Loren Data Corp.

'

 
 

COMMERCE BUSINESS DAILY ISSUE OF APRIL 7,2000 PSA#2574

Department of the Air Force, Air Force Materiel Command, AFRL -- Wright Research Site, Det 1 AFRL/PK, Bldg 167, Area B, 2310 8th Street, Wright-Patterson AFB, OH, 45433-7801

A -- NOTICE OF CONTRACT ACTION FOR ADVANCED TECHNOLOGIES FOR INFORMATION ASSURANCE AND SURVIVABILITY (ATIAS) SOL BAA-00-06-SNK DUE 052400 POC Kathy Spainhower, Contract Negotiator, Phone (937) 255-5182, Email kathy.spainhower@wpafb.af.mil -- Noel Thompson, Contracting Officer, Phone (937) 255-3585, Email noel.thompson@wpafb.af.mil WEB: Visit this URL for the latest information about this, http://www.eps.gov/cgi-bin/WebObjects/EPS?ACode=P&ProjID=BAA-00-06-SNK&LocID=904. E-MAIL: Kathy Spainhower, kathy.spainhower@wpafb.af.mil. Air Force Research Laboratory, Sensors Directorate (AFRL/SNZW) is issuing a single step (full initial proposal), 2.5 year, open-ended Broad Agency Announcement (BAA) to solicit research proposals for the Advanced Technologies for Information Assurance and Survivability program (ATIAS). Multiple contract awards and/or assistance instruments are anticipated with an estimated value of $300K or less with typical periods of performance of 6-12 months including final report. (1) RESEARCH NEED: ATIAS seeks to identify and promote research topics that augment the DARPA Information Assurance and Survivability (IA&S) suite of programs. The overall objective of ATIAS is to identify, evaluate and study key technologies that are required to support the DARPA IA&S program suite. The anticipated ATIAS Focused Research Topics (FRT) support the IA&S program suites and include the following research areas: strategic intrusion assessment, intrusion tolerant systems, fault tolerant networks, dynamic coalitions, information assurance, information assurance science and engineering tools, autonomic information assurance, and cyber command and control research investigations/experiments; distributed security policies; certificate management; development of cyberscience; development of science-based metrics & methods for information system design/assessment; collaborative, mobile agents for all aspects of information assurance/cyberdefense; technologies/approaches to handling automated attacks; automatic, collaborative, multilayer intrusion detection; automated attack modeling; automatic response selection techniques; cyberwarfare situation awareness; attacker localization; multilayer defense; collaborative automatic reaction; course of action development; distributed cyber simulation, information system infrastructure which includes networking technologies/architectures that support interaction between humans and information systems as well as collaborative applications; attack forensics; information system infrastructure which includes networking technologies/architectures that support interaction between humans and information systems as well as collaborative applications; human-information system interaction in distributed computing environments; command system applications; innovative technology/component integration; conceptual design and documentation; multimedia representations; technology transition; reference prototype implementations; technology visualization; distributive computing; defensive system biological model paradigms; biological/non-biological models of intrusion detection & autonomous response, cyberwarfare situation assessment, cyberwarfare software architecture; comparable cyberwarfare architecture; advanced information assurance science, technology tools & theory; advanced autonomous response paradigms; advanced intrusion detection paradigms/models, advanced autonomous response paradigms; cyberwarfare command/control (C2) concepts/paradigms; cybersensors/sensors technology; and collaborative enterprise environment simulation. (2) BACKGROUND: The trend toward sensor-to-shooter integration, coalition operation, use of commercial products, and the increased use of mobile dynamic code significantly exacerbates the already difficult problem of providing information assurance for systems. The current nature of cyberspace provides attacking adversaries with significant advantages and permits them to accomplish their objectives without dominating the physical battlespace. The DARPA Information Assurance and Survivability (IA&S) research program is aimed at reducing vulnerabilities and giving commanders the insight and control needed to defend critical information systems. The IA&S program suite is a closely coordinated group of research programs consisting of the following efforts: Strategic Intrusion Assessment (SIA) Program; Intrusion Tolerant Systems (ITS); Fault Tolerant Networks (FTN) Program; Dynamic Coalitions (DC) Program; Information Assurance (IA) Program, Information Assurance Science and Engineering Tools (IASET) Program, Autonomic Information Assurance (AIA) Program; and Cyber Command and Control (CC2) Program. ATIAS is intended to focus research topics that investigate/study IA&S technology needs/issues/limitations/barriers. This initial BAA solicits research proposals in Focused Research Topics (FRT) #1 and #2 only (see http://www.eps.gov/). Proposal instructions are contained in the solicitation and specific FRT on the EPS homepage (http://www/eps.gov/). Proposals for these two topic areas are due on 24 May 00 (45 days after issuance of the BAA in the CBD). Periodically over the 2.5 year period (ending 30 Sep 02), amendments to the BAA/solicitation will be issued in the CBD to request proposals for subsequent Focused Research Topics (FRT). Proposals for subsequent Focused Research Topics (FRT) will be due 30 days after issuance of the BAA amendment in the CBD. This BAA is unrestricted, except no foreign participation due to International Tariff in Arms Regulations (ITAR), and all responsible domestic sources may submit proposals under full and open competitive procedures. An Inter-government Personnel Act (IPA) employee will be used in the evaluation process. IPA employees are subject to the Conflict of Interest Laws and Standards of Conduct provisions, such as rules on disclosure of confidential information. Interested offerors may view and/or download the full BAA solicitation by accessing the Electronic Posting System (EPS) homepage at http://www.eps.gov/. A website for the ATIAS program has been established to provide detailed information on the ATIAS program, the IA&S program suite, frequently asked questions (FAQ), and current and archived acquisition information. The ATIAS website may be accessed at http://www.sn.afrl.af.mil/ATIAS/index.html. PRIOR TO AWARD OF ANY CONTRACT, POTENTIAL OFFERORS MUST BE REGISTERED WITH THE CENTRAL CONTRACTOR REGISTRATION (CCR) (http://www.ccr2000.com/) AND BE ABLE TO RECEIVE PAYMENT VIA ELECTRONIC FUNDS TRANSFER (EFT). Potential offerors must also have a DUNS Number (http://www.ccr2000.com/faqs.html#10). It is anticipated awards may be either firm fixed price or cost-reimbursable type with firmed fixed price being the preferred method. Prior to award of a cost-reimbursable type contract, the offeror must have an adequate accounting system for determining costs IAW FAR 16.301-3. (4) Interested offerors may submit questions to AFRL TECHNICAL POINT OF CONTACT: Dr. Martin R. Stytz (AFRL/SNZW), email: atias@wpafb.af.mil or CONTRACTING POINT OF CONTACT: Mr. Noel E. Thompson (AFRL/SNKD), (937) 255-3585. Posted 04/05/00 (D-SN441451). (0096)

Loren Data Corp. http://www.ld.com (SYN# 0001 20000407\A-0001.SOL)


A - Research and Development Index Page