Internal Competition Completed
Principal Investigators Selected
- Jason Polakis is authorized to submit, Department of Computer Science
Due to the rapidly approaching deadline, there will be an expedited peer review process.
This program seeks proposals to develop, deploy and integrate security solutions that benefit the scientific community by ensuring the integrity, resilience, and reliability of the end-to-end scientific workflow. This solicitation seeks unique ways to protect scientific instruments, resources, cyberinfrastructure and data that extend beyond building better perimeters and point solutions. The scope of the scientific workflow encompasses instruments, mobile and traditional network, processing software, analysis tools, computing and storage resources as well as information repositories and data archives (not to support basic cybersecurity research).
CICI compromises two Program Areas:
Resilient Security Architecture for Research Cyberinfrastructure: Research Cyberinfrastructure environments have become increasingly complex as campuses and other research institutions adapt their exsiting cyberinfrastructure. This program area seeks to address this complexity by encouraging novel and trustworthy architectural and design approahces, models and frameworks for the creation of a holistic, integrated security environment that speans the entire scientific CI ecosystem. Projects must demonstrate strong security architecture and systems security engineering generilizable across a diverse scientific workflow. A proposal in this area must demonstrate that the proposed architecture responds to the needs of the science and engineering communities and serve to advance scientific discoveries, collaborations and innovations. Proposers are encouraged to explain the threat model upon which the proposed solution is predicted. A sustainability plan describing how the proposed system will be supported beyond the project time period must be included.
Cybersecurity Enhancement: This program area addresses the critical need to focus attention and resources on the security attributes of scientific cyberinfrastructure. Proposals submitted should address scientific research and education needs for secure connectivity on campus and/or externally. Proposals may address the need to assess and redesign their campus security architecture to better support scientific and reserach data flows. A proposal in this area must demonstrate that the proposed architecture responds to the needs of the science and engineering communities and serves to advance scientific discoveries, collaborations and innovations. All proposals must document explicit partnerships or collaborations with the IT support organization, including security leaders such as the Chief Information Officer, Chief Privacy Officer or similar functional position within an institution, collaboration or faciility. You must identify reportable success metrics within the proposal.
University is limited to two proposals.
|UIC Letter of Intent||
February 1, 2017
|UIC Internal Competition||
|Sponsor Letter of Intent||
March 1, 2017
Letter of Intent
DUE TO THE QUICKLY APPROACHING DEADLINE, IN ADDITION TO THE ONLINE LOI FORM, PLEASE UPLOAD THE FOLLOWING BY NOON FEBRUARY 1, 2017.
1. Lay Summary that states which program area your proposal is for and includes the following: (2 page limit)
- Proposed activity and how it benefits society or advances desired societal outcomes
- How your proposal will protect research cyberinfrastructure
- How the proposal responds to the needs of the science and engineering communities and serve to advance scientific discoveries, collaborations and innovations
- Resources available for the proposed activities
- Identify opportunities for student engagement as well as cybersecurity education and training
2. Biosketch (5 page limit)
Please contact Natalia Glubisz at RDS@uic.edu or 312-996-8348 with any questions.
If an authorized principal investigator is not listed above, please consider the limited competition still open. Contact RDS@uic.edu for further information.