Research
Skip Research Menus
Research Menu
The Next Wave (TNW)
About
Subscribe to TNW
Archive
Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Types of Technology Transfer
Policy and Goals
Available Technologies
Types of License Mechanisms
Partner Benefits
Resources
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets-->
Publications
Related Links
|
Skip Search Box
In-house Research AreasThe Trusted Systems Research Group, formerly the National Information Assurance Research Laboratory, conducts in-house research in these focus areas: CryptographyOur challenge is to create practical and secure cryptographic algorithms, architectures, and infrastructures. Unlike other security disciplines that design mechanisms to protect against today's technology, our Cryptographers design cryptographic algorithms to protect against technology that will exist far into the future. Cryptographic Infrastructure and StandardsThis focus area supports security standards for information systems. We lead and influence the development of cryptographic standards to satisfy current and anticipated customer requirements. Additionally, this focus area tackles the challenges inherent in designing and developing a future public key infrastructure (PKI) rigorous enough to support the most sensitive missions. Core elements include dynamic management of groups and group membership as well as the cryptography necessary to protect the distribution of cryptovariables. With both our cryptographic security standards and PKI efforts, we collaborate extensively with external subject matter experts, with other organizations within the Federal Government, and with our Allies. High-confidence Software and Systems (HCSS)One of the biggest challenges facing our Nation is the integrity of the software on which our society depends. Our HCSS focus area concentrates on techniques to be implemented early in the life cycle which ensure correctness and integrity. AuthenticationThe globally-distributed enterprises of tomorrow assume the trustworthiness of each actor, device, service, and datum in the network. This focus area develops rigorous techniques for authenticating attributes, such as identity or location, of those constituents by integrating protocol design with intimate knowledge of hardware. High-Speed Security SolutionsThe high-speed team focuses on the engineering challenges inherent in securing high-bandwidth networks. Research tracks are in high-speed electronics, optical networking technologies, and the developing area of photonic logic research. Secure Wireless MultimediaThe Secure Wireless Multimedia focus area's research goal is to enable end-to-end secure multimedia communications for mobile users. Technical SecurityThis focus area addresses avenues for protecting information in the physical domain. We exploit our deep insight into materials and signal propagation to ensure no unencrypted information ever leaks out of our systems. Attack, Sensing, Warning, and ResponseThis focus area seeks to increase the ability of the U.S. to defend its critical networks through detection and response. Our research includes development of effective methods for detecting and responding to cyber attacks including: intrusion detection systems, malicious code detection, attack attribution (also known as traceback), visualization, data reduction and analysis, and alert correlation. Research IntegrationOur Research Integration group creates proof-of-concept implementations which demonstrate new functionality and security to our customers in a concrete form. Trusted ComputingBoth the Intelligence Community and DoD need to be able to share information and collaborate situationally and selectively. This team explores new access control mechanisms which can help, such as trusted labeling and virtual isolation and containment. |
|
Date Posted: Jan 15, 2009 | Last Modified: Mar 15, 2011 | Last Reviewed: Mar 15, 2011 |