|
COMMERCE BUSINESS DAILY ISSUE OF APRIL 7,2000 PSA#2574Department of the Air Force, Air Force Materiel Command, AFRL -- Wright
Research Site, Det 1 AFRL/PK, Bldg 167, Area B, 2310 8th Street,
Wright-Patterson AFB, OH, 45433-7801 A -- NOTICE OF CONTRACT ACTION FOR ADVANCED TECHNOLOGIES FOR
INFORMATION ASSURANCE AND SURVIVABILITY (ATIAS) SOL BAA-00-06-SNK DUE
052400 POC Kathy Spainhower, Contract Negotiator, Phone (937) 255-5182,
Email kathy.spainhower@wpafb.af.mil -- Noel Thompson, Contracting
Officer, Phone (937) 255-3585, Email noel.thompson@wpafb.af.mil WEB:
Visit this URL for the latest information about this,
http://www.eps.gov/cgi-bin/WebObjects/EPS?ACode=P&ProjID=BAA-00-06-SNK&LocID=904. E-MAIL: Kathy Spainhower,
kathy.spainhower@wpafb.af.mil. Air Force Research Laboratory, Sensors
Directorate (AFRL/SNZW) is issuing a single step (full initial
proposal), 2.5 year, open-ended Broad Agency Announcement (BAA) to
solicit research proposals for the Advanced Technologies for
Information Assurance and Survivability program (ATIAS). Multiple
contract awards and/or assistance instruments are anticipated with an
estimated value of $300K or less with typical periods of performance of
6-12 months including final report. (1) RESEARCH NEED: ATIAS seeks to
identify and promote research topics that augment the DARPA Information
Assurance and Survivability (IA&S) suite of programs. The overall
objective of ATIAS is to identify, evaluate and study key technologies
that are required to support the DARPA IA&S program suite. The
anticipated ATIAS Focused Research Topics (FRT) support the IA&S
program suites and include the following research areas: strategic
intrusion assessment, intrusion tolerant systems, fault tolerant
networks, dynamic coalitions, information assurance, information
assurance science and engineering tools, autonomic information
assurance, and cyber command and control research
investigations/experiments; distributed security policies; certificate
management; development of cyberscience; development of science-based
metrics & methods for information system design/assessment;
collaborative, mobile agents for all aspects of information
assurance/cyberdefense; technologies/approaches to handling automated
attacks; automatic, collaborative, multilayer intrusion detection;
automated attack modeling; automatic response selection techniques;
cyberwarfare situation awareness; attacker localization; multilayer
defense; collaborative automatic reaction; course of action
development; distributed cyber simulation, information system
infrastructure which includes networking technologies/architectures
that support interaction between humans and information systems as well
as collaborative applications; attack forensics; information system
infrastructure which includes networking technologies/architectures
that support interaction between humans and information systems as well
as collaborative applications; human-information system interaction in
distributed computing environments; command system applications;
innovative technology/component integration; conceptual design and
documentation; multimedia representations; technology transition;
reference prototype implementations; technology visualization;
distributive computing; defensive system biological model paradigms;
biological/non-biological models of intrusion detection &
autonomous response, cyberwarfare situation assessment, cyberwarfare
software architecture; comparable cyberwarfare architecture; advanced
information assurance science, technology tools & theory; advanced
autonomous response paradigms; advanced intrusion detection
paradigms/models, advanced autonomous response paradigms; cyberwarfare
command/control (C2) concepts/paradigms; cybersensors/sensors
technology; and collaborative enterprise environment simulation. (2)
BACKGROUND: The trend toward sensor-to-shooter integration, coalition
operation, use of commercial products, and the increased use of mobile
dynamic code significantly exacerbates the already difficult problem
of providing information assurance for systems. The current nature of
cyberspace provides attacking adversaries with significant advantages
and permits them to accomplish their objectives without dominating the
physical battlespace. The DARPA Information Assurance and
Survivability (IA&S) research program is aimed at reducing
vulnerabilities and giving commanders the insight and control needed to
defend critical information systems. The IA&S program suite is a
closely coordinated group of research programs consisting of the
following efforts: Strategic Intrusion Assessment (SIA) Program;
Intrusion Tolerant Systems (ITS); Fault Tolerant Networks (FTN)
Program; Dynamic Coalitions (DC) Program; Information Assurance (IA)
Program, Information Assurance Science and Engineering Tools (IASET)
Program, Autonomic Information Assurance (AIA) Program; and Cyber
Command and Control (CC2) Program. ATIAS is intended to focus research
topics that investigate/study IA&S technology
needs/issues/limitations/barriers. This initial BAA solicits research
proposals in Focused Research Topics (FRT) #1 and #2 only (see
http://www.eps.gov/). Proposal instructions are contained in the
solicitation and specific FRT on the EPS homepage
(http://www/eps.gov/). Proposals for these two topic areas are due on
24 May 00 (45 days after issuance of the BAA in the CBD). Periodically
over the 2.5 year period (ending 30 Sep 02), amendments to the
BAA/solicitation will be issued in the CBD to request proposals for
subsequent Focused Research Topics (FRT). Proposals for subsequent
Focused Research Topics (FRT) will be due 30 days after issuance of the
BAA amendment in the CBD. This BAA is unrestricted, except no foreign
participation due to International Tariff in Arms Regulations (ITAR),
and all responsible domestic sources may submit proposals under full
and open competitive procedures. An Inter-government Personnel Act
(IPA) employee will be used in the evaluation process. IPA employees
are subject to the Conflict of Interest Laws and Standards of Conduct
provisions, such as rules on disclosure of confidential information.
Interested offerors may view and/or download the full BAA solicitation
by accessing the Electronic Posting System (EPS) homepage at
http://www.eps.gov/. A website for the ATIAS program has been
established to provide detailed information on the ATIAS program, the
IA&S program suite, frequently asked questions (FAQ), and current
and archived acquisition information. The ATIAS website may be accessed
at http://www.sn.afrl.af.mil/ATIAS/index.html. PRIOR TO AWARD OF ANY
CONTRACT, POTENTIAL OFFERORS MUST BE REGISTERED WITH THE CENTRAL
CONTRACTOR REGISTRATION (CCR) (http://www.ccr2000.com/) AND BE ABLE TO
RECEIVE PAYMENT VIA ELECTRONIC FUNDS TRANSFER (EFT). Potential
offerors must also have a DUNS Number
(http://www.ccr2000.com/faqs.html#10). It is anticipated awards may be
either firm fixed price or cost-reimbursable type with firmed fixed
price being the preferred method. Prior to award of a cost-reimbursable
type contract, the offeror must have an adequate accounting system for
determining costs IAW FAR 16.301-3. (4) Interested offerors may submit
questions to AFRL TECHNICAL POINT OF CONTACT: Dr. Martin R. Stytz
(AFRL/SNZW), email: atias@wpafb.af.mil or CONTRACTING POINT OF CONTACT:
Mr. Noel E. Thompson (AFRL/SNKD), (937) 255-3585. Posted 04/05/00
(D-SN441451). (0096) Loren Data Corp. http://www.ld.com (SYN# 0001 20000407\A-0001.SOL)
A - Research and Development Index Page
|
|