Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF JANUARY 26, 2002 FBO #0055
MODIFICATION

A -- ANTI-TAMPER (AT)

Notice Date
1/24/2002
 
Notice Type
Modification
 
Contracting Office
Department of the Air Force, Air Force Materiel Command, AFRL - Wright Research Site, Det 1 AFRL/PK Bldg 167, Area B, 2310 8th Street, Wright-Patterson AFB, OH, 45433-7801
 
ZIP Code
45433-7801
 
Solicitation Number
PRDA-01-12-SNK
 
Response Due
5/22/2002
 
Archive Date
6/6/2002
 
Point of Contact
Dawn Ross, Contract Negotiator, Phone (937) 255-5186, Fax (937) 656-9074, - Steven Ewers, Contracting Officer, Phone (937) 255-5915, Fax null,
 
E-Mail Address
Dawn.Ross@wpafb.af.mil, Steven.Ewers@wpafb.af.mil
 
Description
This is an amendment to the Anti Tamper solicitation initially published on 28 Mar 01. The PRDA still remains open until 22 May 02 for out-of-cycle proposals from the original solicitation. Proposals submitted in response to this amendment for Software Protection Initiatives (SPI) will be due no later than 28 Feb 02; 4:00 pm local time. This PRDA continues to be open until 22 May 2002. Out-of-Cycle proposals will be accepted until 22 May 2002. However, there is no guarantee of funding for proposals received after 28 Feb 02 and before 22 May 2002. NOTE: The contracting points of contact have changed, see paragraph 11. above. Also, the technical point of contact for SPI is Dr. Martin Stytz, who can be reached at (937) 255-2811 ext 4380 or by pager at (407) 497-4407. The overall objective of the Software Protection Initiatives (SPI) is to identify, study, and evaluate the key technologies needed to strengthen current software protection capabilities for scientific, engineering, modeling, simulation, and operational software that executes on special-purpose and general-purpose computers. The SPI topics include the following research areas: software protection S&E tools, software protection forensics, software protection research investigations/experiments; software protection security policies; software protection component security software contracts, computation accuracy security; computation precision security; computation precision and accuracy control and access; execution host management and traceability; distribution accountability; software protection and distribution sensors; distribution and copy traceability; binary inspection protection; secure notification of use or reuse; software distribution management and accountability; development of software protection science; development of science-based metrics & methods for software protection; and multi-level protection. Additional topics include component-level software protection; component-based software protection; module-based software protection; module-level software protection; distributed software system protection; inherent access control & management; autonomous protection; autonomous, unsupervised protection assessment; protection of scientific and engineering applications; protection of modeling and simulation applications; design, development, and evaluation of software protection technologies; distribution traceability; protection of operational software on general purpose computers; and multiyear software protection and distribution defense. Further topics are computational accuracy and precision control; automatic and inherent misuse notification; software protection conceptual design and documentation; technology transition; reference prototype implementations; composable, scalable, and separable protection technologies; protection technology visualization; defensive system biological model paradigms; software architecture to enhance software protection; and technology tools & theory. Other topics include virtual machine approaches to achieving software protection at the component, framework, aspect, and object levels; protection metrics development and evaluation; component trust and security assurance; technologies for self-destruct or accuracy degradation upon misuse detection; and software protection technologies for mobile code. While this amendment seeks the development of technologies that enhance the protection of software, the government anticipates that there will be a hardware component to some of the technologies proposed for software protection. Therefore, hardware solutions are encouraged and the research related to the list of topics provided above or other topics related to the SPI may have both a hardware and a software aspect. Network security, intrusion prevention, intrusion detection are outside the scope of this amendment. Interested offerors may view and/or download the full BAA solicitation and this amendment synopsis by accessing the Federal Business Opportunity (FedBizOpps) homepage at http://www.eps.gov/. Direct questions to the Contracting point of contact identified in the announcement
 
Record
SN20020126/00018391-020124210145 (fbodaily.com)
 
Source
FedBizOpps.gov Link to This Notice
(will not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.