct security audits and security architecture design reviews for projects at multiple scales, from large Major Research Equipment and Facilities Construction (MREFC) projects to small CI developments;
Ensure adoption of security best practices in the NSF research community;
Provide situational awareness of the current cyber threats to the research and education environment, including those that impact scientific instruments;
Develop a threat model (or multiple threat models if appropriate), identifying the vulnerabilities in NSF-funded cyberinfrastructure and scientific data associated with that cyberinfrastructure and recommending countermeasures to protect the systems; and
Host an annual workshop in addition to meetings, seminars, training and other events in order to interact with members of the NSF community, industry, government and academia who wish to collaborate on projects and other initiatives.
Awards in this category are anticipated to be in the form of cooperative agreements. Proposals must identify a lead institution.
Proposals must include as a Supplementary Document a Project Plan of up to 5 pages addressing the goals and milestones for the Center of Excellence over the life of the grant. The Project Plan should address known cybersecurity challenges within the NSF community and identify those challenges affecting small projects, multi-institution collaborations, international collaborations and large facilities. Proposals should identify how those challenges will be addressed by the Center of Excellence. The plan should include an initial set of engagements for year 1.
Proposals should include a description of how the Center of Excellence will address software assurance.
Proposals must address how the awardee will use collaboration tools or social media to disseminate cybersecurity information and best practices to the NSF community.
Additional proposal preparation guidance for this category can be found in Section V.A. Proposal Preparation Instructions.
PI Meetings
The program plans to host a PI meeting every year with participation from all funded projects and other representatives from the research community, government and industry. For all awards, one or more project representatives (PI/co-PI/senior personnel, or an NSF-approved replacement) must attend one PI meeting held during the life of the grant.
III. AWARD INFORMATION
Anticipated Type of Award: Continuing Grant or Cooperative Agreement or Standard Grant
Estimated Number of Awards: 13
Anticipated Funding Amount: $11,000,000
total funding for the CICI program, dependent upon the availability of funds. Secure Architecture Design awards will be supported at up to $500,000 total per award for up to three years. Data Provenance for Cybersecurity awards will be supported at up to $500,000 total per award for up to three years. A Cybersecurity Center of Excellence award will be supported at up to $5,000,000 total for up to three years.
Estimated program budget, number of awards and average award size/duration are subject to the availability of funds.
IV. ELIGIBILITY INFORMATION
Who May Submit Proposals:
Proposals may only be submitted by the following:
Universities and Colleges - Universities and two- and four-year colleges (including community colleges) accredited in, and having a campus located in, the US acting on behalf of their faculty members. Such organizations also are referred to as academic institutions.
Non-profit, non-academic organizations: Independent museums, observatories, research labs, professional societies and similar organizations in the U.S. associated with educational or research activities.
Who May Serve as PI:
There are no restrictions or limits.
Limit on Number of Proposals per Organization:
There are no restrictions or limits.
Limit on Number of Proposals per PI or Co-PI:
There are no restrictions or limits.
Additional Eligibility Info:
Organizations eligible to serve as lead proposers are restricted to U.S. academic institutions or U.S. non-profit research organizations directly associated with educational and/or research activities. Organizations eligible to serve as non-lead proposers or subawardees are all those organizations eligible under the provisions of the NSF Grant Proposal Guide (GPG).
V. PROPOSAL PREPARATION AND SUBMISSION INSTRUCTIONS
A. Proposal Preparation Instructions
Full Proposal Preparation Instructions: Proposers may opt to submit proposals in response to this Program Solicitation via Grants.gov or via the NSF FastLane system.
Full proposals submitted via FastLane: Proposals submitted in response to this program solicitation should be prepared and submitted in accordance with the general guidelines contained in the NSF Grant Proposal Guide (GPG). The complete text of the GPG is available electronically on the NSF website at: http://www.nsf.gov/publications/pub_summ.jsp?ods_key=gpg. Paper copies of the GPG may be obtained from the NSF Publications Clearinghouse, telephone (703) 292-7827 or by e-mail from nsfpubs@nsf.gov. Proposers are reminded to identify this program solicitation number in the program solicitation block on the NSF Cover Sheet For Proposal to the National Science Foundation. Compliance with this requirement is critical to determining the relevant proposal processing guidelines. Failure to submit this information may delay processing.
Full proposals submitted via Grants.gov: Proposals submitted in response to this program solicitation via Grants.gov should be prepared and submitted in accordance with the NSF Grants.gov Application Guide: A Guide for the Preparation and Submission of NSF Applications via Grants.gov. The complete text of the NSF Grants.gov Application Guide is available on the Grants.gov website and on the NSF website at: (http://www.nsf.gov/publications/pub_summ.jsp?ods_key=grantsgovguide). To obtain copies of the Application Guide and Application Forms Package, click on the Apply tab on the Grants.gov site, then click on the Apply Step 1: Download a Grant Application Package and Application Instructions link and enter the funding opportunity number, (the program solicitation number without the NSF prefix) and press the Download Package button. Paper copies of the Grants.gov Application Guide also may be obtained from the NSF Publications Clearinghouse, telephone (703) 292-7827 or by e-mail from nsfpubs@nsf.gov.
In determining which method to utilize in the electronic preparation and submission of the proposal, please note the following:
Collaborative Proposals. All collaborative proposals submitted as separate submissions from multiple organizations must be submitted via the NSF FastLane system. Chapter II, Section D.5 of the Grant Proposal Guide provides additional information on collaborative proposals.
See Chapter II.C.2 of the GPG for guidance on the required sections of a full research proposal submitted to NSF. Please note that the proposal preparation instructions provided in this program solicitation may deviate from the GPG instructions.
The following information supplements the guidelines and requirements in the NSF Grant Proposal Guide (GPG) and NSF Grants.gov Application Guide:
For Secure Data Architecture Proposals:
Proposals in this area require titles that begin with "CICI: Secure Data Architecture:" followed by the title of the project.
All proposals in this area must document explicit partnerships or collaborations with one or more domain scientists, research groups or IT support organizations. Partnership documentation from personnel not included in the proposal as PI, Co-PI, or senior personnel should be in the form of a letter of commitment located in the Supplementary Documents section of the proposal.
Any software development under proposed activities should identify the open source license to be used.
Refer to Section II, Program Description, for additional information about requirements for CICI proposals. In particular, a Systems Architecture Diagram and a Project Plan of up to 5 pages in length must be included as Supplementary Documents.
For Data Provenance for Cybersecurity Proposals:
Proposals in this area require titles that begin with "CICI: Data Provenance:" followed by the title of the project.
Any software development under proposed activities should identify the open source license to be used.
Refer to Section II, Program Description, for additional information about requirements for CICI proposals. In particular, a Systems Architecture Diagram and a Project Plan of up to 5 pages in length must be included as Supplementary Documents.
For Cybersecurity Center of Excellence Proposals:
Proposals in this area require titles that begin with "CICI: Center of Excellence:" followed by the title of the project.
Proposals in this area must include a Project Plan up to 5 pages in length addressing project goals and milestones as a Supplementary Document.
Refer to Section II, Program Description, for additional information about requirements for CICI proposals. In particular, a Systems Architecture Diagram and a Project Plan of up to 5 pages in length must be included as Supplementary Documents.
Supplementary Document (upload the following):
A list of Project Personnel and Partner Institutions is required for submissions to all three Program Areas (Note: In collaborative proposals, the lead institution should provide this information for all participants).
Provide current, accurate information for all personnel and institutions involved in the project. NSF staff will use this information in the merit review process to manage conflicts of interest. The list must include all PIs, Co-PIs, Senior Personnel, paid/unpaid Consultants or Collaborators, Subawardees, Postdocs, project-level advisory committee members, and writers of any collaboration letters.
B. Budgetary Information
Cost Sharing: Inclusion of voluntary committed cost sharing is prohibited
Budget Preparation Instructions:
Budgets should include travel funds for the project principal investigators and other team members, as appropriate, from all collaborating institutions to attend one annual Principal Investigators' meeting.
C. Due Dates
Full Proposal Deadline(s) (due by 5 p.m. proposer's local time):
June 02, 2015
D. FastLane/Grants.gov Requirements
For Proposals Submitted Via FastLane:
To prepare and submit a proposal via FastLane, see detailed technical instructions available at: https://www.fastlane.nsf.gov/a1/newstan.htm. For FastLane user support, call the FastLane Help Desk at 1-800-673-6188 or e-mail fastlane@nsf.gov. The FastLane Help Desk answers general technical questions related to the use of the FastLane system. Specific questions related to this program solicitation should be referred to the NSF program staff contact(s) listed in Section VIII of this funding opportunity.
For Proposals Submitted Via Grants.gov:
Before using Grants.gov for the first time, each organization must register to create an institutional profile. Once registered, the applicant's organization can then apply for any federal grant on the Grants.gov website. Comprehensive information about using Grants.gov is available on the Grants.gov Applicant Resources webpage: http://www.grants.gov/web/grants/applicants.html. In addition, the NSF Grants.gov Application Guide (see link in Section V.A) provides instructions regarding the technical preparation of proposals via Grants.gov. For Grants.gov user support, contact the Grants.gov Contact Center at 1-800-518-4726 or by email: support@grants.gov. The Grants.gov Contact Center answers general technical questions related to the use of Grants.gov. Specific questions related to this program solicitation should be referred to the NSF program staff contact(s) listed in Section VIII of this solicitation.
Submitting the Proposal: Once all documents have been completed, the Authorized Organizational Representative (AOR) must submit the application to Grants.gov and verify the desired funding opportunity and agency to which the application is submitted. The AOR must then sign and submit the application to Grants.gov. The completed application will be transferred to the NSF FastLane system for further processing.
Proposers that submitted via FastLane are strongly encouraged to use FastLane to verify the status of their submission to NSF. For proposers that submitted via Grants.gov, until an application has been received and validated by NSF, the Authorized Organizational Representative may check the status of an application on Grants.gov. After proposers have received an e-mail notification from NSF, Research.gov should be used to check the status of an application.
VI. NSF PROPOSAL PROCESSING AND REVIEW PROCEDURES
Proposals received by NSF are assigned to the appropriate NSF program for acknowledgement and, if they meet NSF requirements, for review. All proposals are carefully reviewed by a scientist, engineer, or educator serving as an NSF Program Officer, and usually by three to ten other persons outside NSF either as ad hoc reviewers, panelists, or both, who are experts in the particular fields represented by the proposal. These reviewers are selected by Program Officers charged with oversight of the review process. Proposers are invited to suggest names of persons they believe are especially well qualified to review the proposal and/or persons they would prefer not review the proposal. These suggestions may serve as one source in the reviewer selection process at the Program Officer's discretion. Submission of such names, however, is optional. Care is taken to ensure that reviewers have no conflicts of interest with the proposal. In addition, Program Officers may obtain comments from site visits before recommending final action on proposals. Senior NSF staff further review recommendations for awards. A flowchart that depicts the entire NSF proposal and award process (and associated timeline) is included in the GPG as Exhibit III-1.
A comprehensive description of the Foundation's merit review process is available on the NSF website at: http://nsf.gov/bfa/dias/policy/merit_review/.
Proposers should also be aware of core strategies that are essential to the fulfillment of NSF's mission, as articulated in Investing in Science, Engineering, and Education for the Nation's Future: NSF Strategic Plan for 2014-2018. These strategies are integrated in the program planning and implementation process, of which proposal review is one part. NSF's mission is particularly well-implemented through the integration of research and education and broadening participation in NSF programs, projects, and activities.
One of the strategic objectives in support of NSF's mission is to foster integration of research and education through the programs, projects, and activities it supports at academic and research institutions. These institutions must recruit, train, and prepare a diverse STEM workforce to advance the frontiers of science and participate in the U.S. technology-based economy. NSF's contribution to the national innovation ecosystem is to provide cutting-edge research under the guidance of the Nation's most creative scientists and engineers. NSF also supports development of a strong science, technology, engineering, and mathematics (STEM) workforce by investing in building the knowledge that informs improvements in STEM teaching and learning.
NSF's mission calls for the broadening of opportunities and expanding participation of groups, institutions, and geographic regions that are underrepresented in STEM disciplines, which is essential to the health and vitality of science and engineering. NSF is committed to this principle of diversity and deems it central to the programs, projects, and activities it considers and supports.
A. Merit Review Principles and Criteria
The National Science Foundation strives to invest in a robust and diverse portfolio of projects that creates new knowledge and enables breakthroughs in understanding across all areas of science and engineering research and education. To identify which projects to support, NSF relies on a merit review process that incorporates consideration of both the technical aspects of a proposed project and its potential to contribute more broadly to advancing NSF's mission "to promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes." NSF makes every effort to conduct a fair, competitive, transparent merit review process for the selection of projects.
1. Merit Review Principles
These principles are to be given due diligence by PIs and organizations when preparing proposals and managing projects, by reviewers when reading and evaluating proposals, and by NSF program staff when determining whether or not to recommend proposals for funding and while overseeing awards. Given that NSF is the primary federal agency charged with nurturing and supporting excellence in basic research and education, the following three principles apply:
All NSF projects should be of the highest quality and have the potential to advance, if not transform, the frontiers of knowledge.
NSF projects, in the aggregate, should contribute more broadly to achieving societal goals. These "Broader Impacts" may be accomplished through the research itself, through activities that are directly related to specific research projects, or through activities that are supported by, but are complementary to, the project. The project activities may be based on previously established and/or innovative methods and approaches, but in either case must be well justified.
Meaningful assessment and evaluation of NSF funded projects should be based on appropriate metrics, keeping in mind the likely correlation between the effect of broader impacts and the resources provided to implement projects. If the size of the activity is limited, evaluation of that activity in isolation is not likely to be meaningful. Thus, assessing the effectiveness of these activities may best be done at a higher, more aggregated, level than the individual project.
With respect to the third principle, even if assessment of Broader Impacts outcomes for particular projects is done at an aggregated level, PIs are expected to be accountable for carrying out the activities described in the funded project. Thus, individual projects should include clearly stated goals, specific descriptions of the activities that the PI intends to do, and a plan in place to document the outputs of those activities.
These three merit review principles provide the basis for the merit review criteria, as well as a context within which the users of the criteria can better understand their intent.
2. Merit Review Criteria
All NSF proposals are evaluated through use of the two National Science Board approved merit review criteria. In some instances, however, NSF will employ additional criteria as required to highlight the specific objectives of certain programs and activities.
The two merit review criteria are listed below. Both criteria are to be given full consideration during the review and decision-making processes; each criterion is necessary but neither, by itself, is sufficient. Therefore, proposers must fully address both criteria. (GPG Chapter II.C.2.d.i. contains additional information for use by proposers in development of the Project Description section of the proposal.) Reviewers are strongly encouraged to review the criteria, including GPG Chapter II.C.2.d.i., prior to the review of a proposal.
When evaluating NSF proposals, reviewers will be asked to consider what the proposers want to do, why they want to do it, how they plan to do it, how they will know if they succeed, and what benefits could accrue if the project is successful. These issues apply both to the technical aspects of the proposal and the way in which the project may make broader contributions. To that end, reviewers will be asked to evaluate all proposals against two criteria:
Intellectual Merit: The Intellectual Merit criterion encompasses the potential to advance knowledge; and
Broader Impacts: The Broader Impacts criterion encompasses the potential to benefit society and contribute to the achievement of specific, desired societal outcomes.
The following elements should be considered in the review for both criteria:
What is the potential for the proposed activity to
Advance knowledge and understanding within its own field or across different fields (Intellectual Merit); and
Benefit society or advance desired societal outcomes (Broader Impacts)?
To what extent do the proposed activities suggest and explore creative, original, or potentially transformative concepts?
Is the plan for carrying out the proposed activities well-reasoned, well-organized, and based on a sound rationale? Does the plan incorporate a mechanism to assess success?
How well qualified is the individual, team, or organization to conduct the proposed activities?
Are there adequate resources available to the PI (either at the home organization or through collaborations) to carry out the proposed activities?
Broader impacts may be accomplished through the research itself, through the activities that are directly related to specific research projects, or through activities that are supported by, but are complementary to, the project. NSF values the advancement of scientific knowledge and activities that contribute to achievement of societally relevant outcomes. Such outcomes include, but are not limited to: full participation of women, persons with disabilities, and underrepresented minorities in science, technology, engineering, and mathematics (STEM); improved STEM education and educator development at any level; increased public scientific literacy and public engagement with science and technology; improved well-being of individuals in society; development of a diverse, globally competitive STEM workforce; increased partnerships between academia, industry, and others; improved national security; increased economic competitiveness of the United States; and enhanced infrastructure for research and education.
Proposers are reminded that reviewers will also be asked to review the Data Management Plan and the Postdoctoral Researcher Mentoring Plan, as appropriate.
Additional Solicitation Specific Review Criteria
All CICI projects will be reviewed with careful attention to the following:
The extent to which the work provides a needed capability required by the science, engineering and education community;
The expected impact on the deployed environment described in the proposal, and potential impact across a broader segment of the NSF community; and
The feasibility, utility, and interoperability of the capability in its proposed operational role.
B. Review and Selection Process
Proposals submitted in response to this program solicitation will be reviewed by Ad hoc Review and/or Panel Review.
Reviewers will be asked to evaluate proposals using two National Science Board approved merit review criteria and, if applicable, additional program specific criteria. A summary rating and accompanying narrative will be completed and submitted by each reviewer. The Program Officer assigned to manage the proposal's review will consider the advice of reviewers and will formulate a recommendation.
After scientific, technical and programmatic review and consideration of appropriate factors, the NSF Program Officer recommends to the cognizant Division Director whether the proposal should be declined or recommended for award. NSF strives to be able to tell applicants whether their proposals have been declined or recommended for funding within six months. Large or particularly complex proposals or proposals from new awardees may require additional review and processing time. The time interval begins on the deadline or target date, or receipt date, whichever is later. The interval ends when the Division Director acts upon the Program Officer's recommendation.
After programmatic approval has been obtained, the proposals recommended for funding will be forwarded to the Division of Grants and Agreements for review of business, financial, and policy implications. After an administrative review has occurred, Grants and Agreements Officers perform the processing and issuance of a grant or other agreement. Proposers are cautioned that only a Grants and Agreements Officer may make commitments, obligations or awards on behalf of NSF or authorize the expenditure of funds. No commitment on the part of NSF should be inferred from technical or budgetary discussions with a NSF Program Officer. A Principal Investigator or organization that makes financial or personnel commitments in the absence of a grant or cooperative agreement signed by the NSF Grants and Agreements Officer does so at their own risk.
Once an award or declination decision has been made, Principal Investigators are provided feedback about their proposals. In all cases, reviews are treated as confidential documents. Verbatim copies of reviews, excluding the names of the reviewers or any reviewer-identifying information, are sent to the Principal Investigator/Project Director by the Program Officer. In addition, the proposer will receive an explanation of the decision to award or decline funding.
VII. AWARD ADMINISTRATION INFORMATION
A. Notification of the Award
Notification of the award is made to the submitting organization by a Grants Officer in the Division of Grants and Agreements. Organizations whose proposals are declined will be advised as promptly as possible by the cognizant NSF Program administering the program. Verbatim copies of reviews, not including the identity of the reviewer, will be provided automatically to the Principal Investigator. (See Section VI.B. for additional information on the review process.)
B. Award Conditions
An NSF award consists of: (1) the award notice, which includes any special provisions applicable to the award and any numbered amendments thereto; (2) the budget, which indicates the amounts, by categories of expense, on which NSF has based its support (or otherwise communicates any specific approvals or disapprovals of proposed expenditures); (3) the proposal referenced in the award notice; (4) the applicable award conditions, such as Grant General Conditions (GC-1)*; or Research Terms and Conditions* and (5) any announcement or other NSF issuance that may be incorporated by reference in the award notice. Cooperative agreements also are administered in accordance with NSF Cooperative Agreement Financial and Administrative Terms and Conditions (CA-FATC) and the applicable Programmatic Terms and Conditions. NSF awards are electronically signed by an NSF Grants and Agreements Officer and transmitted electronically to the organization via e-mail.
*These documents may be accessed electronically on NSF's Website at http://www.nsf.gov/awards/managing/award_conditions.jsp?org=NSF. Paper copies may be obtained from the NSF Publications Clearinghouse, telephone (703) 292-7827 or by e-mail from nsfpubs@nsf.gov.
More comprehensive information on NSF Award Conditions and other important information on the administration of NSF awards is contained in the NSF Award & Administration Guide (AAG) Chapter II, available electronically on the NSF Website at http://www.nsf.gov/publications/pub_summ.jsp?ods_key=aag.
C. Reporting Requirements
For all multi-year grants (including both standard and continuing grants), the Principal Investigator must submit an annual project report to the cognizant Program Officer at least 90 days prior to the end of the current budget period. (Some programs or awards require submission of more frequent project reports). Within 90 days following expiration of a grant, the PI also is required to submit a final project report, and a project outcomes report for the general public.
Failure to provide the required annual or final project reports, or the project outcomes report, will delay NSF review and processing of any future funding increments as well as any pending proposals for all identified PIs and co-PIs on a given award. PIs should examine the formats of the required reports in advance to assure availability of required data.
PIs are required to use NSF's electronic project-reporting system, available through Research.gov, for preparation and submission of annual and final project reports. Such reports provide information on accomplishments, project participants (individual and organizational), publications, and other specific products and impacts of the project. Submission of the report via Research.gov constitutes certification by the PI that the contents of the report are accurate and complete. The project outcomes report also must be prepared and submitted using Research.gov. This report serves as a brief summary, prepared specifically for the public, of the nature and outcomes of the project. This report will be posted on the NSF website exactly as it is submitted by the PI.
More comprehensive information on NSF Reporting Requirements and other important information on the administration of NSF awards is contained in the NSF Award & Administration Guide (AAG) Chapter II, available electronically on the NSF Website at http://www.nsf.gov/publications/pub_summ.jsp?ods_key=aag.
VIII. AGENCY CONTACTS
Please note that the program contact information is current at the time of publishing. See program website for any updates to the points of contact.
General inquiries regarding this program should be made to:
Anita Nikolich, telephone: (703) 292-4551, email: anikolic@nsf.gov
For questions related to the use of FastLane, contact:
FastLane Help Desk, telephone: 1-800-673-6188; e-mail: fastlane@nsf.gov.
For questions relating to Grants.gov contact:
Grants.gov Contact Center: If the Authorized Organizational Representatives (AOR) has not received a confirmation message from Grants.gov within 48 hours of submission of application, please contact via telephone: 1-800-518-4726; e-mail: support@grants.gov.
IX. OTHER INFORMATION
The NSF website provides the most comprehensive source of information on NSF Directorates (including contact information), programs and funding opportunities. Use of this website by potential proposers is strongly encouraged. In addition, "NSF Update" is an information-delivery system designed to keep potential proposers and other interested parties apprised of new NSF funding opportunities and publications, important changes in proposal and award policies and procedures, and upcoming NSF Grants Conferences. Subscribers are informed through e-mail or the user's Web browser each time new publications are issued that match their identified interests. "NSF Update" also is available on NSF's website at https://public.govdelivery.com/accounts/USNSF/subscriber/new?topic_id=USNSF_179.
Grants.gov provides an additional electronic capability to search for Federal government-wide grant opportunities. NSF funding opportunities may be accessed via this mechanism. Further information on Grants.gov may be obtained at http://www.grants.gov.
ABOUT THE NATIONAL SCIENCE FOUNDATION
The National Science Foundation (NSF) is an independent Federal agency created by the National Science Foundation Act of 1950, as amended (42 USC 1861-75). The Act states the purpose of the NSF is "to promote the progress of science; [and] to advance the national health, prosperity, and welfare by supporting research and education in all fields of science and engineering."
NSF funds research and education in most fields of science and engineering. It does this through grants and cooperative agreements to more than 2,000 colleges, universities, K-12 school systems, businesses, informal science organizations and other research organizations throughout the US. The Foundation accounts for about one-fourth of Federal support to academic institutions for basic research.
NSF receives approximately 55,000 proposals each year for research, education and training projects, of which approximately 11,000 are funded. In addition, the Foundation receives several thousand applications for graduate and postdoctoral fellowships. The agency operates no laboratories itself but does support National Research Centers, user facilities, certain oceanographic vessels and Arctic and Antarctic research stations. The Foundation also supports cooperative research between universities and industry, US participation in international scientific and engineering efforts, and educational activities at every academic level.
Facilitation Awards for Scientists and Engineers with Disabilities provide funding for special assistance or equipment to enable persons with disabilities to work on NSF-supported projects. See Grant Proposal Guide Chapter II, Section D.2 for instructions regarding preparation of these types of proposals.
The National Science Foundation has Telephonic Device for the Deaf (TDD) and Federal Information Relay Service (FIRS) capabilities that enable individuals with hearing impairments to communicate with the Foundation about NSF programs, employment or general information. TDD may be accessed at (703) 292-5090 and (800) 281-8749, FIRS at (800) 877-8339.
The National Science Foundation Information Center may be reached at (703) 292-5111.
The National Science Foundation promotes and advances scientific progress in the United States by competitively awarding grants and cooperative agreements for research and education in the sciences, mathematics, and engineering.
To get the latest information about program deadlines, to download copies of NSF publications, and to access abstracts of awards, visit the NSF Website at http://www.nsf.gov
Location:
4201 Wilson Blvd. Arlington, VA 22230
For General Information
(NSF Information Center):
(703) 292-5111
TDD (for the hearing-impaired):
(703) 292-5090
To Order Publications or Forms:
Send an e-mail to:
nsfpubs@nsf.gov
or telephone:
(703) 292-7827
To Locate NSF Employees:
(703) 292-5111
PRIVACY ACT AND PUBLIC BURDEN STATEMENTS
The information requested on proposal forms and project reports is solicited under the authority of the National Science Foundation Act of 1950, as amended. The information on proposal forms will be used in connection with the selection of qualified proposals; and project reports submitted by awardees will be used for program evaluation and reporting within the Executive Branch and to Congress. The information requested may be disclosed to qualified reviewers and staff assistants as part of the proposal review process; to proposer institutions/grantees to provide or obtain data regarding the proposal review process, award decisions, or the administration of awards; to government contractors, experts, volunteers and researchers and educators as necessary to complete assigned work; to other government agencies or other entities needing information regarding applicants or nominees as part of a joint application review process, or in order to coordinate programs or policy; and to another Federal agency, court, or party in a court or Federal administrative proceeding if the government is a party. Information about Principal Investigators may be added to the Reviewer file and used to select potential candidates to serve as peer reviewers or advisory committee members. See Systems of Records, NSF-50, "Principal Investigator/Proposal File and Associated Records," 69 Federal Register 26410 (May 12, 2004), and NSF-51, "Reviewer/Proposal File and Associated Records," 69 Federal Register 26410 (May 12, 2004). Submission of the information is voluntary. Failure to provide full and complete information, however, may reduce the possibility of receiving an award.
An agency may not conduct or sponsor, and a person is not required to respond to, an information collection unless it displays a valid Office of Management and Budget (OMB) control number. The OMB control number for this collection is 3145-0058. Public reporting burden for this collection of information is estimated to average 120 hours per response, including the time for reviewing instructions. Send comments regarding the burden estimate and any other aspect of this collection of information, including suggestions for reducing this burden, to:
Suzanne H. Plimpton
Reports Clearance Officer
Office of the General Counsel
National Science Foundation
Arlington, VA 22230
CALL FOR WORKSHOP PROPOSALS
Embedded Systems Week (ESWEEK)
October 4-9 2015, Amsterdam, The Netherlands http://www.esweek.org
Embedded Systems Week is the premier and exciting event covering all aspects of embedded systems and software. By bringing together three leading conferences (CASES, CODES+ISSS, and EMSOFT), symposium
(ESTIMedia), and several workshops and tutorials, ESWEEK allows attendees to benefit from a wide range of topics covering the state of the art in embedded systems research and development.
ESWEEK 2015 in Amsterdam, Netherlands will host several workshops on Thursday October 8th and is soliciting proposals for new and recurring workshops. ESWEEK workshops are excellent opportunities to bring together researchers and practitioners from different communities to share their experiences in an interactive atmosphere and to foster collaboration for new and innovative projects. We invite you to submit workshop proposals on any topic related to the broad set of research, education, and application areas in embedded systems.
Guidelines for proposals:
Proposals should be submitted at the latest by *** May 1st ***
2-page maximum PDF file, including the following information:
- A concise title of the workshop
- Description of the topics and specific issues that the workshop will address, how the workshop complements ESWEEK conferences and symposium, and why the workshop theme is relevant
- Expected formal of the workshop (regular paper presentations, poster presentations, invited talks, panel discussions, demo sessions, or other ideas to promote active exchange of ideas)
- Organizers with short bio, affiliation and their expertise in the proposed topic(s)
- In case the workshop has been previously held, provide information to show that the previous edition(s) were successful in terms of paper submissions and/or attendance.
- Length of the workshop (half-day/one-day) and the expected number of participants
- Follow-up plans (if any) to disseminate the ideas from the workshop, for example through position paper or journal special issue
Please submit your workshop proposal by email to the workshop chair Tulika Mitra (tulika@comp.nus.edu.sg). Please write "[ESWEEK 2015] Workshop Proposal" on the e-mail subject line.
The Intelligent Transportation Systems Joint Program Office's (ITS-JPO) posted a solicitation for Phase I, Concept Deveopment, of the Connected Vehicle (CV) Pilot Deployments. The objective of Phase I is to develop a CV Pilot Deployment concept, build partnerships among stakeholders, and prepare a comprehensive pilot deployment plan that reduces technical, institutional and financial risk. Responses are due March 16. More information is located at https://www.fbo.gov/index?s=opportunity&mode=form&id=4bb6693ac3021c178595d83fab3b5d73&tab=core&_cview=1.
The Global City Teams Challenge (GCTC) was successfully launched by the National Institute of Standards and Technology (NIST) and US Ignite with a kick-off event at NIST on September 29-30. At this two day event, we had more than 350 on-site and remote attendees who came together to present project ideas and form Action Clusters on cyber-physical systems (CPS) and Internet of Things (IoT) for smart cities around the world. As of today, we have over 25 Action Clusters formed in energy, transportation, healthcare, disaster response, and many other sectors, working to demonstrate the deployments of scalable, replicable, and interoperable smart city solutions by June 2015. A current list of Action Clusters can be found at globalcityteams.org.
We are excited to announce that the National Science Foundation (NSF), one of the primary partners in the Challenge, has released an invitation to GCTC participants to submit proposals for up to $300,000 in funding. Detailed information about NSF's Early-Concept Grants for Exploratory Research (EAGER) proposals to support GCTC participants can be found here: http://1.usa.gov/1Eu2jwN
The deadline for submission of EAGERs is January 15, 2015, but earlier submissions are encouraged, and decisions will be made on a first-come, first-serve basis.
Additionally, NSF released a solicitation that makes available up to $4 million for the development of next-generation Internet applications. Many projects being pursued by GCTC participants are aligned with the NSF's solicitation, as it identifies national priorities including clean energy, transportation, health information technology, public safety/emergency preparedness, cyberlearning, and/or advanced manufacturing.
More detailed information can be found here: NSF 15-508. Application for this solicitation are also due January 15.
Of course, if you have not yet connected your CPS project or your next-generation network/IoT project with the Global City Teams Challenge, it is not too late!
LEARN MORE ABOUT NSF FUNDING OPPORTUNITIES:
US Ignite will host a webinar on Monday. November 17th at 3pm (US-Eastern) that will provide insights into the application process and outline the benefits of being a GCTC participant.
WEBINAR DETAILS:
Date: Monday, November 17, 2014
Time: 3:00PM Eastern
Log-in Information:
https://global.gotomeeting.com/join/765269669
Via Phone: Dial +1 (872) 240-3212
Access Code: 765-269-669
CONNECT YOUR PROJECT TO THE GLOBAL CITY TEAMS CHALLENGE:
Sign-up on US Ignite's Collaborative Community Exchange (CCX) on behalf of your organization
Explore our existing Action Clusters on US Ignite's Collaborative Community Exchange (CCX) and join one by reaching out to the project contact
Add your Action Cluster idea, and highlight the type of partners that will strengthen your project
Contact the organizers of the Challenge to discuss the steps to register your Action Cluster to GCTC.
We are very excited at the progress all the teams are making so far, and would love to see more Action Clusters stand up around the world. Please don't hesitate to let us know if you have any questions. We are here to help make your GCTC project a great success.
Thank you for your continued interest in the Global City Teams Challenge.
Joe Kochan
US Ignite
2015 Cyber-Physical Systems Solicitation (15-541)
http://www.nsf.gov/pubs/2015/nsf15541/nsf15541.pdf
Directorate for Computer & Information Science & Engineering
Cyber-Physical Systems (CPS)
CONTACTS
David Corman, dcorman@nsf.gov, (703) 292-8754, Room 1175
Radhakisan Baheti, rbaheti@nsf.gov, (703) 292-8339, Room 525
Sankar Basu, sabasu@nsf.gov, (703) 292-7843
Bruce Hamilton, bhamilto@nsf.gov, (703) 292-7066, Room 565
Bruce Kramer, bkramer@nsf.gov, (703) 292-5348, Room 545
Anita Nikolich, anikolic@nsf.gov, (703) 292-4551
Phillip Regalia, pregalia@nsf.gov, (703) 292-8910, Room 1115
Gurdip Singh, gsingh@nsf.gov, (703) 292-8061
Sylvia Spengler, sspengle@nsf.gov, (703) 292-8930, Room 1125
Ralph Wachter, rwachter@nsf.gov, (703) 292-8950, Room 1175
PROGRAM GUIDELINES
Solicitation 15-541
Important Information for Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 15-1), is effective for proposals submitted, or due, on or after December 26, 2014. The PAPPG is consistent with, and, implements the new Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (Uniform Guidance) (2 CFR § 200). Please be advised that the guidelines contained in NSF 15-1 apply to proposals submitted in response to this funding opportunity.
DUE DATES
Full Proposal Window: April 20, 2015 - May 4, 2015
SYNOPSIS
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability that will far exceed the simple embedded systems of today. CPS technology will transform the way people interact with engineered systems -- just as the Internet has transformed the way people interact with information. New smart CPS will drive innovation and competition in sectors such as agriculture, energy, transportation, building design and automation, healthcare, and manufacturing.
The December 2010 report of the President's Council of Advisors on Science and Technology (PCAST) titled Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology calls for continued investment in CPS research because of its scientific and technological importance as well as its potential impact on grand challenges in a number of sectors critical to U.S. security and competitiveness such as the ones noted above. These challenges and technology gaps are further described in a CPS Vision Statement published in 2012 by the federal Networking and Information Technology Research and Development (NITRD) CPS Senior Steering Group.
Tremendous progress has been made in advancing CPS technology over the last five-plus years. We have explored foundational technologies that have spanned an ever-growing set of application domains, enabling breakthrough achievements in many of these fields. At the same time, the demand for innovation in these domains continues to grow, and is driving the need to accelerate fundamental research to keep pace.
Despite significant inroads into CPS technology in recent years, we do not yet have a mature science to support systems engineering of high-confidence CPS, and the consequences are profound. Traditional analysis tools are unable to cope with the full complexity of CPS or adequately predict system behavior. For example, minor events that trip the current electric power grid -- an ad hoc system -- can escalate with surprising speed into widespread power failures. This scenario exemplifies the lack of appropriate science and technology to conceptualize and design for the deep interdependencies among engineered systems and the natural world. The challenges and opportunities for CPS are thus significant and far-reaching. New relationships between the cyber and physical components require new architectural models that redefine form and function. They integrate the continuous and discrete, compounded by the uncertainty of open environments. Traditional real-time performance guarantees are insufficient for CPS when systems are large and spatially, temporally, or hierarchically distributed in configurations that may rapidly change. With the greater autonomy and cooperation possible with CPS, greater assurances of safety, security, scalability, and reliability are demanded, placing a high premium on open interfaces, modularity, interoperability, and verification.
The goal of the CPS program is to develop the core system science needed to engineer complex cyber-physical systems which people can use or interact with and depend upon. Some of these may require high-confidence or provable behaviors. The program aims to foster a research community committed to advancing research and education in CPS and to transitioning CPS science and technology into engineering practice. By abstracting from the particulars of specific systems and application domains, the CPS program seeks to reveal cross-cutting fundamental scientific and engineering principles that underpin the integration of cyber and physical elements across all application sectors. To expedite and accelerate the realization of cyber-physical systems in a wide range of applications, the CPS program also supports the development of methods, tools, and hardware and software components based upon these cross-cutting principles, along with validation of the principles via prototypes and testbeds. We have also seen a convergence of CPS technologies and research thrusts that underpin "Smart Cities" and the Internet of Things (IoT). These domains offer new and exciting challenges for foundational research and provide opportunities for maturation at multiple time horizons.
In 2015, NSF is working closely with multiple agencies of the federal government, including the U.S. Department of Homeland (DHS) Security Science and Technology Directorate (S&T), U.S. Department of Transportation (DOT) Federal Highway Administration (FHWA), U.S. DOT Intelligent Transportation Systems (ITS) Joint Program Office (JPO), National Aeronautics and Space Administration (NASA) Aeronautics Research Mission Directorate (ARMD), and several National Institutes of Health (NIH) institutes and centers [including the National Institute of Biomedical Imaging and Bioengineering (NIBIB), Office of Behavioral and Social Sciences Research (OBSSR), National Cancer Institute (NCI), and National Center for Advancing Translational Sciences (NCATS)], to identify basic research needs in CPS common across multiple application domains, along with opportunities for accelerated transition to practice.
Three classes of research and education projects -- differing in scope and goals -- will be considered through this solicitation:
- Breakthrough projects must offer a significant advance in fundamental CPS science, engineering and/or technology that has the potential to change the field. This category focuses on new approaches to bridge computing, communication, and control. Funding for Breakthrough projects may be requested for a total of up to $500,000 for a period of up to 3 years.
- Synergy projects must demonstrate innovation at the intersection of multiple disciplines, to accomplish a clear goal that requires an integrated perspective spanning the disciplines. Funding for Synergy projects may be requested for a total of $500,001 to $1,000,000 for a period of 3 to 4 years.
- Frontier projects must address clearly identified critical CPS challenges that cannot be achieved by a set of smaller projects. Funding may be requested for a total of $1,000,001 to $7,000,000 for a period of 4 to 5 years.
REVISIONS AND UPDATES