Loren Data Corp.

'

 
 

COMMERCE BUSINESS DAILY ISSUE OF JANUARY 19,1995 PSA#1265

Advanced Research Projects Agency (ARPA), Contracts Management Office (CMO), 3701 North Fairfax Drive, Arlington, VA 22203-1714

A -- INFORMATION SYSTEM SECURITY SOL BAA95-15 DUE 041795 POC Teresa F. Lunt, ARPA/CSTO, POC, FAX: (703)522-2668. The Advanced Research Projects Agency (ARPA) is soliciting proposals for research in various aspects of computer and network security, to create and integrate advanced security technologies for the DII, NII, National Challenge problems, and defense uses. This solicitation is part of a larger strategy for developing technology for defensive information warfare. Proposals are sought that address one or more of the following areas: 1) Infrastructure Protection: Proposals are sought to develop prototypes of security mechanisms, value-added security services, packet and cell encryption techniques, and seamlessly integrated security in mobile, high-data-rate, multimedia, network technologies. Of interest are the creation of modular value-added security services such as authentication, authorization, auditing and audit analysis, security management, nonrepudiation, and anonymity, and the redesign of network protocols to remove known security weaknesses, especially vulnerability to malicious denial of service attacks. In addition, research prototypes are sought for a protected infrastructure for key management that could support both symmetric and asymmetric keying needed by secure applications and network services. As a complementary method to other protection schemes, ARPA also is interested in research into packet and cell encryption devices and techniques. Proposed encryption devices should support performance ranges up to 10 gigabit/second and 10 megapacket/second, a variety of addressing schemes (unicast and multicast), and modularly replaceable cryptographic services, and should interface to a variety of network technologies. For all of the above, approaches that include multiparty software key escrow as a key management function are encouraged. Where appropriate, research should be applicable to unicast, broadcast, and dynamic group (multicast) communications and specifically address the problem of interoperability of various plausible security infrastructures. Specific deliverables may include libraries or toolkits with standard interfaces for linking security functions and services to applications. Technical POC: Teresa F. Lunt, Michael StJohns 2) Protection of End-systems: ARPA is seeking technology to allow geographically separated parts of an organization to interact as if they shared a common security perimeter. Approaches should allow uniform system-wide security policies to be enforced, and should provide a high degree of resistance to attack while providing greater interoperability with applications. Of special interest is research and prototyping of firewalls, technologies to support secure distributed applications across heterogeneous platforms, secure configuration controls, and security administration tools. Approaches should allow a variety of organization-specific security policies to be defined and enforced and allow for varying degrees of configurable assurance. Security prototypes may be integrated into standard or emerging systems or be at the core of new technology. Proposals are encouraged in the area of generating and linking policy-enforcement derived from high-level expression of security policy, constraints, and requirements into specific applications. Also of interest is technology to allow system components or devices to be mutually authenticated to provide secure configuration. Proposals regarding security management technology should result in efficient and scalable tools allowing administrators of large systems to assess their systems' vulnerabilities, to bring their systems into compliance with any given set of security requirements, to remotely monitor systems for security compliance, and to quickly assess and correct damage from security incidents. Proposals for end-system protection through appropriate design and function of operating systems and services are strongly encouraged, proposals for work in the area of operating systems and services should be submitted through the forthcoming companion BAA on Scalable Systems and Software. Technical POC: Teresa F. Lunt, Glenn Ricart 3) Assurance: Proposals are sought for prototype experimental system structuring languages, analysis methods, and systems development tools and development environment to express the structure of information systems, reason about their security and other properties, and allow efficient and secure implementations. The proposed approach should be capable of expressing modular operating system structures, networking and other system services, and distributed information system protocols including those providing security services. Approaches that also address system hardware levels and their integration into higher-level system structures are also desired. Proposed projects should be based on well-founded languages which include abstraction mechanisms suitable for expressing and reasoning about complex system structures. Reuse of current methodologies and tools is encouraged where possible. Approaches are encouraged to integrate security tools and assurance methods into existing or emerging automated programming support environments. Demonstration of the approach on state-of-the-art security systems and an assessment of the degree of increased security achieved is encouraged. Proposals are also sought for metrics, evaluation techniques, and tools for quantitative assessment of system security or strength against attack. Technical POC: Teresa F. Lunt, John Salasin. PROGRAM SCOPE: Proposed research should investigate innovative, scalable approaches that lead to or enable revolutionary advances in the state of the art. Specifically excluded is research which primarily results in evolutionary improvement to the existing state of practice or focuses on a specific system or hardware solution. Topics are not limited to those outlined above. When appropriate, new concepts are to be demonstrated by means of prototypes or reference implementations. Proposals may range from small-scale efforts that are primarily theoretical in nature, to medium-scale experimental and prototyping efforts of hardware and/or software, to larger-scale integrated systems efforts. The target computing environment includes wireless and mobile platforms as well as fixed-location hosts. Proposals may involve other research groups or industrial cooperation and cost sharing. Collaborative efforts and teaming are encouraged. Technologies which have a broad impact will be given highest priority. Proposals will be considered in each of the above areas as well as across multiple areas. Proposers are strongly encouraged to include tasks that evaluate the security of their resulting prototypes under realistic scenarios. Remaining vulnerabilities of proposed approaches should be identified, and proposers are encouraged to include techniques for the detection of attacks that exploit those weaknesses. Proposals should identify opportunities for technology transfer within the commercial marketplace and employ evolutionary concepts to allow their approaches to maintain currency with emerging technology. Scalable, efficient, and interoperable approaches are encouraged. ARPA does not advocate or endorse the use of any particular cryptographic algorithm or cryptographic system. Proposals involving the use of cryptography must be modular and independent of encryption algorithm, allowing replacement with other algorithms, and employing two or more algorithms if possible. Development of cryptographic algorithms or cryptoanalytic attacks is not within scope of this solicitation. Some Government Furnished Equipment and Information (GFE) in the form of FORTEZZA cryptographic cards and PCMCIA card readers (up to 5 per contract), the FORTEZZA C library and device drivers (for selected platforms only), and the FORTEZZA Applications Developers Guide may be available, but ARPA does not guarantee its availability. It is also anticipated that GFE software cryptography will become available during the course of projects awarded under this BAA. Proposers may request the use of such GFE, but must describe alternatives they would use in the event this GFE is not available. GENERAL INFORMATION: In order to minimize unnecessary effort in proposal preparation and review, proposers are strongly encouraged to submit brief proposal abstracts in advance of full proposals. An original and three (3) copies of the proposal abstract must be submitted to ARPA/CSTO, 3701 North Fairfax Drive, Arlington, VA 22203-1714, (ATTN: BAA 95-15) on or before 4:00 PM, February 17, 1995. Proposal abstracts received after this date may not be reviewed. Upon review, ARPA will provide written feedback on the likelihood of a full proposal being selected. Proposers must submit an original and four (4) copies of full proposals by 4:00 PM, April 17, 1995, in order to be considered. Proposers must obtain a pamphlet, BAA 95-15, Proposer Information, which provides further information on the submission, evaluation, funding processes, proposal and proposal abstract formats. This pamphlet may be obtained by fax, electronic mail, or mail request to the administrative contact address given below, as well as at URL address http://www.csto.arpa.mil/Solicitations. Proposals not meeting the format described in the pamphlet may not be reviewed. This notice, in conjunction with the pamphlet BAA 95-15, Proposer Information, constitutes the total BAA. No additional information is available, nor will a formal RFP or other solicitation regarding this announcement be issued. Requests for same will be disregarded. The Government reserves the right to select for award all, some, or none of the proposals received. All responsible sources capable of satisfying the Government's needs may submit a proposal which shall be considered by ARPA. Historically Black Colleges and Universities (HBCU) and Minority Institutions (MI) are encouraged to submit proposals and join others in submitting proposals, however, no portion of this BAA will be set aside for HBCU and MI participation due to the impracticality of reserving discrete or severable areas of information security research. Evaluation of proposals will be accomplished through a scientific review of each proposal using the following criteria, which are listed in descending order of relative importance: (1) overall scientific and technical merit, (2) potential contribution and relevance to ARPA mission, (3) offeror's capabilities and related experience, (4) plans and capability to accomplish technology transition, and (5) cost realism. Note: Cost realism will be significant only in proposals which have significantly under or over estimated the cost to complete their effort. All administrative correspondence and questions on this solicitation, including requests for information on how to submit a proposal abstract or proposal to this BAA, should be directed to one of the administrative addresses below, e-mail or fax is preferred. ARPA intends to use electronic mail and fax for correspondence regarding BAA 95-15. The administrative addresses for this BAA are: Fax: 703-522-2668 Addressed to: ARPA/CSTO, BAA 95-15 Electronic Mail: baa9515@arpa.mil Mail: ARPA/CSTO, ATTN: BAA 95-15, 3701, N. Fairfax Drive, Arlington, VA 22203-1714 (0017)

Loren Data Corp. http://www.ld.com (SYN# 0001 19950118\A-0001.SOL)


A - Research and Development Index Page