10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Curriculum</strong> <strong>Vitae</strong>Bhavani Thuraisingham, Ph.D.February 20121. Biography 22. Major Awards 53. Synopsis <strong>of</strong> Research 74. Research Leadership 135. Resume Summary 156. Industry/Government Experience 197. Teaching Experience (Academic and Pr<strong>of</strong>essional) 238. Academic Research Supervision 279. Research Funding 3110. Public<strong>at</strong>ions List (Authored works, e.g., Journals, Conferences, Books) 3611. Edited Works (e.g., Books, Proceedings, Journals) 6112. Technical Reports 6413. Present<strong>at</strong>ions (e.g., Keynote addresses, panels) 7414. S<strong>of</strong>tware Prototypes Developed 9215. N<strong>at</strong>ional and Intern<strong>at</strong>ional Research Collabor<strong>at</strong>ion 9816. Intellectual Property and P<strong>at</strong>ents 9917. Discussion <strong>of</strong> Published Work in Secure Dependable D<strong>at</strong>a Management (1985-2010) 10118. Discussion <strong>of</strong> Complete Research and Public<strong>at</strong>ions (1980-Present) 11319. Pr<strong>of</strong>essional Activities 11820. Media Reports 12221. Cyber Security Research Center and Affili<strong>at</strong>ed Labs 1271


Minnesota, Java Development Certific<strong>at</strong>ion from Learning Tree Intern<strong>at</strong>ional, the Certific<strong>at</strong>e in TerrorismStudies <strong>at</strong> St. Andrews <strong>University</strong>, Scotland and CISSP (Certified Inform<strong>at</strong>ion Systems SecurityPr<strong>of</strong>essional) certific<strong>at</strong>ion with ISC2.Dr. Bhavani is the founding president <strong>of</strong> “Bhavani Security Consulting, LLC”, a company providingservices in consulting and training in Cyber Security and Inform<strong>at</strong>ion Technology. She is also the founder<strong>of</strong> “Knowledge and Security Analytics, LLC”, a spin-<strong>of</strong>f company from UTD developing tools in assuredinform<strong>at</strong>ion sharing and “Evolving Malware Security, LLC” a second spin<strong>of</strong>f company from UTDdeveloping malware detection tools. She also serves on the inaugural corpor<strong>at</strong>e board <strong>of</strong> AccuvantCorpor<strong>at</strong>ion since 2011.Dr. Bhavani promotes M<strong>at</strong>h and Science to high school students as well as to women andunderrepresented minorities, and is a member <strong>of</strong> the Society <strong>of</strong> Women Engineers (SWE). She hasparticip<strong>at</strong>ed in panels <strong>at</strong> CRA-W and has given fe<strong>at</strong>ured addresses <strong>at</strong> conferences sponsored by WITI(Women in Technology Intern<strong>at</strong>ional) and SWE. She has been involved with IEEE Computer Societyactivities for over 10 years first serving on the conferences and tutorial board and l<strong>at</strong>er on the awardsboard. She also serves on the ACM Policy Council advising about policy issues on privacy and intellectualproperty and on the ACM-W council promoting women in computing. She is a strong advoc<strong>at</strong>e forsafeguarding children and has particip<strong>at</strong>ed in a N<strong>at</strong>ional Academy panel on protecting children frominappropri<strong>at</strong>e content on the Internet chaired by the Hon. Dick Thornburgh in 2000 and is continuing withthese efforts and recently particip<strong>at</strong>ed in the EastWest Institute’s 1 st Worldwide Security Summit panel onprotecting our children in cyberspace. She also writes motiv<strong>at</strong>ional articles including one on CS Careers inthe Global Economy and another on an 8E framework for promoting women in science and engineering.Articles on her efforts and her vision, as well as her team’s research, have appeared in multiple mediaoutlets including the <strong>Dallas</strong> Morning News, <strong>The</strong> Boston Globe, ABC News, D Magazine, MITRE M<strong>at</strong>ters,the DFW Metroplex Technology magazine and Raytheon Technology Magazine, as well as press releasespublished by UTD, MITRE, the United St<strong>at</strong>es Air Force, and IBM Research Zurich among others. She hasalso appeared on DFW television giving her views on cyber security. Her additional awards include the2001 Woman <strong>of</strong> Color Research Leadership Award from Career Communic<strong>at</strong>ions Inc. and the Fellow <strong>of</strong>the Society <strong>of</strong> Inform<strong>at</strong>ion Reuse and Integr<strong>at</strong>ion (subcommittee <strong>of</strong> IEEE Systems, Man and CyberneticsSociety).4


EXTERNALSection 2: MAJOR AWARDSBest paper award, IEEE Conference on Systems Sciences, 1988 on Secure Query ProcessingStr<strong>at</strong>egies (Invited paper published in IEEE Computer, March 1989)Recipient <strong>of</strong> IEEE Computer Society’s 1997 Technical Achievement Award for contributions tosecure distributed d<strong>at</strong>abase management. As cited by IEEE, “this award is given to individualswho have made outstanding and innov<strong>at</strong>ive contributions in the field <strong>of</strong> computer and inform<strong>at</strong>ionscience and engineering within the past 15 years”.IEEE Senior Member 1997 (now a Fellow)Recipient <strong>of</strong> Career Communic<strong>at</strong>ion Inc.’s N<strong>at</strong>ional 2001 Woman <strong>of</strong> Color Technology ResearchLeadership AwardFe<strong>at</strong>ured in SiliconIndia’s May 2002 issue as one <strong>of</strong> the top seven technology innov<strong>at</strong>ors (theonly woman) in USA <strong>of</strong> South Asian origin (others are from Stanford, Berkeley, MIT, NASA,PARC and HP Labs). <strong>The</strong> innov<strong>at</strong>ion was for d<strong>at</strong>a and web security.Recipient <strong>of</strong> IEEE’s 2003 Fellow Award for Contributions to Secure Systems involvingd<strong>at</strong>abases, distributed systems and the web. As st<strong>at</strong>ed by IEEE, “each year, following a rigorousevalu<strong>at</strong>ion procedure, the IEEE Fellow Committee recommends a select group <strong>of</strong> recipients forone <strong>of</strong> the Institute's most prestigious honors, election to IEEE Fellow”.Recipient <strong>of</strong> AAAS (American Associ<strong>at</strong>ion for the Advancement <strong>of</strong> Science) 2003 Fellow Awardfor “Outstanding and Innov<strong>at</strong>ive Contributions to Secure D<strong>at</strong>abase Systems and Secure WebInform<strong>at</strong>ion Systems”Recipient <strong>of</strong> British Computer Society (BCS) 2005 Fellow Award for contributions toinform<strong>at</strong>ion technology IEEE Distinguished Lecturer, 2002-20052010 Research Leadership Award for Outstanding and Sustained Leadership Contributions to theField <strong>of</strong> Intelligence and Security Inform<strong>at</strong>ics presented jointly by the IEEE IntelligentTransport<strong>at</strong>ion Systems Society’s Technical Committee on Intelligence and Security Inform<strong>at</strong>icsin Transport<strong>at</strong>ion Systems and the IEEE Systems, Man and Cybernetics Society’s TechnicalCommittee on Homeland Security2010 ACM SIGSAC Outstanding Contributions Award for seminal research contributions andleadership in d<strong>at</strong>a and applic<strong>at</strong>ions security for over 25 years2010 ACM Distinguished Scientist5


2011 AFCEA (Armed Forces Communic<strong>at</strong>ions and Electronics Associ<strong>at</strong>ion) Medal <strong>of</strong> Merit forService to AFCEA and Sustained Pr<strong>of</strong>essional Excellence in Communic<strong>at</strong>ions, Electronics,Intelligence and Inform<strong>at</strong>ion SystemsRecipient <strong>of</strong> 2011 SDPS (Society for Design and Process Science) Fellow Award forTransdisciplinary research in cyber securityRecipient <strong>of</strong> 2011 Society <strong>of</strong> Inform<strong>at</strong>ion Reuse and Integr<strong>at</strong>ion (Subcommittee <strong>of</strong> IEEE Systems,Man and Cybernetics Society) Fellow Award for “outstanding research contributions andleadership in Secure Knowledge Management”INTERNALMITRE Program Achievement Awards 1997 (AWACS), 2002 and 2005 (IRS Research Credit)MITRE Director’s Awards 1997 (D<strong>at</strong>a Mining), 1997 (Distributed Objects) MITRE Author <strong>of</strong> the Month Award (1997, 1999) Honeywell Computer Sciences Center Employee <strong>of</strong> the Month Award (April 1987)Control D<strong>at</strong>a Corpor<strong>at</strong>ion, Arden Hill Programming Division, CDCNET Award (September1985) NSF Program Awards (ITR 2003, Cyber Trust 2005)Louis A. Beecherl, Jr. I Distinguished Pr<strong>of</strong>essorship in the Erik Jonsson School <strong>of</strong> Engineeringand Computer Science, <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, 2010UTD Author Receptions (2007, 2008, 2009, 2010, for 4 books published while <strong>at</strong> UTD) UTD Invention Disclosure Awards, April 2010 UTD Invention Disclosure and Tech Transfer Award, November 20106


Section 3: SYNOPSIS OF RESEARCHMy research combines theory and practice. During the past 30+ years I have utilized my PhD research intheory <strong>of</strong> comput<strong>at</strong>ion and complexity theory with my systems expertise in industry to develop prototypesbased on fundamental principles. Much <strong>of</strong> my research during this time was on the design anddevelopment <strong>of</strong> secure d<strong>at</strong>a management systems based on fundamental principles. A synopsis <strong>of</strong> myresearch follows.After I finished my PhD, starting in 1980, I continued with my research in computability theory andpublished four papers on my thesis work. <strong>The</strong>y are: (i) Cylindrical Decision Problems for SystemFunctions in the Notre Dame Journal <strong>of</strong> Formal Logic in 1983; System Functions and their DecisionProblems, in Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik. (M<strong>at</strong>hem<strong>at</strong>ical LogicQuarterly) in 1984; <strong>The</strong> Concept <strong>of</strong> N-Cylinder and its Applic<strong>at</strong>ion in Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logikund Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik in 1986; and Reducibility Rel<strong>at</strong>ionships Between Decision Problems forSystem Functions in Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik in 1987. Untilmy research, there was no generalized framework to study different classes <strong>of</strong> decision problems. In otherwords, recursion theoretic properties were studied for individual problems such as the halting problem, thederivability problem and the confluence problem. With my framework, we were able to study theindividual problems with the generalized classes. This was a major breakthrough <strong>at</strong> th<strong>at</strong> time. I develepedcounter-examples for properties th<strong>at</strong> could not be proved. This was achieved by the concept <strong>of</strong> N-Cylinderwhich I defined. N-Cylinder was an extension <strong>of</strong> Paul Young’s semi-cylinder. By using the N-Cylinder, Iwas able to show th<strong>at</strong> the general confluence problem was neither recursive nor a cylinder while JohnCleave (my advisor <strong>at</strong> the <strong>University</strong> <strong>of</strong> Bristol) was unable to prove this result back in the early 1970swith the use <strong>of</strong> Young’s semi-cylinder.Between 1980 and 1983, while <strong>at</strong> the New Mexico Tech and <strong>at</strong> the <strong>University</strong> <strong>of</strong> Minnesota, I continuedto work on this topic and produced five more journal papers: Represent<strong>at</strong>ion <strong>of</strong> One-One Degrees byDecision Problems in the Journal <strong>of</strong> Computer and Systems Sciences in 1982; Some Elementary ClosureProperties <strong>of</strong> N-Cylinders in the Notre Dame Journal <strong>of</strong> Formal Logic in 1983; <strong>The</strong> Concept <strong>of</strong> N-Cylinder and its Rel<strong>at</strong>ionship to Simple Sets in the Notre Dame Journal <strong>of</strong> Formal Logic in 1983;Represent<strong>at</strong>ion <strong>of</strong> One-One Degrees by N-Cylindrical Decision Problems in Zeitschrift furM<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik in 1988; and System Function Languages inM<strong>at</strong>hem<strong>at</strong>ical Logic Quarterly in 1993. Furthermore, there were some questions th<strong>at</strong> John Cleave posed inhis work in the early 1970s which I solved in the early 1980s. Particularly interesting was the followingquestion: could every one-one degree be represented by a particular decision problem? Cleave had shownth<strong>at</strong> every m-degree could be represented by a decision problem in the early 1970s which was a weakerresult. Cleave believed th<strong>at</strong> the answer to this question would be a major breakthrough as this would showthe existence <strong>of</strong> decision problems th<strong>at</strong> are Simple. In fact this was the first problem I worked on after myPhD. It was published in the prestigious Journal <strong>of</strong> Computer and Systems Sciences. This work wouldl<strong>at</strong>er (1989) help me prove th<strong>at</strong> the inference problem was unsolvable, a significant development ind<strong>at</strong>abase security.Between January 1984 and January 1986, I worked <strong>at</strong> Control D<strong>at</strong>a Corpor<strong>at</strong>ion as I wanted to get realworld industrial experience working in a product development environment in computer networks anddistributed systems so th<strong>at</strong> I get a feel for how systems really work. During this time I started research insecure dependable distributed systems th<strong>at</strong> would complement my work <strong>at</strong> Control D<strong>at</strong>a Corpor<strong>at</strong>ion. Icollabor<strong>at</strong>ed with Pr<strong>of</strong>. W. Tsai and his student <strong>at</strong> the <strong>University</strong> <strong>of</strong> Minnesota and together we addressedthe challenging problem <strong>of</strong> fault tolerance in a binary tree task model. Prior work had focused on a treewith a single child. We felt th<strong>at</strong> binary tree model would be more realistic as tasks usually spawn multipletasks. After several years <strong>of</strong> work, we published our research in IEEE Transactions on S<strong>of</strong>twareEngineering..Due to my increasing interest in secure systems, I joined Honeywell in January 1986 as I felt having aresearch-oriented job would strengthen my research in secure systems. I started working in the challengingarea <strong>of</strong> secure d<strong>at</strong>a management. I was part <strong>of</strong> a team designing one <strong>of</strong> the two prominent high assurance7


secure d<strong>at</strong>abase systems. I was a key contributor to this design which was published in IEEE Transactionson Knowledge and D<strong>at</strong>a Engineering in 1990 entitled “Design <strong>of</strong> LDV, A Multilevel Secure D<strong>at</strong>abaseManagement System”. Our team made significant contributions to building secure d<strong>at</strong>abase systemsbased on a type enforcement mechanism to produce high assurance systems. Some <strong>of</strong> our concepts on d<strong>at</strong>aclassific<strong>at</strong>ion methods were used by Oracle and others in emerging commercial products <strong>at</strong> th<strong>at</strong> time.During this time I got interested in the inference and aggreg<strong>at</strong>ion problem and was one <strong>of</strong> three pioneerson this topic (the others being Thomas Hinke <strong>at</strong> TRW and M<strong>at</strong>hew Morgenstern <strong>at</strong> SRI). <strong>The</strong> problem isas follows: how can you prevent a user from combining unclassified pieces <strong>of</strong> d<strong>at</strong>a and deducingclassified d<strong>at</strong>a? <strong>The</strong> first paper I wrote on this topic “Security Checking in Rel<strong>at</strong>ional D<strong>at</strong>abase SystemsAugmented with Inference Engines” was published in the Computers and Security Journal. While I was <strong>at</strong>Honeywell I collabor<strong>at</strong>ed with Pr<strong>of</strong>essor Wei-Tek Tsai and his student <strong>at</strong> the <strong>University</strong> <strong>of</strong> Minnesota anddeveloped novel query rewriting techniques for secure query processing which addressed some aspects <strong>of</strong>the inference problem. This paper published in the Proceedings <strong>of</strong> the IEEE Conference on SystemsSciences in January 1988 received the best paper award and we were subsequently invited to publish anenhanced version <strong>of</strong> the paper “Secure Query Processing Str<strong>at</strong>egies” in the popular IEEE ComputerMagazine in March 1989. My continued collabor<strong>at</strong>ion with them resulted in the first ever paper on secureobject d<strong>at</strong>abase systems published in the Proceedings <strong>of</strong> the 1988 N<strong>at</strong>ional Computer SecurityConference. <strong>The</strong> system was subsequently called SODA and an enhanced version was l<strong>at</strong>er published inComputers and Security Journal in 1989. <strong>The</strong> papers mentioned in this paragraph have several cit<strong>at</strong>ions inGoogle scholar.While my main research <strong>at</strong> Honeywell was on d<strong>at</strong>a security, I also conducted some research in d<strong>at</strong>amanagement. In particular, I developed technologies for integr<strong>at</strong>ing heterogeneous d<strong>at</strong>a dictionaries. Thiswas a breakthrough <strong>at</strong> th<strong>at</strong> time as many <strong>of</strong> the approaches only worked with homogeneous d<strong>at</strong>abases anddictionaries. This work was published in the Proceedings <strong>of</strong> the N<strong>at</strong>ional Computer Conference in 1987and transferred to Honeywell’s Residential Control Division. L<strong>at</strong>er in 1988, I teamed with researchers incontrol systems and developed an expert control system called XIMKON. This work was presented in theAAAI workshop on control systems and published as a book chapter. A version was also published in theAmerican Control Systems Conference in 1989. <strong>The</strong> research was transferred to Honeywell's IndustrialAutom<strong>at</strong>ion Division and this gave me a lot <strong>of</strong> experience with technology transfer.In January 1989 I joined MITRE and started working on three topics. One is secure distributed d<strong>at</strong>abasesystems, the second is inference problem and the third is secure object systems. In the area <strong>of</strong> distributedd<strong>at</strong>abase systems we developed designs <strong>of</strong> secure query processing and secure transaction processing andimplemented the designs. <strong>The</strong> paper “Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed Query Processor” waspublished in the Journal <strong>of</strong> Systems and S<strong>of</strong>tware. <strong>The</strong> significant impact we had with this system is th<strong>at</strong> itwas the first such system to connect d<strong>at</strong>abases in Bedford, MA, McLean, VA and Fort Monmouth, NJ in1991and the demonstr<strong>at</strong>ion was a huge success with the Air Force, Navy, the Army and the NSA.With respect to the inference problem, I used the techniques I had developed during my PhD and duringthe early 1980s and proved th<strong>at</strong> the inference problem was unsolvable in 1989. This work was presented <strong>at</strong>the IEEE Computer Security Found<strong>at</strong>ions Workshop which was a highly prestigious venue in 1990. Soonafter, <strong>at</strong> the 1990 N<strong>at</strong>ional Computer Security Conference in Washington DC, Dr. John Campbell <strong>of</strong> NSAwrote in the Proceedings th<strong>at</strong> 1990 was a gre<strong>at</strong> year for secure d<strong>at</strong>abase research and st<strong>at</strong>ed something tothe effect “Bhavani Thuraisingham proving th<strong>at</strong> the inference problem was unsolvable was the mostsignificant result in 1990”. <strong>The</strong>n in the early 1990s, together with the team, I designed and developed thefirst d<strong>at</strong>abase inference controller and distributed d<strong>at</strong>abase inference controller. Two papers werepublished, one in D<strong>at</strong>a and Knowledge Engineering on “Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abaseInference Controller” and another in the IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering on“Security Constraint Processing in a Multilevel Secure Distributed D<strong>at</strong>abase System”. Both these papershave several cit<strong>at</strong>ions. Following this, I wanted to develop logic for secure d<strong>at</strong>abases so th<strong>at</strong> systems basedon logical principles could be developed. Subsequently I developed a logic called NTML (NonmonotonicTyped Multilevel Logic). It had to be nonmonotonic as one could have different inform<strong>at</strong>ion in differentsecurity worlds. <strong>The</strong> papers from this work were published in IEEE Computer Security Found<strong>at</strong>ionsWorkshop in 1991 and 1992, and this had a significant impact on the found<strong>at</strong>ions work in secured<strong>at</strong>abases th<strong>at</strong> was to be carried out l<strong>at</strong>er on. As a third approach to handling the inference problem, I used8


the concepts in semantic nets and conceptual graphs and developed methods for secure applic<strong>at</strong>ionsdesign. A paper titled “On the Use <strong>of</strong> Conceptual Structures for Handling the Inference Problem”published in IFIP D<strong>at</strong>a Security Conference in 1991 is widely quoted and Dr. Thomas Hinke and his teambased their research on my work. At th<strong>at</strong> time, the d<strong>at</strong>abase security community was divided about theapproach to designing inference controllers. Many felt th<strong>at</strong> it had to be done during d<strong>at</strong>abase design time.However, I was perhaps one <strong>of</strong> a handful <strong>of</strong> researchers who was far-thinking. I believed th<strong>at</strong> a timewould come where we would have the technologies to address the limit<strong>at</strong>ions we had in 1990. <strong>The</strong>refore, Ifelt th<strong>at</strong> we needed an integr<strong>at</strong>ed approach to study the inference problem, during query, upd<strong>at</strong>e andd<strong>at</strong>abase design. Some researchers from the <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> th<strong>at</strong> time agreed with me and publishedin the Proceedings <strong>of</strong> the 1991 Computer Security Applic<strong>at</strong>ions Conference something to the effect th<strong>at</strong>“Thuraisingham’s approach was correct”. Now, almost 20 years l<strong>at</strong>er, it is my approach th<strong>at</strong> the semanticweb community is pursuing–including Dr. Tim Finin and his team <strong>at</strong> the <strong>University</strong> <strong>of</strong> Maryland,Baltimore County and Sir Tim Berners Lee and his team <strong>at</strong> MIT. We are also developing inferencecontrollers during query processing with semantic web technologies since 2005. My research on theinference problem has resulted in three US P<strong>at</strong>ents. <strong>The</strong>se p<strong>at</strong>ents are widely cited in numerous otherp<strong>at</strong>ents, and have been purchased by Intellectual Ventures from MITRE for a substantial sum <strong>of</strong> money (Iwas told th<strong>at</strong> my p<strong>at</strong>ents were three <strong>of</strong> the four “must have” p<strong>at</strong>ents Intellectual Ventures wanted).As st<strong>at</strong>ed earlier, the third area I focused back in l<strong>at</strong>e 1980s was on secure objects. After working on thefirst secure object system with the team <strong>at</strong> the <strong>University</strong> <strong>of</strong> Minnesota, I felt th<strong>at</strong> we had to look <strong>at</strong>existing object models and examine security issues. My paper on SORION (which incorpor<strong>at</strong>ed securityinto ORION) was published in the highly prestigious conference ACM OOPSLA. This paper is titled“Mand<strong>at</strong>ory Security in Object D<strong>at</strong>abase System” and is widely cited. Pr<strong>of</strong>. Elisa Bertino from Purdue hasst<strong>at</strong>ed th<strong>at</strong> this paper is a “must read” for anyone wanting to work in object security. This was followed bythe design and implement<strong>at</strong>ion <strong>of</strong> a system using ObjectStore d<strong>at</strong>a manager and we presented the results toOntos Corpor<strong>at</strong>ion which was developing the first commercial secure object d<strong>at</strong>abase system with fundingfrom the Air Force.Around 1992, while continuing to work in secure d<strong>at</strong>abases, I then started to get into a new area and th<strong>at</strong> isreal-time d<strong>at</strong>a management. This was because the Air Force had a critical need to modernize the oldsystems such as AWACS (Airborne Warning and Control System). Because <strong>of</strong> my strong expertise in d<strong>at</strong>amanagement, I was invited to join the team. <strong>The</strong> contributions we made here are long-lasting. Wepublished papers in the main conferences and workshops in object real-time systems and they are widelycited. While working with the team to design and develop a main memory d<strong>at</strong>a manager based on objectsand adapt the priority ceiling concurrency control protocol for the d<strong>at</strong>a manager, I was the first tointroduce real-time fe<strong>at</strong>ures for Object Request Brokers. I first presented this work <strong>at</strong> the Navy’s NextGener<strong>at</strong>ion Standards meeting in Newport, Rhode Island in June 1994. <strong>The</strong>n, with the team, we wrote aposition paper and presented it <strong>at</strong> OOPSLA 1994 workshop. I then used some <strong>of</strong> my ideas into buildingthe infrastructure for AWACS. In August 1995, I was invited to particip<strong>at</strong>e in a panel <strong>at</strong> Object World inSan Francisco. At the end <strong>of</strong> my talk I said, “It’s time for OMG (Object Management Group) to start aspecial interest group on this topic”. I was contacted by some people who <strong>at</strong>tended OMG, and I gave sometechnical present<strong>at</strong>ions to them and helped co-found the group. This was a huge breakthrough as thosewho were going to oper<strong>at</strong>ionalize the prototypes we had developed would now have standards to workwith for the middleware. During this time I also wanted to combine my work in security and real-time tobuild dependable systems. I presented some ideas <strong>at</strong> a Navy meeting in December 1992, and got Pr<strong>of</strong>.Sang Son from the <strong>University</strong> <strong>of</strong> Virginia interested in this topic and we collabor<strong>at</strong>ed on a few papers.<strong>The</strong>n I combined all my ideas together in a design <strong>of</strong> a dependable system and this paper was published inIEEE Transactions on Knowledge and D<strong>at</strong>a Engineering in 1999 which spawned a new area <strong>of</strong> research.During 1995 I was given the role <strong>of</strong> managing a department in inform<strong>at</strong>ion and d<strong>at</strong>a management. Iintroduced d<strong>at</strong>a mining to MITRE Corpor<strong>at</strong>ion in October 1995. My colleague Dr. Chris Clifton (who isnow <strong>at</strong> Purdue and who was in my department) worked with me and we put together three programs ind<strong>at</strong>a, text and image mining. One <strong>of</strong> the projects was jointly carried out with Pr<strong>of</strong>. Jeff Ullman <strong>of</strong> Stanford<strong>University</strong> and Sergey Brin (who is the co-founder <strong>of</strong> Google). Sergey had planned his thesis to be on <strong>at</strong>opic called Query Flocks. I engineered this collabor<strong>at</strong>ion between MITRE and Stanford which gaveMITRE tremendous visibility among the major players in d<strong>at</strong>a mining. <strong>The</strong> two teams published a paper9


on Query Flocks <strong>at</strong> ACM SIGMOD which is widely cited. Although I was invited to join as a co-author, Ideclined as I only put my name on a paper if I have made technical contributions to th<strong>at</strong> paper. At thesame time, I got the MITRE team to write an article on d<strong>at</strong>a management research <strong>at</strong> MITRE and got itpublished in the highly visible ACM SIGMOD RECORD. This article instantly put MITRE on the map asa player in d<strong>at</strong>a management and d<strong>at</strong>a mining.In my position, by the l<strong>at</strong>e 1990s, I had to interact with people <strong>at</strong> many levels. <strong>The</strong>se included researchers,government sponsors, and management <strong>at</strong> MITRE among others. In addition, I had my own research todo. <strong>The</strong>refore, I felt th<strong>at</strong> I had to write some books th<strong>at</strong> would educ<strong>at</strong>e the high level managers andgovernment sponsors about the key concepts. <strong>The</strong>refore, I started writing a few books on d<strong>at</strong>amanagement and d<strong>at</strong>a mining. Th<strong>at</strong> has now evolved into twelve books on d<strong>at</strong>a management, d<strong>at</strong>a miningand d<strong>at</strong>a security. Around the l<strong>at</strong>e 1990s, being <strong>at</strong> MITRE I felt th<strong>at</strong> I was getting more and more removedfrom wh<strong>at</strong> industry was doing. By th<strong>at</strong> time, my six years in industry <strong>at</strong> Control D<strong>at</strong>a and Honeywell inthe 1980s seemed so long ago. <strong>The</strong>refore, when the IRS (Internal Revenue Service) consulting opportunityfor examining s<strong>of</strong>tware research credit arose <strong>at</strong> MITRE, I took the position without any hesit<strong>at</strong>ion. Thisgave me insights (and continues to give me insights) into wh<strong>at</strong> the Fortun<strong>at</strong>e 500 companies do and wh<strong>at</strong>they ought to do with respect to s<strong>of</strong>tware. <strong>The</strong>refore, now I have such an excellent understanding <strong>of</strong> wh<strong>at</strong>industry is doing which is helping me a lot with my own university spin-<strong>of</strong>f company.In January 2001, I felt I was ready for the big move to Washington to see wh<strong>at</strong> it is like to be inside thegovernment. My plan was to go there for one year to manage the d<strong>at</strong>a management program. But I endedup spending three years. I started the d<strong>at</strong>a and applic<strong>at</strong>ions security program and co-founded the cybertrust theme. I started my own research in secure semantic web and d<strong>at</strong>a privacy and worked with the<strong>University</strong> <strong>of</strong> Milan team on XML Security. Our joint research papers were published in two prestigiousjournals: IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering on Third Party Public<strong>at</strong>ion <strong>of</strong> D<strong>at</strong>a andin ACM Transactions on Inform<strong>at</strong>ion and Systems Security on Privacy for Trust Management. While <strong>at</strong>NSF, I also began to get a clear picture and understand the government’s needs. With this knowledge, Ithen joined <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>.My task <strong>at</strong> the university was to establish a cyber security research center. While I had some startup fundsfor my own research, I did not have funds to start the center. <strong>The</strong>refore, I decided to focus on d<strong>at</strong>asecurity. After 9/11, there was a huge demand for inform<strong>at</strong>ion sharing. <strong>The</strong>refore, I started a project withthe Air Force and worked on assured inform<strong>at</strong>ion sharing. Our papers were published in several journalsincluding the Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy. More importantly, I wrote the one page paperth<strong>at</strong> went into the DoD MURI BAA (Department <strong>of</strong> Defense Multidisciplinary <strong>University</strong> ResearchIniti<strong>at</strong>ive Broad Agency Announcement). This resulted in a very large research project on this topic.While my team’s focus is on incentives-based inform<strong>at</strong>ion sharing, which is an interdisciplinary projectbetween economists, management scientists, social scientists and computer scientists, my work alsocontinued to be in policy management for semantic web and I expanded it to social networks. Our paperpublished in ACM SACMT in 2009 was one <strong>of</strong> the early papers on security for social networks based onsemantic web and an enhanced version <strong>of</strong> this paper has appeared in the Computers and Security Journal.In addition to policy management and inform<strong>at</strong>ion sharing, my research also focused on ontologyalignment and d<strong>at</strong>a mining for security applic<strong>at</strong>ions. In the area <strong>of</strong> ontology alignment, we used geosp<strong>at</strong>iald<strong>at</strong>a as the applic<strong>at</strong>ions domain. Our papers were published in the prestigious conference ACM GIS threeyears in a row (2007-2009) and a paper was published in the highly prestigious Journal <strong>of</strong> Web Semantics.In the area <strong>of</strong> d<strong>at</strong>a mining for security applic<strong>at</strong>ions, we have made tremendous progress in developingnovel techniques as well as tools. Several papers have been published including in prestigious conferencessuch as IEEE ICDM, and ECML/PKDD as well as in ACM Transactions on Management Inform<strong>at</strong>ionSystems and IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering. A p<strong>at</strong>ent on stream mining as wellas another on social network mining have been filed. A small part <strong>of</strong> my time is spent on investig<strong>at</strong>ingissues on dependable systems and we have a paper accepted in IEEE Transactions on Reliability on thistopic.Last but not least, one <strong>of</strong> the major areas for our government sponsors is secure cloud computing. Wehave a fairly large project on this topic and are building a secure cloud infrastructure to demonstr<strong>at</strong>e theassured inform<strong>at</strong>ion sharing concept. We are one <strong>of</strong> the first to get into this area and have developed10


secure query processing for cloud. Papers on this topic have appeared in prestigious conferences andjournals such as IEEE Cloud Computing and IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering.We have also developed secure storage for grids and this paper was published in IEEE Transactions onDependable and Secure Computing. My current challenge is to look <strong>at</strong> virtual machines and hypervisorssuch as XEN being developed <strong>at</strong> the <strong>University</strong> <strong>of</strong> Cambridge, examine security issues and bring it intoour cloud infrastructure. Due to the excellent work we have done in this area, the US Air Force did a pressrelease on our research on their web site which has given us a lot <strong>of</strong> visibility (seehttp://www.wpafb.af.mil/news/story.asp?id=123209377) Several other articles have appeared about ourwork, including some internal press releases, and some comments from external organiz<strong>at</strong>ions andagencies. <strong>The</strong>se press releases are listed in Section H.I am very pleased with the way my research has progressed over the past 30 years. Coming from industryand government has helped me to understand real world problems and address these problems in myresearch. However, I have a very strong fundamental background with a B.Sc in M<strong>at</strong>hem<strong>at</strong>ics and Physicsfrom the <strong>University</strong> <strong>of</strong> Ceylon (1 st class), M.Sc in M<strong>at</strong>hem<strong>at</strong>ical Logic from the <strong>University</strong> <strong>of</strong> Bristol, anda PhD in Computability <strong>The</strong>ory from the <strong>University</strong> <strong>of</strong> Wales, Swansea. <strong>The</strong>refore, I believe th<strong>at</strong> to buildsystems th<strong>at</strong> can last and be evolvable and adaptable, we need to build them with sound theoreticalprinciples. While continuing my research <strong>at</strong> the university will be my main priority, the university spin-<strong>of</strong>fcompany we have started would give us an opportunity to transfer our technologies into products and spurjob cre<strong>at</strong>ion which is one <strong>of</strong> the challenges we are faced with today. I would also like to point out somest<strong>at</strong>istics <strong>of</strong> my work as <strong>of</strong> December 4, 2010. In Google Scholar, 339 public<strong>at</strong>ions are listed between1982 and 2010. <strong>The</strong>se 339 public<strong>at</strong>ions have a total cit<strong>at</strong>ion <strong>of</strong> 3,099. <strong>The</strong> average cit<strong>at</strong>ion per paper is9.14. My H-Index is 27 and G-Index is 42. My research has resulted in numerous awards and fellowshipsfrom IEEE and ACM, among others. More importantly it earned me the higher doctor<strong>at</strong>e degree <strong>of</strong> Doctor<strong>of</strong> Engineering <strong>at</strong> the <strong>University</strong> <strong>of</strong> Bristol (ranked #23 among the world universities by the US News andWorld Report in 2010) for my thesis consisting <strong>of</strong> my published work on secure dependable d<strong>at</strong>amanagement,After spending three years <strong>at</strong> the N<strong>at</strong>ional Science Found<strong>at</strong>ion and establishing programs in d<strong>at</strong>a andapplic<strong>at</strong>ion security, I joined UTD in October 2004. At UTD I have developed two areas: (i) CyberSecurity, in particular D<strong>at</strong>a and Applic<strong>at</strong>ions Security and (ii) Inform<strong>at</strong>ion Management. In the area <strong>of</strong>D<strong>at</strong>a and Applic<strong>at</strong>ions Security, I have focused on four areas. (a) Assured inform<strong>at</strong>ion sharing: My teamin the CS department collabor<strong>at</strong>es with the School <strong>of</strong> Management and Economics and Policy Sciences todevelop an interdisciplinary approach for incentive-based inform<strong>at</strong>ion sharing. (b) In addition, we havealso explored research issues in secure and priv<strong>at</strong>e social networks. (c) We also developed novel privacypreservingd<strong>at</strong>a mining and d<strong>at</strong>a integr<strong>at</strong>ion techniques. (d) Policy management-based on semantic webtechnologies. (e) D<strong>at</strong>a mining tools for security applic<strong>at</strong>ions. Notable among these tools are those basedon novel class detection for stream mining. In the area <strong>of</strong> Inform<strong>at</strong>ion Management, our focus has been ondeveloping technologies for n<strong>at</strong>ional security in two major areas. (a) We have designed ontologyalignment algorithms critical for homeland security applic<strong>at</strong>ions and (b) developed geosp<strong>at</strong>ial d<strong>at</strong>amanagement and mining techniques. In addition to d<strong>at</strong>a security and inform<strong>at</strong>ion management, my teamhas also focused on secure cloud computing and in-line reference monitors. In addition to collabor<strong>at</strong>ingwith two <strong>of</strong> my colleagues and contributing to assured inform<strong>at</strong>ion sharing as well as to the d<strong>at</strong>a miningtools, my main research has been on policy management based on semantic web technologies. Our goal isto build inference controllers based on RDF d<strong>at</strong>a engines and RDF reasoning engines. Essentially, thisresearch extends my earlier work on the inference problem utilizing semantic web technologies. I havealso developed prototypes for policy management in a coalition environment.We are developing a multi-pronged approach to research. Our major goal is to publish papers in the mostprestigious journals and conferences. Since 2005, I have papers published in IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, IEEE Transactions on Dependable and Secure Computing, ACMTransactions on Inform<strong>at</strong>ion and Systems Security, IEEE Transactions on Systems, Man and Cybernetics,and Very Large D<strong>at</strong>abase Journal. Prestigious conferences include IEEE Conference on D<strong>at</strong>a Mining(ICDM) and ACM Conference <strong>of</strong> Access Control and Models (SACMAT). My team has published severalmore papers in IEEE as well as in ACM Transactions. Our second goal is to build systems. We havedeveloped several prototypes and tools and have published open source s<strong>of</strong>tware. <strong>The</strong>se tools are being11


utilized by our colleagues around the world. Our third goal is to disclose inventions, develop intellectualproperty and start spin-<strong>of</strong>f companies. This is something we started in 2009. Our fourth goal is tocontribute to standards and we particip<strong>at</strong>e in W3C and OGC standards.Since October 2005, my team has gener<strong>at</strong>ed over $14 million in research funding and over $2m ineduc<strong>at</strong>ion funding including a DoD MURI, two NSF Career awards, AFOSR YIP and NSF SFS. Oursponsors include AFOSR, NSF, IARPA, NGA, NASA, ONR and NIH. Our major corpor<strong>at</strong>e sponsor isRaytheon. We also collabor<strong>at</strong>e with Tektronix. I am working toward expanding our corpor<strong>at</strong>e sponsorbase and we are having discussions with Lockheed, Rockwell and IBM, among others.12


Section 4: RESEARCH LEADERSHIPhttp://ecs.utdallas.edu/news-events/news/csaward-6-10.htmlComputer Science Pr<strong>of</strong>essor Bhavani Thuraisingham received the 2010 RESEARCH LEADERSHIPAWARD For Outstanding and Sustained Leadership Contributions to INTELLIGENCE ANDSECURITY INFORMATICS jointly awarded by <strong>The</strong> IEEE Intelligent Transport<strong>at</strong>ion Systems SocietyTechnical Committee on Intelligence and Security Inform<strong>at</strong>ics in Transport<strong>at</strong>ion Systems and <strong>The</strong> IEEESystems, Man, and Cybernetics Society Technical Committee on Homeland Security.Intelligence and Security Inform<strong>at</strong>ics (ISI), a term coined by Dr. H. Chen, McClelland Pr<strong>of</strong>essor <strong>of</strong>Management Inform<strong>at</strong>ion System <strong>at</strong> the <strong>University</strong> <strong>of</strong> Arizona Business School, is an interdisciplinaryfield th<strong>at</strong> integr<strong>at</strong>es multiple disciplines such as computer and inform<strong>at</strong>ion sciences, social sciences andmanagement sciences to support law enforcement, counterterrorism and homeland security missions <strong>of</strong>anticip<strong>at</strong>ion, interdiction, prevention, preparedness and response to terrorism and violence.Thuraisingham received this award <strong>at</strong> the Eighth IEEE ISI Conference in Vancouver, British Columbia onMay 24, 2010. Previous recipients <strong>of</strong> this award include Dr. John Phillips, Chief Scientist <strong>of</strong> the CIA in2006, and Dr. Henry Lee, the world renowned Forensics Scientist in 2008. Not only has Dr.Thuraisingham been a pioneering researcher in the field <strong>of</strong> ISI for the past 25 years, she has continued toprovide extensive leadership to the US Federal Government and the research community. In the earlyyears she focused on research in d<strong>at</strong>a security while <strong>at</strong> Honeywell and l<strong>at</strong>er <strong>at</strong> MITRE and for thisresearch she received the 1997 IEEE Computer Society’s Technical Achievement Award. Since then shehas expanded her research to include d<strong>at</strong>a mining for cyber security and counter-terrorism applic<strong>at</strong>ions.N<strong>at</strong>ional Science Found<strong>at</strong>ion Program Director Dr. Maria Zemankova has st<strong>at</strong>ed th<strong>at</strong> Thuraisingham “isextremely sharp technically and also is a born leader” (Reference: MITRE M<strong>at</strong>ters, March 2003). Dr.Chris Clifton, Associ<strong>at</strong>e Pr<strong>of</strong>essor <strong>at</strong> Purdue <strong>University</strong>, has st<strong>at</strong>ed “there have been a lot <strong>of</strong> areas whereshe’s been ahead <strong>of</strong> the game”.While Thuraisingham was <strong>at</strong> the MITRE Corpor<strong>at</strong>ion, she was an advisor to the Chief <strong>of</strong> the N<strong>at</strong>ionalSecurity Agency’s (NSA) INFOSEC research between 1990 and 1997, and helped establish researchprograms in d<strong>at</strong>a security and also collabor<strong>at</strong>ed with researchers <strong>at</strong> NSA and mentored the juniorresearchers <strong>at</strong> the request <strong>of</strong> the then chief <strong>of</strong> NSA/R2. In 1993 she helped the Intelligence Community toestablish the Massive Digital D<strong>at</strong>a Systems (MDDS) Initi<strong>at</strong>ive and continued to be an advisor to thisprogram until 1999. <strong>The</strong> results <strong>of</strong> the MDDS program were briefed to a DARPA (Defense AdvancedResearch Projects Agency) Office Director in December 1997 th<strong>at</strong> ultim<strong>at</strong>ely led to DARPA’s EELD(Evidence Extraction and Link Detection) program. During this period, she also gave tutorials andseminars <strong>at</strong> numerous federal research labor<strong>at</strong>ories and agencies including <strong>at</strong> ESC (Electronics SystemsCenter), DISA (Defense Inform<strong>at</strong>ion Systems Agency), NSA, EUCOM (United St<strong>at</strong>es EuropeanCommand), SPAWAR (<strong>The</strong> Space and Naval Warfare Systems Center), CECOM (US ArmyCommunic<strong>at</strong>ions-Electronics Command), AFSPC (Air Force Space Command), AMC (Air MobilityCommand), ATIS-JPO (Advanced Integr<strong>at</strong>ion Technical Services - Joint Program Office), IRS (InternalRevenue Service) and AIA (Air Intelligence Agency). She started consulting for IRS in January 1999 andcontinues to advise on s<strong>of</strong>tware research credit. She also consulted to the Justice Department on s<strong>of</strong>twarerel<strong>at</strong>edtax cases in 2001.Dr. Thuraisingham joined NSF in October 2001 as Program Director and became involved in Inter-agencyefforts on applying D<strong>at</strong>a Mining for Counter-Terrorism. She gave invited talks <strong>at</strong> the White House Office<strong>of</strong> Science and Technology Policy, the N<strong>at</strong>ional Academy <strong>of</strong> Sciences as well as <strong>at</strong> the United N<strong>at</strong>ions in2002 so th<strong>at</strong> n<strong>at</strong>ional and intern<strong>at</strong>ional programs could be established on this important topic. At the sametime, she established the D<strong>at</strong>a and Applic<strong>at</strong>ions Security Program <strong>at</strong> NSF and in 2003 she co-founded theCyber Trust theme. While <strong>at</strong> NSF, she was also a consultant to the Department <strong>of</strong> Health and HumanServices’ St<strong>at</strong>es Bioterrorism Initi<strong>at</strong>ive.13


Since joining UTD in October 2004, she has continued to provide leadership to government programs bygiving present<strong>at</strong>ions on semantic web and d<strong>at</strong>a security as well as on d<strong>at</strong>a analytics to IARPA’s(Intelligence Advanced Research Projects Activity) KDD (Knowledge Discovery and Dissemin<strong>at</strong>ion)Program, Air Force Research Labor<strong>at</strong>ory, <strong>The</strong> Central Intelligence Agency and also the Department <strong>of</strong>Homeland Security’s USVISIT program. She has continued to give present<strong>at</strong>ions and tutorials <strong>at</strong> severalAir Force Bases including <strong>at</strong> Offut, Eglin, Lackland, Edwards and Kirkland as well as to the Navy inNorfolk, VA. In addition to advising the US Government and establishing research programs,Thuraisingham has also influenced the field by giving over 70 keynote addresses <strong>at</strong> major intern<strong>at</strong>ionalconferences since 1994. She has also provided services as an expert witness and has consulted to thefederal government through corpor<strong>at</strong>ions.Thuraisingham’s tireless efforts have benefitted her research <strong>at</strong> UTD a gre<strong>at</strong> deal. Together with hercolleagues, she has established a strong research and educ<strong>at</strong>ion program <strong>at</strong> UTD in Cyber Security th<strong>at</strong>includes DoD MURI, NSF Career, AFOSR YIP and NSF SFS (Scholarship for Service) awards. <strong>The</strong> teamhas also received grants from NIH, ONR, IARPA, NGA and NASA. Thuraisingham’s current efforts arein developing research, infrastructure and educ<strong>at</strong>ion programs in assured cloud computing. She promotesa strong customer-focused, team-oriented collabor<strong>at</strong>ive culture and she is working on bringing togetherthe vast number <strong>of</strong> DFW Corpor<strong>at</strong>ions to work on interdisciplinary research programs. Most recently, sheis heading an intern<strong>at</strong>ional collabor<strong>at</strong>ive effort on assured sharing in a cloud environment.She promotes M<strong>at</strong>h and Science to high school students as well as to women and underrepresentedminorities, and is a member <strong>of</strong> the Society <strong>of</strong> Women Engineers (SWE). She has given fe<strong>at</strong>ured addresses<strong>at</strong> conferences sponsored by WITI (Women in Technology Intern<strong>at</strong>ional) and SWE and received the 2001Woman <strong>of</strong> Color Research Leadership Award from Career Communic<strong>at</strong>ions Inc. Articles on her effortsand her vision, as well as her team’s research, have appeared in multiple magazines including the <strong>Dallas</strong>Morning News, the Boston Globe, ABC News, D Magazine, MITRE M<strong>at</strong>ters the DFW MetroplexTechnology magazine. She has also appeared on DFW television giving her view on cyber security. Shehas particip<strong>at</strong>ed in panels on educ<strong>at</strong>ion-rel<strong>at</strong>ed issues including one on protecting children frominappropri<strong>at</strong>e content on the Internet chaired by Hon. Dick Thornburgh in 2000. She is continuing withthese efforts and recently particip<strong>at</strong>ed in EastWest Institute’s 1 st Worldwide Security Summit panel onprotecting children in cyberspace.14


Section 5: RESUME SUMMARYName:Dr. Bhavani ThuraisinghamWork Address: Department <strong>of</strong> Computer Science<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, Richardson, <strong>Texas</strong>Title:Louis A. Beecherl, Jr. I Distinguished Pr<strong>of</strong>essorPhone: 972-883-4738; Fax: 972-883-2349Email:Bhavani.thuraisingham@utdallas.eduURL:http://www.utdallas.edu/~bxt043000/I. EDUCATIONHigher Doctor<strong>at</strong>e: Doctor <strong>of</strong> Engineering, D. Eng, . July 2011, <strong>The</strong>sis consisting <strong>of</strong> published work inSecure Dependable D<strong>at</strong>a Management, <strong>University</strong> <strong>of</strong> Bristol, England.Ph.D. in <strong>The</strong>ory <strong>of</strong> Comput<strong>at</strong>ion and Computability <strong>The</strong>ory; <strong>University</strong> <strong>of</strong> Wales, Swansea, UnitedKingdom, July 1979 (<strong>at</strong> age 24). <strong>The</strong>sis: Decision Problems for System FunctionsAdvisors: Dr. Roger Hindley (Swansea), Dr. John Cleave (Bristol) – received most <strong>of</strong> the supervision <strong>at</strong><strong>University</strong> <strong>of</strong> Bristol and submitted thesis <strong>at</strong> <strong>University</strong> <strong>of</strong> Wales, Swansea due to residency requirementsM.S. in Computer Science, <strong>University</strong> <strong>of</strong> Minnesota, March 1984 (G.P.A. 4.0/4.0); Specialized in:D<strong>at</strong>abases, Networks, Oper<strong>at</strong>ing Systems. Dissert<strong>at</strong>ion: Transport Layer for a Token Ring Network,Advisor: Dr. William MunroeM.Sc. in M<strong>at</strong>hem<strong>at</strong>ical Logic and Found<strong>at</strong>ions <strong>of</strong> Computer Science; <strong>University</strong> <strong>of</strong> Bristol, UnitedKingdom, January 1977; <strong>The</strong>sis: Construction <strong>of</strong> a Universal Partial Recursive Functional; Advisors: Dr.John Cleave and Pr<strong>of</strong>. John ShepherdsonB.Sc. in Pure M<strong>at</strong>hem<strong>at</strong>ics, Applied M<strong>at</strong>hem<strong>at</strong>ics, and Physics; <strong>University</strong> <strong>of</strong> Ceylon, August 1975(First Class and First in order <strong>of</strong> merit)CERTIFICATION PROGRAMS (with exams)1. JAVA Certific<strong>at</strong>ion, Learning Tree Intern<strong>at</strong>ional, 1998-2000 (5 courses)2. Certific<strong>at</strong>e in Terrorism Studies, St. Andrews <strong>University</strong>, Scotland, January – May 20103. CISSP, May 2010PROFESSIONAL EDUCATION1. Management Development Program, 1996-1997, <strong>The</strong> MITRE Institute2. US Intelligence Community, AFCEA 19943. Cybil Programming Language, Control D<strong>at</strong>a Institute, 1984II. HONORS AND AWARDS External: Recipient <strong>of</strong> 2011 AFCEA (Armed ForcesCommunic<strong>at</strong>ions and Electronics Associ<strong>at</strong>ion) Medal <strong>of</strong> Merit for Service to AFCEA and SustainedPr<strong>of</strong>essional Excellence in Communic<strong>at</strong>ions, Electronics, Intelligence and Inform<strong>at</strong>ion Systems ;Recipient <strong>of</strong> 2011 SDPS (Society for Design and Process Science) Fellow Award for Transdisciplinaryresearch in cyber security; Recipient <strong>of</strong> 2011 Society <strong>of</strong> Inform<strong>at</strong>ion Reuse and Integr<strong>at</strong>ion Fellow Awardfor “outstanding research contributions and leadership in Secure Knowledge Management”;Recipient <strong>of</strong>2010 ACM SIGSAC Outstanding Contributions Award; ACM Distinguished Scientist 2010; Recipient <strong>of</strong>2010 Research Leadership Award for Outstanding and Sustained Leadership Contribution to the Field <strong>of</strong>Intelligence and Security Inform<strong>at</strong>ics; Recipient <strong>of</strong> IEEE’s 2003 Fellow Award for Contributions toSecure Systems involving d<strong>at</strong>abases, distributed systems and the web; Recipient <strong>of</strong> AAAS (AmericanAssoci<strong>at</strong>ion for the Advancement <strong>of</strong> Science) 2003 Fellow Award; Recipient <strong>of</strong> British Computer Society(BCS) 2005 Fellow Award; Recipient <strong>of</strong> IEEE Computer Society’s 1997 Technical Achievement Awardfor outstanding and innov<strong>at</strong>ive contributions to secure distributed d<strong>at</strong>abase management; Fe<strong>at</strong>ured inSiliconIndia magazine (May 2002) issue as one <strong>of</strong> seven prominent technology innov<strong>at</strong>ors (the onlywoman) in the USA <strong>of</strong> South Asian origin; Recipient <strong>of</strong> Career Communic<strong>at</strong>ion Inc.’s N<strong>at</strong>ional 200115


Woman <strong>of</strong> Color Technology Research Leadership Award Best Paper Award, IEEE Conference onSystems Sciences, 1988.Internal: Louis A. Beecherl, Jr. I Distinguished Pr<strong>of</strong>essorship, 2010; MITRE Corpor<strong>at</strong>ion’s ProgramAchievement Award (distributed real-time systems) 1997; IRS Program Award 2002 and 2005; DirectorAwards for d<strong>at</strong>a mining and distributed objects, 1998.III. SIGNIFICANCE OF RESEARCHMy early research was on theory <strong>of</strong> comput<strong>at</strong>ion and in particular, recursion theory. This research wascarried out as visiting pr<strong>of</strong>essor <strong>at</strong> the New Mexico Institute <strong>of</strong> Technology and <strong>at</strong> the <strong>University</strong> <strong>of</strong>Minnesota for three years. It resulted in several journal public<strong>at</strong>ions including in the Journal <strong>of</strong> Computerand Systems Sciences. Since 1985, my research has focused on d<strong>at</strong>a security. This research was carried outinitially <strong>at</strong> Honeywell, Inc. as well as the <strong>University</strong> <strong>of</strong> Minnesota as adjunct faculty <strong>of</strong> computer sciencefor over four years. I continued with this research <strong>at</strong> the MITRE Corpor<strong>at</strong>ion starting in 1989. Significantcontributions include design and development <strong>of</strong> Lock D<strong>at</strong>a Views Rel<strong>at</strong>ional D<strong>at</strong>abase System, designand development <strong>of</strong> secure distributed d<strong>at</strong>abase system, design and development <strong>of</strong> techniques to handlethe inference problem, design <strong>of</strong> NTML: a Non Monotonic Logic for Secure D<strong>at</strong>a and Knowledge BasedSystems, design and development <strong>of</strong> secure multimedia and object systems, and the design anddevelopment <strong>of</strong> an object-based real-time d<strong>at</strong>a manager and middleware for next gener<strong>at</strong>ion real-timecommand and control systems. I also used my background in theory and proved th<strong>at</strong> the inferenceproblem was unsolvable. This work has been quoted by Dr. John Campbell <strong>of</strong> NSA as a significantdevelopment in d<strong>at</strong>abase security in 1990. My main research now is focusing in four major areas: AssuredInform<strong>at</strong>ion Sharing; Securing the Semantic Web; Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management; KnowledgeDiscovery/D<strong>at</strong>a Mining for security applic<strong>at</strong>ions and their privacy implic<strong>at</strong>ions. I focus on developingsound theories and then build highly assured systems th<strong>at</strong> are founded on theories th<strong>at</strong> result in prototypes,some <strong>of</strong> which are transferred to oper<strong>at</strong>ional systems and products.IV. WORK EXPERIENCE(i) <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, Richardson, TX (October 2004 – Present): In October 2004, Ijoined the <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> as Tenured Full Pr<strong>of</strong>essor <strong>of</strong> Computer Science and Director <strong>of</strong>the Cyber Security Research Center <strong>at</strong> the Erik Jonsson School <strong>of</strong> Engineering and Computer Science.This is my first tenure track faculty appointment. Over the past seven years, I have hired and mentoredseveral junior faculty in Cyber Security in general and D<strong>at</strong>a Security, in particular. Together we havesecured competitive research funding <strong>of</strong> over $14 million from several federal agencies including AirForce Office <strong>of</strong> Scientific Research, N<strong>at</strong>ional Science Found<strong>at</strong>ion, N<strong>at</strong>ional Geosp<strong>at</strong>ial IntelligenceAgency, N<strong>at</strong>ional Aeronautical and Space Administr<strong>at</strong>ion, and Intelligence Advanced Research ProjectsAgency. This funding also includes a prestigious DoD MURI award. In addition, we have established aclose research collabor<strong>at</strong>ion and partnership with Raytheon Corpor<strong>at</strong>ion in DFW. Together we have about30 Ph.D. students; I gradu<strong>at</strong>ed my first student in 2007. Due to our efforts, we were in the first group <strong>of</strong>universities to receive the NSA/DHS Center for Excellence in Research Award in 2008. My team hassignificantly enhanced UTD’s educ<strong>at</strong>ion program in Inform<strong>at</strong>ion Assurance by introducing severalcourses including D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Digital Forensics, Trustworthy Semantic Web,Biometrics, Privacy, Knowledge Discovery, Cryptography and Secure Programming Languages. UT<strong>Dallas</strong> is one <strong>of</strong> the top universities in the world in d<strong>at</strong>a security educ<strong>at</strong>ion.(ii) N<strong>at</strong>ional Science Found<strong>at</strong>ion, Arlington, VA (Oct. 1, 2001 – September 30, 2004)IPA Position: Director <strong>of</strong> Cyber Trust, D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Inform<strong>at</strong>ion and D<strong>at</strong>aManagement.As an IPA from the MITRE Corpor<strong>at</strong>ion <strong>at</strong> NSF for three years, I managed programs in Inform<strong>at</strong>ionManagement, Sensor Networks, D<strong>at</strong>a and Applic<strong>at</strong>ions Security and Cyber Trust. In addition, I initi<strong>at</strong>edthe program in d<strong>at</strong>a and applic<strong>at</strong>ions security and made it a focus area.(iii) <strong>The</strong> MITRE Corpor<strong>at</strong>ion, Bedford, MA (January 1989 – October 2004): My 15 plus yearsexperience <strong>at</strong> MITRE has given me the opportunity to work on research, development and technologytransfer projects. I secured research funding from a number <strong>of</strong> sponsors including the Air Force, Navy,16


Army, NSA, and CIA as well as consulted for the IRS. I led team research efforts and designed anddeveloped algorithms and prototypes for secure distributed d<strong>at</strong>abase systems, secure object systems andsecure deductive systems. I proved th<strong>at</strong> the inference problem was unsolvable and developed solutions tolimited aspects <strong>of</strong> this problem. We also developed distributed object-based real-time systems andtransferred the technology to the AWACS program. Additionally, I built MITRE’s programs and gavethem intern<strong>at</strong>ional visibility in d<strong>at</strong>a mining and d<strong>at</strong>a security. For 4 years, I managed a department <strong>of</strong>about 28 staff. I am currently a consultant to IRS through MITRE on the s<strong>of</strong>tware research credit program.(iv) Honeywell, Inc., Golden Valley, MN (January, 1986 – January, 1989) Position: PrincipalResearch Scientist / Engineer, Corpor<strong>at</strong>e Systems Development Division. I conducted research,development, and technology transfer activities in d<strong>at</strong>abase security, d<strong>at</strong>a management, distributedprocessing, inform<strong>at</strong>ion systems, process control systems, pay<strong>of</strong>f modeling, and AI applic<strong>at</strong>ions. Inaddition to reports and proprietary documents, papers were also published in refereed journals andconferences. Work was carried out for Honeywell internal divisions, as well as for the Air Force andNASA.(v) Control D<strong>at</strong>a Corpor<strong>at</strong>ion, Arden Hills, MN (December 1983 – January 1986) Position: SeniorProgrammer/ Analyst, Arden Hills programming Division. I was involved in the design and development<strong>of</strong> the CDCNET (Control D<strong>at</strong>a Communic<strong>at</strong>ions Network) product. Company proprietary documents werealso written. Specifically, I was responsible for the design and development <strong>of</strong> transport, network, sessionlayers as well as several other components <strong>of</strong> the network. Details are given under the Industry Experiencesection.V. RESEARCH ACCOMPLISHMENTSPublic<strong>at</strong>ions St<strong>at</strong>istics: Over 100 journal papers including articles in several IEEE Transactions, VeryLarge D<strong>at</strong>abase Journal, ACM Transactions, Journal <strong>of</strong> Computer and Systems Sciences and Notre DameJournal <strong>of</strong> Formal Logic. Over 200 Conference/Workshop Papers (IEEE, ACM and IFIP conferences),over 70 keynote/fe<strong>at</strong>ured present<strong>at</strong>ions, 12 books authored (d<strong>at</strong>a security, d<strong>at</strong>a management and d<strong>at</strong>amining), 12 books edited; 4 US p<strong>at</strong>ents (3 obtained and 1 filed in d<strong>at</strong>a security).Research Contracts/GrantsUT <strong>Dallas</strong>: Over $14 million in grants and contracts by my team in assured inform<strong>at</strong>ion sharing,geosp<strong>at</strong>ial inform<strong>at</strong>ion management, semantic web, d<strong>at</strong>a mining for security applic<strong>at</strong>ions, and securegrids. Sponsors include AFOSR, IARPA, NSF, NASA, NGA, ONR, NIH and Raytheon. Over $2 millionin educ<strong>at</strong>ion grants in cyber security from DoD and NSF.MITRE: I initi<strong>at</strong>ed and led several research projects for various sponsors including Navy (securedistributed d<strong>at</strong>abases, secure objects, inference problem/NTML), Army (inference problem, securityconstraint processing), Air Force (secure distributed d<strong>at</strong>abases and real-time d<strong>at</strong>abases/middleware), andN<strong>at</strong>ional Security Agency (secure feder<strong>at</strong>ed d<strong>at</strong>abases, designing secure systems and applic<strong>at</strong>ions). Eachproject th<strong>at</strong> I led consisted <strong>of</strong> about three – five staff, a third with Ph.D.’s and half with MS degrees; alsoincluded students from Carnegie Mellon <strong>University</strong>, Cornell, <strong>University</strong> <strong>of</strong> Rhode Island and NorthEastern <strong>University</strong>.Prototypes and Products: UT <strong>Dallas</strong>: My students are implementing several prototypes in secure d<strong>at</strong>a,inform<strong>at</strong>ion and knowledge management systems, d<strong>at</strong>a mining tools for security applic<strong>at</strong>ions, geosp<strong>at</strong>ialsemantic webs and social network tools. Some tools were transferred to the Raytheon program and we arehaving discussions on commercializing the d<strong>at</strong>a mining tools. Other: Developed parts <strong>of</strong> the CDCNETproduct <strong>at</strong> Control D<strong>at</strong>a Corpor<strong>at</strong>ion (extensive implement<strong>at</strong>ion in Cybil language). Oversaw theimplement<strong>at</strong>ion <strong>of</strong> expert process control system XIMKON <strong>at</strong> Honeywell as well as Network oper<strong>at</strong>ingsystem and students’ implement<strong>at</strong>ions <strong>at</strong> <strong>University</strong> <strong>of</strong> Minnesota (mostly C). Supervised very closely theimplement<strong>at</strong>ion <strong>of</strong> several prototypes based on my designs <strong>at</strong> MITRE. <strong>The</strong>se included secure distributedd<strong>at</strong>abase system prototypes, d<strong>at</strong>abase inference controller prototypes for query, upd<strong>at</strong>e, and d<strong>at</strong>abasedesign, multimedia system prototypes simul<strong>at</strong>ing security fe<strong>at</strong>ures, active real-time d<strong>at</strong>a managementprototype, and real-time d<strong>at</strong>a management hosted on an infrastructure for real-time applic<strong>at</strong>ions andd<strong>at</strong>a/text mining and knowledge management prototypes.17


Educ<strong>at</strong>ional Activities: I have promoted M<strong>at</strong>h and Science among high school students (e.g., talks <strong>at</strong>UTD), women (SWE, WITI) and disadvantaged minorities (Career Communic<strong>at</strong>ions). At NSF, I wasactively involved in the M<strong>at</strong>h Science Educ<strong>at</strong>ion Partnerships between universities and high schools. Ihave been involved in tutorials <strong>at</strong> numerous conferences since 1987, AF/Army/Navy Bases since 1992,and AFCEA (Armed Forces Communic<strong>at</strong>ions and Electronics Associ<strong>at</strong>ion) since 1998.VI. PROFESSIONAL ACTIVITIESMajor Advisory Boards: Advisory Board, Department <strong>of</strong> Computer Science, Purdue <strong>University</strong> 2005 -2006.Advisory boards for journals. Conference and Journal Boards: IEEE Distinguished Lecturer 2002 –2005; Chair IEEE Kanai Award 2002 – 2006; Editor in Chief, Computer Standards and Interface Journal,2005 – 2009; Editorial board member IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering (1996 –2000) the Journal <strong>of</strong> Computer Security (1990 – 2000), Computer Standards and Interface Journal (1993– present), ACM Transactions on Inform<strong>at</strong>ion Systems Security (2004 – 2008), IEEE Transactions onSecure Dependable Computing (2004 – present); Conference Programs: Program Chair for over 15conferences; Program committee member for over 100 conferences; Government Panels: N<strong>at</strong>ionalScience Found<strong>at</strong>ion, N<strong>at</strong>ional Academy <strong>of</strong> Sciences, Air Force Scientific Advisory Board, Department <strong>of</strong>Health and Human Services, and the White House Office <strong>of</strong> Science and Technology Policy.My educ<strong>at</strong>ion and work have been influenced a gre<strong>at</strong> deal by my personal life. My personalst<strong>at</strong>ement “From Industry to Government to Academia” can be found under the section“Motiv<strong>at</strong>ional Articles” on my UTD web site.18


Section 6: INDUSTRY/GOVERNMENT EXPERIENCEI. <strong>The</strong> MITRE Corpor<strong>at</strong>ion, Bedford, MA (January 1989 – June 2005) www.mitre.orgTechnical Positions:* Chief Scientist/Engineer in D<strong>at</strong>a Management, Inform<strong>at</strong>ion Technology Director<strong>at</strong>e(May 1999 – September 2001)* Senior Principal Scientist/Engineer, Advanced Inform<strong>at</strong>ion Systems Center (Sept. 1996 – May 1999)* Principal Scientist/Engineer, Advanced Inform<strong>at</strong>ion Systems Center (March 1995 – Sept. 1996)* Lead Scientist/Engineer, Network and Distributed Systems Center (August 1992 – March 1995),Inform<strong>at</strong>ion Security Center (January 1989 – August 1992)Management Positions:* Section Leader (June 1995 – October 1996) and Department Head (October 1996 – May 1999) inD<strong>at</strong>a Management and Object Technology, Advanced Inform<strong>at</strong>ion Systems Center and Inform<strong>at</strong>ionTechnology Division. Staff grew from ten in June 1995 to approxim<strong>at</strong>ely twenty-eight in May 1999.Leadership/Coordin<strong>at</strong>ion Positions:* Head, MITRE’s Corpor<strong>at</strong>e Research and Development Initi<strong>at</strong>ive in Evolvable InteroperableInform<strong>at</strong>ion Systems (March 1996 – September 1997, budget approxim<strong>at</strong>ely $4 million)* Head, MITRE’s Corpor<strong>at</strong>e Research and Development Initi<strong>at</strong>ive in D<strong>at</strong>a Management (September1994 – March 1996, budget approxim<strong>at</strong>ely $1 million)* Co-Director, MITRE D<strong>at</strong>abase Specialty Group (October 1993 – December 1995)Technical: My sixteen years experience <strong>at</strong> MITRE gave me the opportunity to work on research,development and technology transfer projects. I have worked for a number <strong>of</strong> sponsors including the AirForce, Navy, Army, NSA, CIA and IRS. I have worked with not only researchers and defense contractors,but also with Fortune 500 corpor<strong>at</strong>ions in Inform<strong>at</strong>ion Technology. A summary <strong>of</strong> my technicalaccomplishments is listed below.Inform<strong>at</strong>ion Security: Between January 1989 and August 1992, my work focused entirely onInform<strong>at</strong>ion Security. I initi<strong>at</strong>ed and led various d<strong>at</strong>abase and object security projects for the Army,Navy, Air Force, and the N<strong>at</strong>ional Security Agency. <strong>The</strong> topics included secure distributed/feder<strong>at</strong>edd<strong>at</strong>abase management, inference problem, secure multimedia/object-oriented d<strong>at</strong>a management, andsecure client-server computing. I designed and supervised the implement<strong>at</strong>ion <strong>of</strong> a prototype securedistributed d<strong>at</strong>abase system th<strong>at</strong> connected d<strong>at</strong>abase systems in Bedford, MA, McLean, VA, and FortMonmouth, NJ, the first developed. I also designed centralized and distributed d<strong>at</strong>abase inferencecontrollers and supervised the implement<strong>at</strong>ion <strong>of</strong> these systems. In addition, I designed a secureobject/multimedia d<strong>at</strong>abase system and supervised its implement<strong>at</strong>ion. Other contributions include thepro<strong>of</strong> <strong>of</strong> the unsolvability <strong>of</strong> the inference problem, use <strong>of</strong> conceptual structures to design secured<strong>at</strong>abase applic<strong>at</strong>ions and the development <strong>of</strong> a logic for secure d<strong>at</strong>a and knowledge base managementsystems. Since August 1992, I worked part-time on Inform<strong>at</strong>ion Security. My focus was on theinference problem and object security. I led a team project to investig<strong>at</strong>e security for distributed objectsystems and this work impacted the security standards for the Object Management Group. I providedtechnical direction to DoD projects in d<strong>at</strong>abase security between March 1991 and September 1996,was a consultant to NSA and mentored junior staff there. Between 1996 and 2001, I continued towork in Inform<strong>at</strong>ion Security by providing direction on the Inference problem to the Air Force andalso examining security issues for XML and web inform<strong>at</strong>ion systems.D<strong>at</strong>a Management, Real-time Systems and Object Technology: My work in d<strong>at</strong>a management <strong>at</strong>MITRE began around August 1992. Since then I have initi<strong>at</strong>ed and led projects in real-time d<strong>at</strong>abasemanagement and distributed object management for evolvable real-time command and controlsystems, massive multimedia d<strong>at</strong>a management for Intelligence applic<strong>at</strong>ions, and distributed objectmanagement for heterogeneous d<strong>at</strong>abase integr<strong>at</strong>ion. In addition, I have initi<strong>at</strong>ed and contributed to19


projects in d<strong>at</strong>a mining and warehousing. As part <strong>of</strong> my work, I have provided direction in d<strong>at</strong>amanagement to the Department <strong>of</strong> Defense and the Intelligence community. In particular, betweenOctober 1993 and March 1999, I was the lead in providing technology direction for the IntelligenceCommunity initi<strong>at</strong>ive on Massive Digital D<strong>at</strong>a Systems. Based on results <strong>of</strong> this effort, and togetherwith the CIA sponsor, we began discussions with DARPA on d<strong>at</strong>a mining in December 1997 andthese discussions eventually led to the EELD program <strong>at</strong> DARPA. Also, between October 1993 andSeptember 1999, I was part <strong>of</strong> a team providing direction for next gener<strong>at</strong>ion real-time d<strong>at</strong>amanagement and object systems for the AWACS project. For this work, I received the MITREProgram Achievement award in 1997. For the work in d<strong>at</strong>a mining and distributed objects, I receivedtwo MITRE Director awards in 1997.Consulting in Inform<strong>at</strong>ion Technology (IRS): Between January 1999 and September 2001, Iconsulted for the Internal Revenue Service by interviewing various Fortune 500 corpor<strong>at</strong>ions on theirresearch and development tax credits. This work utilized my extensive experience in ComputerScience and Inform<strong>at</strong>ion Technology. It also enabled me to obtain an excellent understanding <strong>of</strong> theinternal details <strong>of</strong> d<strong>at</strong>abases, ERP, and e-commerce s<strong>of</strong>tware. Between May 2000 and July 2001, Iworked with a major Fortune 100 corpor<strong>at</strong>ion and the IRS jointly to determine the products th<strong>at</strong> wouldqualify for research tax credit. For this effort, I reviewed numerous products th<strong>at</strong> this companyworked on during FY00 which made me intim<strong>at</strong>ely familiar with the commercial products <strong>of</strong> a majorcorpor<strong>at</strong>ion in the US in Inform<strong>at</strong>ion Technology. This work was reported in the Wall Street Journalin December 2000 and also claimed by the IRS as a success story in a major IRS and Fortune 100meeting in February 2001. As a result <strong>of</strong> this work, I received the MITRE Program Achievementawards in 2002 and 2005.Consultant to Air Force: In May 1999, I was appointed chief scientist/engineer in d<strong>at</strong>a managementin MITRE’s Inform<strong>at</strong>ion Technology Director<strong>at</strong>e and in this position provide d<strong>at</strong>a managementdirection for MITRE’s programs for the Air Force, In addition, I oversaw the inform<strong>at</strong>ion technologytechnical work in the director<strong>at</strong>e in the following areas: inform<strong>at</strong>ion management, e-business and webcomputing, real-time computing, and decision support. I also consulted on MITRE's corpor<strong>at</strong>einiti<strong>at</strong>ives in knowledge management and e-business. Between January 2001 and September 2001, Iwas Vice Chair <strong>of</strong> the D<strong>at</strong>abase Migr<strong>at</strong>ion Panel to the AF Scientific Advisory Board (SAB).Other Consulting: In the 1990s, I consulted on several MITRE projects involving inform<strong>at</strong>ion andd<strong>at</strong>a management sponsored by the Intelligence Community, NASA (EOS project) and FAA.Other Inform<strong>at</strong>ion: My work has resulted in IEEE Computer Society’s 1997 Technical AchievementAward, IEEE’s 2003 Fellow Award, AAAS 2003 Fellow Award, British Computer Society’s 2005Fellow Award, over 300 public<strong>at</strong>ions including over 90 journal articles, 3 s<strong>of</strong>tware p<strong>at</strong>ents and 12books (10 published and 2 in prepar<strong>at</strong>ion). I give tutorials to sponsors <strong>at</strong> conferences, and <strong>at</strong> theMITRE Institute in rel<strong>at</strong>ional d<strong>at</strong>abase management, distributed d<strong>at</strong>abase management, heterogeneousd<strong>at</strong>abase integr<strong>at</strong>ion, real-time d<strong>at</strong>a management, secure d<strong>at</strong>a management, object-oriented d<strong>at</strong>abasemanagement, and d<strong>at</strong>a mining. I have also particip<strong>at</strong>ed in standards efforts including Department <strong>of</strong>the Navy’s D<strong>at</strong>abase Interface Standard and Object Management Group’s real-time and C4I standards.I have given over 150 pr<strong>of</strong>essional present<strong>at</strong>ions including 30 keynote/fe<strong>at</strong>ured addresses <strong>at</strong> majorconferences. In addition, I particip<strong>at</strong>ed in panels <strong>at</strong> the N<strong>at</strong>ional Academy <strong>of</strong> Sciences and the AirForce Scientific Advisory Board.Leadership, Coordin<strong>at</strong>ion: Between March 1996 and September 1997, as head <strong>of</strong> the EvolvableInteroperable Inform<strong>at</strong>ion Systems (EIIS) Initi<strong>at</strong>ive <strong>at</strong> MITRE reporting to the Vice President <strong>of</strong> Researchand Technology, I was responsible for research in d<strong>at</strong>a management, real-time systems, s<strong>of</strong>tware reverseengineering, economic analysis for inform<strong>at</strong>ion system evolution and interoper<strong>at</strong>ion, and objecttechnology and architectures. I worked with the leaders in each <strong>of</strong> these areas. Prior to this responsibility,I led the corpor<strong>at</strong>e initi<strong>at</strong>ive in d<strong>at</strong>a management from September 1994 to March 1996 (which is part <strong>of</strong>EIIS). As a co-director between October 1993 and December 1995, I organized meetings in d<strong>at</strong>a20


management to discuss projects as well as conferences <strong>at</strong> MITRE. Between October 1995 and May 1999,I was actively involved in promoting object technology within MITRE. In this role, I was part <strong>of</strong> aMITRE team working in distributed object management, <strong>at</strong>tending Object Management Group meetingsand particip<strong>at</strong>ing in the real-time SIG <strong>at</strong> OMG. I introduced real-time issues for the common objectrequest broker architecture <strong>at</strong> Object World West 1995, founded the C4I SIG <strong>at</strong> OMG in 1996, andorganized object technology conferences <strong>at</strong> MITREManagement: Between June 1995 and May 1999, as a department manager reporting to the Director <strong>of</strong>the Division, I developed the skills in my department <strong>of</strong> about thirty people in rel<strong>at</strong>ional d<strong>at</strong>a management,object-oriented d<strong>at</strong>a management, distributed object management, distributed d<strong>at</strong>abase management,heterogeneous d<strong>at</strong>abase integr<strong>at</strong>ion, multimedia d<strong>at</strong>a management, d<strong>at</strong>a warehousing, migr<strong>at</strong>ing legacyd<strong>at</strong>abases, d<strong>at</strong>a mining, web technology, d<strong>at</strong>a security, and knowledge management. I formed four groupsin my department each focusing on a subset <strong>of</strong> the above technologies with security cutting across allareas. I initi<strong>at</strong>ed and continued projects each year <strong>at</strong> MITRE totaling 3 - 4 staff years. I was activelyinvolved in mentoring staff and helping them in leadership and coordin<strong>at</strong>ion positions such as providingdirection for MITRE's research as well as organizing internal conferences in d<strong>at</strong>a management and objecttechnology. Between May 1999 and September 2001, as chief engineer, I had oversight <strong>of</strong> the technicalwork in MITRE's Inform<strong>at</strong>ion Technology Director<strong>at</strong>e for about 200 staff.II. N<strong>at</strong>ional Science Found<strong>at</strong>ion, Arlington, Virginia (Oct. 1, 2001 – September 30, 2004)IPA Position from the MITRE Corpor<strong>at</strong>ion: Director <strong>of</strong> Inform<strong>at</strong>ion Cyber Trust, D<strong>at</strong>a andApplic<strong>at</strong>ions Security, Inform<strong>at</strong>ion and D<strong>at</strong>a ManagementI completed a three year IPA from the MITRE Corpor<strong>at</strong>ion <strong>at</strong> the N<strong>at</strong>ional Science Found<strong>at</strong>ion. At NSF,during 2002, I was program director for inform<strong>at</strong>ion and d<strong>at</strong>a management. This is approxim<strong>at</strong>ely a $10million program a year and funds research in various aspects <strong>of</strong> inform<strong>at</strong>ion and d<strong>at</strong>a managementincluding d<strong>at</strong>a mining, inform<strong>at</strong>ion retrieval and inform<strong>at</strong>ion systems. I also particip<strong>at</strong>ed in interdirector<strong>at</strong>eactivities on providing direction in Bioinform<strong>at</strong>ics and Geoinform<strong>at</strong>ics. In addition, I wasinvolved in the M<strong>at</strong>h Science Partnership program with the Educ<strong>at</strong>ion Director<strong>at</strong>e. During 2003, I initi<strong>at</strong>eda new program in D<strong>at</strong>a and Applic<strong>at</strong>ions Security ($2 million/year) and also managed the Inform<strong>at</strong>ionManagement component <strong>of</strong> ITR (approxim<strong>at</strong>ely $50 million) and Inform<strong>at</strong>ion Management for the SensorIniti<strong>at</strong>ive (approxim<strong>at</strong>ely $2 million). During 2004, I was a member <strong>of</strong> NSF’s Cyber Trust <strong>The</strong>me(approxim<strong>at</strong>ely $30 million).During 2002 and 2003, I supported the Department <strong>of</strong> Health and Human Services on planning forinform<strong>at</strong>ion technologies to comb<strong>at</strong> bioterrorism as part <strong>of</strong> the St<strong>at</strong>es’ Bioterrorism Initi<strong>at</strong>ive. In 2004, Iparticip<strong>at</strong>ed in an interagency study on Hard Problems in Cyber Security and completed a draft inSeptember (a version was l<strong>at</strong>er published by the government in 2006). <strong>The</strong> study report was used byagencies to fund future research in Inform<strong>at</strong>ion Security. Beginning in October 2001, I was active incounter-terrorism-rel<strong>at</strong>ed research especially on the use <strong>of</strong> d<strong>at</strong>a mining. I gave talks not only <strong>at</strong>conferences, but also <strong>at</strong> the White House Office <strong>of</strong> Science and Technology Policy and the United N<strong>at</strong>ionsand particip<strong>at</strong>ed in N<strong>at</strong>ional Academy <strong>of</strong> Science activities in this area. I was a member <strong>of</strong> interagencyplanning on d<strong>at</strong>a mining for counter-terrorism. As an IPA, I also conducted research <strong>at</strong> MITRE, focusingon privacy, secure semantic web and secure sensor inform<strong>at</strong>ion management.III. Honeywell Inc., Golden Valley, MN (January 1986 - January 1989)http://www51.honeywell.com/honeywell/Position: Principal Research Scientist / Engineer, Corpor<strong>at</strong>e Systems Development DivisionI conducted research, development, and technology transfer activities in d<strong>at</strong>abase security, d<strong>at</strong>amanagement, distributed processing, inform<strong>at</strong>ion systems, process control systems, pay<strong>of</strong>f modeling, andAI applic<strong>at</strong>ions. In addition to reports and proprietary documents, papers were also published in refereedjournals and conferences. Work was carried out for Honeywell internal divisions as well as for the AirForce and NASA. Specific projects included the following: Design <strong>of</strong> a Multilevel Secure D<strong>at</strong>abase21


Management System (Rome Labor<strong>at</strong>ory); Development <strong>of</strong> Engineering Inform<strong>at</strong>ion Systems (WrightLabor<strong>at</strong>ory); Design <strong>of</strong> a Distributed D<strong>at</strong>a Dictionary System (Honeywell’s Residential Control Division);AI Applic<strong>at</strong>ions in Process Control Systems (Honeywell Industrial Autom<strong>at</strong>ion Systems Division);Design <strong>of</strong> a Network Oper<strong>at</strong>ing System for a Multicomp<strong>at</strong>ible Network Interface Unit (NASA);Development <strong>of</strong> a Pay<strong>of</strong>f Model <strong>of</strong> Altern<strong>at</strong>ive Communic<strong>at</strong>ion Str<strong>at</strong>egies (Honeywell Corpor<strong>at</strong>e); Design<strong>of</strong> Innov<strong>at</strong>ive S<strong>of</strong>tware Architectures for Industrial and Buildings Control Systems (Honeywell BuildingControls Systems); and Design <strong>of</strong> Knowledge Transform<strong>at</strong>ion Str<strong>at</strong>egies (Honeywell IndustrialAutom<strong>at</strong>ion Systems Division).IV. Control D<strong>at</strong>a Corpor<strong>at</strong>ion, Arden Hills, MN (December 1983 - January 1986)http://en.wikipedia.org/wiki/Control_D<strong>at</strong>a_Corpor<strong>at</strong>ionPosition: Senior Programmer/Analyst, Arden Hills Programming DivisionI was involved in the design and development <strong>of</strong> the CDCNET (Control D<strong>at</strong>a Communic<strong>at</strong>ions Network)product. Company proprietary documents were also written. Specifically, I was responsible for thefollowing: design, development and testing <strong>of</strong> CDCNET Transport layer (Generic and Xerox transportprotocols); design, development and testing <strong>of</strong> the first version <strong>of</strong> the CDCNET session layer, whichenabled the ASYNC Terminal Interface Program to communic<strong>at</strong>e with the Cyber 170 G<strong>at</strong>eway; design,development and testing <strong>of</strong> X25 support for CDCNET, which would enable CDCNET to communic<strong>at</strong>ewith an X25 Network; development and testing <strong>of</strong> CDCNET Network Layer; implement<strong>at</strong>ion <strong>of</strong> theIntranetwork layer, which supported HDLC, Ethernet and MCI Networks; design, and development andtesting <strong>of</strong> a set <strong>of</strong> command processors (transport St<strong>at</strong>us command processor), which g<strong>at</strong>hered inform<strong>at</strong>ionabout the Transport connections, and also a set <strong>of</strong> command processors to configure an MCI network;development and testing <strong>of</strong> CDCNET memory management unit, which was responsible for releasing thebuffers depending on the congestion; acting as the Task Lead for testing CDCNET with other Cyberproducts. (Official start d<strong>at</strong>e <strong>of</strong> January 1984; consulted in December 1983)V. Bhavani Security Consulting (June 2005 – Present) www.dr-bhavani.orgI am the founding president <strong>of</strong> Bhavani Security Consulting, a consulting and training company. I consultfor the Department <strong>of</strong> Treasury through a contract from the MITRE Corpor<strong>at</strong>ion on corpor<strong>at</strong>e researchcredit as well as being an expert witness in s<strong>of</strong>tware. I also handle p<strong>at</strong>ent litig<strong>at</strong>ion cases as an expertwitness. I teach AFCEA (Armed Forces Communic<strong>at</strong>ions and Electronics Associ<strong>at</strong>ion) courses in d<strong>at</strong>amanagement, d<strong>at</strong>a mining for counter-terrorism and d<strong>at</strong>a security. Through AFCEA, I teach classes <strong>at</strong> AirForce bases including Offutt, Eglin, Lackland, Edwards and Kirkland. I consult for corpor<strong>at</strong>ions intechnology futures and write books on d<strong>at</strong>a management and d<strong>at</strong>a security.VI. Knowledge and Security Analytics, LLC (UTD spin-<strong>of</strong>f)http://www.knowledge-security.com/home.htmlA spin-<strong>of</strong>f company was established in August 2010 based on UT <strong>Dallas</strong> research, focusing on d<strong>at</strong>asecurity, geosp<strong>at</strong>ial d<strong>at</strong>a management, d<strong>at</strong>a mining and social networking. Partners: Dr. L<strong>at</strong>ifur Khan andDr. Mur<strong>at</strong> Kantarcioglu.VII. Evolving Malware Security, LLC (UTD Spin-<strong>of</strong>f)www.evolvingmalwaresecurity.comA second spin<strong>of</strong>f company was established in September 2011 to commercialize our malware products.Dr. L<strong>at</strong>ifur Khan is the main technical lead for this company.VII. Personal Tutors, England (1979-1980)http://www.personal-tutors.co.uk/home.htmlTaught high school students M<strong>at</strong>hem<strong>at</strong>ics and prepared them for GCE OL and GCE AL exams.Section 7: TEACHING EXPERIENCEI. Academic Teaching Experience (1980 – Present)22


Current (2004 – Present)<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>Position: Pr<strong>of</strong>essor <strong>of</strong> Computer Science and Director <strong>of</strong> Cyber Security Research Center D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Spring 2005, Spring 2006, Spring 2007, Spring 2008, Spring2009, Fall 2009, Fall 2010, Fall 2011 (based on my book D<strong>at</strong>abase and Applic<strong>at</strong>ions Security:Integr<strong>at</strong>ing D<strong>at</strong>a Management and Inform<strong>at</strong>ion Security, CRC Press/Auerbach, June 2005)Gradu<strong>at</strong>e level Biometrics, Fall 2005, Gradu<strong>at</strong>e level Building Trustworthy Semantic Webs, Fall 2006, Fall 2008, Spring 2010, Spring 2011 (based onmy book Building Trustworthy Semantic Webs, CRC Press, 2007) Ph.D. level D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Spring 2007, Spring 2008, Spring 2011 (Inform<strong>at</strong>ion Assurance,Minor Core course) Undergradu<strong>at</strong>e level Digital Forensics, Fall 2007, Fall 2008, Fall 2009, Fall 2010, Fall 2011 (Inform<strong>at</strong>ion AssuranceMinor, Core course) Undergradu<strong>at</strong>e level Inform<strong>at</strong>ion and Security Analytics, (based on CISSP 10 Domains) Summer 2010, Summer 2011 Inform<strong>at</strong>ion Assurance, Minor: D<strong>at</strong>a and Applic<strong>at</strong>ions Security, as well as Digital Forensics, aretwo <strong>of</strong> the three mand<strong>at</strong>ory security courses for a minor in Inform<strong>at</strong>ion Assurance <strong>at</strong> theUndergradu<strong>at</strong>e level. Students work with ENCASE tool and conduct forensics analysis. Inform<strong>at</strong>ion Assurance Masters TrackPrevious (1980 – 2001)(i) New Mexico Institute <strong>of</strong> Technology, Socorro, New MexicoPosition: Visiting Pr<strong>of</strong>essor 1980 – 1981Dept. Head: Pr<strong>of</strong>. Tom Nartker (now <strong>at</strong> UNLV)1. Department <strong>of</strong> Computer Science<strong>The</strong>ory <strong>of</strong> Comput<strong>at</strong>ionPh.D. level course on theory <strong>of</strong> comput<strong>at</strong>ion covering topics such as autom<strong>at</strong>a theory, complexitytheory and recursion theory, using the text book <strong>The</strong>ory <strong>of</strong> Comput<strong>at</strong>ion by Barinard andLandweberD<strong>at</strong>e: Fall Semester 1980 (August – December 1980)M<strong>at</strong>hem<strong>at</strong>ical Logic for Computer ScientistsSenior undergradu<strong>at</strong>e/ 1 st yr MS level course covering logic, theorem proving. Developed my ownlecture notes. References used: <strong>The</strong>orem Proving by Chang and Lee, M<strong>at</strong>hem<strong>at</strong>ical Logic by E.MendelssohnD<strong>at</strong>e: Spring Semester 1981 (January – May 19812. Department <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>icsCalculusUndergradu<strong>at</strong>e level course in calculusD<strong>at</strong>e: Spring Semester, 1981 (January – May 1981)(ii ) <strong>University</strong> <strong>of</strong> MinnesotaPosition: Visiting Pr<strong>of</strong>essor, 1981 – 1982Adjunct Pr<strong>of</strong>essor and Member <strong>of</strong> the Gradu<strong>at</strong>e Faculty, September 1984 – December 1988Schedule Coordin<strong>at</strong>or: Pr<strong>of</strong>. Sartaj Sahni (now <strong>at</strong> <strong>University</strong> <strong>of</strong> Florida)1. Department <strong>of</strong> Computer ScienceFortran ProgrammingUndergradu<strong>at</strong>e course in FORTRAN programming23


D<strong>at</strong>e: Fall Quarter 1984, Winter 1985, Spring 1985, Fall 1985, Winter 1986, Spring 1986, Fall1986, Winter 1987, Spring 1987, Summer I and II 1987, Fall 1987, Winter 1988, Spring 1988,Summer I and II 1988Basic and Advanced Assembly Language ProgrammingJunior and senior undergradu<strong>at</strong>e as well as 1 st year MS level course in M68000 programmingD<strong>at</strong>e: Fall 1985, Winter 1986, Spring 1986, Fall 1986Algorithms and D<strong>at</strong>a StructuresJunior undergradu<strong>at</strong>e course in algorithmsD<strong>at</strong>e: Winter 1987, Winter 1988Programming Languages using SchemeJunior undergradu<strong>at</strong>e course in Scheme programming and principlesD<strong>at</strong>e: Spring 1987, Spring 1988Discrete Structure <strong>of</strong> Computer ScienceJunior undergradu<strong>at</strong>e course in Combin<strong>at</strong>orial m<strong>at</strong>hem<strong>at</strong>ics for computer scientistsD<strong>at</strong>e: Summer I, 1986Principles <strong>of</strong> Programming LanguagesSenior undergradu<strong>at</strong>e/1 st year MS level course on principles <strong>of</strong> programming languages includingprinciples <strong>of</strong> FORTRAN, Pascal, Algal, Lisp, Prolog, and SmalltalkD<strong>at</strong>abase Security, Ph.D. level seminar; D<strong>at</strong>e: Fall 19872. Department <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>icsCalculus and AlgebraUndergradu<strong>at</strong>e level courses on calculus and algebraD<strong>at</strong>e: Fall 1981, Winter 1982, Spring 1982, Spring 1985, Fall 1985, Winter 1986(iii) Boston <strong>University</strong>Position: Adjunct Pr<strong>of</strong>essor <strong>of</strong> Computer Science, 1999 – 2001Point <strong>of</strong> Contact: Linda Goldberg1. Department <strong>of</strong> Computer ScienceAdvanced D<strong>at</strong>a ManagementGradu<strong>at</strong>e level course which covered rel<strong>at</strong>ional d<strong>at</strong>abases, object d<strong>at</strong>abases, distributed d<strong>at</strong>abasesheterogeneous d<strong>at</strong>abases, migr<strong>at</strong>ing legacy d<strong>at</strong>abases, d<strong>at</strong>a mining, d<strong>at</strong>a warehousing, webd<strong>at</strong>abases.Based on my two books D<strong>at</strong>a Management System Evolution and Interoper<strong>at</strong>ion, CRC Press,May 1997, and D<strong>at</strong>a Mining, Technologies, Techniques, Tools and Trends, CRC Press, December1998D<strong>at</strong>e: Spring Semester 2000, Spring Semester 2001.II. Pr<strong>of</strong>essional Teaching Experience (1990 – Present)(i) <strong>The</strong> MITRE Institute (1990 – 2000)Position: InstructorSchedule Coordin<strong>at</strong>or: Phil TrudeauCourses taught:D<strong>at</strong>abase Security (Four two hour lectures, 1990)Introduction to D<strong>at</strong>abases (3 hour, 10 week course, 1992, 1993)Heterogeneous D<strong>at</strong>abase Integr<strong>at</strong>ion (1 day course taught several times in 1993 – 1994)24


Object D<strong>at</strong>abases (1 day course taught several times in 1993 – 1994)Real-time D<strong>at</strong>abases (1 day course taught several times in 1994)D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion (2 day course taught several times in1997 -1999), based on my bookD<strong>at</strong>a Mining (1 day course taught several times in 1998 – 2000), based on my bookThrough the MITRE Corpor<strong>at</strong>ion, I taught courses to several government agencies(1992 – 2000)Topics: secure d<strong>at</strong>abases, d<strong>at</strong>a management and d<strong>at</strong>a mining (based on my books)US Government (DoD and Intelligence)Agencies: Air Force (ESC, AIA, SPACECOM), Navy (SPAWAR, NRaD), Army (CECOM),Other: DISA, DISA/JPO, NSA, EUCOM(ii) AFCEA Pr<strong>of</strong>essional Development Center (1998 – Present)Position: Instructor (helps in developing contacts with the DoD)Schedule Coordin<strong>at</strong>or: Ann BeckhamCourses Taught (all courses based on my books – see public<strong>at</strong>ions)D<strong>at</strong>a Management (3 day course in September 1998, June 1999)D<strong>at</strong>a Management, D<strong>at</strong>a Mining and E-Commerce (3 day course in October 2000)D<strong>at</strong>a Management, Inform<strong>at</strong>ion Management and Knowledge Management (3 day course inOctober 2001, October 2002, October 2003, September 2004, October 2005)D<strong>at</strong>a Mining (3 day course in June 2003, December 2003, December 2004, March 2006,December 2006, November 2007, May 2008, November 2008)Knowledge Management through Semantic Web and Social Network (April 2008, October 2009,April 2010, October 2010)D<strong>at</strong>a Mining for Counter-terrorism (3 day course, June 2010)D<strong>at</strong>a Management, Inform<strong>at</strong>ion Management and Knowledge Management: to the Air Forcethrough AFCEA (3 day course)Offutt AFB, October 2004Eglin AFB, March 2005Lackland AFB, August 2006Edwards AFB, June 2006Kirkland AFB, September 2006(iii) <strong>University</strong> <strong>of</strong> California, San Diego (2008)Security for Service Oriented Architecture portion <strong>of</strong> the Certific<strong>at</strong>e Course on Systems Engineering,<strong>of</strong>fered <strong>at</strong> UCSD under the directorship <strong>of</strong> Pr<strong>of</strong>. Hal Sorenson. This course was also taught as part <strong>of</strong> theArchitecture course <strong>at</strong> AFCEA under the directorship <strong>of</strong> Pr<strong>of</strong>. Alex Levis.(iv) <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>Cyber Security Certific<strong>at</strong>e Course, Planned in 2012 (Course utilizing Shon Harris’ CISSP Trainingbook). Students will learn the 10 CISSP domains.NSF Scholarship for Service (SFS) Award 2010 - 2013In January 2010, I worked with my colleagues and submitted a proposal to the NSF SFS Program whichwas subsequently awarded. I visited several universities (e.g., NYU Poly, Mississippi St<strong>at</strong>e and<strong>University</strong> <strong>of</strong> Tulsa) to learn from their successful experiences to put together this proposal.25


NSF Capacity Building on Assured Cloud Computing 2011-2013In January 2011, I worked with colleagues and submitted a proposal to NSF SFS for capacity buildingin assured cloud computing. This project was funded in September 2011. We are working on building aprogram in assured cloud computing.26


Section 8: ACADEMIC RESEARCH SUPERVISIONFor details <strong>of</strong> the projects, please see the Cyber Security Research Center website <strong>at</strong>http://csrc.utdallas.edu/.<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> (October 2004 – Present)Ph.D. Students Gradu<strong>at</strong>ed:Li Liu (2004 – 2008) Privacy Preserving D<strong>at</strong>a Mining; May 2008 (formerly Senior SecurityStr<strong>at</strong>egist <strong>at</strong> EBay; Currently Senior Cyber Security Risk Analyst <strong>at</strong> DTCC Corpor<strong>at</strong>ion, WallStreet) Ryan Layfield (2004 – 2008) Social Network and Game <strong>The</strong>ory Applic<strong>at</strong>ions, December 2008(Senior Research Scientist <strong>at</strong> CISCO) Zhong Wang (2007 – 2010) Complexity Results in Secure Wireless Networks, December 2010(Current research member Shanghai Jiao Tong <strong>University</strong>)M. Farhan Husain (2006 – 2011) Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management, May 2011 (Currently withAmazon Cloud project)Tyrone Cadenhead (2008 – 2011) Secure D<strong>at</strong>a Provenance Using Semantic Web Technologies,August 2011(currently research scientist <strong>at</strong> UTD)Wei-She, (2006 – 2011), Secure Web Services, December 2011 (currently research scientist <strong>at</strong>UTD)Jeffrey Partyka, 2007 – 2011, Geosp<strong>at</strong>ial Semantic Web, December 2011, (Raytheon Research)MS Students with <strong>The</strong>sis Gradu<strong>at</strong>ed (supported as RAs):Gal Lavee (December 2005) Suspicious Event Detection, Ph.D. <strong>at</strong> Technion-IsraelVibha Sethi (August 2006) Secure Sensor Networks, MotorolaAbinanthan (May 2007) Fingerprinting Biometrics and RFID, OracleSrinivasan (May 2007) Trust Management for Assured Inform<strong>at</strong>ion Sharing, Hewlett PackardPavan Chittamala (May 2007) Geosp<strong>at</strong>ial D<strong>at</strong>a Management - Micros<strong>of</strong>tJungin Kim (August 2007) Dependable Inform<strong>at</strong>ion Management, Samsung KoreaGanesh Subbiah (December 2007) Trust Negoti<strong>at</strong>ion for Semantic Web, ESRIYashashwini Harshakumar (2007) Assured Inform<strong>at</strong>ion Sharing, AmazonSonia Chib (2009) Geosp<strong>at</strong>ial Proximity for Blackbook, ESRIPranav Parikh (2009) Secure Amazon.com Web Services, YahooPankil Doshi (December 2010) SPARQL over Hadoop, Research in MotionPh.D. Students (supported as RAs):Vaibhav Khadilkar (2008) Managing Large RDF Graphs (completion 2013)Neda Alipanah (2007) Geosp<strong>at</strong>ial Semantic Web (completion 2012)Jyothsna Rachapalli (2009) Ontology Alignment and Development for NVD (completion 2013)Parveen Pallabi (2010) Secure Semantic Web (completion 2012)Lidan Fan (2011) Exploring research topics (completion 2014)Other StudentsAlam Ashraful (2005 – 2007) Geosp<strong>at</strong>ial D<strong>at</strong>a Management (First job AT&T and now <strong>at</strong> <strong>Texas</strong> Energy)N<strong>at</strong>alie Tsublinik (2005 – 2008) Peer to Peer d<strong>at</strong>a management (Micros<strong>of</strong>t)Other Ph.D. students I have sponsored and/or mentored:27


Mehedy Masud, Stream Mining, Defended <strong>The</strong>sis, October 2009S<strong>at</strong>yen Abrol, 2009 – PresentSunitha Ramanujam Toward an Integr<strong>at</strong>ed Semantic Web Interoperability Between D<strong>at</strong>a Models(completed December 2011)James McGlothlin, Efficient Semantic Web Knowledge Management (completed December 2011)Non-<strong>The</strong>sis MS Students (supported as Students Workers/RAs; with research papers):Parveen Pallabi (2005 – 2006) Face Recognition, RFID, Gradu<strong>at</strong>ed, <strong>Texas</strong> InstrumentsAlam Ashraful (2006) Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management, Gradu<strong>at</strong>ed, AT&TSai Ch<strong>at</strong>anya (2006) Privacy Preserving SurveillanceDilshad Cavus (2006) D<strong>at</strong>a Mining for Assured Inform<strong>at</strong>ion SharingAmy Tan (2007) Mining Massive D<strong>at</strong>a SetsRamaya N<strong>at</strong>arajan (2007) Secure Motion ManagementJyothsna Rachapalli (2008 – 2009) Semantic WebGreg Hellings (2009) Geosp<strong>at</strong>ial D<strong>at</strong>a ManagementClay Woolam (2009) D<strong>at</strong>a MiningOther non-<strong>The</strong>sis MS Students on IARPA Project:Geosp<strong>at</strong>ial Proximity Team (2008 – 2009)Aniruddh Bajirao, Siddharth Manu, Laveesh BansalLucene & Hadoop Model Team (2008 – 2009)Phillip White, Abhishek Shanbhag, John George, Julie RauerSPARQL over Hadoop Team (2008 – 2009)Asif MohammedVariable Ontology Team (2008 – 2009)Mohit Pawar, Vijay Bahirji, Gaurav Kumar, Nilesh Singhania, Abhilash Kannan, Sandip GaikwadSemantic Support and S<strong>of</strong>tware Pr<strong>of</strong>essionaliz<strong>at</strong>ion Team ( 2008 – 2010)Pralabh Kumar, Shar<strong>at</strong>h Jagann<strong>at</strong>hCVE/NVD on Blackbook (Collabor<strong>at</strong>ion with NIST on the NVD Project) (2008 – 2009)Aniruddh BajiraoPost-Doctoral Research Associ<strong>at</strong>es:Dr. Mamoun Awad (February 2006 – August 2006) Assured Inform<strong>at</strong>ion Sharing, Ph.D. UT <strong>Dallas</strong>(currently Associ<strong>at</strong>e Pr<strong>of</strong>essor U <strong>of</strong> UAE)Dr. Chuan Li (September 2006 – December 2006) Geosp<strong>at</strong>ial D<strong>at</strong>a Mining, Ph.D. UT <strong>Dallas</strong> (JoinedBrown <strong>University</strong> as Post Doctoral Research Associ<strong>at</strong>e)Dr. Ebru Celikel (June 2006 – June 2007) Risk-based Access Control, Ph.D. Turkey (Senior Lecturer,UNT)Dr. Greg Lee (August 2007 – July 2009) Surgical/Secure Robots, Ph.D. <strong>University</strong> <strong>of</strong> Washington (Asst,Pr<strong>of</strong>. Case Western)Dr. Mehedy Masud (March 2010 –December 2011) Malware Detection, Ph.D. UT <strong>Dallas</strong> (Joining as Asst.Pr<strong>of</strong>. U <strong>of</strong> UAE)Research Scientist:Irina Sakharova (2010 – Present) Tracking Terrorist FinancingDr. Yan Zhou (2010 – Present) D<strong>at</strong>a Security and Privacy, Ph.D. Washington <strong>University</strong>, St. LouisDr. Tyrone Cadenhead (2011 – Present) D<strong>at</strong>a Provenance and Assured Cloud Computing, Ph.D., UT<strong>Dallas</strong>Visiting Scholar:Dr. Jan Kallberg (2011-Present), Social and Policy Aspects <strong>of</strong> Security28


<strong>The</strong>sis Committees: Serving/served on numerous internal and external MS and Ph.D. Committees sincejoining UT <strong>Dallas</strong>. External committees include <strong>University</strong> <strong>of</strong> Milan (2005 – 2009), <strong>University</strong> <strong>of</strong> Ottowa(2006), <strong>University</strong> <strong>of</strong> Maryland, Baltimore County (2005 – 2007).Research is proceeding in the following areas: D<strong>at</strong>a and Applic<strong>at</strong>ions Security and Privacy (AssuredInform<strong>at</strong>ion Sharing, Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management, D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions,Secure Grid, Storage and Web Services, Secure Social Networks) and Inform<strong>at</strong>ion Management(Semantic Web, Inform<strong>at</strong>ion Integr<strong>at</strong>ing). Topics include the following:1. D<strong>at</strong>a Security and PrivacyArea 1: Assured Inform<strong>at</strong>ion SharingTrustworthy partners experiment<strong>at</strong>ion, semi-trustworthy partners and game theory, untrustworthy partnersand worm detection, agent-based trust management, peer-to-peer trust management, d<strong>at</strong>a integrity andprovenance, risk-based access control and d<strong>at</strong>a sharingArea 2: Secure Geosp<strong>at</strong>ial D<strong>at</strong>a ManagementSecure geosp<strong>at</strong>ial semantic web and web services, geosp<strong>at</strong>ial d<strong>at</strong>a management for emergencypreparedness, privacy for geosp<strong>at</strong>ial d<strong>at</strong>aArea 3: Secure Semantic Web and Social NetworksPolicy management, inference control, security and privacy for social networksArea 4: D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ionsIntrusion, buffer overflow and worm detection, autom<strong>at</strong>ic face recognition and RFID technologies, d<strong>at</strong>amining for surveillance applic<strong>at</strong>ions, secure robots for disaster recovery, d<strong>at</strong>a mining for fault detection,privacy preserving d<strong>at</strong>a miningArea 5: Secure Grid, Clouds, and Web ServicesAccountability for grids, deleg<strong>at</strong>ion-based model for secure web servicesOther: Complexity <strong>The</strong>oryExamining complexity results for sensor networks and security problems.2. Inform<strong>at</strong>ion ManagementOntology Alignment for Semantic Web, Geosp<strong>at</strong>ial D<strong>at</strong>a Mining, Knowledge Management, ManagingLarge RDF graphs, Query Processing in Clouds, Geosp<strong>at</strong>ial D<strong>at</strong>a MiningResearch Supervision: Previous (1980 – 2004)New Mexico Institute <strong>of</strong> TechnologyWhile I taught courses in theory <strong>of</strong> comput<strong>at</strong>ion and M<strong>at</strong>hem<strong>at</strong>ics Logic, I conducted research inComplexity theory and published several journal papers including ones in the Journal <strong>of</strong> Computer andSystems Sciences and the Notre Dame Journal <strong>of</strong> Formal Logic. I developed a concept called SystemFunction Language in 1981 which was published l<strong>at</strong>er in 1993 in the Journal <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>ical Logic.<strong>University</strong> <strong>of</strong> MinnesotaAs a member <strong>of</strong> the gradu<strong>at</strong>e faculty, together with Pr<strong>of</strong>. Wei-Tek Tsai (now <strong>at</strong> Arizona St<strong>at</strong>e <strong>University</strong>),I co-supervised the following students from 1984 to 1988.Tom Keefe, Ph.D.29


Secure query processing and SODA system (several journal and conference papers, see public<strong>at</strong>ions –IEEE Computer Computers and Security)K. Hwang, Ph.D.Distributed system and networks; Conference paper in IEEE Local Area Networks 1987S. Chen, Ph.D.Fault Tolerant Distributed SystemsPaper in IEEE Transactions on S<strong>of</strong>tware EngineeringD. Thomsen, M.S.Prototyping secure d<strong>at</strong>abase systemsJournal paper and conference papers (e.g. Computers and Security)Other Research: While I worked in the M<strong>at</strong>hem<strong>at</strong>ics Department in the early 1980s, I conducted researchwith Pr<strong>of</strong>. Marian Pour-El on Algorithmic Inform<strong>at</strong>ion <strong>The</strong>ory and gave seminars <strong>at</strong> the <strong>University</strong>.<strong>The</strong> MITRE Corpor<strong>at</strong>ionCollabor<strong>at</strong>ed with universities and supervised many students for senior undergradu<strong>at</strong>e research projectsand gradu<strong>at</strong>e MS level students. In particular, collabor<strong>at</strong>ed with the following universities:Carnegie Mellon <strong>University</strong>Amiel Kamon: Secure Distributed Query Processing, research funded by Navy-SPAWAR, Summer 1989,senior undergradu<strong>at</strong>eJon<strong>at</strong>han O’Keefe: Constraint Processing in Secure D<strong>at</strong>abases systems, research funded by Navy-SPAWAR (papers and p<strong>at</strong>ents) Summer 1990, Winter 1991, senior undergradu<strong>at</strong>eCornell <strong>University</strong>David Foti: Secure Distributed D<strong>at</strong>abases, research funded by Army – CECOM, Summer 1992,undergradu<strong>at</strong>eNortheastern <strong>University</strong>Gary Gengo: Active Real-time D<strong>at</strong>a Management, research funded by Air Force (ESC) 1994, MS<strong>University</strong> <strong>of</strong> Rhode IslandJointly with Pr<strong>of</strong>essor Victor Wolfe supervised the following students:Michael Squadrito: MS (1994-1996) Research on Real-time Transaction Processing, research funded byAir Force (ESC)Roman Ginis: senior undergradu<strong>at</strong>e (1996) Research on Real-time D<strong>at</strong>a Management, research funded byAir Force (ESC)Massachusetts Institute <strong>of</strong> TechnologyCo-supervised MS students with Pr<strong>of</strong>. Amar Gupta in secure e-commerce (2000-2001)(Journal paper in Knowledge management journal and conference papers)<strong>University</strong> <strong>of</strong> Milan, ItalyWith Pr<strong>of</strong>. Elisa Bertino, I supervised two students, Barbara Carmin<strong>at</strong>i and Anna Squicciarini, in XMLSecurity (2000 – 2004)(Journal paper in TKDE and conference papers, e.g., EDBT)<strong>The</strong>sis CommitteesIn addition to serving on the committees <strong>of</strong> many <strong>of</strong> the students I supervised, I also served on thecommittee for Ph.D. thesis <strong>at</strong> <strong>University</strong> <strong>of</strong> Minnesota, L<strong>at</strong>robe <strong>University</strong>, Australia and <strong>University</strong> <strong>of</strong>Milan, Italy (1999 – 2004).30


Section 9: RESEARCH FUNDINGI have obtained research funding <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, <strong>The</strong> MITRE Corpor<strong>at</strong>ion, andHoneywell, Inc. My team <strong>at</strong> UT <strong>Dallas</strong> has brought in over $14 million in grants and contracts sinceOctober 2005 and over $2 million in educ<strong>at</strong>ion funding. Below I list only the federal funding I haveobtained. My team has also obtained research funding from commercial corpor<strong>at</strong>ions.<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> (October 2004 – Present)1. Air Force Office <strong>of</strong> Scientific Research, 2005 – 2008 (PI)Topic: Inform<strong>at</strong>ion Oper<strong>at</strong>ions Across Infospheres: Assured Inform<strong>at</strong>ion SharingResponse to BAA: Air Force Office <strong>of</strong> Scientific Research BAA 2005-ISubcontract to UTSAAmount: $300,0002. CH2MHILL, 2005 – 2007 (co-PI)Topic: Geosp<strong>at</strong>ial D<strong>at</strong>a Management Equipment GrantPI: D. HarrisAmount: $50,0003. Raytheon Corpor<strong>at</strong>ion, 2006 – 2009 (PI)Topic: Geosp<strong>at</strong>ial Semantic Web Research, D<strong>at</strong>a Mining and SecurityRaytheon <strong>University</strong> Research ProgramAmount: $400,0004. Raytheon Corpor<strong>at</strong>ion, 2007 – 2008 (co-PI)Topic: Geosp<strong>at</strong>ial Semantic Web Development for Security Applic<strong>at</strong>ionsPI: L. KhanAmount: $100,0005. Air Force Office <strong>of</strong> Scientific Research, 2006 – 2009 (co-PI)Topic: System Integrity ControlResponse to BAA: Air Force Office <strong>of</strong> Scientific Research BAA 2006-ISubcontract from Purdue <strong>University</strong>PI: M. KantarciogluAmount: $150,0006. <strong>The</strong> N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2007 – 2009 (PI)Topic: A Semantic Framework for Policy Specific<strong>at</strong>ion and EnforcementResponse to Program Solicit<strong>at</strong>ion: 07-500Collabor<strong>at</strong>ion with UMBC and UTSAAmount: $590,0007. <strong>The</strong> N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2007 – 2008 (PI)Topic: D<strong>at</strong>a and Applic<strong>at</strong>ions Security WorkshopAmount: $50,0008. N<strong>at</strong>ional Geosp<strong>at</strong>ial Intelligence Agency, 2007 – 2010 (co-PI)Topic: Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for Crime AnalysisResponse to Program Solicit<strong>at</strong>ion NURI-007Subcontract from <strong>University</strong> <strong>of</strong> MinnesotaPI: L. KhanAmount: $150,0009. N<strong>at</strong>ional Aeronautic Space Administr<strong>at</strong>ion, 2008 – 2010 (co-PI)31


Topic: D<strong>at</strong>a Mining <strong>of</strong> Fault ReportsResponse to BAA: NASASubcontract from <strong>University</strong> <strong>of</strong> Illinois, Urbana ChampaignPI: L. KhanAmount: $360,00010. Department <strong>of</strong> Defense, 2008 – 2013 (PI: 2008-10, Co-PI: 2010-13)Topic: Assured Inform<strong>at</strong>ion SharingMulti-university research initi<strong>at</strong>ive (MURI) funded by the DoD/AFOSRResponse to BAA: MURI 2007 (Subcontract from UMBC)Amount: $1 million11. Department <strong>of</strong> Defense, 2008 – 2012 (PI)Topic: Secure Grid/Cloud Inform<strong>at</strong>ion ManagementMulti-university research initi<strong>at</strong>ive (MURI) funded by the DoDSubcontract to UTA and Purdue <strong>University</strong>Amount: $2.2 million12. Department <strong>of</strong> Defense, 2009 – 2013PI: 2009-2011; Co-PI: 2011-2013Topic: Secure Social and Sensor NetworksSubcontracts to Purdue; Collin County, TXAmount: $1.55 million13. N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2009 (PI)Topic: Intelligence and Security Inform<strong>at</strong>ics (Student Scholarships)Amount: $10,00014. Air Force Office <strong>of</strong> Scientific Research, 2009 – 2012 (Senior Personnel)Topic: Malware DetectionPI: Kevin Hamlen, co-PI: L<strong>at</strong>ifur KhanAmount: $450,00015. N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2009 (co-PI)Topic: Secure Peer to Peer D<strong>at</strong>a Management (EAGER)PI: Kevin HamlenAmount: $80,00016. N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2010 – 2013 (Senior Personnel)Topic: Privacy Preserving Ontology Alignment (TC: Small)PI: M. KantarciogluAmount: $260,00017. N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2010 – 2013 (co-PI)Topic: Scholarship for ServicePI: Kamil SaracAmount: $1.8 million18. Air Force Office <strong>of</strong> Scientific Research, 2010 – 2011 (PI)Topic: Assured Cloud ComputingCo-PI: L. Khan, M. KantarciogluAmount: $44,00019. Air Force Office <strong>of</strong> Scientific Research, 2011 (Co-PI)Topic: Assured Cloud Computing Equipment32


PI: L. KhanAmount: $260,00020. N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2011 – 2013 (PI)Topic: Capacity Building for Assured Cloud ComputingCo-PI: K. Hamlen, M. Kantarcioglu, K. Sarac, L. KhanAmount: $280,00021. N<strong>at</strong>ional Science Found<strong>at</strong>ion, 2011 – 2016 (Co-PI)Topic: Privacy-Enhanced Secure D<strong>at</strong>a Provenance (TC: Large)PI: M. KantarciogluAmount: $912,00022. <strong>Texas</strong> Enterprise Research Funds, 2004 – 2008Topic: D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityPart <strong>of</strong> technology funds awarded to UT <strong>Dallas</strong> by <strong>Texas</strong> Instruments and St<strong>at</strong>e <strong>of</strong> <strong>Texas</strong>Awards Received by Team Members (2006 – Present)Kevin Hamlen: Air Force Young Investig<strong>at</strong>or Award, 2007, 350KMur<strong>at</strong> Kantarcioglu: NSF CAREER Award, 2009, 400KMur<strong>at</strong> Kantarcioglu: Botnet, ONR (subcontract from Purdue) , 2009, 60KMur<strong>at</strong> Kantarcioglu: Privacy in Genomic D<strong>at</strong>abases, NIH (subcontract from Vanderbilt), 2009, 350KMur<strong>at</strong> Kantarcioglu: Provenance for Sensor D<strong>at</strong>a, NSF NeTS, 2010, 260KKevin Hamlen: NSF Career, 2011, 500KKevin Hamlen: Medium Trustworthy Computing, 2011, 550KL<strong>at</strong>ifur Khan, Tektronix, 100KL<strong>at</strong>ifur Khan, NSF Workshop, 20KDoD IASP Capacity Building and Scholarship, 2006 – Present, approx. 75K/year (Kamil Sarac, Mur<strong>at</strong>Kantarcioglu, Kevin Hamlen, L<strong>at</strong>ifur Khan)<strong>The</strong> MITRE Corpor<strong>at</strong>ion (January 1989 – 2004)MITRE is a Not-for-Pr<strong>of</strong>it federally funded research and development center and therefore the researchprojects th<strong>at</strong> are externally funded are internally completed. One staff year is approxim<strong>at</strong>ely $200,000.I. Principal Investig<strong>at</strong>or for the following research projects <strong>at</strong> MITRE:1. Secure Distributed D<strong>at</strong>a ManagementUS Navy, SPAWAR, FY89 (1 staff year)Team members: Bhavani Thuraisingham, Amiel KamonUSAF Rome Air Development Center, FY90, FY91, FY92 (1 staff year/yr)2. Inference Problem/Constraint ProcessingUS Navy, SPAWAR, FY90 (1.5 staff years)Team Members: Bhavani Thuraisingham, William Ford, Marie Collins, Jon<strong>at</strong>han O’KeeffeUS Army CECOM, FY91 – FY95 (1.5 staff years/yr approx.)Continued to work on project FY96 and 97Team Members: Bhavani Thuraisingham, William Ford, Harvey Rubinovitz, Marie Collins,David FotiUS AirForce, FY99 (1 staff year)Team Members: Bhavani Thuraisingham, Harvey Rubinovitz3. Secure Multimedia/Object D<strong>at</strong>abase ManagementUS Navy SPAWAR, FY91 – FY93 (2 staff years/yr approx.)Continued to work on project FY94, FY9533


Team Members: Bhavani Thuraisingham, William Herndon, Arnon Rosenthal, Richard Graubart,Jim Williams4. Secure Client Server ComputingUS Army CECOM, FY94 (1 staff year)Investig<strong>at</strong>ed security issues for client-server computing and identified security for object requestbrokers.Team Members: Bhavani Thuraisingham, Brian Kahn5. Research Directions in D<strong>at</strong>abase Security, Special topics in D<strong>at</strong>abase Security(Secure Feder<strong>at</strong>ed D<strong>at</strong>a Management, Found<strong>at</strong>ions <strong>of</strong> Inference Problem, D<strong>at</strong>a Mining andPrivacy)NSA FY91 (0.5 staff year), FY92 (1.5 staff years), FY93 – FY95 (0.5 staff year/yr), FY96 (1 staffyear). Project continued under Dr. Chris Clifton, FY97Team Members: Bhavani Thuraisingham, Mark Nadel, Leonard Monk, Chris CliftonNSA Team Members: Leonard Binns, Don Marks, Peter Sell6. Research Directions in Massive Digital D<strong>at</strong>a Systems (MDDS), D<strong>at</strong>a Mining for Text D<strong>at</strong>abasesCIA MDDS FY93 – FY99 (1.5 staff year/yr)Text mining (initi<strong>at</strong>ed project for 2 staff years/yr in FY96 – subcontractor: Stanford <strong>University</strong>,project managed by Dr. Chris Clifton and continued until FY99)Team Members: Bhavani Thuraisingham, Maria Zemankova, Beth Lavender, Henry Bayard,Marcia Kerchner, Manette Lazar, Chip Paradise, Chris Clifton, Arnon Rosenthal7. Research in Real-time D<strong>at</strong>a Management and Real-time MiddlewareUSAF Rome Lab, FY93 – FY99 (Principal investig<strong>at</strong>or for Real-time D<strong>at</strong>a Management portion<strong>of</strong> project: 2 staff year/yr). Part <strong>of</strong> larger project, approx. 5 – 7 staff year/yr managed by JohnMaurer)Team members: Bhavani Thuraisingham, Alice Shafer, Gary Gengo, Mike Squadrito, RomanGinis, Victor Fay-Wolfe, Steve Wohlever, Eric Hughes8. Research Directions in D<strong>at</strong>a ManagementMITRE Research FY95 – FY97 (1 staff year/yr)Team Members: Bhavani Thuraisingham, Barbara Blaustein, Arnon Rosenthal, Len Seligman,Penny Chase, Tom Mowbray9. XML SecurityPart <strong>of</strong> independent research from NSF IPA (20% <strong>of</strong> my time, FY02 – FY04)II. Other Research Analysis/Technology Transfer Projects:1. Treasury research credit (evalu<strong>at</strong>ed research conducted by Fortune 100 corpor<strong>at</strong>ions FY99 –FY01), work report in Wall Street Journal, December 2000. Part <strong>of</strong> a team instrumental inbringing this project to MITRE FY99 – FY01.2. Technology Transfer to Services: (i) Air Force: AWACS project; Secure Distributed Queryprocessing – IMOM Applic<strong>at</strong>ion (ii) Navy: Inference problem analysis for oper<strong>at</strong>ional systems;and (iii) Army: Technology transfer <strong>of</strong> secure distributed d<strong>at</strong>abase researchIII. Research Management1. MITRE: Department Head <strong>of</strong> MITRE, managed budget <strong>of</strong> approx. $5 million/yr for 4+ years.2. MITRE: Head, MITRE’s research in IT, managed a budget <strong>of</strong> approx. $4million/yr for 3 years.34


3. CIA: As manager <strong>of</strong> fifteen research projects for CIA, managed a budget <strong>of</strong> approx. $3 million/yrfor 6 years.Honeywell Inc. (1986 – 1989)1. Air Force, Response to BAA: Secure Distributed D<strong>at</strong>a ViewsAs project contributor, worked on proposals for various research projects and contributed toprojects, e.g. Secure Distributed D<strong>at</strong>a Views (SDDS), RADC. Became the principal investig<strong>at</strong>orduring the 2 nd year <strong>of</strong> the three year SDDS project. (January 1986 – December 1988); managed 3staff years/yrTeam Members: P<strong>at</strong> Dwyer, Emanual Oneugbe, Paul Stachour, Tom Haigh, Earl Boebert, BlairDillaway2. Air Force, Response to BAA: Engineering Inform<strong>at</strong>ion Systems As project contributor, led thed<strong>at</strong>a modeling part <strong>of</strong> the project for Engineering Inform<strong>at</strong>ion Systems; project funded by WrightP<strong>at</strong>terson AFB (October 1987 - December 1988); managed 2 staff years /yr (Team member:Venk<strong>at</strong> Venk<strong>at</strong>raman)3. NASA, Response to BAA: Distributed Systems Project contributor on the distributed systemsproject for NASA; principal investig<strong>at</strong>or <strong>of</strong> the Network Oper<strong>at</strong>ing Systems portion <strong>of</strong> the project(November 1986- October 1987); managed 2 staff year /yr4. Internally funded research projects:Distributed D<strong>at</strong>a Dictionary Systems: Honeywell’s Residential Controls Division, 1986 – 1987Team members: Krishna Mikkileneni, Hongjun LuExpert Systems for Control Systems, Honeywell Industrial Autom<strong>at</strong>ion Systems Division 1987 –1988Team members: Ferit Konar, Paul FelixExpert Systems for Network Management: Honeywell Building Controls Division, 1987 – 1988Object Technology for Building Control Systems, Honeywell’s Building Controls Division, 1987– 1988Cost Modeling <strong>of</strong> S<strong>of</strong>tware Str<strong>at</strong>egies, Honeywell Corpor<strong>at</strong>e, 1987 – 1988Team member: Ron CroweHeterogeneous Knowledge Integr<strong>at</strong>ion, Honeywell Industrial Autom<strong>at</strong>ion Systems Division, 1988– 1989Infrastructure Development FundingI have supported my colleagues in the NSA Capacity building efforts for 2007 (Mur<strong>at</strong> Kantarcioglu), 2008(Kevin Hamlen) and 2010 (L<strong>at</strong>ifur Khan). In 2011, we received infrastructure funding from AFOSR. In2011 w also received capacity building funds from NSF SFS (for courses in assured cloud computing)35


I. JOURNAL PAPERSD<strong>at</strong>a and Applic<strong>at</strong>ions SecuritySection 10: PUBLICATIONSAuthored Works (Journals, Conferences, Books, etc.)1. Multilevel Security in D<strong>at</strong>abase Management Systems, Computers and Security Journal, June 1987(North Holland), Vol. 6, No. 3, pp. 252-260, (co-authors: P. Dwyer, G. Jel<strong>at</strong>is).2. Security Checking in Rel<strong>at</strong>ional D<strong>at</strong>abase Management Systems Augmented with Inference Engines,Computers and Security Journal, December 1987 (North Holland), Vol. 6, No. 6, pp. 479-492.3. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems, Computers and SecurityJournal August 1988 (North Holland), Vol. 7, No. 4, (co-author: J. McHugh).4. Secure Query Processing Str<strong>at</strong>egies, IEEE Computer, March 1989, Vol. 22, No. 3 (invited paper, coauthors:T. F. Keefe and W. T. Tsai).5. SODA - A Secure Object-Oriented D<strong>at</strong>abase System, Computers and Security Journal, Vol. 8 , October1989 (co-authors: W. T. Tsai and T. F. Keefe).6. Prototyping to Explore MLS/DBMS Design, Computers and Security Journal, May 1989 (Elsevier,formerly North Holland), Vol. 8, No. 3(co-authors: W. T.Tsai and D. Thomsen).7. A Functional View <strong>of</strong> Multilevel D<strong>at</strong>abases, Computers and Security Journal (Elsevier), Vol. 8, No. 8,December 1989.8. Towards the Design <strong>of</strong> a Secure D<strong>at</strong>a/Knowledge Base Management System, D<strong>at</strong>a and KnowledgeEngineering Journal, March 1990, (North Holland), Vol. 5, No. 1.9. Security in Object-Oriented D<strong>at</strong>abase Systems, Journal <strong>of</strong> Object-Oriented Programming, March/April1990, Vol. 2, No. 6. (also reprinted in book on object-oriented d<strong>at</strong>abase management systems by SIGpublishers).10. Design <strong>of</strong> LDV - A Multilevel Secure D<strong>at</strong>abase Management System, IEEE Transactions on Knowledgeand D<strong>at</strong>a Engineering, June 1990, Vol. 2, No. 2 (co-author: P. Stachour).11. SQL Extensions for Security Assertions, Computer Standards and Interfaces Journal, 1990 (NorthHolland), Vol. 11, No.1, 5-14 (co-author: P. Stachour).12. AI Applic<strong>at</strong>ions in Multilevel D<strong>at</strong>abase Security, Computer Security Journal, , 1990 (Miller FreemanPublishers), Vol. 6, No. 1, (co-authors: W. Tsai, T. Keefe, and D. Thomsen)13. Multilevel Secure Object-Oriented D<strong>at</strong>a Model - Issues on Noncomposite Objects, Composite Objects,and Versioning, Journal <strong>of</strong> Object-Oriented Programming, Volume 4, November/December 1991.(Version <strong>of</strong> the article reprinted by the MITRE Journal, 1992.) (Also reprinted in book on objectorientedd<strong>at</strong>abase management systems by SIG publishers.)14. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems – II, Computers and SecurityJournal (Elsevier), Volume 10, No. 8, December 1991.36


15. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management - III, Computers and Security(Elsevier), Vol. 11, November 1992 (co-author: H. Rubinovitz).16. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed Query Processor for a Trusted Distributed D<strong>at</strong>abaseManagement Systems, Journal <strong>of</strong> Systems and S<strong>of</strong>tware, April 1993 (North Holland), Vol. 21, No. 1(co-author: Harvey Rubinovitz).17. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller, D<strong>at</strong>a and Knowledge EngineeringJournal, December 1993 (North Holland), Vol. 11, No. 3, p. 271 – 297, (co-authors: W. Ford, M.Collins, J. O'Keeffe); (Article reprinted by the MITRE Journal, 1994).18. Integr<strong>at</strong>ing Intelligent D<strong>at</strong>abase Technology and Trusted D<strong>at</strong>abase Technology, Computer SecurityJournal, 1993 (Miller Freeman Publishers).19. Simul<strong>at</strong>ion <strong>of</strong> Join Query Processing Algorithms for a Trust Distributed D<strong>at</strong>abase ManagementSystem, Inform<strong>at</strong>ion and S<strong>of</strong>tware Technology Journal (Chapman and Hall), Vol. 35, No. 5, 1993(co-author: Harvey Rubinovitz) (version <strong>of</strong> conference paper published in Simul<strong>at</strong>ion Conference,1991).20. Towards Developing a Standard Multilevel Rel<strong>at</strong>ional D<strong>at</strong>a Model for Representing a MultilevelUniverse, Computer Standards and Interfaces Journal (North Holland), Vol. 15, No. 1, 1993 (alsopublished by Computer Standards Interface Journal special issue in 1999 as one <strong>of</strong> the seminalpapers to appear in the journal).21. Multilevel Security for Inform<strong>at</strong>ion Retrieval Systems, Inform<strong>at</strong>ion and Management Journal (NorthHolland) Vol. 24, 1993.22. User-Role Based Security for Collabor<strong>at</strong>ive Computing Environment, Multimedia Review: <strong>The</strong>Journal <strong>of</strong> Multimedia Computing (Penton Media publishers), Summer 1993 (co-authors: S.Demurjian and T.C. Ting).23. Security Issues for Feder<strong>at</strong>ed D<strong>at</strong>abase Systems, Computers and Security (North Holland), Vol. 13,No. 6, p. 509 – 525, December 1994.24. Multilevel Security in Inform<strong>at</strong>ion Retrieval Systems - II, Inform<strong>at</strong>ion and Management Journal(North Holland), Vol. 28, No. 1, 1995.25. Security Constraint Processing in a Multilevel Secure Distributed D<strong>at</strong>abase Management System,IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, April 1995 (co-author: W. Ford).26. Towards the Design <strong>of</strong> a Multilevel Secure Object-Oriented D<strong>at</strong>abase Management System, Journal<strong>of</strong> Object-Oriented Programming, June 1995.27. MOMT: A Multilevel Object Modeling Technique for designing Secure D<strong>at</strong>abase Applic<strong>at</strong>ions,Journal <strong>of</strong> Object-Oriented Programming, 1996 (co-authors: D. Marks and P. Sell).28. Adaptable Object Request Brokers for Inform<strong>at</strong>ion Survivability for Real-time Command andControl Systems, Distributed Computer Systems, 1999, p. 242 – 245 (co-author: J. Maurer).29. Secure Distributed D<strong>at</strong>abase Systems, Inform<strong>at</strong>ion Security Journal (Elsevier Science special issue inD<strong>at</strong>abase Security), 2001.30. Selective and Authentic Third-Party Public<strong>at</strong>ion <strong>of</strong> XML Documents, IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, Vol. 16, No. 10, p. 1263 – 1278, 2004 (co-author: E. Bertino et37


al). (version also published as MIT Working Paper, 2002)31. Secure Sensor Inform<strong>at</strong>ion Management & Mining, IEEE Signal Processing, May 2004.32. Security and Privacy for Sensor D<strong>at</strong>abases, Sensor Letters, Inaugural Issue (American Scientific),Vol. 2, No.1, March 2004.33. Security and Privacy for Multimedia D<strong>at</strong>abase Management Systems, Multimedia Tools (Kluwer),Vol. 33, No. 1, October 2007 (keynote <strong>at</strong> IEEE Multimedia S<strong>of</strong>tware Engineering and DistributedMultimedia 2003).34. Privacy-preserving D<strong>at</strong>a Mining: Developments and Directions, Journal <strong>of</strong> D<strong>at</strong>abase Management,(special issue in D<strong>at</strong>abase Technologies for N<strong>at</strong>ional Security), p. 75 – 87, March 2005.35. Privacy Constraint Processing in a Privacy-Enhanced D<strong>at</strong>abase Management System, D<strong>at</strong>a andKnowledge Engineering Journal, Vol. 55, No. 2, p. 159 - 188 (North Holland), 2005.36. Security Standards for the Semantic Web, Computer Standards and Interface Journal (NorthHolland), Vol. 27, p. 257 – 268, March 2005 (version <strong>of</strong> COMPSAC Conference workshop paper,2003).37. Access Control for Web D<strong>at</strong>a: Models and Policy Languages, Invited Paper - Annales desTelecommunic<strong>at</strong>ions, p. 245, Vol. 61, No. 3-4, March/April 2006 (co-authors: B. Carmin<strong>at</strong>a, E.Ferrari).38. Directions for Security and Privacy for Semantic E-Business Applic<strong>at</strong>ions, Invited Paper,Communic<strong>at</strong>ions <strong>of</strong> ACM, December 2005.39. A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering,VLDB Journal, Vol. 16, No. 1, January 2007 (co-authors: M. Awad et al).40. A Framework for a Video Analysis Tool for Suspicious Event Detection, Multimedia Tools, Vol. 35No. 1, October 2007 (co-author: G. Lavee et al).41. Standards for Secure D<strong>at</strong>a Sharing Across Organiz<strong>at</strong>ions, Computer Standards and InterfaceJournal, Vol. 29, No. 1, January 2007 (co-author: D. Harris et al).42. Secure Knowledge Management: Confidentiality, Trust and Privacy, IEEE Transactions on Systems,Man and Cybernetics, May 2006 (co-authors: E. Bertino et al) (based on keynote presented <strong>at</strong> SKM2004).43. PP-trust-X: A System for Privacy Preserving Trust Negoti<strong>at</strong>ion, ACM Transactions on Inform<strong>at</strong>ionand Systems Security, Vol. 10, No. 3, Article 12, July 2007 (co-author: E. Bertino et al).44. Administering the Semantic Web: Confidentiality, Privacy and Trust Management, Intern<strong>at</strong>ionalJournal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, January 2007 (co-author: N. Tsybulnik, A. Ashraful).45. Secure Grid Computing, Intern<strong>at</strong>ional Journal <strong>of</strong> Computer Science and Network Security, August2006 (co-author: J. Zhu).46. Security for ERP Systems, Inform<strong>at</strong>ion Systems Security Journal, May 2007 (co-author: W. She).47. Secure D<strong>at</strong>a Warehousing, D<strong>at</strong>a Warehousing Journal, IDEA Press, 2007 (co-authors: Srinivasan, M.Kantarcioglu).38


48. E-Mail Worm Detection Using D<strong>at</strong>a Mining. Mohammad M. Masud, L<strong>at</strong>ifur Khan, Bhavani M.Thuraisingham: IJISP 1(4):47-61 (2007)49. Design and Implement<strong>at</strong>ion <strong>of</strong> a Framework for Assured Inform<strong>at</strong>ion Sharing AcrossOrganiz<strong>at</strong>ional Boundaries, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, 2008.(co-authors: Y. Harsha Kumar et al).50. A Scalable Multi-level Fe<strong>at</strong>ure Extraction Technique to Detect Malicious Executables,Inform<strong>at</strong>ion Systems Frontiers, (Springer Netherlands), Vol. 10, No. 1, Page 33-45, March2008 (co-authors: M. Masud, L. Khan).51. <strong>The</strong> Applicability <strong>of</strong> the Perturb<strong>at</strong>ion Based Privacy Preserving D<strong>at</strong>a Mining for Real-WorldD<strong>at</strong>a,, " D<strong>at</strong>a and Knowledge Engineering (DKE), Vol. 65, No. 1, p.5-21, 2008 LeadingJournal (co-authors: L. Liu, M. Kantarcioglu).52. A Risk Management Approach to RBAC, Risk and Decision Analysis Journal, 2008 (coauthors:E. Celikel, M. Kantarcioglu, E. Bertino).53. Exploiting an Antivirus Interface, Computer Standards & Interfaces, Vol. 31, No. 6, p. 1182-1189, November 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan).54. Privacy Preserv<strong>at</strong>ion in Wireless Sensor Networks: A St<strong>at</strong>e-<strong>of</strong>-the-art Survey, Ad-HocNetworks Journal, Vol. 7, No. 8, November 2009 (co-authors: L. Na et al).55. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, Computer Systems Scienceand Engineering, Vol. 24, No. 2, March 2009 (co-authors: R. Layfield et al).56. Deleg<strong>at</strong>ion Model for Web Services, Journal <strong>of</strong> Web Services Research 2009 (co-authors: W.She, I. Yen).57. Rel<strong>at</strong>ionaliz<strong>at</strong>ion <strong>of</strong> Provenance D<strong>at</strong>a in Complex RDF Reific<strong>at</strong>ion Nodes, Special Issue <strong>of</strong> ElectronicCommerce Research Journal on Trust and Privacy Aspects <strong>of</strong> Electronic Commerce, 2009 (coauthors:S. Sriram et al).58. Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>a Streams under TimeConstraints, Accepted and to appear in IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering,2010 (co-authors: M. Masud, L. Khan, J. Han).59. Semantic Web, D<strong>at</strong>a Mining and Security, IEEE Intelligent Systems Special Issue, 2010 (coauthors:M. Kantarcioglu and L. Khan).60. Secure D<strong>at</strong>a Objects Replic<strong>at</strong>ion in D<strong>at</strong>a Grid, IEEE Transactions on Dependable and SecureComputing, January 2010 (co-authors: Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham,and L<strong>at</strong>ifur Khan).61. Security Issues for Cloud Computing, Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, Vol. 4, No. 2,2010, p. 36 – 48 (coauthors: K. Hamlen, L. Khan, M. Kantarcioglu).62. Policy Management for Assured Inform<strong>at</strong>ion Sharing, Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy,September 2010 (co-authors: M. Awad et al).39


63. Privacy-Preserved Social Network Integr<strong>at</strong>ion and Analysis for Security Inform<strong>at</strong>ics IEEEIntelligent Systems Special Issue, Vol. 25, No. 5, p. 88 – 90, 2010 (co-author: C. Yang).64. Geosp<strong>at</strong>ial Resource Description Framework (GRDF) and security constructs, Computer Standards& Interfaces, Vol. 33, No. 1, p. 35-41, 2011 (co-authors: Ashraful Alam, L<strong>at</strong>ifur Khan).65. Semantic Web-based Social Network Access Control, Computers and Security, Vol. 30, No. 2 – 3,2011 (special issue for SACMAT conference) (co-authors: B. Carmin<strong>at</strong>i et al).66. Adaptive Inform<strong>at</strong>ion Coding for Secure and Reliable Wireless Telesugery Communic<strong>at</strong>ions,Journale <strong>of</strong> Mobile Networks and Applic<strong>at</strong>ions (MONET), Springer online(http://www.springerlink.com/content/r71p755326k68814/), July 2011.67. Cyberphysical Systems Security Applied to Telesurgical Robotics, Computer Standards &Interfaces, Vol. 34, No. 1, p. 225-229, January 2012 (co-author: Gregory S. Lee).68. D<strong>at</strong>a Security Services, Solutions and Standards for Outsourcing, To appear in Computer Standardsand Interfaces Journal, 2012 (co-author: K. Hamlen).69. Security-aware Service Composition with Fine-grained Access and Inform<strong>at</strong>ion Flow Control, Toappear in IEEE Transactions on Services Computing, 2012 (co-authors: W. She et al).70. D<strong>at</strong>abase Inference Controller for 3D Motion Capture D<strong>at</strong>abase, To appear in Journal <strong>of</strong>Inform<strong>at</strong>ion Security and Privacy, 2012 (co-author: R. N<strong>at</strong>arajan et al).71. Effective S<strong>of</strong>tware Fault Localiz<strong>at</strong>ion using an RBF Neural Network, To appear in IEEETransactions on Reliability, 2012 (co-authors: W. E. Wong, V. Debroy, R. Golden, X. Xu).72. Secure Semantic Computing, To appear in the Semantic Computing Journal 2012 (co-author: K.Hamlen).73. Malware Detection in the Cloud, To appear in the ACM Transactions on Management Inform<strong>at</strong>ionSystems, 2012 (coauthor: M. Masud et al).Distributed Systems/D<strong>at</strong>a Management/AI Applic<strong>at</strong>ions/Real-time Systems74. AI Applic<strong>at</strong>ions in Distributed System Design Issues, 1988, IEEE Network, Vol. 2, No. 6, (co-author:J. Larson).75. Recovery Point Selection on a Reverse Binary Tree Task Model, August 1989, IEEE Transactions onS<strong>of</strong>tware Engineering, Vol. 15, No.8, (co-authors: W. T. Tsai and S. K Chen).76. From Rules to Frames and Frames to Rules, October 1989, AI Expert (Miller Freeman Publishers)Volume 2, No. 10. (Reviewed by Editorial Board).77. A New View <strong>of</strong> Inform<strong>at</strong>ion Modeling: A Bridge Between D<strong>at</strong>a and Inform<strong>at</strong>ion, Inform<strong>at</strong>ionSystems Management Journal (Auerbach), Vol. 9, No., Spring 1992 (co-author: V. Venk<strong>at</strong>araman;also reprinted in Handbook <strong>of</strong> D<strong>at</strong>a Management 1993, Editor: von Halle and Kull).78. On Developing Multimedia D<strong>at</strong>abase Management Systems Using the Object-Oriented Approach,Multimedia Review: Journal <strong>of</strong> Multimedia Computing, Vol. 3, No.2, 1992.40


79. Inform<strong>at</strong>ion Demands Drive D<strong>at</strong>a Base Interoperability, SIGNAL Magazine: AFCEA Journal,December 1995.80. Web Inform<strong>at</strong>ion Management and Its Applic<strong>at</strong>ion to Electronic Commerce, Intern<strong>at</strong>ional Journal onArtificial Intelligence Tools (World Scientific), Vol. 8, No. 2, June 1999.81. Real-time Transaction Processing, Computer Systems: Science and Practice (Chapman and Hall),1999 (co-authors: L. DiPippo, V. Wolfe et al).82. A Primer for Understanding D<strong>at</strong>a Mining, IEEE ITPro, Vol., 2, No. 1, January/February 2000.83. Real-time CORBA, IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 10, October2000 (co-author: V. Wolfe et al).84. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-Time Middleware, Real-time Systems Journal(Kluwer), Vol. 20, p. 155 -182, 2001 (co-author: V. Wolfe, L. DiPippo et al).85. Emerging Standards for D<strong>at</strong>a Mining, Computer Standards and Interface Journal (North Holland),Vol. 23, No. 3, 2001 (co-author: C. Clifton).86. Found<strong>at</strong>ions <strong>of</strong> D<strong>at</strong>a Mining: Position Paper, Communic<strong>at</strong>ions <strong>of</strong> Institute for Inform<strong>at</strong>ion andComputing Machinery (Taiwan Journal), May 2002. (PAKDD 2002 workshop paper published asspecial issue in journal).87. Collabor<strong>at</strong>ive Commerce and Knowledge Management, Knowledge Management Journal (WileyInterscience), 2002.88. Managing and Mining Multimedia D<strong>at</strong>abases, Intern<strong>at</strong>ional Journal <strong>of</strong> Artificial Intelligence Tools(World Scientific), Vol. 13, No. 3, 2004 (keynote <strong>at</strong> ICTAI99).89. Predicting WWW Surfing Using Multiple Evidence Combin<strong>at</strong>ion, VLDB Journal, May 2008 (coauthor:M. Awad et al).90. A Framework for Autom<strong>at</strong>ed Image Annot<strong>at</strong>ion, Intern<strong>at</strong>ional Journal <strong>of</strong> Computer Systems Scienceand Engineering, Vo1. 22, No. 1 – 2, 2007, (co-author: L Wang et al).91. A Scalable Clustering Method Based on Density, WSEAS Transactions on Computing Research, 2008(co-authors: L. Khan and S. Bereg).92. Emergency Response Applic<strong>at</strong>ions: Dynamic Plume Modeling and Real-Time Routing, IEEE InternetComputing, Vol. 12, No. 1, p. 38-44, January - February 2008,(co-authors: P. K. Chitumalla, D.Harris, L. Khan).93. R2D: A Bridge Between the Semantic Web and Rel<strong>at</strong>ional Visualiz<strong>at</strong>ion Tools, Semantic ComputingJournal, 2009. (co-authors: S. Sriram et al).94. Necessary and Sufficient Conditions for Transaction-consistent Global Checkpoints in a DistributedD<strong>at</strong>abase System, Inform<strong>at</strong>ion Sciences, Vol. 179, No. 20, p. 3659 – 3672, September 2009, (coauthors:J. Wu, D. Manivannan).95. Upd<strong>at</strong>e Enabled Triplific<strong>at</strong>ion <strong>of</strong> Rel<strong>at</strong>ional D<strong>at</strong>a into Virtual RDF Stores Intern<strong>at</strong>ional Journal <strong>of</strong>Semantic Computing, World Scientific, Vol. 4, No. 4 December 2010, p. 423 – 451 (selected fromProc. <strong>of</strong> Fourth IEEE Intern<strong>at</strong>ional Conference on Semantic Computing [IEEE ICSC 2010],41


September 22-24, 2010, Carnegie Mellon <strong>University</strong>, Pittsburgh, PA, USA). (co-authors: S.Ramanujam, V. Khadilkar, L. Khan, S. Seida, M. Kantarcioglu).96. Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing, IEEETransactions on Knowledge and D<strong>at</strong>a Engineering, Vol. 23, No. 9, p. 1312-1327, 2011 (co-authors:Mohammad Farhan Husain, James P. McGlothlin, Mohammad M. Masud, L<strong>at</strong>ifur R. Khan).97. Enhanced Geographically Typed Semantic Schema M<strong>at</strong>ching, Journal <strong>of</strong> Web Semantics, Vol. 9, No.1, p. 52-70, 2011 (co-authors: Jeffrey Partyka, Pallabi Parveen, L<strong>at</strong>ifur Khan, Shashi Shekhar).Computability/Complexity <strong>The</strong>ory98. Represent<strong>at</strong>ion <strong>of</strong> One-One Degrees by Decision Problems, 1982, Journal <strong>of</strong> Computer and SystemsSciences (Academic Press), Vol. 24, p. 373-377.99. Some Elementary Closure Properties <strong>of</strong> N-Cylinders, 1983, Notre Dame Journal <strong>of</strong> Formal Logic,Vol. 24, No. 2, p. 242-253.100. <strong>The</strong> Concept <strong>of</strong> N-Cylinder and its Rel<strong>at</strong>ionship to Simple Sets, 1983, Notre Dame Journal <strong>of</strong> FormalLogic, Vol. 24, No. 3, p. 328-336.101. Cylindrical Decision Problems, 1983, Notre Dame Journal <strong>of</strong> Formal Logic, Vol. 24, , No. 2, p. 188-198.102. System Functions and their Decision Problems, 1984, Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logik undGrundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 30, No. 7 - 8, p. 119-128. (now Journal <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>ical Logic)103. <strong>The</strong> Concept <strong>of</strong> N-Cylinder and its Applic<strong>at</strong>ion , 1986, Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logik undGrundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 32, No. 13 - 16, p. 211-219.104. Reducibility Rel<strong>at</strong>ionships Between Decision Problems for System Functions, 1987, Zeitschrift furM<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 33, No. 4, p. 305-312.105. Represent<strong>at</strong>ion <strong>of</strong> One-One Degrees by N-Cylindrical Decision Problems, 1988, Zeitschrift furM<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 34, No. 6.106. System Function Languages, M<strong>at</strong>hem<strong>at</strong>ical Logic Quarterly, Vol. 39, No. 1, 1993.107. A Construction <strong>of</strong> Cartesian Authentic<strong>at</strong>ion Codes from Orthogonal Spaces over a Finite Field <strong>of</strong>Odd Characteristic, Discrete M<strong>at</strong>hem<strong>at</strong>ics, Algorithms and Applic<strong>at</strong>ions, Vol. 1, No. 1, March 2009(co-authors: Z. Li et al).108. A Better Approxim<strong>at</strong>ion for Minimum Average Routing P<strong>at</strong>h Clustering Problem in 2-D Underw<strong>at</strong>erSensor Networks, Discrete M<strong>at</strong>hem<strong>at</strong>ics, Algorithms and Applic<strong>at</strong>ions, Vol. 1, No. 2, June 2009 (coauthors:W. Wang et al).II. CONFERENCES PAPERSD<strong>at</strong>a and Applic<strong>at</strong>ions Security1. Secure Query Processing Using AI Techniques, January 1988, Proceedings <strong>of</strong> the IEEE HawaiiIntern<strong>at</strong>ional Conference on Systems Sciences, p. 561-570, (co-authors: W. T. Tsai and T. F. Keefe)- Best Paper Award for S<strong>of</strong>tware Tracks (enhanced version in IEEE Computer 1989).42


2. Found<strong>at</strong>ions <strong>of</strong> Multilevel D<strong>at</strong>abases, May 1988, Proceedings 1st RADC D<strong>at</strong>abase SecurityInvit<strong>at</strong>ional Workshop, Menlo Park, CA, (Proceedings published by Springer Verlag, 1992, Ed: T.Lunt – Book Chapter).3. Design <strong>of</strong> an Upd<strong>at</strong>e Processor for MLS/DBMS, October 1988, Invited paper, Proceedings <strong>of</strong> the 11thN<strong>at</strong>ional Computer Security Conference, Baltimore, MD; addendum to Proceedings (co-authors: P.Stachour and P. Dwyer).4. Query Processing in LDV: A Secure D<strong>at</strong>abase System, December 1988, Proceedings <strong>of</strong> the 4th IEEEAerospace Computer Security Conference, Orlando, FL (co-authors: P. Dwyer, E. Onuegbe and P.Stachour).5. A Multilevel Security Model for Object-Oriented Systems, October 1988, Proceedings <strong>of</strong> the 11thN<strong>at</strong>ional Computer Security Conference, Baltimore, MD, (co-authors: W. T. Tsai and T. F. Keefe).6. Prototyping as a Research Tool for MLS/DBMS, October 1988, Proceedings <strong>of</strong> the IFIP WG 11.3Conference on D<strong>at</strong>abase Security, Kingston, Ontario, Canada, (also published as book chapterby North Holland, 1989: D<strong>at</strong>abase Security II: St<strong>at</strong>us and Prospects) (co-authors: W. Tsai and D.Thomsen).7. Security Checking with Prolog-Extensions, May 1989, Proceedings <strong>of</strong> the 2nd RADC D<strong>at</strong>abaseSecurity Invit<strong>at</strong>ional Workshop, Franconia, NH.8. Mand<strong>at</strong>ory Security in Object-Oriented D<strong>at</strong>abase Systems, October 1989, Proceedings <strong>of</strong> the ACMConference on Object-Oriented Programming, Systems, Languages and Applic<strong>at</strong>ions (ACMOOPSLA) Conference, New Orleans, LA.9. A Multilevel Secure Object-Oriented D<strong>at</strong>a Model, October 1989, Proceedings <strong>of</strong> the 12th N<strong>at</strong>ionalComputer Security Conference, Baltimore, MD.10. Secure Query Processing in Intelligent D<strong>at</strong>abase Management Systems, December 1989, Proceedings<strong>of</strong> the 5th IEEE Computer Security Applic<strong>at</strong>ions Conference Tucson, AZ.11. Novel Approaches to Handle the Inference Problem, June 1990, Proceedings <strong>of</strong> the 3rd RADCD<strong>at</strong>abase Security Workshop, New York.12. <strong>The</strong> Inference Problem in Multilevel Secure D<strong>at</strong>abase Management Systems, June 1990, Proceedings<strong>of</strong> the 3rd RADC D<strong>at</strong>abase Security Workshop, New York (co-authors: W. Ford, M. Collins, J.O'Keeffe).13. Trusted Distributed D<strong>at</strong>abase Management Systems, June 1990, Proceedings <strong>of</strong> the 3rd RADCD<strong>at</strong>abase Security Workshop, New York, (co-author: H. Rubinovitz).14. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem in D<strong>at</strong>abase Security, June 1990, Presented<strong>at</strong> the 3rd IEEE Found<strong>at</strong>ions <strong>of</strong> Computer Security Workshop, Franconia, NH (public release was notobtained in time for proceedings; printed as MITRE Paper M291 May 1990).15. Multilevel Security for Multimedia D<strong>at</strong>abase Systems, September 1990, Proceedings <strong>of</strong> the 4th IFIPWG 11.3 Conference on D<strong>at</strong>abase Security, Halifax, England, (also published as book chapter byNorth Holland, 1991, p. 99 - 116).16. Secure Query Processing in Distributed D<strong>at</strong>abase Management Systems - Design and PerformanceStudy, December 1990, Proceedings <strong>of</strong> the 6th IEEE Computer Security Applic<strong>at</strong>ions Conference,Tucson, AZ, (co-author: A. Kamon).43


17. A Note on Security Constraint Processing in a Multilevel Secure D<strong>at</strong>abase Management System,April 1991, Proceedings <strong>of</strong> the 4th RADC D<strong>at</strong>abase Security Workshop, Little Compton, RI (coauthor:W. Ford, M. Collins).18. Trusted Distributed D<strong>at</strong>abase Management Systems R & D - A Progress Report, April 1991,Proceedings <strong>of</strong> the 4th RADC D<strong>at</strong>abase Security Workshop, Little Compton, RI, (co-authors: H.Rubinovitz).19. Handling Security Constraints During Multilevel D<strong>at</strong>abase Design, April 1991, Proceedings <strong>of</strong> the4th RADC D<strong>at</strong>abase Security Workshop, Little Compton, RI.20. Implement<strong>at</strong>ion and Simul<strong>at</strong>ion <strong>of</strong> Secure Distributed Query Processing Algorithms, Proceedings <strong>of</strong>the 1991 Computer Simul<strong>at</strong>ion Conference, Baltimore, MD, (co-author: H. Rubinovitz).21. A Nonmonotonic Typed Multilevel Logic for Multilevel Secure D<strong>at</strong>a/Knowledge Base ManagementSystem - II, June 1991, Proceedings <strong>of</strong> the 4th IEEE Computer Security Found<strong>at</strong>ions Workshop,Franconia, NH.22. Issues on the Design and Implement<strong>at</strong>ion <strong>of</strong> an Intelligent D<strong>at</strong>abase Inference Controller,Proceedings <strong>of</strong> the 1991 IEEE Intern<strong>at</strong>ional Conference on Systems, Man, and Cybernetics,Charlottesville, VA (co-author: W. Ford).23. <strong>The</strong> Use <strong>of</strong> Conceptual Structures to Handle the Inference Problem, Proceedings <strong>of</strong> the 5th IFIP WG11.3 Conference on D<strong>at</strong>abase Security, Shepherdstown, VA. , November 1991 (Also published byNorth Holland, 1992)24. Security Constraint Processing During the Upd<strong>at</strong>e Oper<strong>at</strong>ion in a Multilevel Secure D<strong>at</strong>abaseSystem, Proceedings <strong>of</strong> the 7th IEEE Computer Security Applic<strong>at</strong>ions Conference, San Antonio, TX,December 1991 (co-authors: M. Collins, W. Ford).25. Design and Simul<strong>at</strong>ion <strong>of</strong> Secure Distributed Concurrency Control Algorithms, Proceedings <strong>of</strong> the1992 Computer Simul<strong>at</strong>ion Conference, Nevada, July 1992. (co-author: H. Rubinovitz).26. A Nonmonotonic Typed Multilevel Logic for Multilevel D<strong>at</strong>abase Management Systems - II, June1992, Proceedings <strong>of</strong> the 5th IEEE Computer Security Found<strong>at</strong>ions Workshop, Franconia, NH.27. Knowledge-based Inference Controlin a Multilevel Secure D<strong>at</strong>abase Management System,Proceedings <strong>of</strong> the 15th N<strong>at</strong>ional Computer Security Conference, Baltimore, MD, October 1992.28. A Note on the Security Impact on Real-time D<strong>at</strong>abase Management Systems, Proceedings <strong>of</strong> the 5thRADC D<strong>at</strong>abase Security Workshop, New York, October 1992.29. Secure Computing with the ACTOR Paradigm, Presented <strong>at</strong> the ACM/SIGSAC New ComputerSecurity Paradigms Workshop, Little Compton, RI, September 1992. (Proceedings published byACM Press, 1993)30. An Object-Oriented Approach to Modeling Multilevel D<strong>at</strong>abase Applic<strong>at</strong>ions, Proceedings <strong>of</strong> theACM Conference Workshop on Object-Oriented Programming Language, Systems, and Applic<strong>at</strong>ions,Vancouver, B.C., October 1992 (co-author: P. Sell).31. Towards the Design and Implement<strong>at</strong>ion <strong>of</strong> a Multilevel Secure Deductive D<strong>at</strong>abase ManagementSystem, Proceedings <strong>of</strong> the 26th Hawaii Intern<strong>at</strong>ional Conference on Systems Sciences, January 1993.44


32. Parallel Processing and Trusted D<strong>at</strong>abase Management Systems - Applying One Technology to theOther, Proceedings <strong>of</strong> the 1993 ACM Conference in Computer Science, Indianapolis, Indiana (coauthor:W. Ford).33. Security and Integrity Constraint Processing in a Multilevel Secure Distributed Environment,MILCOM 93, October 1993 (classified session) (co-authors: A. Abreu, H. Rubinovitz, M. Collins).34. Towards a Multilevel Secure D<strong>at</strong>abase Management System for Realtime Applic<strong>at</strong>ions, Proceedings<strong>of</strong> the First IEEE Workshop in Realtime Computing, May 1993 (co-author: S. Son).35. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed D<strong>at</strong>abase Inference Controller, Proceedings <strong>of</strong> the 17thIEEE COMPSAC Conference, November 1993. (co-authors: H. Rubinovitz, D. Foti, A. Abreu).36. Security and Integrity in Distributed D<strong>at</strong>abase System, D<strong>at</strong>abase Colloquium 93, San Diego, CA,August 1993 (co-authors: D. Small, D. Goldsmith) (proceedings available in electronic media).37. Applying OMT for Multilevel D<strong>at</strong>abase Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the 7th IFIP WorkingConference on D<strong>at</strong>abase Security, Huntsville, Alabama, September 1993. (co-author: P. Sell) (alsopublished as book chapter by North Holland, 1994).38. Object-oriented Approach to Interconnecting Trusted D<strong>at</strong>abase Management Systems, September1993, ACM OOPSLA-93 Conference Workshop on Object Persistence in Heterogeneous D<strong>at</strong>abaseEnvironments, Washington D.C. (co-author: H. Rubinovitz).39. Security Constraint Processing in a Distributed D<strong>at</strong>abase Environment, Proceedings <strong>of</strong> the 1994ACM Computer Science Conference, Phoenix, AZ, March 1994. (co-author: H. Rubinovitz).40. D<strong>at</strong>abase Inference Control, Proceedings <strong>of</strong> the DoD D<strong>at</strong>abase Security Workshop, Maine, June1994 (co-authors: M. Collins and H. Rubinovitz).41. MLS D<strong>at</strong>abase Applic<strong>at</strong>ion Design, Proceedings <strong>of</strong> the DoD D<strong>at</strong>abase Security Workshop, Maine,June 1994 (co-authors: S. Lewis, D. Marks, P. Sell, S. Wiseman).42. Hypersemantic D<strong>at</strong>a Modeling for Inference Analysis, Proceedings <strong>of</strong> the 8th IFIP WorkingConference in D<strong>at</strong>abase Security, Hildesheim, Germany, August 1994. (co-authors: D. Marks, L.Binns) (also published as book chapter by North Holland 1995).43. A Fine-grained Access Control Model for Object-oriented DBMS, Proceedings <strong>of</strong> the 8th IFIPWorking Conference in D<strong>at</strong>abase Security, Hildesheim, Germany, August 1994 (co-authors: A.Rosenthal et al) (also as book chapter by North Holland, 1995).44. An Adaptive Policy for Improved Timeliness in Secure D<strong>at</strong>abase Systems, Proceedings <strong>of</strong> the 9th IFIPWorking Conference in D<strong>at</strong>abase Security, New York, August 1995. (co-authors: S. Son and R.David, also as book chapter by North Holland 1996).45. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller Utilizing a Deductive Object-Oriented D<strong>at</strong>a Model, Proceedings <strong>of</strong> the 13th DOD D<strong>at</strong>abase Colloquium, San Diego, CA, August1996. (co-authors: M. Collins, D. Marks, B. Newman).46. Survivability Issues for Evolvable Real-time Command and Control Systems, Proceedings <strong>of</strong> theInform<strong>at</strong>ion Survivability Workshop, February 1997 (co-authors: P. Krupp, J. Maurer).47. Adaptable Object Request Brokers for Inform<strong>at</strong>ion Survivability <strong>of</strong> Command and Control Systems,Proceedings <strong>of</strong> the Inform<strong>at</strong>ion Survivability Workshop, October 1998 (co-author: J. Maurer et al).45


48. D<strong>at</strong>a Mining, D<strong>at</strong>a Warehousing and Security, Proceedings <strong>of</strong> the IFIP Conference Book, Chapmanand Hall, 1997 (version <strong>of</strong> keynote address <strong>at</strong> conference, 1996; editor: P. Samar<strong>at</strong>i and R. Sandhu)(also presented <strong>at</strong> CODATA Conference, Paris, June 1999).49. Adaptable Object Request Brokers for Inform<strong>at</strong>ion Survivability <strong>of</strong> Evolvable Real Time Commandand Control Systems, proceedings IEEE FTDCS Conference, Cape Town, South Africa, December1999 (co-author: J. Maurer).50. Directions for Web and E-Commerce Security, Proceedings WET ICE June 2001, Boston, MA (coauthors:C. Clifton, E. Bertino et al).51. D<strong>at</strong>a and Applic<strong>at</strong>ions Security: Developments and Directions Proceedings IEEE COMPSAC, 2002,Oxford, UK.52. Building Secure Survivable Semantic Webs, Proceedings IEEE ICTAI 2002, Washington DC. .53. Security Issues for the Semantic Web, Proceedings IEEE COMPSAC 2003, <strong>Dallas</strong>, TX.54. Dependable Computing for N<strong>at</strong>ional Security: A Position Paper, Proceedings <strong>of</strong> the 6 th Intern<strong>at</strong>ionalSymposium on Autonomous Decentralized Systems, April 2003, Pisa, Italy (ISADS).55. D<strong>at</strong>a and Applic<strong>at</strong>ions Security: Past, Present and Future, Proceedings <strong>of</strong> IFIP Conference Book(Kluwer), 2004 (version <strong>of</strong> keynote address <strong>at</strong> conference, Colorado, 2003; editor: I. Ray)56. Security and Privacy for Web D<strong>at</strong>abases and Services, Proceedings <strong>of</strong> the EDBT Conference, March2003, Crete, Greece (co-author: E. Ferrari) (based on keynote address <strong>at</strong> EDBT).57. Using RDF for Policy Specific<strong>at</strong>ion and Enforcement, Proceedings <strong>of</strong> the DEXA Workshop on WebSemantics, Zaragoza, Spain, August 2004 (co-author: B. Carmin<strong>at</strong>i et al).58. On the Complexity <strong>of</strong> the Privacy Problem in D<strong>at</strong>abases, Proceedings Found<strong>at</strong>ions <strong>of</strong> D<strong>at</strong>a Mining,Workshop, England, 2004 (Proceedings by lecture notes, Springer).59. Towards Access Control for Visual Web Model Management, Proceedings IEEE E-CommerceWorkshop, Hong Kong, May 2005 (co-author: G. Song et al).60. Trust Management in a Distributed Environment, Proceedings <strong>of</strong> the 29 th Annual Intern<strong>at</strong>ionalComputer S<strong>of</strong>tware and Applic<strong>at</strong>ions Conference (COMPSAC), Edinburgh, Scotland, July 2005.61. Secure Model Management Oper<strong>at</strong>ions for the Web, Proceedings IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityConference, Connecticut, August 2005 (co-authors: G. Song et al).62. Multilevel Secure Teleconferencing over Public Switched Telephone Network, IFIP D<strong>at</strong>a andApplic<strong>at</strong>ions Security Conference, Connecticut, 2005 (co-author: I. Youn et al).63. Dependable Real-time D<strong>at</strong>a Mining, Proceedings ISORC 2005, Se<strong>at</strong>tle (co-author: L. Khan et al).64. A Framework for a Video Analysis Tool for Suspicious Event Detection, ACM SIGKDD MultimediaD<strong>at</strong>a Mining Workshop, Chicago, IL 2005 (co-author: G. Lavee et al).65. Message Correl<strong>at</strong>ion in Autom<strong>at</strong>ed Communic<strong>at</strong>ion Surveillance through Singular ValueDecomposition, Proceedings ACM MM Workshop, Chicago, IL, 2005 (co-author: R. Layfield, et al).46


66. Privacy Preserving D<strong>at</strong>a Mining, Proceedings IEEE ICDM Workshop on Privacy preserving D<strong>at</strong>aMining, Houston, TX, 2005.67. Dependable and Secure TMO Scheme, Proceedings <strong>of</strong> the 9th IEEE ISORC, Gyeongju, South Korea,April 2006 (co-author: J. Kim).68. Design <strong>of</strong> a Secure CAMIN Applic<strong>at</strong>ion Systems based on Secure and Dependable TMO, ProceedingsISORC, May 2007, Santorini, Greec, (co-author: J. Kim).69. Security for Web Services, Proceedings ACM Workshop in Secure Web Services, May 2006 (coauthor:C. Farkas et al) (California)70. Detection and Resolution <strong>of</strong> Anomalies in Firewall Policy Rules, Proceedings IFIP D<strong>at</strong>a andApplic<strong>at</strong>ions Security Conference, Sophia Antipolis, France, 2006 (co-author: M. Abedin et al).71. A Knowledge Based Approach to Detect New Malicious Executables, Proceedings Second SKMWorkshop, Brooklyn, NY, September 2006 (co-author: L. Khan et al; enhanced version appeared inInform<strong>at</strong>ion Systems Frontiers).72. Access Control for Geosp<strong>at</strong>ial Web Services, Proceedings ACM CCS Conference Workshop, andNovember 2006. Fairfax, VA (co-author: A. Ashraful et al).73. Geosp<strong>at</strong>ial RDF, ISWC Conference on Geosp<strong>at</strong>ial Semantic Web, Athens, GA, Nov. 2006 (coauthor:A. Ashraful).74. Face Recognition Using Multiple Classifiers, IEEE ICTAI Conference Proceedings, November 2006Washington DC, (co-author: P. Parveen).75. <strong>The</strong> Applicability <strong>of</strong> the Perturb<strong>at</strong>ion Model-based Privacy-preserving D<strong>at</strong>a Mining, ProceedingsIEEE ICDM Conference Workshop on Privacy Preserving D<strong>at</strong>a Mining, Hong Kong, December2006. (enhanced version appeared in DKE 2008) (co-author: L. Liu).76. Design and Simul<strong>at</strong>ion <strong>of</strong> Trust Management Techniques for a Coalition D<strong>at</strong>a Sharing Environment,Proceedings FTDCS, 2007, Sedona, Arizona (co-author: S. Iyer).77. Fingerprint M<strong>at</strong>ching Algorithm, Proceedings ARES, Vienna, Austria, April 2007.78. Extended RBAC - Based Design and Implement<strong>at</strong>ion for a Secure D<strong>at</strong>a Warehouse, ProceedingsARES, April 2007, Vienna Austria, (enhanced version appeared in d<strong>at</strong>a warehousing journal) (coauthor:S. Iyer).79. Risk Management and Security, Proceedings Decision and Risk Analysis Conference, Richardson,TX, May 2007.80. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for N<strong>at</strong>ional Security, Proceedings ISI, New Brunswick, NJ, May 2007 (coauthor:Chuanjun et al).81. Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web, Proceedings <strong>of</strong> the 8 thIEEE Intern<strong>at</strong>ional Workshop on Policies for Distributed Systems and Networks (POLICY), Bologna,Italy, June 2007.82. A Hybrid Model to Detect Malicious Executables, Proceedings ICC 2007, Glasgow, Scotland (coauthors:M. Masud, L. Khan).47


83. Enforcing Honesty in Assured Inform<strong>at</strong>ion Sharing within a Distributed System, Proceedings IFIPD<strong>at</strong>a and Applic<strong>at</strong>ions Security, Redondo Beach, CA, July 2007 (co-authors: R. Layfield et al).84. SCRUB-tcpdump: A Multilevel Packet Anonymizer Demonstr<strong>at</strong>ing Privacy and Analysis Trade<strong>of</strong>fs,Proceedings SecureComm, Nice, France, September 2007 (co-authors: W. Yurcik, et al).85. Secure Peer-to-Peer Networks for Trusted Collabor<strong>at</strong>ion, Proceedings <strong>of</strong> the 2 nd IEEE Intern<strong>at</strong>ionalWorkshop on Trusted Collabor<strong>at</strong>ion (TrustCol), White Plains, NY November 2007.86. Centralized Security Labels in Decentralized P2P Networks, Computer Security Applic<strong>at</strong>ionsConference, Miami Beach, FL, December 2007 (ACSAC) (co-authors: N. Tsybulnik and K. Hamlen)87. Deleg<strong>at</strong>ion-Based Security Model for Web Services, IEEE Intern<strong>at</strong>ional Symposium on HighAssurance Systems Engineering (HASE), p. 82-91, <strong>Dallas</strong>, TX, November 2007 (co-authors: WeiShe, I. Yen).88. Building Secure Applic<strong>at</strong>ions for Peer to Peer Systems, Proceedings TRUST workshop, New York,November 2007.89. Detecting Remote Exploits Using D<strong>at</strong>a Mining, Proceedings IFIP Digital Forensics Conference,Kyoto, Japan, January 2008 (co-author: M. Masud et al).90. Geosp<strong>at</strong>ial Resource Description Framework (GRDF) and Security Constructs, Proceedings ICDEConference Workshop in Secure Semantic Web, April 2008, Cancun, Mexico (co-author: A. Alam etal).91. Toward Trusted Sharing <strong>of</strong> Network Packet Traces Using Anonymiz<strong>at</strong>ion: Single-FieldPrivacy/Analysis Trade<strong>of</strong>fs, Computing Research Repository (CoRR), abs/0710.3979: (2007) (coauthors:William Yurcik, Clay Woolam, Greg Hellings, L<strong>at</strong>ifur Khan).92. Measuring Anonymiz<strong>at</strong>ion Privacy/Analysis Trade<strong>of</strong>fs Inherent to Sharing Network D<strong>at</strong>a, NetworkOper<strong>at</strong>ions and Management Symposium (NOMS) 2008, p. 991-994, Salvador, Brazil (co-authors:W. Yurick et al).93. <strong>The</strong> SCRUB Security D<strong>at</strong>a Sharing Infrastructure, Network Oper<strong>at</strong>ions and Management Symposium(NOMS) 2008: 630-644, Salvador, Brazil (co-authors: Y. Yurick et al) (also s<strong>of</strong>tware available asOpensource).94. Making Quantit<strong>at</strong>ive Measurements <strong>of</strong> Privacy/Analysis Trade<strong>of</strong>fs Inherent to Packet TraceAnonymiz<strong>at</strong>ion, Financial Cryptography and D<strong>at</strong>a Security, 2008, p. 323-324, Cozumel, Mexico (coauthors:W. Yurick et al).95. Privacy/Analysis Trade<strong>of</strong>fs in Sharing Anonymized Packet Traces: Single-Field Case, Intern<strong>at</strong>ionalConference on Availability, Reliability and Security (ARES) 2008, p. 237-244, Barcelona, Spain (coauthors:W. Yurick et al).96. ROWLBAC - Representing Role Based Access Control in OWL, Proceedings ACM SACMAT June2008, Colorado, (co-authors: T. Finin, L Kagal et al).97. Accountability for Grid, DOE Conference on Cyber Security, Knoxville, TN, (co-author: E. Bertino)98. Role Based Access Control and OWL, Proceedings <strong>of</strong> the Fourth OWL: Experiences and DirectionsWorkshop, April 2008, Washington, DC (co-author: T. Finin et al).48


99. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, <strong>The</strong> 3rd Intern<strong>at</strong>ional Workshop onTrustworthiness, Reliability and Service in Ubiquitous and Sensor Networks (TRUST), EUC2008, Shanghai, China, (co-authors: L. Khan, K. Hamlen et al).100. Trustworthy Semantic Web Technologies for Secure Knowledge Management, TSP 2008,Shanghai, China (co-author: P. Parikh).101. Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems, IEEE HighAssurance Systems Engineering Symposium (HASE) 2008, Nanjing, China (co-author: Y. Yeet al).102. Enhancing Security Modeling for Web Services Using Deleg<strong>at</strong>ion and Pass-On,<strong>The</strong> IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS) 2008, Beijing, China (co-author: She,Wei; Yen, I-Ling).103. Flow-based Identific<strong>at</strong>ion <strong>of</strong> Botnet Traffic by Mining Multiple Log Files, In proceedings <strong>of</strong> theIntern<strong>at</strong>ional Conference on Distributed Frameworks & Applic<strong>at</strong>ions (DFMA), Penang, Malaysia,Oct. 2008, (co-authors: M. Masud, T. Al-kh<strong>at</strong>eeb, L. Khan, K. Hamlen).104. Incentive and Trust Issues in Assured Inform<strong>at</strong>ion Sharing, Invited Paper, Collabor<strong>at</strong>eCom, Orlando,FL, November 2008 (co-authors: R. Layfield and M. Kantarcioglu).105. Privacy Preserving Decision Tree Mining from Perturbed D<strong>at</strong>a, HICSS 2009, Hawaii: 1-10,Nomin<strong>at</strong>ed for best paper award (co-authors: Li Liu and Mur<strong>at</strong> Kantarcioglu).106. Effective and Efficient Implement<strong>at</strong>ion <strong>of</strong> an Inform<strong>at</strong>ion Flow Control Protocol for ServiceComposition, Proceedings <strong>of</strong> the Service Oriented Computing And Applic<strong>at</strong>ions Workshop, Taipei,Taiwan, Jan. 2009 (co-authors: W. She, I. Yen, E. Bertino).107. <strong>The</strong> SCIFC Model for Inform<strong>at</strong>ion Flow Control in Web Service Composition<strong>The</strong> IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS) 2009, Los Angeles, CA (co-authors: W.She, I. Yen, E. Bertino).108. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, IEEE ISI Conference Workshop onSocial Computing, 2009, <strong>Dallas</strong> TX (co-authors: R. Layfield et al).109. Assured Inform<strong>at</strong>ion Sharing Life Cycle, IEEE ISI Conference workshop on Social Computing, 2009(co-author: T. Finin et al), <strong>Dallas</strong>, TX.110. A Semantic Web Based Framework for Social Network Access Control, SACMAT 2009: Italy, 177-186, (co-authors: E. Ferrari, B. Carmin<strong>at</strong>i, , R. He<strong>at</strong>herly, M. Kantarcioglu).111. Inferring Priv<strong>at</strong>e Inform<strong>at</strong>ion Using Social Network D<strong>at</strong>a, World Wide Web (WWW) Conference2009, p. 1145-1146, Madrid, Spain (co-authors: J. Lindamood et al).112. Policy-Driven Service Composition with Inform<strong>at</strong>ion Flow Control, <strong>The</strong> IEEE Intern<strong>at</strong>ionalConference on Web Services (ICWS) 2010, Miami, FL (coauthors: W.She, I. Yen and E. Bertino)113. Scalable and Efficient Reasoning for Enforcing Role-based Access Control, IFIP 11.3, Rome, Italy2010 (co-authors: T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham).114. A Token-based Access Control System for RDF D<strong>at</strong>a in the Clouds, IEEE CloudCom 2010,Indianapolis, IN (co-authors: M. Farhan Husain, K. Hamlen et al).49


115. Secure D<strong>at</strong>a Storage and Retrieval in the Cloud, Collabor<strong>at</strong>eCom 2010, Chicago, IL (co-authors: V.Khadilkar et al)116. An Evalu<strong>at</strong>ion <strong>of</strong> Privacy, Risks and Utility with Provenance, Proceedings, Secure KnowledgeManagement (SKM) Workshop, November 2010, New Brunswick, NJ (co-authors: T. Cadenhead etal)117. Identity Management for Cloud, Proceedings Cyber Security and Inform<strong>at</strong>ion Intelligence ResearchWorkshop, Oak Ridge N<strong>at</strong>ional Labor<strong>at</strong>ory, Oak Ridge, TN, October 2011.118. A Language for Provenance Access Control, Proceedings <strong>of</strong> 1 st ACM Conference on D<strong>at</strong>a andApplic<strong>at</strong>ion Security and Privacy (CODASPY) 2011, San Antonio, TX (co-authors: T. Cadenhead,V. Khadilkar, M. Kantarcioglu).119. Differenti<strong>at</strong>ing Code from D<strong>at</strong>a in x86 Binaries, Proceedings <strong>of</strong> ECML/PKDD 2011 (Vol. 3) p. 522 -536, Athens, Greece (co-authors: R. Wartell, Y. Zhou, K. Hamlen, M. Kantarcioglu).120. Transforming Provenance Using Redaction, Proceedings <strong>of</strong> SACMAT 2011, Innsbruck, Austria (coauthors:T. Cadenhead, V. Khadilkar, M. Kantarcioglu).121. Secure D<strong>at</strong>a Processing in a Hybrid Cloud, Computing Research Repository (CoRR) abs/1105.1982,2011 (co-authors: V. Khadilkar, M. Kantarcioglu, S. Mehrotra).122. On Secure and Resilient Telesurgery over Unreliable Networks, <strong>The</strong> First Intern<strong>at</strong>ional Workshop onCyber-Physical Networking Systems, p. 725 – 730, Shanghai, China, April 2011, (co-authors: M. E.Tozal, Y. Wang, E. Al-Shaer, K. Sarac, B. Chu).Real-time Processing: Objects, D<strong>at</strong>a Management and Networks123. Implementing a Real Time System on Local Area Network, October 1987, Presented <strong>at</strong> the 12th IEEELocal Computer Network Conference, Minneapolis, MN, Proceedings, pp. 142 (co-authors: W. T.Tsai, K. W. Hwang, abstract in proceedings, paper distributed <strong>at</strong> conference).124. MCNIU- A High Performance FDDI Local Area Network for Space St<strong>at</strong>ion Applic<strong>at</strong>ion, October1987, Proceedings <strong>of</strong> the Fiber Optic Communic<strong>at</strong>ion Local Area Network Conference (FOC/LAN),Anaheim, CA, pp. 69-73, (co-authors: P. Gonia, D. Myers and T. Chan).125. RT-OMT: A Real-time Object Modeling Technique for Designing Real-time D<strong>at</strong>abase Applic<strong>at</strong>ions:A Position Paper, Proceedings <strong>of</strong> the 2nd IEEE Realtime Systems Applic<strong>at</strong>ions Workshop, July 1994,Maryland, (co-author: A. Schafer).126. On Realtime Extensions to the Common Object Request Broker Architecture, Proceedings <strong>of</strong> theOOPSLA 94 Conference Workshop on CORBA, Portland, OR. September 1994, (co-authors: P.Krupp, A. Schafer, V. Wolfe)127. An Integr<strong>at</strong>ed Architecture for Constraint Processing in Real-time D<strong>at</strong>abase Management Systems,Proceedings <strong>of</strong> the 1995 High Performance Computing Symposium, Phoenix, AZ, April 1995.128. Evolvable Real-time C3 Systems, Proceedings <strong>of</strong> the 1st IEEE Complex Systems Conference,November 1995, Florida,(co-authors: E. Bensley et al).129. Real-time Extensions to Remote Procedure Call, Proceedings <strong>of</strong> the IEEE High PerformanceComputing Conference, December 1995, India, (co-authors: V. Wolfe et al).50


130. Object-oriented Implement<strong>at</strong>ion <strong>of</strong> an Infrastructure and D<strong>at</strong>a Manager for Real-time Command andControl Systems, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented Real-time DependableSystems (WORDS 1996), Laguna Beach, CA, February 1996, (co-author: E. Bensley et al).131. Design and Implement<strong>at</strong>ion <strong>of</strong> an Active Real-time D<strong>at</strong>abase Management System, Proceedings <strong>of</strong> theIntelligent Inform<strong>at</strong>ion Systems Management Conference, June 1996, Washington DC, (co-authors:G. Gengo).132. Towards Priority Ceilings in Object-based Semantic Real-time Concurrency Control, Proceedings <strong>of</strong>the 1st Real-time D<strong>at</strong>abase Workshop, March 1996, Newport Beach, CA (co-authors: V. Wolfe).133. Evolvable Real-time C3 Systems - II, Proceedings <strong>of</strong> the 2nd IEEE Complex Systems Conference,October 1996, Montreal, Canada (co-authors: E. Bensley et al).134. Active Real-time D<strong>at</strong>a Management for Command and Control Applic<strong>at</strong>ions, Proceedings DARTWorkshop, CIKM Conference, Maryland, November 1996, (co-author: E. Hughes et al).135. Object Technology for the Integr<strong>at</strong>ion <strong>of</strong> the Infrastructure, D<strong>at</strong>a Manager, and Tracker forCommand and Control Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented RealtimeDependable Systems (WORDS), Newport Beach, CA, February 1997 (co-authors: M. G<strong>at</strong>es)136. D<strong>at</strong>a Manager for Evolvable Real-time Command and Control, Proceedings VLDB 1997, Athens,Greece (co-author: R. Ginis et al).137. Object-oriented D<strong>at</strong>a Management and Distribution for Real-time Command and Control Systems,Proceedings Intern<strong>at</strong>ional Workshop on Real Time D<strong>at</strong>abases 1997, Burlington, VT (co-author: R.Ginis, E. Hughes, et al).138. Schedule and Priority Mapping for St<strong>at</strong>ic and Real-time Middleware, Proceedings RT Middlewareworkshop, San Francisco, CA 1997, (also published in Springer book: Real Time Systems, Vol. 20,No. 2, March 2001) (co-authors: V. Wolfe et al).139. Concurrency Control in Real-time Object-oriented Systems, Proceedings IEEE ISORC, Kyoto, April1998, (co-authors: M. Squadrito, et al).140. Distributed Adaptable Object-based Architecture for Evolvable Command and Control Systems, WebProceedings <strong>of</strong> the DARPA/OMG Workshop on Compositional S<strong>of</strong>tware Architecture, January 1998(co-author: P. Krupp et al), Monterey, CA.141. Adaptable Real-time Distributed Object Management for Command and Control Systems,Proceedings <strong>of</strong> the IEEE ISADS Conference, March 1999, Tokyo, Japan (co-author: J. Maurer et al).142. CORBA-based Real-time Trader Service for Adaptable Command and Control Systems, Proceedings<strong>of</strong> the IEEE ISORC Conference, May 1999, St. Malo, France (co-author: S. Wohlever et al).143. Dependable Objects for D<strong>at</strong>abases, Middleware, and Methodologies, Proceedings IEEE WORDS99F, Monterey, CA. (co-author: Dr. Marion Ceruti).144. Towards a Real-time Agent Architecture: A White Paper, Proceedings IEEE WORDS 99F, Monterey,CA, (co-author: L. DiPippo).145. Benchmarking Distributed Real-time Objects, Proceedings IEEE ISORC 2000, Newport Beach, CA(co-author: John Maurer et al).51


146. Real-time D<strong>at</strong>a Mining <strong>of</strong> Multimedia D<strong>at</strong>a Objects, Proceedings IEEE ISORC, ISORC, 2001,Magdeburg, Germany (co-author: M. Ceruti et al).147. Dependable Semantic Web, Proceedings IEEE WORDS 2002, San Diego, CA (keynote addresspublished as paper, also version appeared in IEEE ICTAI 2002, Washington DC) (co-authors: E.Hughes et al)148. Dependable Infrastructures and D<strong>at</strong>a Managers for Sensor Networks, Proceedings IEEE WORDS2003F, Capri Island, Italy149. QOS Aware Dependable Distributed Steam Processing, ISORC 2008: 69-75 , (co-authors: V.Kalogeraki, D. Gunopulos, R. Sandhu), Orlando, FL.150. Difference in Fitts’ Law Task Performance, EuroHaptics 2008: 295-300, Madrid, Spain (co-author:G. Lee).151. Real-time Knowledge Discovery and Dissemin<strong>at</strong>ion for Intelligence Analysis, Proceedings HICCS2009, Hawaii (co-author: J. Han et al) Nomin<strong>at</strong>ed for best paper award.152. Dynamic Service and D<strong>at</strong>a Migr<strong>at</strong>ion in the Clouds, Proceedings IEEE Intern<strong>at</strong>ional ComputerS<strong>of</strong>tware and Applic<strong>at</strong>ions Conference (COMPSAC) Workshop, July 2009, Se<strong>at</strong>tle, WA (coauthors:W. Hao, I. Yen).153. Secure Semantic Service Oriented Grid for Cyber Physical System and Applic<strong>at</strong>ions, ProceedingsDHS/CPS Workshop on Cyber Physical Systems Security, Newark, NJ, July 2009 (co-authors: I.Yen et al).154. Classific<strong>at</strong>ion and Novel Class Detection in D<strong>at</strong>a Streams with Active Mining, Proceedings <strong>of</strong> 14thPacific-Asia Conference on Knowledge Discovery and D<strong>at</strong>a Mining, 2010, p. 311 – 314,Hyderabad, India. (co-authors: M. Masud, J. Gao, L. Khan, J. Han).155. Addressing Concept-Evolution in Concept-Drifting D<strong>at</strong>a Streams, IEEE Intern<strong>at</strong>ional Conference onD<strong>at</strong>a Mining (ICDM) Conference, December 2010, p. 929 – 934, Sydney, Australia,. (co-authors: M.Mehedy, L. Khan, J. Han, C. Agrawal et al).156. Rule-Based Run-Time Inform<strong>at</strong>ion Flow Control in Service Cloud, Proceedings <strong>of</strong> IEEEIntern<strong>at</strong>ional Conference on Web Services (ICWS 2011), July 2011, Washington DC (co-authors:Wei She, I-Ling Yen, San-Yih Huang).D<strong>at</strong>a Management and Mining/Geosp<strong>at</strong>ial Inform<strong>at</strong>ion Systems/Semantic Web157. Design <strong>of</strong> a Distributed D<strong>at</strong>a Dictionary System, June 1987, Proceedings <strong>of</strong> the N<strong>at</strong>ional ComputerConference, Chicago, IL, pp. 583-590, (co-authors: H. Lu and K. Mikkilineni).158. Knowledge-Based User Interface Design Issues for Heterogeneous Networks, September 1988,Proceedings <strong>of</strong> the Australian Computer Conference, Sydney, Australia.159. Knowledge-Based Support for the Development <strong>of</strong> D<strong>at</strong>abase-centered Applic<strong>at</strong>ions, February 1989,Proceedings <strong>of</strong> the 5th IEEE Intern<strong>at</strong>ional Conference on D<strong>at</strong>a Engineering, Los Angeles, CA, (coauthors:R. Bell and H. Atchan).160. XIMKON: An Expert Simul<strong>at</strong>ion and Control Program, AAAI Conference Workshop on AI inProcess Engineering, St Paul, MN (co-authors: F. Konar, 1988).52


161. XIMKON- An Expert Simul<strong>at</strong>ion and Control Program, June 1989, Proceedings <strong>of</strong> the AmericanControl Conference (enhanced version <strong>of</strong> AAAI Workshop 1988 paper) Pittsburgh, PA (coauthors:F. Konar and P. Felix).162. Expert Network Simul<strong>at</strong>ion and Control, March 1989, Proceedings <strong>of</strong> the 7th Applic<strong>at</strong>ions <strong>of</strong>Artificial Intelligence Conference, Orlando, FL.163. Applying OMT for Designing Medical D<strong>at</strong>abase Applic<strong>at</strong>ions, September 1993, Proceedings <strong>of</strong> theOOPSLA Conference Workshop on Inform<strong>at</strong>ion Modeling, Washington D.C.164. Extending an Object-Oriented D<strong>at</strong>a Model for Representing Multimedia D<strong>at</strong>abase Applic<strong>at</strong>ions,Proceedings <strong>of</strong> the OOPSLA 94 Conference Workshop on Precise Behavioral Specifici<strong>at</strong>ion inObject Oriented Inform<strong>at</strong>ion Modeling, Portland, OR. October 1994, (co-author: K. Nwosu).165. Object-Oriented Approach for the Interoperability <strong>of</strong> Persistent D<strong>at</strong>abase Systems, Proceedings<strong>of</strong> the OOPSLA 94 Conference Workshop on Persistence in Heterogeneous D<strong>at</strong>abase Systems,Portland, OR. October 1994, (co-author: R. Nemec).166. Consistent D<strong>at</strong>a Access in a Distributed D<strong>at</strong>abase Management System for Command and ControlApplic<strong>at</strong>ions, Proceedings <strong>of</strong> the High Performing Computing Symposium, April 1994. San Diego,CA (co-authors: D. Small, D. Goldsmith).167. Distributed D<strong>at</strong>abase Technology for Mobile Computing and Communic<strong>at</strong>ions Systems, Proceedings<strong>of</strong> the IEEE Technology Dual Use and Applic<strong>at</strong>ions Conference, Utica, NY, May 1994.168. Applying OMT for Designing Multimedia Inform<strong>at</strong>ion Systems Applic<strong>at</strong>ions, Proceedings <strong>of</strong> theIEEE Technology Dual Use and Applic<strong>at</strong>ions Conference, Utica, NY, May 1994. (co-author: K.Nwosu)169. Distributed Multimedia D<strong>at</strong>abase Systems, Proceedings <strong>of</strong> the AIPASG Symposium, March 1994,(Abstract in Proceedings; co-author: B. Lavender).170. Object-Oriented Approach to Feder<strong>at</strong>ed D<strong>at</strong>a Management, Proceedings <strong>of</strong> the ISMM Intern<strong>at</strong>ionalConference on Intelligent Inform<strong>at</strong>ion Management Systems, Washington D.C., June 1994, (coauthor:N. Idris).171. On Dynamic Realloc<strong>at</strong>ion <strong>of</strong> Parallel Retrievable Objects, Proceedings <strong>of</strong> the DistributedMultimedia Systems Applic<strong>at</strong>ions Conference, Honolulu, HI, August 1994, (co-author: P. Bobbie).172. Maintaining Integrity in a Distributed Heterogeneous D<strong>at</strong>abase Systems, Proceedings <strong>of</strong> the DODD<strong>at</strong>abase Colloquium 94, San Diego, CA, August 1994, (co-author: D. Goldsmith).173. <strong>The</strong> Role <strong>of</strong> Standards in the Interoperability <strong>of</strong> Heterogeneous D<strong>at</strong>abase Systems, Proceedings <strong>of</strong> theDOE Office Inform<strong>at</strong>ion Technology Conference, August 1994 (abstract and present<strong>at</strong>ion publishedin Proceedings) (co-author: M. Zemankova).174. Distributed D<strong>at</strong>abase Management for C3I Systems, Proceedings <strong>of</strong> the MILCOM 94 Conference, Ft.Monmouth, NJ, October 1994, (co-authors: A. Grasso, M. Collins; classified session).175. Applic<strong>at</strong>ion <strong>of</strong> Object-Oriented Technology for Integr<strong>at</strong>ing Heterogeneous D<strong>at</strong>abase Systems,Proceedings <strong>of</strong> the ACM Computer Science Conference, Nashville TN, March 1995.53


176. D<strong>at</strong>a Alloc<strong>at</strong>ion and Sp<strong>at</strong>io Temporal Implic<strong>at</strong>ion for Video on Demand Systems, Proceedings <strong>of</strong> theIEEE Phoenix Conference on Computers and Communic<strong>at</strong>ions, Scottsdale, AZ March 1995, (coauthor:K. Nwosu).177. Intelligence Community Initi<strong>at</strong>ive in Massive Digital D<strong>at</strong>a Systems, Proceedings <strong>of</strong> the AIPASGSymposium, March 1995, (co-authors: R. Kluttz, et al); an upd<strong>at</strong>e published in AIPASGSymposium, March 1996, (co-author: H. Curran et al) Tysons Corner, VA178. Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE, Proceedings <strong>of</strong> the AIPASG SymposiumMarch Tysons Corner, VA, 1995 (also versions given <strong>at</strong> MITRE conferences).179. Applying OMT to design Medical Inform<strong>at</strong>ion Systems Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the IntelligentInform<strong>at</strong>ion Systems Management Conference, Washington D.C. June 1995.180. Object oriented Technology for Integr<strong>at</strong>ing Distributed Heterogeneous D<strong>at</strong>abase System,Proceedings <strong>of</strong> the 1995 DOD D<strong>at</strong>abase Colloquium, San Diego, CA (co-authors: M. Ceruti et al).181. D<strong>at</strong>a Mining and D<strong>at</strong>a Visualiz<strong>at</strong>ion, A Position Paper, D<strong>at</strong>abases Issues for D<strong>at</strong>a Visualiz<strong>at</strong>ionWorkshop, Atlanta, GA, Oct. 1996 (Springer Verlag, 1996) (co-author: G. Grinstein).182. Interactive D<strong>at</strong>a Mining and its Impact on the World Wide Web, Proceedings Compugraphics andVisualiz<strong>at</strong>ion Techniques, Paris, France December 1996.183. D<strong>at</strong>a Mining in Text, AIPASG, 1997, McLean, VA, (co-author: C. Clifton et al).184. Text Mining and Visualiz<strong>at</strong>ion, Proceedings <strong>of</strong> the KDD Workshop on D<strong>at</strong>a Mining andVisualiz<strong>at</strong>ion, Newport Beach, CA, August 1997 (also in IEEE Visualiz<strong>at</strong>ion workshop, October1997: Role <strong>of</strong> Visualiz<strong>at</strong>ion in <strong>Texas</strong> Mining).185. Understanding D<strong>at</strong>a Mining and Applying it to C3I Environments, Proceedings IEEE COMPSAC2000, Taipei, Taiwan, (co-author: M. Ceruti).186. D<strong>at</strong>a Management for Global Command and Control Systems, AFCEA D<strong>at</strong>abase Colloquium 2000,San Diego, (co-author: J. Putman et al).187. D<strong>at</strong>a Mining for E-commerce, Proceedings SPIE, 2000, Orlando, FL, (co-author: A. Grasso et al).188. Neural Networks and D<strong>at</strong>a Mining, AFCEA 2001, San Diego, CA, (co-author: C. Clifton).189. D<strong>at</strong>a Management for the 21 st Century, Proceedings IEEE Systems, Man & Cybernetics, July 2002,Hammamet, Tunisia (co-author: M. Ceruti).190. D<strong>at</strong>a Quality, Kluwer 2002 (based on keynote address <strong>at</strong> IFIP Integrity, November 2001, Brussela,Belgium, (co-author: E. Hughes).191. Reasoning with Semantics-aware Access Control Policies for Geosp<strong>at</strong>ial Web Services, Proceedings<strong>of</strong> ACM SWS, November 2006, Fairfax, VA, (co-authors: A. Alam et al).192. Geosp<strong>at</strong>ial D<strong>at</strong>a Qualities as Web Services Performance Metrics, Proceedings ACM Intern<strong>at</strong>ionalWorkshop on Advances in Geographic Inform<strong>at</strong>ion Systems (GIS), November 2007, Se<strong>at</strong>tle WA(co-author: G. Subbiah et al).193. DAGIS: A Geosp<strong>at</strong>ial Semantic Web Services Discovery and Selection Framework, GeoS 2007,Mexico City, Mexico, November 2007, (co-author: A. Alam et al).54


194. Ontology Alignment Using Multiple Contexts. Intern<strong>at</strong>ional Semantic Web Conference (Posters &Demos) 2008 (co-authors: J. Partyka et al), Germany.195. Content-based Ontology M<strong>at</strong>ching for GIS D<strong>at</strong>asets, ACM Intern<strong>at</strong>ional Workshop on Advances inGeographic Inform<strong>at</strong>ion Systems (GIS) 2008, Irvine, CA(co-authors: J. Partyka et al).196. A Practical Approach to Classify Evolving D<strong>at</strong>a Streams: Training with Limited Amount <strong>of</strong> LabeledD<strong>at</strong>a, ICDM 2008 (co-authors: M. Masud et al), Pisa, Italy197. A Multi-Partition Multi-Chunk Ensemble Technique to Classify Concept-Drifting D<strong>at</strong>a Streams,PAKDD 2009, Bangkok, Thailand (co-author: M. Masud et al).198. Simul<strong>at</strong>ing Bioterrorism Thru Epidemiology Approxim<strong>at</strong>ion, IEEE Intern<strong>at</strong>ional Conference onIntelligence and Security Inform<strong>at</strong>ics 2008, (co-authors: Ryan Layfield, Mur<strong>at</strong> Kantarcioglu),Taipei, Taiwan.199. An Effective Evidence <strong>The</strong>ory Based K-Nearest Neighbor (KNN) Classific<strong>at</strong>ion, Web Intelligence2008:797-801, Sydney, Australia (co-authors: Lei Wang, L<strong>at</strong>ifur Khan).200. Inferring Priv<strong>at</strong>e Inform<strong>at</strong>ion Using Social Network D<strong>at</strong>a, World Wide Web (WWW) Conference2009: 1145-1146, Madrid, Spain (co-authors: J. Lindamood et al).201. A Rel<strong>at</strong>ional Wrapper for RDF Reific<strong>at</strong>ion, Third IFIP WG 11.11 Intern<strong>at</strong>ional Conference on(IFIPTM), West Lafayette, USA, June 15-19, 2009, (co-authors: S. Ramanujam, A. Gupta, L. Khan,and S. Seida).202. “Rel<strong>at</strong>ionalizing RDF Stores for Tools Reusability” ACM 18th Intern<strong>at</strong>ional World Wide WebConference (WWW 2009—Poster Session), Madrid, Spain, April 2009 (co-authors: S. Ramanujam,A. Gupta, L. Khan, and S. Seida).203. On the Mitig<strong>at</strong>ion <strong>of</strong> Bioterrorism through Game <strong>The</strong>ory, ISI 2009 (co-authors: Ryan Layfield andMur<strong>at</strong> Kantarcioglu) <strong>Dallas</strong> TX204. Social Network Classific<strong>at</strong>ion Incorpor<strong>at</strong>ing Link Type, ISI 2009 (co-authors: Raymond He<strong>at</strong>herlyand Mur<strong>at</strong> Kantarcioglu). <strong>Dallas</strong> TX205. Design <strong>of</strong> a Temporal Geosocial Semantic Web for Military Stabiliz<strong>at</strong>ion and ReconstructionOper<strong>at</strong>ions, Proceedings SIGKDD Conference Workshop on Intelligence and Security Inform<strong>at</strong>ics,2009 (co-authors: L. Khan et al).206. R2D: Extracting Rel<strong>at</strong>ional Structure from RDF Stores, IEEE WIC/ACM Conference on WebIntelligence, September 2009 (co-authors: Sunitha Ramanujam, Anubha Gupta, L<strong>at</strong>ifur Khan, andSteven Seida).207. Integr<strong>at</strong>ing Novel Class Detection with Classific<strong>at</strong>ion for Concept-Drifting D<strong>at</strong>a Streams, PKDD,September 2009 (co-authors: M. Masud et al).208. Semantic Schema M<strong>at</strong>ching Without Shared Instances, Proceedings IEEE Semantic ComputingConference, 2009, short paper (co-authors: J. Partyka et al)).209. R2D: A Bridge between the Semantic Web and Rel<strong>at</strong>ional Visualiz<strong>at</strong>ion Tools, Proceedings IEEEIntern<strong>at</strong>ional Conference on Semantic Computing, 2009, long regular paper (co-authors: S.Ramanujam et al).55


210. Semantic Web for Content Based Video Retrieval, Proceedings IEEE Intern<strong>at</strong>ional Conference onSemantic Computing, Berkeley, CA, 2009 (short paper – co-author: B. Prabhakaran et al).211. Geographically-typed Semantic Schema M<strong>at</strong>ching, GIS 2009: 456-459 (co-authors: Jeffrey Partyka,L<strong>at</strong>ifur Khan).212. Storage and Retrieval <strong>of</strong> Large RDF Graph Using Hadoop and MapReduce. CloudCom 2009,Beijing, China (co-authors: M. Husain, P. Doshi, and L. Khan).213. Bi-directional Transl<strong>at</strong>ion <strong>of</strong> Rel<strong>at</strong>ional D<strong>at</strong>a into Virtual RDF Stores, Proceedings IEEE SemanticComputing Conference, September 2010, p. 268 - 276 (coauthors: L. Khan et al)214. Classific<strong>at</strong>ion and Novel Class Detection <strong>of</strong> D<strong>at</strong>a Streams in a Dynamic Fe<strong>at</strong>ure Space, ProceedingsEuropean Conference on Machine Learning (ECML), Barcelona, Spain, 2010 (co-authors: L. Khanet al)215. D<strong>at</strong>a Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools, IEEECloud Computing, Miami, July 2010 (co-authors: M. Farhan Husain et al)216. Ranking Ontologies Using Verified Entities to Facilit<strong>at</strong>e Feder<strong>at</strong>ed Queries, Web Intelligence 2010,p. 332 – 337, Toronto, Canada (co-authors: Neda Alipanah, Piyush Srivastava, Pallabi Parveen).217. Efficient Processing <strong>of</strong> Large RDF Streams Using Memory Management Algorithms, <strong>The</strong>Intern<strong>at</strong>ional Semantic Web Conference (ISWC) 2010, Shanghai, November 2010 (co-authors: V.Khadilkar et al)218. Geosp<strong>at</strong>ial Schema M<strong>at</strong>ching with High-Quality Cluster Assurance and Loc<strong>at</strong>ion Mining fromSocial Network, Proceedings <strong>of</strong> the Intern<strong>at</strong>ional Conference on D<strong>at</strong>a Mining (ICDMW) WorkshopsDecember 2010, p. 517 (co-authors: L<strong>at</strong>ifur Khan, Jeffrey Partyka, S<strong>at</strong>yen Abrol).219. Ontology-driven Query Expansion Methods to Facilit<strong>at</strong>e Feder<strong>at</strong>ed Queries, Proceedings <strong>of</strong> IEEEIntern<strong>at</strong>ional Conference on Service-oriented Computing and Applic<strong>at</strong>ions (SOCA) 2010, p. 1-8,(co-authors: Neda Alipanah, Pallabi Parveen, Sheetal Menezes, L<strong>at</strong>ifur Khan, Steven Seida).220. RDFKB: A Semantic Web Knowledge Base, Proceedings <strong>of</strong> the 22nd Intern<strong>at</strong>ional Joint Conferenceon Artificial Intelligence (IJCAI 2011), p. 2830 - 2831, July 2011, Barcelona, C<strong>at</strong>alonia, Spain (coauthors:James P. McGlothlin, L<strong>at</strong>ifur Khan).221. Scalable Complex Query Processing Over Large Semantic Web D<strong>at</strong>a Using Cloud, Proceedings <strong>of</strong>the IEEE Intern<strong>at</strong>ional Conference on Cloud Computing (CLOUD 2011), p. 187 – 194, July 2011,Washington DC (co-authors: Mohammad Farhan Husain, James McGlothlin, L<strong>at</strong>ifur Khan).222. Ontology-Driven Query Expansion using Map/Reduce Framework to Facilit<strong>at</strong>e Feder<strong>at</strong>ed Queries,Proceedings <strong>of</strong> the IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS 2011), p. 712 – 713, July2011, Washington, DC (co-authors: Neda Alipanah, Pallabi Parveen, L<strong>at</strong>ifur Khan).223. Identific<strong>at</strong>ion <strong>of</strong> Rel<strong>at</strong>ed Inform<strong>at</strong>ion <strong>of</strong> Interest Across Free Text Documents, Proceedings <strong>of</strong> theIEEE Intern<strong>at</strong>ional Conference on Intelligence and Security Inform<strong>at</strong>ics (ISI 2011), Beijing, China,p. 107 – 112, (co-authors: James R. Johnson, Anita Miller, L<strong>at</strong>ifur Khan, Mur<strong>at</strong> Kantarcioglu).224. Extraction <strong>of</strong> Expanded Entity Phrases, Proceedings <strong>of</strong> the IEEE Intern<strong>at</strong>ional Conference onIntelligence and Security Inform<strong>at</strong>ics (ISI 2011), p. 101 – 106, , Beijing China (co-authors: JamesR. Johnson, Anita Miller, L<strong>at</strong>ifur Khan, Mur<strong>at</strong> Kantarcioglu).56


225. RETRO: A Framework for Semantics Preserving SQL-to-SPARQL Transl<strong>at</strong>ion, Proceedings <strong>of</strong>Intern<strong>at</strong>ional Semantic Web Conference Workshop, October 2011, Bonn, Germany (co-authors: J.Rachapalli, V. Khadilkar, Mur<strong>at</strong> Kantarcioglu).III. BOOKS AUTHOREDSeries 1: D<strong>at</strong>a Management, D<strong>at</strong>a Mining, D<strong>at</strong>a Security for Technical Managers1. D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion, CRC Press, May 19972. D<strong>at</strong>a Mining, Technologies, Techniques Tools and Trends, CRC Press December 19983. Web D<strong>at</strong>a Management and Electronic Commerce, CRC Press, June 20004. Managing and Mining Multimedia D<strong>at</strong>abases, CRC Press, June 20015. XML, D<strong>at</strong>abases and Semantic Web, CRC Press, March 20026. Web D<strong>at</strong>a Mining and Counter-terrorism, CRC Press, June 20037. D<strong>at</strong>abase and Applic<strong>at</strong>ions Security: Integr<strong>at</strong>ing D<strong>at</strong>a Management and Inform<strong>at</strong>ion Security, CRCPress/Auerbach, June 20058. Building Trustworthy Semantic Webs, CRC Press/Auerbach, 20079. Secure Semantic Service Oriented Systems, CRC Press, 201010. Building and Securing the Cloud, CRC Press, expected public<strong>at</strong>ion, 2012.Series 2: Research from PhD/MS <strong>The</strong>sis <strong>of</strong> Students11. Design and Implement<strong>at</strong>ion <strong>of</strong> D<strong>at</strong>a Mining Tools, CRC Press, June 2009(co-authors: L. Khan, M. Awad, L. Wang).12. D<strong>at</strong>a Mining Tools for Malware Detection, CRC Press, December 2011 (co-authors: L. Khan, M.Masud).13. Reactively Adaptive Malware and Stream Mining, CRC Press (contract to be signed November2012, Expected public<strong>at</strong>ion 2013) (co-authors: Kevin Hamlen, Mehedy Masud, L<strong>at</strong>ifur Khan)IV. BOOK CHAPTERS (not including reprints from conference proceedings)1. Expert System to Design Control Systems, May 1990, Artificial Intelligence in Process Engineering,Academic Press, ed: M. Mavronopoulos (co-authors: F. Konar and P. Felix).2. Distributed D<strong>at</strong>abase Management Systems: Developments and Challenges, Local Area NetworkHandbook 1993 (Auerbach Publishers, invited paper, ed: J. Sloane and A. Drinan).3. Object-Oriented Approach to the Interoperability <strong>of</strong> Heterogeneous D<strong>at</strong>abase Management Systems,Local Area Network Handbook, 1994 (Aurebach Publishers, invited paper, ed: J. Sloane).57


4. Distributed Object Management System Approach to Integr<strong>at</strong>ing Heterogeneous D<strong>at</strong>abase Systems,Local Area Network Handbook, 1995 (Auerbach Publishers, invited paper, ed: R. Maybry).5. Internet D<strong>at</strong>abase Management, D<strong>at</strong>abase Management, 1996 (Auerbach Publishers, ed: R. Mabry).6. Secure d<strong>at</strong>abase management, Handbook <strong>of</strong> D<strong>at</strong>abase Management, McGraw Hill 1996 (Ed: P.Fortier, co-author: S. Son et al).7. Multimedia d<strong>at</strong>abase management, Handbook <strong>of</strong> D<strong>at</strong>abase Management, McGraw Hill, 1996 (Ed: P.Fortier, co-author: S. Dao).8. Secure D<strong>at</strong>abase Systems, Advances on D<strong>at</strong>a Management, 2000 (Editor: O. Diaz and M. Pi<strong>at</strong>tini; coauthor:E. Ferrari - Artech House).9. KM for Heterogeneous inform<strong>at</strong>ion exchange, Kluwer Book (co-author: A Gupta et al), 2002.10. Managing Cyber Thre<strong>at</strong>s: Issues and Challenges, Kluwer (editor: V. Kumar et al), 2004.11. D<strong>at</strong>a Mining for Counter-terrorism, AAAI Press (editor: H. Kargupta et al), 2004 (MGDMConference, 2002).13. Secure Semantic Grids, Web and Inform<strong>at</strong>ion Systems Security, co-author: L. Khan (editors: E.Ferrari et al) Idea Group.14. Assured Inform<strong>at</strong>ion Sharing Across Organiz<strong>at</strong>ion Boundaries, D<strong>at</strong>a Mining for Counter-terrorism,Springer, 2006 (editor: H. Chen).15. Secure Semantic Web Services, Springer, (editor: M. Gertz), 200816. Assured Inform<strong>at</strong>ion Sharing: Technologies, Challenges and Directions,Intelligence and Security Inform<strong>at</strong>ics 2008: 1-15.17. Secure Semantic Web Services, Handbook <strong>of</strong> D<strong>at</strong>abase Security, Springer, 2008, p. 231 - 245 (Editor:S. Jajodia and M Gertz)18. Policy Management for the Semantic Web, Handbooks in Inform<strong>at</strong>ion Systems, Volume 4, Ch. 6, p.159 – 191, 2009, Elsevier (Editors: H. Raghav Rao, Shambhu Upadhyaya)19. Security and Privacy for Social Networks, Springer, co-authors: B. Carmin<strong>at</strong>i et al (Editor: E. Ferrari)V. TECHNICAL ARTICLES1. Decision Problems for System Functions, March 1980, Recursive Function <strong>The</strong>ory Letters.2. Recent Developments in D<strong>at</strong>abase Security, September 1989, Tutorial Proceedings <strong>of</strong> the IEEECOMPSAC Conference, Orlando, FL.3. An Object-Oriented Approach for Designing Secure Systems, Fall 1989, IEEE CIPHER (co-author:F.Chase).4. Computing Transitive Closures <strong>of</strong> Multilevel Rel<strong>at</strong>ions, September 1990, ACM SIGMOD Record,Vol. 19, No. 3.58


5. Inference Problem in D<strong>at</strong>abase Security, IEEE CIPHER, Winter 1991.6. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem, IEEE CIPHER, Winter 1991.7. A Note on the Recursive Enumerability <strong>of</strong> the Inference Problem in Multilevel Secure D<strong>at</strong>abaseManagement Systems, Recursive Function <strong>The</strong>ory Letters, 19928. Current St<strong>at</strong>us <strong>of</strong> R&D in Trusted D<strong>at</strong>abase Management Systems, ACM SIGMOD Record, Vol. 21,#3, September 1992.9. Concurrency Control in Trusted D<strong>at</strong>abase Management Systems, ACM SIGMOD Record, December1993 (co-author: H. Ko).10. Engineering Real-time Complex Systems, IEEE Complex Systems, 1994/1995, (co-authors: P. Krupp,A. Kanevsky).11. D<strong>at</strong>a Management Research <strong>at</strong> the MITRE Corpor<strong>at</strong>ion, ACM SIGMODRecord, September 1995 (co-authors: Rosenthal, et al).12. Improving Timeliness in Real Time Secure D<strong>at</strong>abase Systems, ACM SIGMOD Record. 1996 (coauthor:S. Son et al).13. D<strong>at</strong>a Mining, N<strong>at</strong>ional Security, Privacy and Civil Liberties, ACM SIGKDD, December 2002.14. Semantic Web, Encyclopedia <strong>of</strong> Human Computer Interaction, Berkshire Publishers, (Editor: W.Bainbridge), 2004.15. Security, Encyclopedia <strong>of</strong> Human Computer Interaction, Berkshire Publishers, Editor: W. Bainbridge,2004.16. Homeland Security, D<strong>at</strong>a Mining Link Analysis for N<strong>at</strong>ional Security, Essays in the Encyclopedia <strong>of</strong>D<strong>at</strong>a Warehousing and Mining, Editor: J. Wang, 2005.17. Security and Privacy for Geosp<strong>at</strong>ial D<strong>at</strong>a Management, Encyclopedia <strong>of</strong> Geosp<strong>at</strong>ial D<strong>at</strong>aManagement, Springer, 2007 (co-authors: L. Khan et al).18. Managing and Mining Multimedia D<strong>at</strong>a, Anim<strong>at</strong>ions and Annot<strong>at</strong>ions, Proceedings WileyEncyclopedia, 2007 (co-authors: B. Prabhakaran, L. Khan).19. Multilevel Secure D<strong>at</strong>a Management, Encyclopedia on D<strong>at</strong>abase Security, (Editor: E. Ferrari), 2007.20. Mand<strong>at</strong>ory Security, Encyclopedia <strong>of</strong> Inform<strong>at</strong>ion Security, (Editor: E. Ferrari).20. Privacy and Security Challenges in GIS, Encyclopedia <strong>of</strong> GIS (Springer)2008: 898-902 (co-authorsL<strong>at</strong>ifur Khan, Ganesh Subbiah, Ashraful Alam, Mur<strong>at</strong> Kantarcioglu).21. Geosp<strong>at</strong>ial Semantic Web, Definition. Encyclopedia <strong>of</strong> GIS 2008: 398 (co-authors: L<strong>at</strong>ifur Khan,Ganesh Subbiah, Ashraful Alam, Mur<strong>at</strong> Kantarcioglu).22. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions and Its Privacy Implic<strong>at</strong>ions, Lecture Notes in ComputerScience, Springer Verlag, (Based on keynote address <strong>at</strong> SIGKDD workshop 2008).59


23. Challenges and Future Directions <strong>of</strong> S<strong>of</strong>tware Technology: Secure S<strong>of</strong>tware Development.COMPSAC 2010, Bhavani M. Thuraisingham, Kevin W. Hamlen24. Secure Semantic Sensor Web and Pervasive Computing. Bhavani M. Thuraisingham, Kevin W.Hamlen SUTC/UMC 2010: 5-10VI. MITRE JOURNALS1. Multilevel Secure Object-Oriented D<strong>at</strong>a Model - Issues on Noncomposite Objects, CompositeObjects, <strong>The</strong> MITRE Journal, 1992 (Version <strong>of</strong> Journal <strong>of</strong> Object-Oriented Programming paper,1991).2. Object-Oriented Approach to PACS Applic<strong>at</strong>ions, MITRE Inform<strong>at</strong>ion Systems Engineering Journal,Fall 1993.3. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller, the MITRE Journal, 1994, (coauthors:W. Ford, M. Collins, J. O'Keeffe; version <strong>of</strong> D<strong>at</strong>a and Knowledge Engineering Paper, 1993).60


I. JOURNAL SPECIAL ISSUES EDITEDSection 11: EDITED WORKS1. Special issue in Security and Standards, Computer Standards and Interface Journal, 1995 (coeditor:J. Williams, editorial introduction).2. Special issue in Secure D<strong>at</strong>abase Systems Technology, IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, February 1996 (co-editor: T. Ting, editorial introduction).3. Special issue in Multimedia D<strong>at</strong>abase Management, Multimedia Tools and Applic<strong>at</strong>ions Journal,1997, (co-editors: K. Nwosu, B. Berra – also version published as book by Kluwer).4. Special issue in Multimedia D<strong>at</strong>abases, IEEE Multimedia (co-editors: Nwosu, Berra, editorialintroduction), 19975. Special Issue in D<strong>at</strong>a and Applic<strong>at</strong>ions Security, D<strong>at</strong>a and Knowledge Engineering Journal,November 2002 (co-editor: R. van der Riet).6. Special Issue in D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Journal <strong>of</strong> Computer Security, 2003 (co-editor R.van der Riet).7. Special Issue in D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Journal <strong>of</strong> Intelligent Inform<strong>at</strong>ion Systems, 2004.8. Privacy-preserving D<strong>at</strong>a Management, VLDB Journal, September 2006 (co-editor: E. Ferrari).9. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security (co-editor: E. Ferrari).10. Editorial for Computer Standards and Interface Journal as Editor-in-Chief, November 2006.11. Foreword for book on Security Standards for Web Services (Editor: Eduardo Fernandez-Medina).12. Special Issue ACM Transactions on Inform<strong>at</strong>ion and System Security (TISSEC) 2010.13. Inform<strong>at</strong>ion and Communic<strong>at</strong>ions Security, Privacy and Trust: Standards and Regul<strong>at</strong>ions. ComputerStandards & Interfaces, Elsevier, Vol. 32, No. 5-6, 2010 (co-editor: Stefanos Gritzalis).14. Special Issue Computer Standards and Interface Journal on Secure Semantic Web, 2012 (co-editor:Barbara Carmin<strong>at</strong>i)15. Special Issue on D<strong>at</strong>a Security, IEEE Transactions on Dependable and Security Computing, 2012(co-editor: E. Ferrari).II. BOOKS EDITED1. D<strong>at</strong>abase Security VI: St<strong>at</strong>us and Prospects, 1993, Book by North Holland (co-editor: C.Landwehr). (Enhanced version <strong>of</strong> Proceedings <strong>of</strong> 6th IFIP 11.3 Working Conference in D<strong>at</strong>abaseSecurity, 1992).2. Security for Object-Oriented Systems, Book by Springer Verlag, 1994 (co-editor: R. Sandhu, T.C.Ting, Enhanced version <strong>of</strong> ACM OOPSLA Workshop Proceedings on Secure Object Systems).61


3 Multimedia D<strong>at</strong>abase Management Systems, Kluwer Public<strong>at</strong>ions, 1996 (co-editors: B. Berra, K.Nwosu).4. D<strong>at</strong>a Management Handbook Supplement, Auerbach Public<strong>at</strong>ions, 1996 (Guest Editor).5. Directions in Multimedia D<strong>at</strong>abase Management, Kluwer, 1997 (co-editors: B. Berra, K. Nwosu).6. D<strong>at</strong>a Management Handbook, 1998 (Consulting Editor).7. Knowledge Management, MIT Press, 2001 (co-editors: M. Maybury et al).8. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Kluwer 2001; enhanced version <strong>of</strong> Proceedings <strong>of</strong> IFIP D<strong>at</strong>abaseSecurity Conference, 2000 (co-editors: R. van der Riet et al).9. Heterogeneous Inform<strong>at</strong>ion Exchange, Kluwer 2002, editorial introduction, 2002 (co-editors: H.Besteg<strong>of</strong>f et al).10. Web Inform<strong>at</strong>ion Management Security, Artech House, 2005 (co-editor: E. Ferrari).11. System Integrity and Control, Springer, 2006 (co-editor S. Wang et al).III. CONFERENCE AND WORKSHOP PROCEEDINGS EDITED1. Proceedings <strong>of</strong> the 3rd RADC D<strong>at</strong>abase Security Workshop, Published as MITRE Technical Report,MTP 385, May 1991.2. Proceedings <strong>of</strong> the 6th IFIP 11.3 Working Conference in D<strong>at</strong>abase Security, August 1992.3. Proceedings <strong>of</strong> the OOPSLA-93 Conference Workshop on Integr<strong>at</strong>ing Object-oriented technologyand Security Technology, September 1993 (co-editors: R. Sandhu and T.C. Ting).4. Proceedings <strong>of</strong> the Massive Digital D<strong>at</strong>a Systems Workshop, March 1994, published by theCommunity Management Staff, Intelligence Community (co-authors: B. Lavender et al).5. Proceedings <strong>of</strong> the OOPSLA 94, 95, and 96 Conference Workshop on Object-Oriented Technologyfor Medical Inform<strong>at</strong>ion Systems, October 1994, 95, 96 (co-editor: M. Ibrahim et al).6. Proceedings <strong>of</strong> the ACM Multimedia Conference Workshop on Multimedia D<strong>at</strong>abase ManagementSystems, October 1994, November 95 (co-editors: B. Berra, K. Nwosu).7. Proceedings WORDS 1999 by IEEE CS Press, August 1999 (also edited preliminary conferenceproceedings in January 1999).8. Proceedings <strong>of</strong> the 14th IFIP 11.3 Working Conference in D<strong>at</strong>abase Security, August 2000. (coeditor:R. van der Riet et al).9. Proceedings ISI Conference, Springer, 2006 (co-editor: H. Chen et al).10. SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, SophiaAntipolis, France, June 20-22, 2007, Proceedings ACM 2007 (co-editor: V. Lotz)11. NSF D<strong>at</strong>a and Applic<strong>at</strong>ions Security Workshop, February 200962


12. Proceedings ISI Conference, IEEE, 2009 (co-editor: H. Chen et al).IV. WORKSHOP AND SPECIAL SESSION REPORTS1. Workshop Summary, 7th IFIP 11.3 D<strong>at</strong>abase Security Conference, IFIP Transactions in D<strong>at</strong>abaseSecurity VII, North Holland, 1994 (Editors: Keefe and Landwehr).2. Workshop Summary, OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems,Addendum to the Proceedings <strong>of</strong> the ACM OOPSLA 93 Conference, OOPS Messenger, Vol. 5, No.2,April 1994.3. Panel Summary, ACM OOPSLA-93 Conference Panel on Integr<strong>at</strong>ing Object-Oriented and SecurityTechnologies, Addendum to the Proceedings <strong>of</strong> the OOPSLA 93 Conference, OOPS Messenger, Vol.5, No.2, April 1994.4. Workshop Summary, ACM OOPSLA-94 Conference Workshop on Object Technology in HealthcareInform<strong>at</strong>ion Systems, Addendum to the Proceedings <strong>of</strong> the ACM OOPSLA 94 Conference, ACMOOPS Messenger, 1995 (co-authors: M. Ibrahim, S. Arora, T. C. Ting).5. Workshop Summary, ACM Multimedia '94 Conference Workshop on Multimedia D<strong>at</strong>abaseManagement Systems, ACM SIGMOD Record, 1995.6. Interactive D<strong>at</strong>a Mining, Workgroup Session Report, D<strong>at</strong>abases in visualiz<strong>at</strong>ion workshop 1995,Springer Verlag, 1996.7. D<strong>at</strong>a Mining and Security, Special session <strong>at</strong> the 1995 IFIP D<strong>at</strong>abase Security Conference, Jointarticle in conference proceedings book chapter published by Chapman and Hall, 1996. (co-authors:T.Y. Lin, T. Hinke, D. Marks).8. Workshop Discussion, Interactive D<strong>at</strong>a Mining, IEEE D<strong>at</strong>abase and Visualiz<strong>at</strong>ion workshop, Atlanta,GA (proceedings published by Springer), 1996.9. Workshop Summary, D<strong>at</strong>a and Applic<strong>at</strong>ions Security, IFIP 11.3, August 2001.10. Workshop Summary, Secure Semantic Web, ICDE Conference, 2008 (Co-chair: B. Carmin<strong>at</strong>i)V. MITRE Public<strong>at</strong>ions Edited1. Special Issue Editorial, Edge D<strong>at</strong>a Mining Issue, MITRE, 20002. Conferences Co-Chaired: First Applied D<strong>at</strong>abase Technology Day, 1994; First D<strong>at</strong>abase Vendor Day1995, Second Applied D<strong>at</strong>abase Technology Day, 1995, First Object technology Day, 199663


Section 12: TECHNICAL REPORTSI. TECHNICAL REPORTS <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>UTDCS-05-05UTDCS-39-05D<strong>at</strong>a Mining Techniques for BiometricsSystemsUncertainty: An Extra Layer <strong>of</strong> SecurityFor Unauthorized Traffic Based WebServicesL<strong>at</strong>ifur KhanBhavani ThuraisinghamParag AgarwalB. PrabhakaranBhavani ThuraisinghamUTDCS-02-06 Dependable and Secure TMO Scheme Jung-In KimBhavani ThuraisinghamUTDCS-03-06UTDCS-04-06UTDCS-05-06UTDCS-06-06UTDCS-13-06UTDCS-14-06UTDCS-15-06UTDCS-22-06UTDCS-27-06UTDCS-32-06UTDCS-39-06UTDCS-40-06UTDCS-43-06UTDCS-44-06Geography Resource DescriptionFramework (GRDF) and Secure GRDF(S-GRDF)An Adaptable Perturb<strong>at</strong>ion Model <strong>of</strong>Privacy Preserving D<strong>at</strong>a MiningFace Recognition Using VariousClassifiers: Artificial Neural Network,Linear Discriminant and PrincipalComponent AnalysisAdministering <strong>The</strong> Semantic Web: CPT:Confidentiality, Privacy and TrustManagementOn the Complexity <strong>of</strong> the PrivacyProblem in D<strong>at</strong>abasesInference Control for Document Releaseand Dissemin<strong>at</strong>ionIndividually Adaptable Perturb<strong>at</strong>ionModel for Privacy Preserving D<strong>at</strong>aMiningDesign and Implement<strong>at</strong>ion <strong>of</strong> a SecureSocial Network SystemDetecting New Malicious ExecutablesUsing D<strong>at</strong>a MiningFingerprint M<strong>at</strong>ching Algorithm BasedOn Tree Comparison Using R<strong>at</strong>ios <strong>of</strong>Rel<strong>at</strong>ional DistancesA Scalable Clustering Method Based onDensityDetecting Malicious Executables UsingAssembly Fe<strong>at</strong>ure RetrievalAssured Inform<strong>at</strong>ion Sharing:Technologies, Challenges and DirectionsDesign and Implement<strong>at</strong>ion <strong>of</strong> PolicyEnforcement, D<strong>at</strong>a Sharing and MiningComponents for Trustworthy CoalitionsAshraful AlamBhavani ThuraisinghamLi LiuBhavani ThuraisinghamMur<strong>at</strong> KantarciogluL<strong>at</strong>ifur KhanPallabi ParveenBhavani ThuraisinghamN<strong>at</strong>halie TsybulnikBhavani Thuraisingham02/0512/0501/0601/0601/0601/0602/06Bhavani Thuraisingham 03/06Bhavani Thuraisingham 03/06Li LiuMur<strong>at</strong> KantarciogluBhavani ThuraisinghamRyan LayfieldBhavani ThuraisinghamMohammad M. MasudL<strong>at</strong>ifur KhanBhavani ThuraisinghamMamoun A. AwadAbinandhan ChandrasekaranBhavani ThuraisinghamK<strong>at</strong>hryn BeanSergey BeregL<strong>at</strong>ifur KhanBhavani ThuraisinghamMohammad M. MasudL<strong>at</strong>ifur KhanBhavani Thuraisingham03/0604/0607/0607/0609/0609/06Bhavani Thuraisingham 10/06Mamoun AwadDilsad CavusL<strong>at</strong>ifur KhanManjun<strong>at</strong>h Reddy10/0664


Bhavani ThuraisinghamUTDCS-45-06UTDCS-46-06UTDCS-47-06UTDCS-48-06UTDCS-51-06UTDCS-58-06UTDCS-60-06UTDCS-61-06Design and Simul<strong>at</strong>ion <strong>of</strong> Agent-basedTrust Management Techniques for aCoalition EnvironmentResearch and Simul<strong>at</strong>ion <strong>of</strong> Game<strong>The</strong>oretical Techniques for D<strong>at</strong>a SharingAmong Semi-Trustworthy PartnersDefensive Inform<strong>at</strong>ion Oper<strong>at</strong>ions:Detecting Malicious Executables UsingAssemble Fe<strong>at</strong>ure Retrieval in anUntrustworthy EnvironmentInform<strong>at</strong>ion Oper<strong>at</strong>ions AcrossInfospheres: Volume 1A Novel Privacy Preserving DecisionTree AlgorithmFace Segment<strong>at</strong>ion for PrivacyPreserving Video SurveillanceA Compar<strong>at</strong>ive Study <strong>of</strong> a KeyAgreement Protocol Based on ECC andRSARFID Technologies and <strong>The</strong>irApplic<strong>at</strong>ionsSrinivasan IyerBhavani ThuraisinghamRyan LayfieldMur<strong>at</strong> KantarciogluBhavani ThuraisinghamM. Mehedy MasudL<strong>at</strong>ifur KhanBhavani ThuraisinghamBhavani ThuraisinghamL<strong>at</strong>ifur KhanMur<strong>at</strong> KantarciogluMamoun AwadDilsad CavusRyan LayfieldMehedy MasudSrinivasan IyerLi LiuMur<strong>at</strong> KantarciogluBhavani ThuraisinghamSai ChaitanyaBhavani ThuraisinghamVibha SethiBhavani ThuraisinghamAbinandhan ChandrasekaranBhavani ThuraisinghamUTDCS-64-06 Secure Grid Computing Jianmin ZhuBhavani ThuraisinghamUTDCS-65-06UTDCS-66-06UTDCS-68-06UTDCS-01-07UTDCS-02-07UTDCS-03-07UTDCS-33-07Face Recognition Using MultipleClassifiersA Framework for a Video Analysis Toolfor Suspicious Event DetectionA Model for Risk Adaptive AccessControl in RABC Employed DistributedEnvironmentsAn Integr<strong>at</strong>ed Pl<strong>at</strong>form for SecureGeosp<strong>at</strong>ial Inform<strong>at</strong>ion ExchangeThrough the Semantic WebOracle 10 G XE Tutorial (Product <strong>of</strong>Oracle Corpor<strong>at</strong>ion)Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for N<strong>at</strong>ionalSecurity: Land Cover Classific<strong>at</strong>ion AndGrouping for Semantic AssessmentSecurity for Enterprise ResourcePlanning SystemsPallabi ParveenBhavani ThuraisinghamGal LeveeL<strong>at</strong>ifur KhanBhavani ThuraisinghamGal LeveeL<strong>at</strong>ifur KhanBhavani ThuraisinghamBhavani ThuraisinghamAlam AshrafulGanesh SubbiahL<strong>at</strong>ifur KhanSrinivasan IyerBhavani ThuraisinghamChuanjun LiL<strong>at</strong>ifur KhanM. HusainBhavani ThuraisinghamSha<strong>of</strong>ei ChenFang QiuWei-SheBhavani Thuraisingham10/0610/0610/0610/0610/0611/0611/0611/0612/0612/0612/0612/0601/0702/0703/0708/0765


UTDCS-34-07 Secure Semantic Web Services Bhavani Thuraisingham 08/07UTDCS-35-07Extended RBAC-Based Design andImplement<strong>at</strong>ion for A Secure D<strong>at</strong>aWarehouseBhavani ThuraisinghamMur<strong>at</strong> KantarciogluSrinivasan Iyer09/07UTDCS-39-07Architecture for a Trusted ComputingBase For need-to-share in case <strong>of</strong>emergenciesYashaswini Harsha KumarBhavani ThuraisinghamL<strong>at</strong>ifur Khan11/07UTDCS-40-07Enforcing Honesty in AssuredInform<strong>at</strong>ionSharing within a DistributedSystemRyan LayfieldMur<strong>at</strong> KantarciogluBhavani Thuraisingham11/07UTDCS-41-07D<strong>at</strong>a Mining for DefensiveOper<strong>at</strong>ionsMohammad MasudL<strong>at</strong>ifur KhanBhavani Thuraisingham11/07UTDCS-45-07Inform<strong>at</strong>ion Oper<strong>at</strong>ions AcrossInfospheres: Volume 2L<strong>at</strong>ifur KhanBhavani ThuraisinghamMur<strong>at</strong> KantarciogluYashaswini Harsha KumarMehedy MasudRyan Layfield12/07UTDCS-01-08Trusted Computing Base for AssuredInform<strong>at</strong>ion SharingYashaswini Harsha KumarBhavani ThuraisinghamL<strong>at</strong>ifur Khan01/08UTDCS-02-08Deleg<strong>at</strong>ion-based Security Model ForWeb ServicesWei SheBhavani ThuraisinghamI-Ling Yen01/08UTDCS-05-08Mining Concept-Drifting D<strong>at</strong>a StreamTo Detect Peer to Peer Botnet TrafficMohammad M. MasudJing GaoL<strong>at</strong>ifur KhanJiawei HanBhavani Thuraisingham03/08UTDCS-13-08Content-based Ontology M<strong>at</strong>ching forGIS D<strong>at</strong>asetsJeffrey L. PartykaL<strong>at</strong>ifur KhanBhavani ThuraisinghamNeda AlipanahShashi Shekhar05/08UTDCS-18-08Surgical Haptics and Robotics: Influence<strong>of</strong> Mism<strong>at</strong>ched Haptic and VisualDisplay ScalesGregory S. LeeBhavani Thuraisingham07/08UTDCS-20-08Synthesize Virtual World Motions From2D Video RecognitionYohan JinMyunghoon SukB. PrabhakaranBhavani Thuraisingham07/08UTDCS-22-08Content-based Ontology M<strong>at</strong>ching ForGIS D<strong>at</strong>asetsJeffrey PartykaNeda AlipanahL<strong>at</strong>ifur KhanBhavani ThuraisinghamShashi Shekhar07/08UTDCS-23-08Secure Haptics and SurgicalRobotics: Adapt<strong>at</strong>ion to Fitts’ LawPerformance Measure for Multi-TargetTask ComparisonsGregory S. LeeBhavani Thuraisingham08/0866


UTDCS-32-08A Practical Approach to ClassifyEvolving D<strong>at</strong>a Streams: Training withLimited Amount <strong>of</strong> Labeled D<strong>at</strong>aMohammad M. MasudBhavani ThuraisinghamJing GaoL<strong>at</strong>ifur KhanJiawei Han10/08UTDCS-40-08A Framework for the Rel<strong>at</strong>ionalTransform<strong>at</strong>ion <strong>of</strong> RDF D<strong>at</strong>aSunitha RamanujamAnubha GuptaL<strong>at</strong>ifur KhanSteven SeidaBhavani Thuraisingham12/08UTDCS-01-09A Fine Grained Model for Inform<strong>at</strong>ionFlow Control in Web ServiceCompositionWei SheI-Ling YenBhavani Thuraisingham01/09UTDCS-03-09Preventing Priv<strong>at</strong>e Inform<strong>at</strong>ion InferenceAttacks on Social NetworksRaymond He<strong>at</strong>herlyMur<strong>at</strong> KantarciogluBhavani Thuraisingham02/09UTDCS-09-09Design <strong>of</strong> a Temporal GeosocialSemantic Web for Military Stabiliz<strong>at</strong>ionand Reconstruction Oper<strong>at</strong>ionsBhavani ThuraisinghamL<strong>at</strong>ifur KhanMur<strong>at</strong> Kantarcioglu04/09UTDCS-13-09Integr<strong>at</strong>ing Novel Class Detection withClassific<strong>at</strong>ion for Concept-Drifting D<strong>at</strong>aStreamsMohammad M. MasudJing GaoL<strong>at</strong>ifur KhanJiawei HanBhavani Thuraisingham06/09UTDCS-25-09Design and Implement<strong>at</strong>ion <strong>of</strong> RestfulWeb Services for BlackbookPranav ParikhMur<strong>at</strong> KantarciogluL<strong>at</strong>ifur KhanBhavani Thuraisingham08/09UTDCS-28-09A Case Study on Geosp<strong>at</strong>ial D<strong>at</strong>aManagement with BlackbookSonia ChibJyothsna RachapalliBhavani ThuraisinghamL<strong>at</strong>ifur KhanMur<strong>at</strong> Kantarcioglu09/09UTDCS-36-09Enhanced Inform<strong>at</strong>ion Flow Controlfor Service Composition and ItsImplement<strong>at</strong>ionWei SheI-Ling YenBhavani ThuraisinghamElisa Bertino09/09UTDCS-40-09Cost-based Query Processing for LargeRDF Graph Using Hadoop andMapReduceMohammad HusainPankil DoshiL<strong>at</strong>ifur KhanSyeda A. RizviMur<strong>at</strong> KantarciogluBhavani Thuraisingham11/09UTDCS-41-09Efficient Query Processing forLarge RDF Graphs Using Hadoop andMapReduceMohammad HusainPankil DoshiJames McGlothlinL<strong>at</strong>ifur KhanBhavani ThuraisinghamMur<strong>at</strong> Kantarcioglu11/0967


UTDCS-51-09UTDCS-01-10Secure Dependable and HighPerformance Cloud StorageSemantic Web Implement<strong>at</strong>ionScheme for N<strong>at</strong>ional VulnerabilityCommon Pl<strong>at</strong>form Enumer<strong>at</strong>ion D<strong>at</strong>aYunqi YeI-Ling YenLiangliang XiaoFarohk Bastani,Bhavani ThuraisinghamVaibhav KhadilkarJyothsna RachapalliBhavani ThuraisinghamUTDCS-02-10 Security Issues for Cloud Computing Kevin HamlenL<strong>at</strong>ifur KhanMur<strong>at</strong> KantarciogluBhavani ThuraisinghamUTDCS-03-10 Securing the Execution Environment Elisa Bertino, Gabriel Ghinita ,Kevin Hamlen, Mur<strong>at</strong> Kantarcioglu,Hsien-Hsin S. Lee, Ninghui LiCalton Pu, Ravi Sandhu, WaleedSmari, Bhavani ThuraisinghamGene Tsudik, Dongyan XuShouhuai Xu11/0901/1001/1002/10UTDCS-04-10Ranking Entities from MultipleOntologies to Facilit<strong>at</strong>e Feder<strong>at</strong>edQueriesNeda Alipanah, Julie RauerL<strong>at</strong>ifur Khan, Steven B. SeidaBhavani Thuraisingham02/10UTDCS-13-10Bi-Directional Transl<strong>at</strong>ion <strong>of</strong> Rel<strong>at</strong>ionalD<strong>at</strong>a into Virtual RDF StoresSunitha Ramanujam, VaibhavKhadilkar, L<strong>at</strong>ifur Khan, StevenSeida, Mur<strong>at</strong> Kantarcioglu, BhavaniThuraisingham05/10UTDCS-19-10Selected Papers in Security StudiesVolume 1: Terrorism Tactics, Trendsand TechnologiesBhavani Thuraisingham07/10UTDCS-20-10RBF Neural Network-based FaultLocaliz<strong>at</strong>ionW. Eric Wong, Vidroha Deboy,Bhavani Thuraisingham, RichardGolden07/10UTDCS-23-10Selected Papers in Security StudiesVolume 2: Inform<strong>at</strong>ion SharingStr<strong>at</strong>egies <strong>of</strong> the United St<strong>at</strong>es FederalGovernment and Its Allies andOur Contributions TowardsImplementing <strong>The</strong>se Str<strong>at</strong>egiesBhavani Thuraisingham08/10UTDCS-24-10A Comparison <strong>of</strong> Approaches for Large-Scale D<strong>at</strong>a MiningAmy Xuyang TanValerie Li LiuMur<strong>at</strong> KantarciogluBhavani Thuraisingham08/10UTDCS-27-10Ontology-driven Query ExpansionMethods to Facilit<strong>at</strong>e Feder<strong>at</strong>ed QueriesNeda Alipanah, Parveen Pallabi,Sheetal Menezes, L<strong>at</strong>ifur Khan,Steven Seida, BhavaniThuraisingham09/10UTDCS-12-11Feder<strong>at</strong>ed Query Processing UsingOntology Structure and Ranking In aService Oriented EnvironmentNeda Alipanah, Parveen Pallabi,L<strong>at</strong>ifur Khan, BhavaniThuraisingham03/11UTDCS-22-11RETRO: A Framework for SemanticsPreserving SQL-to-SPARQL Transl<strong>at</strong>ionJyothsna Rachapalli, VaibhavKhadilkar, Mur<strong>at</strong> Kantarcioglu, andBhavani Thuraisingham08/1168


UTDCS-27-11Towards the Design and Implement<strong>at</strong>ion<strong>of</strong> a Cloud-Centric Assured Inform<strong>at</strong>ionSharingBhavani Thuraisingham, VaibhavKhadilkar, Tyrone Cadenhead,Jyothsna Rachapalli, Mur<strong>at</strong>Kantarcioglu, Kevin Hamlen09/11UTDCS-30-11Optimized Ontology-Driven QueryExpansion Using Map-ReduceFramework to Facilit<strong>at</strong>e Feder<strong>at</strong>edQueriesNeda Alipanah, L<strong>at</strong>ifur Khan andBhavani Thuraisingham11/11UTDCS-31-11Risk-Aware D<strong>at</strong>a Processing in HybridCloudsBhavani Thuraisingham, VaibhavKhadilkar, Kerim Yasin Oktay, BijitHore, Mur<strong>at</strong> Kantarcioglu andSharad Mehrotra,11/11UTDCS-35-11Selected Papers in Security StudiesVolume 6: <strong>The</strong> Continued War onTerrorism – How to Maintain Long-Range Terrorist DeterrenceJan Kallberg, BhavaniThuraisingham11/11UTDCS-36-11Selected Papers in Security StudiesVolume 7: Supply Chain Managementfor Inctive and Risk-based AssuredInform<strong>at</strong>ion SharingBhavani Thuraisingham12/11II. Technical Reports <strong>at</strong> MITRE1. Security Issues in Distributed D<strong>at</strong>abase Management Systems, September 1989, Technical Report,M89-52, Vol. 1.2. Research Directions in Distributed D<strong>at</strong>abase Management Systems, September 1989, TechnicalReport, M89-52, Vol. 2).3. <strong>The</strong> Inference Problem in D<strong>at</strong>abase Security, September 1989, Technical Report, M89-52, Vol. 3.4. Directions for Future Research and Development in Trusted Distributed D<strong>at</strong>abase ManagementSystems, September 1989, Technical Report, M89-52, Vol. 4,5. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem in D<strong>at</strong>abase Security, May 1990, TechnicalReport, MTP-291, (From Report No. 190).6. Secure Query Processing in Trusted D<strong>at</strong>abase Management Systems - Design and PerformanceStudies, May 1990, Technical Report, MTP-292, (From Report No. 189).7. M<strong>at</strong>hem<strong>at</strong>ical Formalisms for Multilevel Object-Oriented Systems, June 1990, Technical Report,MTP-291.8. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems, July 1990, TechnicalReport, MTP-297, (From Reports No. 188, No. 189).9. Handling Associ<strong>at</strong>ion Constraints in Multilevel D<strong>at</strong>abases, July 1990, Technical Report, WP-28904.10. A Nonmonotonic Typed Multilevel Logic for Formalizing Multilevel D<strong>at</strong>abase Systems, June 1990,Technical Report, MTR-10935.69


11. Secure Distributed Query Processing Str<strong>at</strong>egies, June 1990, Technical Report, WP 28891, (coauthors:H. Rubinovitz and M. Collins)12. <strong>The</strong> Use <strong>of</strong> Conceptual Structures in Handling the Inference Problem in D<strong>at</strong>abase Security, August1990, Technical Report, M90-55. D<strong>at</strong>abase Inference Controller - An Overview, Technical Report,August 1990, MTR-10963, (co-authors: W. Ford, J. O'Keeffe).13. Secure Distributed Query Processor - An Overview, August 1990, Technical Report, MTR-10969,Volume 1 (co-author: H. Rubinovitz) (also published as RADC Technical Report).14. Issues on Developing a Multilevel Secure Object-Oriented D<strong>at</strong>a Model, Technical Report, MTP 384,December 1990.15. Security Issues for Feder<strong>at</strong>ed D<strong>at</strong>abase Systems to Manage Distributed, Heterogeneous, andAutonomous Multilevel D<strong>at</strong>abases, Technical Report, M91-78, November 1991.16. Enhancements to the Secure Distributed Query Processor Prototype to function in a LimitedHeterogeneous Environment, Technical Report, M91-86, December 1991.17. Security Constraint Processing in a Multilevel Secure Distributed Environment, Technical Report,MTR 11239, April 1992 (co-author: W. Ford).18. Simul<strong>at</strong>ion <strong>of</strong> Query Processing and Concurrency Control Algorithms for a Trusted DistributedD<strong>at</strong>abase Management System, June 1992, MTR92B0000077.19. COMPUSEC Training Course: D<strong>at</strong>abase Security and Issues, Technical Report, M92B0000102,Vol. 8, September 1992. (Based on half a day course given to AFCSC - see public<strong>at</strong>ion #270).20. Concurrency Control in Trusted D<strong>at</strong>abase Management Systems, Technical Report, M92B0000109,September 1992 (co-author: Hai-Ping Ko).21. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed D<strong>at</strong>abase Inference Controller - I, Technical Report,MTR92B0000168, December 1992 (co-authors: Harvey Rubinovitz, D. Foti).22. Multilevel Security for Object-Oriented D<strong>at</strong>abase Management Systems, Technical ReportWP92B0000375, February 1993 (co-authors: A. Rosenthal, W. Herndon, R. Graubart).23. Selected Research Topics on the Inference Problem, M93B0000024, Technical Report, March 1993.24. A Framework for Specifying MLSDB Requirements, MTR 93B0000089, Technical Report, June 1993(co-authors: L. Monk and M. Nadel).25. A Seminar on Object-Oriented D<strong>at</strong>abase Management Systems, Technical Report M93B0000175,December 1993.26. A Seminar on Distributed and Heterogeneous D<strong>at</strong>abase Systems, Technical Report M93B0000176,December 1993.27. Applying OMT for Designing Multilevel D<strong>at</strong>abase Applic<strong>at</strong>ions, Technical Report, M93B0000180,December 1993, (co-authors: P. Sell and D. Marks).28. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed D<strong>at</strong>abase Inference Controller - II, Technical Report,MTR94B0000057, June 1994 (co-authors: Harvey Rubinovitz, M. Collins).70


29. A Seminar on Real-time D<strong>at</strong>abase Management Systems, Technical Report, MP 94B 0000124 July1994.30. Evolvable Systems Initi<strong>at</strong>ive for Real-time C3: Infrastructure Requirements: MTR 94B0000116, (coauthors:E. Bensley et al), September 1994 (Unclassified, NOFORN).31. Design and Implement<strong>at</strong>ion <strong>of</strong> an Active Real-time D<strong>at</strong>abase System, MP 94B 0000167, December1994 (co-authors: G. Gengo and A. Schafer).32. Massive Digital D<strong>at</strong>a Systems Issues MP 94B0000169, September 1994, (co-authors: H. Bayard, B.Lavender, M. Zemankova).33. Directions for D<strong>at</strong>a Management Technology Research <strong>at</strong> MITRE, MP 95B0000112, March 1995,(co-authors: B. Blaustein, L. Seligman, and A. Rosenthal).34. Final Report on the Inference Problem, Technical Report, June 1995 (co-authors: M. Collins, H.Rubinovitz).35. Program Plan for the Massive Digital D<strong>at</strong>a Systems Initi<strong>at</strong>ive, Technical Report, May 1995.36. Toward Developing a Testbed for MDDS, Technical Report, September 1995.37. Plan for ORD Labor<strong>at</strong>ory, Technical Report, September 1995 (co-author: C. Clifton et al.).38. Secure Client Server Computing, Working Note, MITRE, June 1995 (co-author: B. Kahn).39. Evolvable Systems Initi<strong>at</strong>ive for Real-time C3: Design and Implement<strong>at</strong>ion <strong>of</strong> the Infrastructure, D<strong>at</strong>aManagement, and Applic<strong>at</strong>ion, Technical Report (co-authors: E. Bensley et al), September 1995.40. Evolvable Systems Initi<strong>at</strong>ive for Real-time C3: Integr<strong>at</strong>ion <strong>of</strong> the Infrastructure, D<strong>at</strong>a Manager, andTracker Technical Report (co-authors: M. G<strong>at</strong>es et al), September 1996.41. Evolvable Interoperable Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE, Technical Report, September 1996(co-authors: P. Chase et al).42. Evolvable Interoperable Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE: Final report, Technical Report,September 1997 (co-authors: P. Chase et al).43. Adaptable real-time CORBA, Technical report, Volume 1 September 1997 (co-author: R. Ginis, etal).44. Adaptable Real-time CORBA, Technical report, Volume 1I September 1998 (co-author: S. Wohleveret al).45. MDDS, Volume 1, Program Overview, MITRE Report May 1998.46. MDDS, Volume 2, Technology Overview, MITRE Report. June 1998.47. MDDS, Volume 3, D<strong>at</strong>a Mining, MITRE Report July 1998.48. MDDS, Volume 4, Multimedia D<strong>at</strong>abases, MITRE Report, August 1998.49. MDDS, Volume 5, Web Technologies, MITRE Report September 1998.71


50. MDDS: Interviews, Concept <strong>of</strong> Oper<strong>at</strong>ion, Scenarios and Technologies, MITRE Report, 1999.51. Adaptable Real-time Object Request Brokers, Volume 3, MITRE tech Report, September 1999 (coauthor:S. Wohlever et al)52. Inference Problem, MITRE Technical Report, 1999. (co-author: H. Rubinovitz)IV. Other Significant Technical Reports1. Multilevel Security for D<strong>at</strong>abase Management Systems, October 1986, Technical Report, HoneywellComputer Sciences Center, Minneapolis, MN, (co-authors: P. Dwyer, G. Jel<strong>at</strong>is).2. Security Policy for LDV, 1989, Technical Report, Honeywell Secure Computing Technology Center,Minneapolis, MN, (co-authors: E. Boebert, B. Dillaway, P. Dwyer, T. Haigh) (also published asRADC Technical report).3. Implement<strong>at</strong>ion Specific<strong>at</strong>ions for LDV, 1989, Technical Report, Honeywell Secure ComputingTechnology Center, Minneapolis, MN, (co-authors: P. Dwyer, T. Haigh, E. Onuegbe, P. Stachour)(also published as RADC Technical report).4. Deficiencies Analysis for LDV, 1989, Technical Report, Honeywell Secure Computing TechnologyCenter, Minneapolis, MN, (co-authors: R. O'Brien, T. Haigh, J. Payne, P. Stachour, D. Toups).5. Optimal Placement <strong>of</strong> Recovery Points in Distributed Environments, 1986,Technical Report TR86-43, <strong>University</strong> <strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: S. Chen, W. Tsai).6. On the Optimal AT and RP Assignment, 1987, Technical Report TR86-47, <strong>University</strong> <strong>of</strong> Minnesota,Minneapolis, MN, (co-authors: W. Tsai, et al.).7. Secure Query Processing Using AI Techniques, 1987, Technical Report TR87-37, Department <strong>of</strong>Computer Science, <strong>University</strong> <strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: W. T. Tsai, T. Keefe).8. Multilevel Security in Object-Oriented Systems, January 1988, Technical Report TR88-8, <strong>University</strong><strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: T. Keefe, W. T. Tsai).9. Artificial Intelligence Applic<strong>at</strong>ions in D<strong>at</strong>abase Security, 1988, Technical Report TR88-31,<strong>University</strong> <strong>of</strong> Minnesota, Minneapolis, MN, (co-authors: W. T. Tsai, T. Keefe, D. Thomsen) (alsoappeared in Computer Security Journal, 1988).10. SODA - A Secure Object-Oriented D<strong>at</strong>abase System, 1989, Technical Report, <strong>University</strong> <strong>of</strong>Minnesota, Minneapolis, MN, (co-authors: W. T. Tsai, T. Keefe).11. Real-time Method Invoc<strong>at</strong>ions in Distributed Environments, TR95-244, January 1996 (co-author: V.Fay. Wolfe et al).12. Real-time CORBA Development <strong>at</strong> MITRE, NRad, TriPacific and URI, TR99-272, December 1997(co-author: G. Cooper et al).13. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-Time Middleware, TR98-261, September 1998 (coauthors:L. DiPippo et al).72


14. Concurrency Control in Real-time Object-Oriented Systems: <strong>The</strong> Affected Set Priority CeilingProtocols, TR98-262 (co-author: M. Squadrito et al); April 1998.15. Towards a Real-time Agent Architecture – A White Paper, WORDS 1999 Fall, November 1999 (coauthor:L. DiPippo et al).16. Real-time CORBA, <strong>University</strong> <strong>of</strong> Rhode Island, TR00-276, October 2000 (co-author: V. Wolfe et al).17. D<strong>at</strong>abase Migr<strong>at</strong>ion for Command and Control, AF Summer Study Report, 2001 (Vice Chair <strong>of</strong>Panel; co-author: J. Hendler et al)) .18. Knowledge Management, MIT Sloan School Working Paper, 2002 (co-author : A. Gupta et al).19. XML Security, MIT Sloan School Working Paper, 2002 (co-author: A. Gupta et al).73


Section 13: PRESENTATIONS(Keynote addresses, panels, etc.)I. KEYNOTE/FEATURED PRESENTATIONS1. Interoperability <strong>of</strong> Heterogeneous D<strong>at</strong>abase Systems: Developments and Challenges, keynoteaddress given <strong>at</strong> the Plenary session <strong>at</strong> the AFCEA D<strong>at</strong>abase Colloquium, San Diego, CA, August 29,1994 (followed keynote present<strong>at</strong>ion by General Edmonds, Director DISA - abstract published inproceedings).2. Applic<strong>at</strong>ion <strong>of</strong> Object Technology in D<strong>at</strong>a Management, keynote address given <strong>at</strong> the Plenary session<strong>at</strong> the AFCEA D<strong>at</strong>abase Colloquium, San Diego, CA, August 28, 1995 (following keynotepresent<strong>at</strong>ion by Ms Diane McCoy, Deputy Director, DISA - abstract published in proceedings).3. Applic<strong>at</strong>ion <strong>of</strong> Object Technology in D<strong>at</strong>a Management, version also given <strong>at</strong> FEDOOTS,Washington DC, October 1995 (abstract, charts in proceedings).4. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining, and Security, keynote address given <strong>at</strong> the 10th IFIP 11.3 D<strong>at</strong>abaseSecurity Conference, Como, Italy, July 1996. (Paper in Chapman and Hall book 1997).5. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining, and Security, also keynote address <strong>at</strong> PAKDD D<strong>at</strong>a MiningConference, Melbourne, Australia, April 1998.6. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining, and Security, fe<strong>at</strong>ured address <strong>at</strong> WITI (Women in TechnologyIntern<strong>at</strong>ional), Carey, North Carolina, September 1999.7. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, fe<strong>at</strong>ured present<strong>at</strong>ion <strong>at</strong> Object World East,Hynes Convention Center, Boston, MA, May 1996.8. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, Object World West, San Jose, CA, August1996 (briefing in proceedings).9. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, Object World East March 1997 Boston, MA10. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, Object World West July 1997 (charts inproceedings), San Francisco, CA11. D<strong>at</strong>a Mining and D<strong>at</strong>a Warehousing: Developments and Challenge, keynote address given <strong>at</strong>AFCEA DOD D<strong>at</strong>abase Colloquium, San Diego, CA, August 27, 1996 (abstract in proceedings).12. D<strong>at</strong>a Mining and D<strong>at</strong>a Warehousing: Developments and Challenges, fe<strong>at</strong>ured address <strong>at</strong> IEEEEngineering Solutions: From Desktop to Internet Conference and Exposition, Hynes ConventionCenter, Boston, September 1996 (charts in proceedings).13. D<strong>at</strong>a Mining Developments and Challenges, fe<strong>at</strong>ured address <strong>at</strong> the D<strong>at</strong>a Warehousing and Year 2000Symposium, November 1996, Orlando, FL.14. D<strong>at</strong>a Mining Developments and Challenges, keynote address <strong>at</strong> ACM SAC Conference, February1997, San Jose, CA.15. D<strong>at</strong>a Mining Developments and Challenges, also keynote address <strong>at</strong> IEEE Artificial NeuralNetworks, 1999, St Louis, MO.16. D<strong>at</strong>a Mining Developments and Challenges, June 1997, Atlantic City, NJ (charts in proceedings).74


17. D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion, fe<strong>at</strong>ured address <strong>at</strong> DoD D<strong>at</strong>abaseColloquium, September 1997, San Diego, CA (based on book by CRC Press, 1997).18. Web D<strong>at</strong>abase Management, fe<strong>at</strong>ured address <strong>at</strong> DoD D<strong>at</strong>abase Colloquium, September 1998(abstract in proceedings), San Diego, CA.19. Evolvable Interoperable Real-time Command and Control Systems, fe<strong>at</strong>ured address <strong>at</strong> DoD D<strong>at</strong>abaseColloquium, September 1999 (following keynote address by Dr. Marv Langston), (abstract inproceedings), San Diego, CA.20. Multimedia D<strong>at</strong>a Management and Mining, keynote address <strong>at</strong> SAS Institute Conference, 1999(preceded keynote by Dr. Jim Goodnight) Carey, North Carolina.21. Multimedia D<strong>at</strong>a Management and Mining also keynote <strong>at</strong> IEEE ICTAI, 1999, Chicago, IL.22. Multimedia D<strong>at</strong>a Management and Mining, IASTED AI Conference, February 2002 (present<strong>at</strong>ion inproceedings) Innsbruck, Austria.23. D<strong>at</strong>a Management for the 21 st Century, AFCEA D<strong>at</strong>abase Colloquium, 2000 (abstract in proceedings,enhanced paper presented <strong>at</strong> another conference), San Diego, CA.24. D<strong>at</strong>a Management for Biotechnology Applic<strong>at</strong>ions, AFCEA D<strong>at</strong>abase Colloquium, August 2001(abstract in proceedings), San Diego, CA.25. Secure Semantic Web, keynote address <strong>at</strong> IEEE SRDS Conference Workshop on D<strong>at</strong>a Warehouse andSecurity, October 2001, New Orleans, LA.26. Secure Semantic Web, NSF/EU Workshop on Semantic Web, Sophia Antipolis, France.27. D<strong>at</strong>a Quality: Developments and Directions, IFIP 11.5 Conference, Brussels, Belgium, November2001 (paper in Kluwer Book).28. XML security (with E. Bertino et al), keynote address <strong>at</strong> NSF PI Conference , Fort Worth, TX, April2001.29. Semantic Web and Dependable Computing, WORDS 2002, San Diego, CA (paper in proceedings).30. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security and Counter-terrorism, keynote address <strong>at</strong> the White House,Office <strong>of</strong> Science and Technology Policy, February 2002. Washington, DC.31. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security and Counter-terrorism, luncheon address <strong>at</strong> IEEE COMPSACConference, Oxford <strong>University</strong>, August 2002.32. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security and Counter-terrorism, fe<strong>at</strong>ured address <strong>at</strong> United N<strong>at</strong>ions,September 2002, New York.33. Web D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Counter-terrorism, keynote address <strong>at</strong> SIAM D<strong>at</strong>a MiningConference Workshop on Web Mining, April 2002, Washington, DC.34. Web D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Counter-terrorism, keynote address <strong>at</strong> IEEE ICTAI 2002.Washington DC/Crystal City, VA.75


35. Sensor Web and Sensor D<strong>at</strong>a Management, keynote address <strong>at</strong> ISE, San Diego, July 2002. (ReceivedSCSC award for this keynote, abstract in proceedings).36. Feder<strong>at</strong>ed D<strong>at</strong>abases for Bioinform<strong>at</strong>ics, 4 th Annual Bioinform<strong>at</strong>ics Conference, September 2002,Boston, MA.37. Security for Multimedia D<strong>at</strong>abase Management, IEEE Multimedia S<strong>of</strong>tware Engineering,Conference, December 2002, Newport Beach, CA.38. Security for Multimedia D<strong>at</strong>abase Management, Distributed Multimedia Conference, Miami,Florida, September 2003.39. Secure Semantic Web, XML Security and Privacy, keynote address <strong>at</strong> Conference on AppliedInform<strong>at</strong>ics, Innsbruck, Austria, February 2003.40. Secure Semantic Web, XML Security and Privacy, fe<strong>at</strong>ured address <strong>at</strong> Knowledge ManagementConference, Washington DC, March 2003.41. Secure Semantic Web, XML Security and Privacy keynote address <strong>at</strong> ICCS Las Vegas, April 2003.42. Dependable Sensor Inform<strong>at</strong>ion Management, fe<strong>at</strong>ured address IEEE WORDS, Capri Island, Italy,October 2003.43. D<strong>at</strong>a Mining and Cyber Security, keynote address <strong>at</strong> Quality S<strong>of</strong>tware Conference, <strong>Dallas</strong>, <strong>Texas</strong>,November 2003 (abstract in proceedings).44. D<strong>at</strong>a Mining and Cyber Security, keynote <strong>at</strong> 3 rd Applied Technology Conference, <strong>University</strong> <strong>of</strong>Arkansas, Little Rock, February 2004.45. D<strong>at</strong>a Mining for Biometrics, fe<strong>at</strong>ured address <strong>at</strong> Society for Women Engineers Conference,Baltimore, MD, March 2004.46. Security and Privacy for Web D<strong>at</strong>abases and Services, keynote address, EDBT Conference, Crete,Greece, March 2004 (complete paper in EDBT Proceedings Springer, co-author: E. Ferrari).47. Access Control in D<strong>at</strong>abases: Developments and Directions, keynote address <strong>at</strong> ACM SACMAT,New York, June 2004.48. Secure Knowledge Management, NSF Workshop on Secure Knowledge Management, SUNYBuffalo, September 2004.49. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, keynote address, Intern<strong>at</strong>ional Conference on MachineLearning, Louisville, Kentucky, December 2004.50. Sensor Inform<strong>at</strong>ion Management, fe<strong>at</strong>ured address, MITRE Community Workshop, Tyson’s Corner,October 2005.51. Voice Over IP Security, IASTED Conference on Communic<strong>at</strong>ions, Phoenix, AZ, November 2005.52. D<strong>at</strong>a Mining for Counter-terrorism Applic<strong>at</strong>ions, fe<strong>at</strong>ured address, SAS D<strong>at</strong>a Mining Conference,Las Vegas, October 2005.53. D<strong>at</strong>a Mining for Malicious Code Detection, keynote address, ASTRNET Workshop, Kings College,London, April 2006.76


54. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security Applic<strong>at</strong>ions, keynote address, Pacific Asia D<strong>at</strong>a MiningConference Workshop, Singapore, April 2006 (proceedings abstract).55. D<strong>at</strong>a Mining for Surveillance Applic<strong>at</strong>ions, fe<strong>at</strong>ured address, Pacific Asia D<strong>at</strong>a Mining Conference,Singapore, April 2006 (proceedings abstract).56. Identity Management and RFID Technologies, keynote address, Identity Solutions Conference,Jonesboro, Arkansas, February 2007.57. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, ARES Conference, Vienna, Austria, April 2007.58. CPT for the Semantic Web, IEEE Policy, Bologna, Italy, June 2007. (proceedings paper).59. Multimedia Systems Security, ACM Multimedia Systems Security Workshop, <strong>Dallas</strong>, TX, September2007 (proceedings abstract).60. Privacy Preserving D<strong>at</strong>a Mining, ICDM Workshop, Omaha, Nebraska, October 2007.61. Inform<strong>at</strong>ion Security, Privacy and Governance for Assured Inform<strong>at</strong>ion Sharing, fe<strong>at</strong>ured address,ISIG 1 st Intern<strong>at</strong>ional Conference on Global Inform<strong>at</strong>ion Governance, Pisa, Italy, March 2008.62. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, Invited Plenary Talk, Cyber Security Symposium,Arizona St<strong>at</strong>e U, Tempe, AZ, April 2008.63. D<strong>at</strong>a Analytics for Security Applic<strong>at</strong>ions, Intelligence and Security Inform<strong>at</strong>ics, Taipei, Taiwan, 2008.64. Confidentiality, Privacy and Trust for D<strong>at</strong>a Mining, ACM KDD Workshop on Privacy and D<strong>at</strong>aMining, Las Vegas, NV, August 2008 (proceedings published by Springer Verlag).65. D<strong>at</strong>a Mining for Malicious Code Detection and Security Applic<strong>at</strong>ions, TRUST, Shanghai, Cjina,December 2008.66. Building Trustworthy Semantic Webs, TSP, Shanghai, China, December 2008.67. Assured Inform<strong>at</strong>ion Sharing, ASIA-CCS, Sydney, Australia, March 2009.68. Assured Inform<strong>at</strong>ion Sharing for Trustworthy, Untrustworthy and Semi-trustworthy Partners, DoECyber Security Conference, Knoxville, TN April 2009.69. Geosocial Semantic Web for Military Stabiliz<strong>at</strong>ion and Reconstruction, Pacific Asia Intelligence andSecurity Inform<strong>at</strong>ics, Bangkok, Thailand, April 2009.70. Security Engineering: Developments and Directions, IEEE Intern<strong>at</strong>ional Conference on SecureS<strong>of</strong>tware Integr<strong>at</strong>ion and Reliability Improvement (SSIRI), Shanghai, China, July 2009.71. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, WI/IAT Conference, Milan, Italy September 2009.72. Trustworthy Semantic Webs, IEEE Conference on Inform<strong>at</strong>ion Reuse and Integr<strong>at</strong>ion, Las Vegas,NV, August 2009.73. D<strong>at</strong>a Security and Integrity: Developments and Directions, SIGKDD workshop on Intelligence andSecurity Inform<strong>at</strong>ics, Paris, France, June 2009.77


74. Building a Geosp<strong>at</strong>ial Semantic Web, 4th Intern<strong>at</strong>ional Conference on Frontier <strong>of</strong> Computer Scienceand Technology, Shanghai, China, December 2009.75. Assured Inform<strong>at</strong>ion Sharing: Opportunities and Challenges for Indo-US Collabor<strong>at</strong>ion, Presented <strong>at</strong>the Info-US Summit on Infrastructure Security, Bangalore, India, January 2010 (sponsored by NSFand IUSSTF).76. Secure Semantic Sensor Web and Pervasive Computing, keynote address, IEEE Intern<strong>at</strong>ionalConference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Newport Beach,CA, June 2010 (presented by Pr<strong>of</strong>. L<strong>at</strong>ifur Khan).77. Assured Inform<strong>at</strong>ion Sharing: Detecting Malicious Code, keynote address <strong>at</strong> the PAKDD PAISI,Hyderabad, India, June 2010.78. Assured Cloud Computing, keynote address, IEEE COMPSAC Conference Workshop on Securityand Privacy, Seoul, South Korea, July 2010.79. Building Trustworthy Semantic Web, IEEE Semantic Computing Conference, Pittsburgh, September2010 (Mini-keynote: special session with Pr<strong>of</strong>s. Tom Mitchell and Manuela M. Veloso).80. Cloud Computing, NIT Warangal, India. Technozion 2010, Video Keynote given from <strong>Dallas</strong> TX,September 2010.81. Secure Cloud D<strong>at</strong>a Management, CloudCom Security Workshop, November 2010, Indianapolis, IN.82. D<strong>at</strong>a Mining for Malware Detection, SDPS Annual Conference, Jeju Island, S. Korea, June 2011.83. D<strong>at</strong>a Mining for Malware Detection, European Intelligence and Security Inform<strong>at</strong>ics, September2011, Athens, Greece.84. D<strong>at</strong>a Mining for Malware Detection, DFW MetroCon, October 2011, Arlington, TX.85. Assured Cloud-based Inform<strong>at</strong>ion Sharing, IEEE Intern<strong>at</strong>ional Conference on Dependable,Autonomic and Secure Computing (DASC), December 2011, Sydney, Australia.II. PANEL PAPERS AND PRESENTATIONS(some present<strong>at</strong>ions published as proceeding papers)1. Inference Problem in D<strong>at</strong>abase Security, Panel present<strong>at</strong>ion <strong>at</strong> the 1st RADC D<strong>at</strong>abase SecurityWorkshop, (Chair: M. Morgenstern) 1988. Proceedings paper published by Springer Verlag, MeloPark, CA, 1992 (Editor: T. Lunt).2. Issues in Trusted Distributed D<strong>at</strong>abase Management Systems - A Position Paper, Proceedings <strong>of</strong> the13th N<strong>at</strong>ional Computer Security Conference, Washington DC, October 1990 (Chair: J. Campbell).3. Issues in Multilevel Secure Object-Oriented D<strong>at</strong>abase Management Systems - A Position Paper,Proceedings <strong>of</strong> the 13th N<strong>at</strong>ional Computer Security Conference, Washington, DC , October 1990(Chair: R. Sandhu).4. D<strong>at</strong>abase Security - Thre<strong>at</strong>s, Solutions, Designs and Products, Panel present<strong>at</strong>ion <strong>at</strong> the 6thIntern<strong>at</strong>ional D<strong>at</strong>a Engineering Conference, Los Angeles, CA, February 1990 (Chair: I. Kameny).78


5. Recent Developments in Some Trusted D<strong>at</strong>abase Management Systems, Proceedings <strong>of</strong> the 14thN<strong>at</strong>ional Computer Security Conference, Washington DC, October 1991 (Chair: J. Campbell).6. Approaches to Handling the Inference Problem, Proceedings <strong>of</strong> the 14th N<strong>at</strong>ional Computer SecurityConference, Washington DC, October 1991 (Chair: T. Lunt).7. Security Issues for Feder<strong>at</strong>ed D<strong>at</strong>abase Systems, Presented <strong>at</strong> the 5th IFIP WG 11.3 Conference onD<strong>at</strong>abase Security, November 1991, Proceedings by North Holland, 1992, Shepherdstown, WV(Chair: M. Morgenstern).8. Security Issues for Heterogeneous D<strong>at</strong>abase Systems, Presented <strong>at</strong> the 11th Phoenix IEEEIntern<strong>at</strong>ional Conference on Computers and Communic<strong>at</strong>ions, April 1992, Phoenix AZ (Chair: O.Sheng).9. Secure Distributed D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the 6th IFIP WG 11.3 Conference onD<strong>at</strong>abase Security, Vancouver, BC, Canada, August 1992 (Chair: C. McCollum).10. Approaches to Designing Trusted DBMSs, Presented <strong>at</strong> the 18th Intern<strong>at</strong>ional Conference on VeryLarge D<strong>at</strong>abases (VLDB), Vancouver, BC, Canada, August 1992 (Chair: M. Morgenstern).11. Object-oriented Approach to the Interoperability <strong>of</strong> Trusted D<strong>at</strong>abase Management Systems,Proceedings <strong>of</strong> the 16th N<strong>at</strong>ional Computer Security Conference, Baltimore, MD, September 1993(Chair: J. Williams).12. Integr<strong>at</strong>ing Object-oriented and Security Technologies, Panel Chair, OOPSLA Conference,Washington, DC, September 1993 (conference proceedings).13. Realtime Systems: From Research to Technology to Applic<strong>at</strong>ions, 2nd IEEE Real-time SystemsApplic<strong>at</strong>ions Workshop, Calverton, MD, July 1994 (Chair: Bob Harrison).14. Inference Problem, Panel Chair, 17th NCSC Conference, Baltimore, MD, October 1994 (paperpublished in the proceedings).15. Real-time and CORBA, Object World West, San Francisco, August 1995 (Chair: F. Kuhl -present<strong>at</strong>ion in proceedings).16. Real-time and CORBA , IEEE Workshop on Object-Oriented Real-time Systems, February 1996,Laguna Beach (Chair: R. Soley).17. Distributed Systems Standards, IEEE Distributed Systems Conference, Hong Kong, May 1996, panelpaper (Chair: R. Soley).18. Standards for ADADS, Panel <strong>at</strong> IEEE ISADS 1997, Berlin, Germany (Chair: K. Kim; paper inproceedings .19. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining Overview and Security, Panels <strong>at</strong> N<strong>at</strong>ional Computer SystemsSecurity Conference, October 1996, Baltimore, MD (Chairs: J. Campbell, J. Davis).20. D<strong>at</strong>a Mining, D<strong>at</strong>a Warehousing, and Security, Panel discussion, Proceedings IFIP D<strong>at</strong>abase SecurityWorkshop, 1997 (Chapman and Hall, 1998) (Chair).21. D<strong>at</strong>a Mining <strong>of</strong> Text and Images, Panel <strong>at</strong> MIT Media Lab Forum, October 1997, Boston, MA (Chair:N. Adam).79


22. Web D<strong>at</strong>a Mining, Inaugural Panel <strong>at</strong> IEEE ICTAI 97, November 1997, Newport Beach, CA (Chairs:Wei Syan Li, J. Srivastava)23. Multimedia D<strong>at</strong>a Mining, AFCEA Technet Panel, June 1997, (Chair: T. Nyland); also version <strong>at</strong>AFCEA D<strong>at</strong>a Mining Symposium Panel, December 1997, Washington, DC.24. CIO Conference on Object Security, FEDOOTS 1997, Washington DC (Chair).25. Privacy for D<strong>at</strong>a Mining and Web, Panel discussion, proceedings IFIP D<strong>at</strong>abase Security Conference,1998 (Book chapter by Kluwer) (Chair).26. Web and D<strong>at</strong>a Security, Panels <strong>at</strong> IEEE COMPSAC 1998 (Proceedings) Vienna, Austria (Chair).27. Web and D<strong>at</strong>a Security, IEEE D<strong>at</strong>a Engineering March 1999, Sydney, Australia (Chair).28. Migr<strong>at</strong>ing Legacy D<strong>at</strong>abases, IEEE D<strong>at</strong>a Engineering Conference, 1998 (Chair) (proceedings),Orlando, FL.29. Directions for S<strong>of</strong>tware Technology, IEEE COMPSAC Distinguished panel, 1998, Vienna, Austria(Chair: S. Yau).30. Ecommerce Directions, IEEE KDEX 1998, Taipei, Taiwan (Chair: J. Tsai).31. Future Research in Multimedia D<strong>at</strong>abase Semantics, IFIP 2.6 panel discussion, Rotarua, NewZealand, January 1999 (Chair).32. Open ADADS Systems, IEEE ISADS, Tokyo, March 1999 (Proceedings).33. Web and Network Security Panel, IEEE COMPSAC October 2000, Taipei, Taiwan (Chair).34. Web and Network Security, IEEE ISADS, March 2001, <strong>Dallas</strong>, TX (Chair).35. Real-time S<strong>of</strong>tware Engineering, ASSET, March 2000, <strong>Dallas</strong>, TX (Chair: I. Yen).36. D<strong>at</strong>a Mining, Protecting Children from Inappropri<strong>at</strong>e Content on Web, N<strong>at</strong>ional Academy <strong>of</strong>Sciences, July 2000, Washington DC, (Chair: R. Thornburgh, Former US Attorney General).37. D<strong>at</strong>a Fusion for Counter-terrorism, N<strong>at</strong>ional Academy <strong>of</strong> Sciences, June 2002 Washington DC,(Chair: G. Strong).38. D<strong>at</strong>a Security Directions, IFIP 11.3 Amsterdam, August 2000, <strong>The</strong> Netherlands, (Chair; proceedingsKluwer 2001).39. Directions for ISADS, Distinguished panel, IEEE ISADS, March 2001, <strong>Dallas</strong> TX (Chair: S. Yau).40. Secure Semantic Web, Future Distributed Computing Panel, IEEE FTDCS, November 2001, Bologna,Italy (Chair: S. Yau).41. D<strong>at</strong>a Integrity, IICIS Panel, November 2001, Proceedings Brussels, Belgium (Chair: L. Straus).42. XML Security Panel, IFIP 11.3 July 2001, Proceedings, Niagara, Canada (Chair: S. Osborne).43. Web Mining/Security Panel, April 2002 (SIAM D<strong>at</strong>a Mining Conf.) Crystal City/Washington DC.80


44. D<strong>at</strong>a Engineering Directions, IEEE D<strong>at</strong>a Engineering Plenary Panel, March 2002, San Jose, CA.45. D<strong>at</strong>abase Technologies, Security and Privacy Stanford <strong>University</strong> D<strong>at</strong>abase workshop, March 2002,Stanford, CA (Chair: J. Ullman).46. Privacy, IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions Conference, July 2002, Cambridge, UK, (Book chapter 2003,Chair: P. Samar<strong>at</strong>i).47. Cyber Security and Terrorism, Panel <strong>at</strong> the United N<strong>at</strong>ions Conference on Cyber Security, September2002, New York, (Chair: M. Lacey).48. ADADS for N<strong>at</strong>ional Security, Panel Paper, published Proceedings IEEE ISADS 2003 (Chair: L.Cordell; did not <strong>at</strong>tend conference due to another commitment <strong>at</strong> NSF).49. CRA-W Panel on Writing Career Proposals, CRA-W Workshop, San Diego, CA, June 2003.50. Privacy and D<strong>at</strong>a Mining: Friends or Foes? KDD Panel, Washington DC, August 2003 (Chair: R.Agrawal).51. Future <strong>of</strong> XML D<strong>at</strong>abases, Panel <strong>at</strong> XML D<strong>at</strong>a Workshop <strong>at</strong> EDBT, March 2004, Crete, Greece(Chair: M. Mastitis; position paper in Springer).52. D<strong>at</strong>abases for Virtual Organiz<strong>at</strong>ions, Panel <strong>at</strong> DIVO Workshop, ACM SIGMOD Conference, June2004, Paris, France,.53. Secure Web Services, Panel <strong>at</strong> IEEE Web Services Conference, July 2004, San Diego, CA.54. D<strong>at</strong>abase Security for Homeland Security, IFIP D<strong>at</strong>abase Security Conference, July 2004, Barcelona,Spain.55. Women and Cyber Security, Secure Knowledge Management Workshop, September 2004, Buffalo,NY.56. Sensor Inform<strong>at</strong>ion Management, MITRE Community Workshop, October 2005, McLean, VA.57. D<strong>at</strong>a Mining for Cyber Security, Collin County Security Conference, April 2006, Plano, TX.58. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, Plenary Panel, Inform<strong>at</strong>ion and Security Inform<strong>at</strong>ics, May2006, San Diego, CA.59. Directions in Access Control, ACM SACMAT, 2006, Lake Tahoe, CA (Chair: R. Sandhu).60. Security Engineering Educ<strong>at</strong>ion, Panel <strong>at</strong> IEEE COMPSAC Conference on S<strong>of</strong>tware EngineeringEduc<strong>at</strong>ion, September 2006, Chicago, IL (Chair: D. Simmons).61. Geosp<strong>at</strong>ial Semantic Web and Interoperability, OGC Interoperability Day, October 2006, Tyson’sCorner, VA.62. Inform<strong>at</strong>ion Security, DFW Chamber <strong>of</strong> Commerce, March 2007, <strong>Dallas</strong>, TX.63. Assured Inform<strong>at</strong>ion Sharing, ACM SACMAT June 2007, Sophia Antipolis, France (Chair).64. Inform<strong>at</strong>ion Security Educ<strong>at</strong>ion, S<strong>of</strong>tware Engineering and Computer Science, August 2007, <strong>Dallas</strong>,TX.81


65. Directions for Cyber Security, Panel <strong>at</strong> Cyber Security Symposium, Arizona St<strong>at</strong>e <strong>University</strong>, April2008, Tempe, AZ (Chair: S. Yau).66. Secure Distributed Systems, Panel IFIP D<strong>at</strong>a Security Conference, July 2008, London, UK(Proceedings) (Chair: S. Barker).67. Directions for Sensor and Pervasive Applic<strong>at</strong>ions, TRUST, December 2008, Shanghai, China, (Chair:S. Yau).68. Women in Cyber Security, Secure Knowledge Management Conference, November 2008, <strong>Dallas</strong>, TX(Chair).69. D<strong>at</strong>a Security for Outsourcing, DFW Outsourcing Associ<strong>at</strong>ion, January 2009, Addison, TX (Chair:Attorney Mr. Peter Vogel).70. Intelligence and Security Inform<strong>at</strong>ics, ISI, June 2009, <strong>Dallas</strong>, TX (Panel Chair).71. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Riend van der Riet Panel, IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityConference, 2009, Montreal, Canada (Panel Chair).72. Challenges <strong>of</strong> Effective Applic<strong>at</strong>ions <strong>of</strong> Cloud Computing, <strong>The</strong> 4th Intern<strong>at</strong>ional Conference onFrontier <strong>of</strong> Computer Science and Technology, December 2009, Shanghai, China (Chair: S. Yau).73. Challenges for COMPSAC, Plenary Panel, , July 2010, Seoul, S Korea (Chair: S. Yau)74. Challenges for ISI, July 2011, IEEE ISI, July 2011, Beijing, China (Panel Chair).75. Security for Cloud Computing, IEEE Intern<strong>at</strong>ional Workshop on Future Trends <strong>of</strong> DistributedComputing System (FTDCS) 2011, September 2011, Banff, Canada.III. CONFERENCE/WORKSHOP PRESENTATIONS (Informal or no Proceedings)D<strong>at</strong>a and Applic<strong>at</strong>ions Security1. M<strong>at</strong>hem<strong>at</strong>ical Formalisms for Multilevel Object-Oriented Systems, paper presented <strong>at</strong> the Workshopon Object-Oriented D<strong>at</strong>abase Security, April 1990, Karlshrue, West Germany.2. Neural Network Applic<strong>at</strong>ions in Intrusion Detection, paper distributed and presented <strong>at</strong> the 7thIntrusion Detection Workshop, May 1991, Menlo Park, CA (co-author: W. Ford).3. Secure Interoperability <strong>of</strong> Trusted D<strong>at</strong>abase Management Systems, Technical paper presented <strong>at</strong> theACM Workshop on D<strong>at</strong>a Management Security and Privacy Standards, December 1991, SanAntonio, TX, (Held in conjunction with the 7th IEEE Computer Security Applic<strong>at</strong>ions Conference).4. Object-oriented Approach to Interconnecting Trusted D<strong>at</strong>abase Management Systems, technicalpaper presented <strong>at</strong> the ACM Workshop on D<strong>at</strong>a Management Security and Privacy Standards,December 1992 , San Antonio, TX (Held in conjunction with the 8th IEEE Computer SecurityApplic<strong>at</strong>ions Conference) (co-author: H. Rubinovitz).5. Fuzzy Logic and Multilevel D<strong>at</strong>abases, presented <strong>at</strong> the 1st Boston Area Fuzzy Logic Workshop,February 1993.82


6. Towards a Global Multilevel D<strong>at</strong>a Model in a Secure Heterogeneous D<strong>at</strong>abase System, Presented <strong>at</strong>the TIMS/ORSA Conference, October 1993 (abstract in proceedings).7. Security and Integrity Constraint Processing in a Multilevel Secure Distributed Environment,Inform<strong>at</strong>ion Security for the 90s, AFCEA Conference, , May 1993, Ft. Monmouth, NJ (co-authors:A. Abreu, H. Rubinovitz, M. Collins).8. Technologies and Security Issues for the Semantic Web, D<strong>at</strong>a and Knowledge Engineering Workshop,May 2002, Sonoma, CA.9. Geosp<strong>at</strong>ial RDF and Secure GRDF, presented <strong>at</strong> the Geosp<strong>at</strong>ial Semantic Web workshop <strong>at</strong> SemanticWeb Symposium, Athens, GA, November 2006 (co-author: A. Ashraful).10. Building Trustworthy Geosp<strong>at</strong>ial Semantic Web, Geosp<strong>at</strong>ial Technologies in Homeland SecurityConference, November 2006, College St<strong>at</strong>ion, TX.11. Sensor and Geosp<strong>at</strong>ial D<strong>at</strong>a Management for Border P<strong>at</strong>rol and Crime Analysis, MITRE SensorCommunity Workshop, Poster Present<strong>at</strong>ion, May 2007, McLean, VA (co-authors: A. Ashraful, S.Shekar, K. Lhan, G. Subbiah).12. D<strong>at</strong>a Mining, Security and Privacy, Position Paper, NSF Workshop, September 2007, Arlington, VA.13. Security and Ontologies, Micros<strong>of</strong>t Workshop on Semantic Technologies, June 2007, Se<strong>at</strong>tle WA(co-author: K. Hamlen).14. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for Crime Analysis, Next Gener<strong>at</strong>ion D<strong>at</strong>a Mining Conference, October2007, Baltimore, MD (co-author: S. Shekhar et al).Distributed Systems Management/AI Applic<strong>at</strong>ions/Real-time Processing15. Transaction Management for Real-time Command and Control Systems, Paper distributed andpresented <strong>at</strong> ATMA, September 1996, Goa, India (co-author: P. Krupp, et al).16. RT-OMT: An Object-Oriented Design and Analysis Methodology for Real-time D<strong>at</strong>abase SystemsApplic<strong>at</strong>ions, Proceedings <strong>of</strong> the OOPSLA Conference Workshop on Object-Oriented Real-timeSystems Analysis, October 1994, Portland, OR (co-author: A. Schafer).17. Adaptable Real-time Command and Control Systems, Work in Progress Session, RTSS, 1998,Madrid, Spain (co-author: S. Wohlever et al) (paper in workshop report proceedings).IV. SIGNIFICANT EXTERNAL TECHNOLOGY EXCHANGE MEETINGS ANDPRESENTATIONS1. Algorithmic Inform<strong>at</strong>ion <strong>The</strong>ory, <strong>University</strong> <strong>of</strong> Minnesota, Seminar Series, February 1982.2. LDV: Design <strong>of</strong> a Secure D<strong>at</strong>abase System, RADC Technology Exchange, December 1987, Rome,NY.3. Trusted D<strong>at</strong>abase Management Systems: Where are we? Where should we go?, TechnologyExchange SPAWAR, Washington DC, February 1991, and NSA, March 1991, Ft. Meade, MD.83


4. Multilevel Security for Multimedia Systems, Technology Exchange SPAWAR, February 1991,Washington, DC, (co-presenters: H. Rubinovitz and M. Collins).5. Towards Developing SDDT: A Secure Distributed D<strong>at</strong>abase Testbed System, presented <strong>at</strong> the RomeLabor<strong>at</strong>ory Technology Exchange Meeting, November 1991, Rome, NY.6. Inference Problem in Secure D<strong>at</strong>abases, <strong>University</strong> <strong>of</strong> Connecticut, April 1992.7. Multilevel Security Impact on D<strong>at</strong>abase Management Systems Interface Standards, presented to theNext Gener<strong>at</strong>ion Computer Systems D<strong>at</strong>abase Management Systems Interface Standards WorkingGroup, , Newport, RI, June 1992 (co-presenter: A. Carengelo).8. Approaches to Designing Secure D<strong>at</strong>abase Systems, NGCR (Navy Next Gener<strong>at</strong>ion ComputingResources) Meeting, August 1992, San Diego, CA.9. Towards a Multilevel D<strong>at</strong>a Model, NGCR (Navy Next Gener<strong>at</strong>ion Computing Resources) Meeting,October 1992, Orlando, FL.10. Present<strong>at</strong>ions on Multilevel Security for Object-Oriented D<strong>at</strong>abase Systems; Security and IntegrityConstraint Processing in a Multilevel Secure Distributed Environment ; Applying OMT forMultilevel D<strong>at</strong>abase Applic<strong>at</strong>ion Design ; NSA Technology Exchange Conference, July 27, 1993, Ft.Meade, MD, (Proceedings) (co-authors: H. Rubinovitz, M. Collins, L. Binns, P. Sell).11. Transaction Processing for MDDS: Developments and Directions; Massive Digital D<strong>at</strong>a SystemsWorkshop (Community Management Staff) February 1 and 2, 1994, Reston, VA.12. RT-OMT: A Realtime Object Modeling Technique for Designing Real-time D<strong>at</strong>abase Applic<strong>at</strong>ions,presented to the Next Gener<strong>at</strong>ion Computer Systems D<strong>at</strong>abase Management Systems InterfaceStandards Working Group, April 1994, Alexandria, VA (also presented to OMG in Helsinki, July1998).13. Real-time Processing and CORBA, presented <strong>at</strong> the Next Gener<strong>at</strong>ion Computer Systems, D<strong>at</strong>abaseManagement Systems Interface Standards Working Group, June 1994, Newport, RI; a version givenas a guest present<strong>at</strong>ion <strong>at</strong> the Department <strong>of</strong> the Navy NRaD's Distributed Systems TechnologyConference, March 1995 (San Diego).14. Evolvable Real-time C3 Systems Initi<strong>at</strong>ive, Navy SPAWAR, San Diego, August 1994; RomeLabor<strong>at</strong>ory Technology Exchange Meeting, Rome, NY, October 1994; NGCR Meeting, Salt LakeCity, November 1994; enhanced versions <strong>at</strong> Ministry <strong>of</strong> Defense, Adelaide-Australia 1996; INRIA,Sophia Antipolis-France, November 1996; <strong>University</strong> <strong>of</strong> Kyoto, April 1997; EPFL Lausanne-Switzerland, May 1998; N<strong>at</strong>ional <strong>University</strong> <strong>of</strong> Singapore, May 1999.15. Massive Digital D<strong>at</strong>a Systems, Rome Lab Workshop, Boston, October 1995; INRIA, Paris-FranceNovember 1996; NEC Research Labs, San Jose, April 1997; HPCC, Maui, May 1998; <strong>University</strong> <strong>of</strong>Rhode Island, June 1996; N<strong>at</strong>ional <strong>University</strong> <strong>of</strong> Singapore, August 1997; Tokyo Institute <strong>of</strong>Technology, May 1999; Hiroshima <strong>University</strong>, April 1998.16. Real-time D<strong>at</strong>abase Management: IEEE Computer Society, Special Present<strong>at</strong>ion, Boston ChapterJanuary 1996; version also given in Madrid, Spain <strong>at</strong> OMG Meeting, July 1996.17. Internet D<strong>at</strong>abase Management, OMG Meeting, Internet SIG, June 1996, Washington DC.18. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining and Security (version <strong>of</strong> IFIP 1996 keynote), seminars <strong>at</strong> IBMZurich and <strong>University</strong> <strong>of</strong> Zurich (Switzerland), 1996.84


19. Object Technology for C4I Applic<strong>at</strong>ions, kick<strong>of</strong>f present<strong>at</strong>ion <strong>at</strong> OMG Meeting C4I FoundingWorking Group, June 1996, Washington DC.20. Real-time Object Modeling, OMG Meeting, July 1998, Helsinki.21. D<strong>at</strong>a Mining, <strong>University</strong> <strong>of</strong> Cambridge, 1999, <strong>University</strong> <strong>of</strong> Stockholm 1999, IEEE Lecture <strong>at</strong> MIT2000, <strong>University</strong> <strong>of</strong> Wales, UK, 2001.22. Directions for Securing Semantic Web Technologies, NSF-EU Workshop on Semantic Web (SophiaAntipolis, France), October 2001. Also version presented <strong>at</strong> NSF workshop on Semantic Web, March2002, Amicalola, GA.23. Research Directions in D<strong>at</strong>a Management, NSF EPSCOR Conference, <strong>University</strong> <strong>of</strong> Arkansas(November 2001, Little Rock), Louisiana St<strong>at</strong>e <strong>University</strong> (April 2002, B<strong>at</strong>on Rouge).24. Seminars on D<strong>at</strong>a and Applic<strong>at</strong>ions Security and XML Security, Wright St<strong>at</strong>e <strong>University</strong>, February2003; <strong>University</strong> <strong>of</strong> Illinois, Urbana, Champagne, April 2003; George Mason <strong>University</strong>, April 2003;<strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, November 2003; <strong>University</strong> <strong>of</strong> Minnesota, December 2003.25. Directions for Research in D<strong>at</strong>a and Applic<strong>at</strong>ions Security and CyberTrust, New England D<strong>at</strong>abaseMeeting, September 2003.26. D<strong>at</strong>a and Applic<strong>at</strong>ions Security and Discovery Inform<strong>at</strong>ics, Seminar series kick<strong>of</strong>f present<strong>at</strong>ion, JohnsHopkins <strong>University</strong>, October 2003.27. Computer and Inform<strong>at</strong>ion Science <strong>at</strong> NSF, NSF EPSCOR Conference, <strong>University</strong> <strong>of</strong> Oklahoma,January 2004.28. Third Party Public<strong>at</strong>ions <strong>of</strong> XML Documents, Seminar series, Ohio St<strong>at</strong>e <strong>University</strong>, January 2004;<strong>University</strong> <strong>of</strong> California <strong>at</strong> Riverside January 2004; Penn St<strong>at</strong>e <strong>University</strong>, April 2004; <strong>The</strong> MITRECorpor<strong>at</strong>ion, March 2005.29. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, Plano Security Symposium, April 2005, Plano, TX.30. D<strong>at</strong>a Mining for Counter-terrorism, IEEE <strong>Dallas</strong> Chapter Present<strong>at</strong>ion, February 2005, <strong>Dallas</strong>, TX.31. D<strong>at</strong>a Mining for Cyber Security, ACM <strong>Dallas</strong> Chapter Present<strong>at</strong>ion, April 2005, <strong>Dallas</strong>, TX.32. D<strong>at</strong>a Mining, Security and Civil Liberties, present<strong>at</strong>ion to N<strong>at</strong>ional White Collar Crime Center, June2005, TX.33. Confidentiality, Privacy and Trust for the Semantic Web, <strong>The</strong> MITRE Corpor<strong>at</strong>ion, November 2005.Bedford, MA.34. D<strong>at</strong>a Security Research <strong>at</strong> UTD, Raytheon Corpor<strong>at</strong>ion, January 2006, Richardson, TX.35. D<strong>at</strong>a Mining for Security and Counter-terrorism, CIA Seminar Series, May 2006 (CIAHeadquarters)VA.36. Inform<strong>at</strong>ion Oper<strong>at</strong>ions: Assured Inform<strong>at</strong>ion Sharing, AFOSR Technology Exchange Conference,August 2006, Utica, NY; June 2007, Syracuse, NY; June 2008, Washington DC.37. Intellectual Property Protection, NAFTA Meeting, December 2006, <strong>Dallas</strong>, TX.85


38. Geosp<strong>at</strong>ial Semantic Web, OGC Interoperability Working Group, October 2006, Tyson’s Corner,VA.39. Geosp<strong>at</strong>ial RDF (with A. Ashraful), W3C Working Group on Geosp<strong>at</strong>ial D<strong>at</strong>a, October 2006,Teleconference meeting (from <strong>Dallas</strong> TX).40. D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Malicious Code Detection and Security, Seminar series, <strong>University</strong><strong>of</strong> North <strong>Texas</strong>, November 2006; <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> Arlington, December 2006.41. D<strong>at</strong>a Mining for Buffer Overflow, Seminar series, Purdue <strong>University</strong> (February 2007); Polytechnic<strong>University</strong> New York, August 2007.42. D<strong>at</strong>a Security Research <strong>at</strong> UTD, Navy SPAWAR, August 2007, San Diego.43. Digital Forensics, SWE UT <strong>Dallas</strong> Chapter Meeting, October 4, 2007, <strong>Dallas</strong>, TX.44. Digital Forensics, ACM UT <strong>Dallas</strong> Chapter Meeting, October 25, 2007, <strong>Dallas</strong>, TX.45. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, SWE <strong>Dallas</strong> TX Chapter Meeting, February 2008, <strong>Dallas</strong>, TX.46. Semantic Web Research <strong>at</strong> UT <strong>Dallas</strong>. IARPA KDD Workshop, February 2008, Oakridge, TN.47. Blackbook Experiences, RDEC User Conference, May 2008, San Diego, CA.48. Assured Inform<strong>at</strong>ion Requirements G<strong>at</strong>hering, DoD MURI Program Review, September 2008,Baltimore, MD.49. Assured Inform<strong>at</strong>ion Sharing, Seminar <strong>at</strong> N<strong>at</strong>ional <strong>University</strong> <strong>of</strong> Singapore, October 2008; <strong>University</strong><strong>of</strong> Penang, October 2008.50. Managing Large RDF Graphs, IARPA KDD Workshop, December 2008, Oakridge, TN.51. Knowledge Discovery and Security Inform<strong>at</strong>ics, SAP Labs, Sophia Antipolis, France, May 2009;Rockwell Collins, Richardson, March 2009.52. Secure Semantic Grid, AFOSR Program Review, June 2009, Washington DC.53. D<strong>at</strong>a Mining and Security, Micros<strong>of</strong>t Invit<strong>at</strong>ional Workshop in D<strong>at</strong>a for Interdisciplinary Research,September 2009, Se<strong>at</strong>tle, WA.54. Inform<strong>at</strong>ion and Security Analytics <strong>at</strong> UTD, present<strong>at</strong>ion <strong>at</strong> Wright St<strong>at</strong>e <strong>University</strong>, November 2009,Dayton, OH.55. Cyber Security Research and Educ<strong>at</strong>ion <strong>at</strong> UTD, Mississippi St<strong>at</strong>e <strong>University</strong>, January 2010.56. D<strong>at</strong>a Mining for Malware Detection, <strong>University</strong> <strong>of</strong> Arizona, February 2010.57. <strong>Dallas</strong> – Ideal city for a technology conference, Presented to the IEEE D<strong>at</strong>a Engineering SteeringCommittee, March 2010 (co-author: Rhonda Walls).58. Assured Inform<strong>at</strong>ion Sharing: Malicious Code Detection, <strong>University</strong> <strong>of</strong> Louisville, Kentucky, March2010.86


59. Assured Cloud Computing, AFOSR Review, July 2010, Arlington, VA.60. D<strong>at</strong>a Mining for Malware Detection, DFW ATW, June 2011, <strong>Dallas</strong>, TX.61. Inform<strong>at</strong>ion Sharing on the Cloud, AFOSR Review, September 2011, Arlington, VA.V. MITRE SYMPOSIA AND TECHNOLOGY EXCHANGE MEETINGS1. Security in Object-Oriented D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Symposium on Object-Oriented Technology, April 1990, Bedford, MA (Proceedings published in Technical Report, MTP382; Editor: D. Grigaro).2. Issues in Object-Oriented D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Managers' Symposium onSupercomputing, May 1990, McLean, VA (Proceedings Editor: L. Zeitlsler).3. Parallel Processing and Trusted D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the 5th MITRESymposium on Parallel Processing, May 1991, Bedford, MA.4. An Overview <strong>of</strong> Parallel D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the 7th MITRE Symposium onParallel Processing, April 22, 1993, Bedford, MA.5. Object-oriented D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the Object-oriented Technology Day,(Bedford, MA) October 7, 1993 and (McLean, VA) March 15, 1994.6. Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems, Presented <strong>at</strong> the 1 st MITRE Technology Symposium, June15, 1994, McLean, VA, (co-author: M. Zemankova, proceedings).7. D<strong>at</strong>a Management for Workflow Computing, Presented <strong>at</strong> the MITRE Symposium on D<strong>at</strong>abases forthe 90s, June 16, 1994, McLean, VA (Abstract and present<strong>at</strong>ion in proceedings; co-author: B.Lavender).8. Proceedings <strong>of</strong> the 1st Applied D<strong>at</strong>abase Technology Day, August 1994 (co-editor: C. Loizides – alsoco-chaired 2nd symposium, December 1995).9. MITRE's Role in Real-time Systems, presented <strong>at</strong> the panel on Real-time Systems, Real-time SystemsTechnology Day, September 1994 (Chair: J. Knobel).10. Real-time D<strong>at</strong>abase Management Systems, presented <strong>at</strong> the Advanced Inform<strong>at</strong>ion SystemsTechnology Day, February 1995 (Chair: M. Maybury).11. MITRE's Role in Parallel D<strong>at</strong>abase Systems, presented <strong>at</strong> the Parallel Processing Symposium, 1995.12. Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE; Proceedings <strong>of</strong> the MITRE D<strong>at</strong>aManagement Symposium, June 1995.13. Intelligence Community Massive Digital D<strong>at</strong>a Systems, MITRE McLean, November 1995, MITREFort Monmouth, May 1996, MITRE San Diego, March 1998.14. Massive and Heterogeneous D<strong>at</strong>a, Massive D<strong>at</strong>a and Inform<strong>at</strong>ion Systems Umbrella; Massive DigitalD<strong>at</strong>a Systems Initi<strong>at</strong>ive, poster present<strong>at</strong>ions <strong>at</strong> the 2nd MITRE Technology Symposium, 20 June1995 (Bedford, MA) and 27 June 1995 (McLean, VA); Plenary present<strong>at</strong>ions also presented <strong>at</strong> 1996MITRE Technology Symposium, Bedford (11 June 1996), Reston (25 June 1996).87


15. Evolvable Interoperable Inform<strong>at</strong>ion Systems Thrust, MITRE Technology Symposium, 11 June 1996(Bedford), 25 June 1996 (Reston) Proceedings, version also <strong>at</strong> 1997 symposia (June 1997).16. Proceedings <strong>of</strong> the 1st MITRE Object-Oriented Technology Conference, Welcome address, June 1996(co-editor: T. Mowbray).17. Privacy, MITRE Technical Exchange, April 2003.18. Cyber Security Roadmap, MITRE Technical Exchange, June 2009.VI. TUTORIALSConference Tutorials1. Recent Developments in D<strong>at</strong>abase Security, presented <strong>at</strong> the 14th Annual Computer SecurityConferences Workshops, Anaheim, CA, November 1987; lecture notes published in the tutorialproceedings; enhanced version published in the IEEE COMPSAC Conference Tutorial Proceedings,November 1989, Orlando, FL.2. Multilevel Secure D<strong>at</strong>abase Management Systems, presented <strong>at</strong> the AFCEA Conference Tutorials, ,August 1993, Princeton, NJ (lecture notes published in the tutorial proceedings).3. A Tutorial in Object-Oriented D<strong>at</strong>abase Systems, presented <strong>at</strong> the IEEE Dual Use TechnologyConference, May 1994, Utica, NY.4. D<strong>at</strong>a Mining, ACM SAC, March 1998, Atlanta, GA.5. D<strong>at</strong>a Mining, IEEE COMPSAC, August 1998, Vienna, Austria.6. D<strong>at</strong>a Mining, IEEE ANNIE, November 1999, St Louis, Missouri.7. Web Inform<strong>at</strong>ion Management and Ecommerce, IEEE ISADS, March 1999, Tokyo, Japan.8. Web Inform<strong>at</strong>ion Management and Ecommerce IEEE COMPSAC, October 1999, Tempe, AZ.9. D<strong>at</strong>a Mining Technologies and Applic<strong>at</strong>ions in Counter-terrorism, Technet, May 2003, Washington,DC.10. D<strong>at</strong>a Mining Technologies and Applic<strong>at</strong>ions in Counter-terrorism, Technet, May 2004, Washington,DC.11. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, TechNet, May 2005, Washington DC.12. D<strong>at</strong>a Mining for Intern<strong>at</strong>ional Security, ISI Workshop, June 2010, Mysore, India.Department <strong>of</strong> Defense and Other Agencies1. A Tutorial in D<strong>at</strong>abase System and D<strong>at</strong>abase System Security, A three full- day tutorial presented tothe U.S. Army CECOM, Ft. Monmouth (August 1992, January 1993), and Dept. <strong>of</strong> the NavySPAWAR, Washington D.C. (February 1993).88


2. A Seminar on Secure D<strong>at</strong>abase System, Full-day tutorial presented to the Dept. <strong>of</strong> the NavyNCCOSC, San Diego (January 1993, June 1993); Versions also presented to the U.S. Air ForceAFCSC (June, August, September, 1991 - San Antonio, TX).3. A Seminar in Object-Oriented DBMS , Full day-tutorial presented to the Department <strong>of</strong> the NavyNCCOSC, San Diego, June 1993; U.S. Army, CECOM, Ft. Monmouth, April 1994; DISANovember 1994; NSA April 1995.4. A Seminar in Distributed and Heterogeneous DBMS, Full-day tutorial presented to the Department <strong>of</strong>the Navy NCCOSC, San Diego, June 1993; U.S. Army, CECOM, Ft. Monmouth, April 1994; DISA,November 1994.5. A Seminar in Real-time DBMS, Presented to U.S. Army, CECOM, Ft. Monmouth, N.J., April 1994.6. A Tutorial in D<strong>at</strong>abase Management Systems, series <strong>of</strong> seven lectures given <strong>at</strong> ESC <strong>University</strong>,Hanscom AFB, Bedford, MA, September 1994 - April 1995 (Introduction, Rel<strong>at</strong>ional, Object-Oriented, Distributed, Heterogeneous DBMS, Real-time, Intelligent D<strong>at</strong>a Management/D<strong>at</strong>a Mining).7. D<strong>at</strong>a Mining, Developments and Challenges, July 1998, San Antonio (AIA), and Stuttgart (Eucom).(versions given to many govt. organiz<strong>at</strong>ions).8. D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion, AFCEA (Three days) June 1999,September 1998, DISA-DARPA-JPO (One day) September 1999.9. D<strong>at</strong>a Management, D<strong>at</strong>a Mining and E-Commerce, AFCEA, October 2000 (Three days).10. D<strong>at</strong>a Management, Inform<strong>at</strong>ion Management and Knowledge Management, AFCEA October 2001,also versions <strong>at</strong> AFCEA October 2002, October 2003, September 2004, October 2005 (Air ForceBases: October 2004 - Offut, March 2005 - Eglin, August 2005 - Lackland, June 2006 – Edwards,September 2006 - Kirkland).11. D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Counter-terrorism, AFCEA June 2003, December 2003, December2004, March 2006 (Three days) , December 2006, November 2007, May 2007, November 2007,November 2008, June 2010 (enhanced version <strong>of</strong> Technet present<strong>at</strong>ion).12. Knowledge Management, Semantic Web and Social Networks, AFCEA April 2008, October 2009,April 2010, October 2010.MITRE Tutorials (excludes informal tutorial present<strong>at</strong>ions <strong>at</strong> MITRE)1. D<strong>at</strong>abase Security, presented <strong>at</strong> the MITRE Institute, February 1990, Bedford, MA (co-presenter: R.Graubart; lecture notes and videotape).2. D<strong>at</strong>abase Systems and D<strong>at</strong>abase Systems Security, presented <strong>at</strong> the MITRE Institute, January 1992Bedford, MA (lecture notes and two videotapes).3. A Seminar In Object-Oriented D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Institute, April 21, 1993,Bedford, MA, (five videotapes and lecture notes); March 14, 1994,McLean, VA,.4. A Seminar In Distributed and Heterogeneous D<strong>at</strong>abase Systems, presented <strong>at</strong> the MITRE Institute,June 3, 1993, Bedford, MA, (videotapes and lecture notes), March 15, 1994, McLean, VA.5. A Course in D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the MITRE Institute, Bedford, MA, Fall1992 and Fall 1993 (videotapes and lecture notes available).89


6. A Seminar on Real-time D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Institute, June 13, 1994,Bedford, MA (videotapes and lecture notes available).7. A Three Day Seminar on D<strong>at</strong>abase Systems, Presented <strong>at</strong> the MITRE Institute, September 1996, Ft.Monmouth, NJ.8. D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion, MITRE Institute, Washington, ColoradoSprings, Bedford and Ft. Monmouth, 1997, Colorado Springs, 1998, Bedford and Washington, 1999.9. D<strong>at</strong>a Mining, Bedford, and DC, (video tapes and notes) May 1998, Bedford and Washington,November 1999, Colorado Springs, March 2000.VII. <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> Conference Present<strong>at</strong>ions (Sample)1. D<strong>at</strong>a and Applic<strong>at</strong>ions Security <strong>at</strong> the <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>,Eric Jonsson School Advisory Board Present<strong>at</strong>ions, October 2004, April 2005, April 2006, November2006; <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, Research Advisory Board, April 2006.2. D<strong>at</strong>a Mining for Security, FBI Symposium, March 2006.3. First UTD Cyber Security Symposium, Program Chair, April 2005.4. Critical Infrastructure Protection, Department <strong>of</strong> Energy Symposium, January 2006.5. UTD/OGC Joint Meeting on Geosp<strong>at</strong>ial Inform<strong>at</strong>ion Management, July 2006.6. D<strong>at</strong>a Mining for Cyber Security and N<strong>at</strong>ional Security, (co-authors: L. Khan, R. Layfield), N<strong>at</strong>ionalWhite Collar Crime Conference, March 2007.7. Secure Collabor<strong>at</strong>ion, NSA/DHS COE Conference <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, June 2008.90


VIII. <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> Present<strong>at</strong>ions to Visitors to UTDKnowledge Discovery and Security Inform<strong>at</strong>ics <strong>at</strong> UTD Open Geosp<strong>at</strong>ial Consortium, April 2006 Raytheon Corpor<strong>at</strong>ion, October 2004, September 2006 Freshman Class, August 2007 IARPA, September 2007 IAB Meeting, October 2004, May 2005, September 2006, November 2008 DFW Teachers, June 2009 Lockheed Martin, January 2010 L-3 Communic<strong>at</strong>ions, January 2010 Ball Aerospace, February 2010, June 2010 Rockwell Collins, March 2009, September 2010 Saffron Group, January 2011 Bluew<strong>at</strong>er Intern<strong>at</strong>ional, September 201191


Section 14. SOFTWARE PROTOTYPES DEVELOPEDControl D<strong>at</strong>a Corpor<strong>at</strong>ionCDCNET, 1983 – 1986Transport, Session and Network Layers as well as Memory Management Algorithms and CommandProcessors for CDCNET. Release 1 December 1985Approx 60 members in the CDCNET TeamHoneywell Inc.1. Lock D<strong>at</strong>a Views, 1986 – 1988Paul Stachour, Bhavani Thuraisingham, P<strong>at</strong> Dwyer, Emmanuel Onuegbe, Tom Haigh, Dick O’BrienDesigned a Multilevel Secure Rel<strong>at</strong>ional D<strong>at</strong>abase System Design Contract from RADC(implement<strong>at</strong>ion contract was awarded to Honeywell using Oracle in 1989, but I did not work on this.)2. Distributed D<strong>at</strong>a Dictionary System, 1986 – 1987Krishna Mikkilineni, Hongjun Lu, Bhavani Thuraisingham, Cho-Li HoDesigned and implemented a system for Honeywell Divisions using NIST IRDS System.3. Network Oper<strong>at</strong>ing System, 1987Bhavani Thuraisingham, Tammy Chan, P<strong>at</strong> GoniaDesigned a Network Oper<strong>at</strong>ing System as part <strong>of</strong> MCNIU network for NASA (implement<strong>at</strong>ioncontract was also awarded, but I did not work on this.)4. XIMKON, 1988 – 1989Ferit Konar, Paul Felix, Bhavani ThuraisinghamDesigned and implemented an expert process control system.<strong>The</strong> MITRE Corpor<strong>at</strong>ionSecure D<strong>at</strong>a Management1. Multilevel Secure D<strong>at</strong>a Management System, 1989Amiel Kamon, Bhavani ThuraisingjamPrototype system developed using Sybase for the backend system and SUN Unix for front-end.Security <strong>at</strong> the front-end was simul<strong>at</strong>ed.2. Inference Control during Query Processing, 1989 – 1990William Ford, Bhavani Thuraisingham, Jon<strong>at</strong>han O’KeeffeSecure Sybase running on Ultrix for MLS/DBMS and built inference controller for query processingas an applic<strong>at</strong>ion.3. Inference Control during Upd<strong>at</strong>e Processing,1990Marie Collins, Bhavani ThuraisinghamSecure Sybase running on Ultrix for MLS/DBMS and built inference controller for upd<strong>at</strong>e processingwas built as an applic<strong>at</strong>ion.4. Inference Control during D<strong>at</strong>abase Design, 1993 – 1994Marie Collins, Bhavani ThuraisinghamUsed CLIPS expert system and implemented in COOL.92


5. Secure Distributed Query Processing, 1989 – 1991Harvey Rubinovitz, Bhavani ThuraisinghamBuilt Secure Distributed Processor DQP th<strong>at</strong> connected multiple Secure Sybase Server running onUltrix oper<strong>at</strong>ing system.6. Simul<strong>at</strong>ion <strong>of</strong> Secure Transaction Processing, 1990 – 1992Harvey Rubinovitz and Bhavani ThuraisinghamSimul<strong>at</strong>ion tool was developed to simul<strong>at</strong>e multiple secure concurrency control algorithms andcompare performance.7. Multilevel Secure Multimedia System, 1990 – 1991Marie Collins, Harvey Rubinovitz and Bhavani ThuraisinghamImplemented a multilevel multimedia system on the MAC environment. Simul<strong>at</strong>ed security fe<strong>at</strong>uresfor text image, audio, anim<strong>at</strong>ion and video.8. Multilevel Secure Object System, 1991Harvey Rubinovitz and Bhavani ThuraisinghamSimul<strong>at</strong>ed security fe<strong>at</strong>ures for Object Store Object DBMS. Implement<strong>at</strong>ion in C++.9. Distributed Secure Query Constraint Processor, 1991 – 1993Harvey Rubinovitz, Bhavani Thuraisingham, David FotiUtilized the DQP and built a distributed inference controller for query processing. Utilized SecureSybase Server on Ultrix.10. Distributed Secure Upd<strong>at</strong>e Constraint processor, 1992 – 1993Harvey Urbanity and Bhavani ThuraisinghamUtilized the Distributed Upd<strong>at</strong>e Processor and built an Inference Controller for processing upd<strong>at</strong>es,1991 – 1993.11. Secure Distributed Processor for Army Applic<strong>at</strong>ions, 1994 – 1996Harvey Rubinovitz, Marie Collins and Bhavani Thuraisingham,Implemented a system with Army MCS applic<strong>at</strong>ion utilizing the distributed constraint processor .Real-time Infrastructure and D<strong>at</strong>a Manager12. Active Real-time D<strong>at</strong>a Manager, 1994Gary Gengo, Bhavani ThuraisinghamUsing ZIP-RTDBMS, built a rule processor for processing rules in real-time.13. Infrastructure for Real-time Applic<strong>at</strong>ions, 1994 – 1996Peter Krupp, Bhavani Thuraisingham, John Maurer, Mike SquadritoDeveloped an ORB-based infrastructure on Lynx oper<strong>at</strong>ing system for command and controlapplic<strong>at</strong>ions with AWACS as an example.14. Real-time Main Memory D<strong>at</strong>a Manager, 1995 – 1996Mike Squadrito, Victor Wolfe, Bhavani Thuraisingham, Peter KruppDeveloped a main memory d<strong>at</strong>a manager and concurrency control algorithms for real-timeapplic<strong>at</strong>ions hosted on the infrastructure.15. Adaptive Real-time Infrastructure, 1997 – 1999Mike Squadrito, Roman Ginis, Peter Krupp, Bhavani ThuraisinghamDesigned and implemented an adaptive component based infrastructure for real-time applic<strong>at</strong>ions.93


Advisor to the following prototypes developed by members <strong>of</strong> my department in D<strong>at</strong>a Mining.Distributed Objects and Multimedia Inform<strong>at</strong>ion Management16. Text D<strong>at</strong>a Mining ToolPI: C. Clifton17. Image Mining ToolPI: C. Clifton18. Broadcast News Navig<strong>at</strong>ion SystemPI: A. Merlino19. Distributed Object Management for Legacy System Migr<strong>at</strong>ionPI: E. Hughes<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>D<strong>at</strong>a Mining Tools1. Suspicious Event Detection and Surveillance, 2004 – 2005Gal Lavee, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanDeveloped a system for detecting suspicious events. Developed a distance m<strong>at</strong>rix to identify eventsth<strong>at</strong> are similar.2. D<strong>at</strong>a Mining Toolkit for Malware Detection, 2005 – 2009Mehedy Masud, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped d<strong>at</strong>a mining algorithms using WEKA and other tools to detect buffer overflow, andmalicious code.3. Stream Mining Tools, 2008 – 2009Mehedy Masud, L<strong>at</strong>ifur Khan, Bhavani Thuraisingham with Jiawei Han et al.Developed a stream mining algorithm for novel class detection.Inform<strong>at</strong>ion Sharing, Privacy, and Policy Management4. Assured Inform<strong>at</strong>ion Sharing, 2007 – 2008Yashaswini Harshakumar, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanUsing Oracle d<strong>at</strong>abase systems and XACML policies implemented assured inform<strong>at</strong>ion sharingprototype.5. Assured Inform<strong>at</strong>ion Sharing Simul<strong>at</strong>ion, 2005 – 2006Mamoun Awad, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamSimul<strong>at</strong>ed policy management in inform<strong>at</strong>ion sharing algorithms and determined the amount <strong>of</strong>inform<strong>at</strong>ion th<strong>at</strong> would be lost by enforcing policies. This would give guidance to the decision makers<strong>of</strong> the policies th<strong>at</strong> need to be enforced.6. Trust Management in Inform<strong>at</strong>ion Sharing, Simul<strong>at</strong>ion, 2006 – 2007R. Srinivasan and B. ThuraisinghamComputes trust and shares inform<strong>at</strong>ion based on trust values.7. Game <strong>The</strong>ory-based Algorithms for Biosecurity, 2005 – 2008Ryan Layfield, Mur<strong>at</strong> Kantarcioglu, Bhavani Thuraisingham94


Simul<strong>at</strong>ed algorithms for inform<strong>at</strong>ion sharing using game theory concepts for bioterrorism and insecurity.8. Privacy Preserving Decision Tree, 2005 – 2007Li Liu, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamDeveloped a tool based on decision tree for privacy preserving d<strong>at</strong>a mining.9. Security for Motion Capture and Anim<strong>at</strong>ion, 2008R. N<strong>at</strong>arajan, B. Thuraisingham, L. Khan, and B. PrabhakaranPrototype system th<strong>at</strong> builds a front-end to perform query rewriting for motion capture d<strong>at</strong>aGeosp<strong>at</strong>ial Inform<strong>at</strong>ion Management10. Geosp<strong>at</strong>ial Policy Interoperability, 2006 – 2007Alam Ashraful, Farhan Husain, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDevelop a prototype for implementing security policies in heterogeneous geosp<strong>at</strong>ial d<strong>at</strong>a managementsystems.11. Police Blotter Prototype, 2006Farhan Husain, L<strong>at</strong>ifur Khan, A. Ashraful, Bhavani Thuraisingham, Steven SeidaThis system, jointly developed with Raytheon, essentially is an advisory tool for police to loc<strong>at</strong>e wherethe criminals are. <strong>The</strong> system was demonstr<strong>at</strong>ed <strong>at</strong> GEOINT.12. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining, 2006 – 2007Chuan Li, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped tool for classifying geosp<strong>at</strong>ial d<strong>at</strong>a.13. Ontology Alignment in Geosp<strong>at</strong>ial D<strong>at</strong>a, 2007 – 2009Jeff Partyka, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped ontology alignment algorithms for integr<strong>at</strong>ing heterogeneous geosp<strong>at</strong>ial d<strong>at</strong>abase systems.<strong>The</strong> algorithms were integr<strong>at</strong>ed into Intelligence Community’s Blackbook.Semantic Web, Web Services and Security14. Transl<strong>at</strong>ors and Mappings from Rel<strong>at</strong>ional to RDF D<strong>at</strong>a and Vice Versa, 2007 – 2009Sunitha Sriram, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped a tool for use by rel<strong>at</strong>ional d<strong>at</strong>abase users and RDF users to carry out transl<strong>at</strong>ions. Tool willbe distributed to external users.15. Inference Controller for Semantic Web, 2009Tyrone Cadenhead, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamPrototype developed for Policy Management using descriptive logic based inference controller.16. Geosp<strong>at</strong>ial Semantic Web, 2006 – 2007Ganesh Subbiah, L<strong>at</strong>ifur Khan, Bhavani Thuraisingham, Alam AshrafulDeveloped a system called DAGIS to answer geosp<strong>at</strong>ial semantic queries. Implemented an accesscontrol module for DAGIS.17. Secure Web Services, 2007 – 2010Wei-She, I-Ling Yen, Bhavani ThuraisinghamImplemented a deleg<strong>at</strong>ion model for secure web services.95


Biometrics18. Implement<strong>at</strong>ion <strong>of</strong> Fingerprinting Algorithms, 2006 – 2007Abinanthan, Bhavani ThuraisinghamImplemented a novel fingerprinting m<strong>at</strong>ching algorithm and associ<strong>at</strong>ed system.19. Face Detection Algorithms, 2006 – 2007Parveen Pallabi and Bhavani ThuraisinghamDeveloped a system th<strong>at</strong> detects facial fe<strong>at</strong>ures using neural networks. <strong>The</strong> algorithm combines SVMand ANN and uses Dempster-Shafer theory for fusing the results.Social Networks and Security20. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, 2005 – 2006Ryan Layfield, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanDeveloped a prototype secure social network system and analyzed the properties using the Enron d<strong>at</strong>aset.21. Access Control Model for Social Networks, 2009 – 2010Raymond We<strong>at</strong>herly, Mur<strong>at</strong> Kantarcioglu, Barbara Carmin<strong>at</strong>i, Elena FerrariPrototype developed for a system <strong>of</strong> a secure social network using a novel access control model.22. TweetHood, 2010 – PresentS<strong>at</strong>yen Abrol, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamLoc<strong>at</strong>ion-aware tweet mining.Cloud D<strong>at</strong>a Management and Security23. Feder<strong>at</strong>ed Query Processing in Clouds, 2008 – 2009Farhan Husain, Pankil Doshi, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped a cloud computing pl<strong>at</strong>form with Hadoop and MapReduce and implemented securefeder<strong>at</strong>ed query processing and optimiz<strong>at</strong>ion algorithms on top <strong>of</strong> this pl<strong>at</strong>form.24. Secure Query Processing in Cloud with HIVE, 2009 – 2010Vaibhav Khadilkar, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamThis system is a query rewriting system th<strong>at</strong> will examine the XACML policies and implement queryprocessing in a cloud using Hadoop/MapReduce framework.25. SPARQL Query Optimizer, 2009 – 2010Farhan Husain, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamThis system is developing a SPARQL query optimizer for the Hadoop/MapReduce framework.26. Secure Query Processing in Cloud with Semantic Web D<strong>at</strong>a, 2009 – 2010Farhan Husain, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamThis system is a query rewriting system th<strong>at</strong> will examine the XACML policies and implement queryprocessing in a cloud with SPARQL, Hadoop/MapReduce framework. It uses the framework we havebuilt in the system discussed under the previous project. Two versions <strong>of</strong> the prototype have beendeveloped.27. Secure XACML Implement<strong>at</strong>ion with Hadoop, 2009 – PresentIn progress. This system essentially explores the Hadoop s<strong>of</strong>tware and incorpor<strong>at</strong>es XACML policybasedaccess control. It will be <strong>of</strong>fered as open source.Blackbook Enhancements and GOTS (Government Off the Shelf)96


1. Geosp<strong>at</strong>ial Proximity Algorithm, 2008 – 2009Sonia Chib, Bhavani Thuraisingham, Jyothsna Rachapalli, L<strong>at</strong>ifur KhanImplemented geosp<strong>at</strong>ial proximity algorithms using Google maps for Blackbook users.2. REST Interface and Integr<strong>at</strong>ion <strong>of</strong> Amazon.com Web Services into Blackbook, 2008 – 2009Pranav Parikh, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamImplemented the REST Interface to Blackbook. <strong>The</strong>n using this interface integr<strong>at</strong>ed Blackbook withAmazon.com webs services for query processing.3. MALLET/Blackbook Integr<strong>at</strong>ion, 2009 – 2010Pranav Parikh, Bhavani ThuraisinghamDeveloped a pr<strong>of</strong>essionaliz<strong>at</strong>ion service for the MALLET Machine learning algorithms and integr<strong>at</strong>edinto Blackbook.4. NIST NVD Ontology Management, 2009Jyothsna Rachapalli, Vaibhav Khadilkar, Bhavani Thuraisingham, NISTDeveloped an ontology based system for specifying the d<strong>at</strong>a in the NIST NVD D<strong>at</strong>abases.Open Source S<strong>of</strong>tware <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>1. SCRUB toolhttp://scrub-tcpdump.sourceforge.net/index.phphttp://sourceforge.net/projects/scrub-tcpdump/2. JENA Contributions, Very Large RDF Graphshttp://jena.sourceforge.net/contrib/contributions.htmlhttp://cs.utdallas.edu/semanticweb/jenaextension.htmlTool Repositories developed and hosted <strong>at</strong> UTDD<strong>at</strong>a Mining Toolshttp://dml.utdallas.edu/Mehedy/Anonymiz<strong>at</strong>ion Toolshttp://cs.utdallas.edu/dspl/cgi-bin/toolbox/index.phpSemantic Web Toolshttp://cs.utdallas.edu/semanticweb/index.htmlSecure Cloud Repositoryhttp://cs.utdallas.edu/secure-cloud-repository/97


Section 15: NATIONAL AND INTERNATIONALRESEARCH COLLABORATION1985 – 1988: I have carried out both n<strong>at</strong>ional and intern<strong>at</strong>ional collabor<strong>at</strong>ion since 1985. While I worked<strong>at</strong> the Control D<strong>at</strong>a Corpor<strong>at</strong>ion and Honeywell Inc., I collabor<strong>at</strong>ed closely with pr<strong>of</strong>essors <strong>at</strong> the<strong>University</strong> <strong>of</strong> Minnesota and we published several papers in conferences within the USA.1989 – 2001: When I joined MITRE, I presented papers <strong>at</strong> both n<strong>at</strong>ional and intern<strong>at</strong>ional conferences. Myfirst internal conference was on secure object systems in Karlsruhe, Germany in April 1990 and the secondconference was in Halifax, UK in September 1990. I started collabor<strong>at</strong>ing with researchers <strong>at</strong> the<strong>University</strong> <strong>of</strong> Rhode Island in 1994 and we published several papers in both n<strong>at</strong>ional and intern<strong>at</strong>ionalconferences. During this time, I also started giving keynote addresses <strong>at</strong> n<strong>at</strong>ional and intern<strong>at</strong>ionalconferences as well as presented papers including in Italy, Spain, Switzerland, Austria, Australia,Netherlands, Sweden, Norway, Finland, Ireland, Japan, Hong Kong, Taiwan, South Africa, India, and NewZealand.2001 – 2004: This is the time I was <strong>at</strong> the N<strong>at</strong>ional Science Found<strong>at</strong>ion in Washington, DC and I initi<strong>at</strong>edprograms between USA and Europe and <strong>at</strong>tended n<strong>at</strong>ional and intern<strong>at</strong>ional conferences to give keynoteaddresses including in the UK, Austria, Belgium, Spain, Switzerland, Greece, and France.2004 – Present: I continue to present papers and give keynote addresses <strong>at</strong> both n<strong>at</strong>ional and intern<strong>at</strong>ionalevents. I also collabor<strong>at</strong>e on research projects with several universities in the US including the <strong>University</strong><strong>of</strong> Maryland Baltimore County, Purdue <strong>University</strong>, <strong>University</strong> <strong>of</strong> Illinois, <strong>University</strong> <strong>of</strong> Minnesota and the<strong>University</strong> <strong>of</strong> <strong>Texas</strong> San Antonio. Much <strong>of</strong> my research is funded by the US Air Force, the N<strong>at</strong>ionalScience Found<strong>at</strong>ion, Advanced Research Projects Activity (Intelligence Community), the N<strong>at</strong>ionalGeosp<strong>at</strong>ial Intelligence Agency, and the N<strong>at</strong>ional Aeronautics and Space Administr<strong>at</strong>ion.Collabor<strong>at</strong>ion with Europe: As part <strong>of</strong> a larger initi<strong>at</strong>ive funded by the US Air Force, I have establishedintern<strong>at</strong>ional research collabor<strong>at</strong>ion with Kings College London and the <strong>University</strong> <strong>of</strong> Insubria in Italy.This has included several trips to the UK to visit researchers <strong>at</strong> Kings College London. Funding for ourEuropean partners is from the US Air Force in Europe (EOARD: European Office <strong>of</strong> Aerospace Researchand Development). <strong>The</strong> project is on assured inform<strong>at</strong>ion sharing and our goal is to demonstr<strong>at</strong>einform<strong>at</strong>ion sharing between US, UK and Italy in the cloud while maintaining security policies.Collabor<strong>at</strong>ion with Asia Pacific: I am hoping to initi<strong>at</strong>e a similar intern<strong>at</strong>ional collabor<strong>at</strong>ion for the USAir Force with Australia. <strong>The</strong> funding for this effort is expected to come from US Air Force in Asia(AOARD: Asia Office <strong>of</strong> Aerospace Research and Development). I gave a keynote address <strong>at</strong> a computerconference in Sydney, Australia in December 2011 and we have begun discussions with researchers fromMacquarie <strong>University</strong> in Sydney, Australia on this collabor<strong>at</strong>ion.98


Section 16: INTELLECTUAL PROPERTY AND PATENTS1. <strong>The</strong> MITRE Corpor<strong>at</strong>ionUS P<strong>at</strong>ent, October 1994, an Appar<strong>at</strong>us and Method for a system for security constraint processing duringd<strong>at</strong>abase query upd<strong>at</strong>e and design oper<strong>at</strong>ions. (with William Ford and Marie Collins).US P<strong>at</strong>ent, January 1996, an Appar<strong>at</strong>us and Method for a system for handling the inference problem basedon Nonmonotonic Typed Multilevel Logic.US P<strong>at</strong>ent, December 1997, an Appar<strong>at</strong>us and Method for a system for expert inference control (withWilliam Ford).St<strong>at</strong>us <strong>of</strong> my p<strong>at</strong>ents: In 2003, former Micros<strong>of</strong>t CTO N<strong>at</strong>han Myhrvold’s company (Intellectual Ventures)wanted to purchase 4 p<strong>at</strong>ents from MITRE. Three <strong>of</strong> them were mine. MITRE also as a bonus gave themadditional p<strong>at</strong>ents together with the 4 must have p<strong>at</strong>ents for $2m approx. Each <strong>of</strong> the inventors was given$7K.2. <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>P<strong>at</strong>ent Applic<strong>at</strong>ion: Systems and Methods for Detecting a Novel D<strong>at</strong>a ClassUTD-10-017 (Applic<strong>at</strong>ion Number 13/214,720)P<strong>at</strong>ent Applic<strong>at</strong>ion: A Method and System to Determine and Identify Loc<strong>at</strong>ion <strong>of</strong> Users by MiningSocial Networking D<strong>at</strong>a and Inform<strong>at</strong>ion (61/525,614)Intellectual Property DisclosuresDisclosure Number: 09-037Title: Policy Management for Assured Inform<strong>at</strong>ion Sharing in a CoalitionEnvironmentInventors: B. Thuraisingham, L. Khan, M. KantarciogluDisclosure Number: 10-017Title: Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>aStreams Under Time ConstraintsInventors: L. Khan, M. Masud (former UTD Post-doc), B. ThuraisinghamDisclosure Number: 10-019Title: Biological Weapon Attack Simul<strong>at</strong>ion Using Social Network andGame <strong>The</strong>oretic ModelingInventors: M. Kantarcioglu, R. Layfield (former Ph.D. student)Disclosure Number: 10-054Title: Agglomer<strong>at</strong>ive Clustering using Label Propag<strong>at</strong>ion for Loc<strong>at</strong>ionMiningInventors: S. Abrol, L. Khan, B. Thuraisingham99


UTD Spin-Off Corpor<strong>at</strong>ions1. We started a spin-<strong>of</strong>f company with UTD titled: “Knowledge and Security Analytics, LLC” in Summer2010. <strong>The</strong> company founder is Bhavani Thuraisingham. This spin<strong>of</strong>f company is a holding companyfrom which we will apply for SBIR/STTR.2. We started a spin-<strong>of</strong>f company with UTD titled: “Evolving Malware Security, LLC” in Summer 2011.<strong>The</strong> company founder is Bhavani Thuraisingham. This spin<strong>of</strong>f company will be a holding companyfrom which we will apply for SBIR/STTR.100


Section 17: DISCUSSION OF PUBLISHED WORK INSECURE DEPENDABLE DATA MANAGEMENT (1985 – 2010)17.1 INTRODUCTIONThis section consists <strong>of</strong> some <strong>of</strong> my papers th<strong>at</strong> have made an impact in secure dependable d<strong>at</strong>amanagement. <strong>The</strong> specific sub-areas are the following: Multilevel Secure D<strong>at</strong>a Management Systems;Dependable D<strong>at</strong>a Management Systems; Semantic Web, Web Services and Security; and D<strong>at</strong>a Mining forMalware Detection. A summary <strong>of</strong> each <strong>of</strong> these sub-areas is given below. More details are given in theSections 17.2, 17.3, 17.4, 17.5 and 17.6.Multilevel Secure D<strong>at</strong>a Management Systems: As st<strong>at</strong>ed in Section 3, my research in secure dependabled<strong>at</strong>a management began in 1985. My initial focus was in multilevel secure d<strong>at</strong>abase systems. In particular,I examined multilevel security for rel<strong>at</strong>ional d<strong>at</strong>abase systems, distributed d<strong>at</strong>abase systems and objectd<strong>at</strong>abase systems. In addition, during this time I also conducted research on the inference problem. Myresearch in this area has resulted in several papers and three US p<strong>at</strong>ents. <strong>The</strong> research was also transferredto oper<strong>at</strong>ional programs and commercial products.Dependable D<strong>at</strong>a Management Systems: In the early 1990s, I started my research in real-time d<strong>at</strong>amanagement systems and l<strong>at</strong>er integr<strong>at</strong>ed this research with my work in secure d<strong>at</strong>a management.Integr<strong>at</strong>ing security and real-time systems was a new concept <strong>at</strong> th<strong>at</strong> time. This research was transferred toAir Force programs such as AWACS (Airborne Warning and Control System).Semantic Web, Web Services and Security: In 2000, I started my research in security for semantic weband web services. First I examined security for XML (eXtensible Markup Language) and then designedand developed inference controllers based on RDF (Resource Description Framework). In addition, Iexamined access control and inform<strong>at</strong>ion flow models for web services.D<strong>at</strong>a Mining for Malware Detection: My recent research has also included designing and applying d<strong>at</strong>amining techniques for malware detection. In particular, I have developed d<strong>at</strong>a mining tools for bufferoverflow management and intrusion detection. I have also developed stream mining techniques fordetecting novel classes.<strong>The</strong> organiz<strong>at</strong>ion <strong>of</strong> this section is as follows. Section 17.2 describes my research in secure d<strong>at</strong>amanagement. Section 17.3 describes my research in dependable real-time d<strong>at</strong>a management. Section 17.4describes my research in secure semantic web and web services. Section 17.5 describes my research ind<strong>at</strong>a mining for malware detection. Section 17.6 discusses my future work in secure d<strong>at</strong>a management.17.2 MULTILEVEL SECURE DATA MANAGEMENT SYSTEMSI began my research on multilevel secure d<strong>at</strong>a management systems in 1985 and this research continueduntil the mid 1990s. I describe eleven <strong>of</strong> my papers on this topic.Secure Rel<strong>at</strong>ional D<strong>at</strong>a Management: My early research in the mid to l<strong>at</strong>e 1980s was on the design anddevelopment <strong>of</strong> a prominent system called Lock D<strong>at</strong>a Views (LDV). Paper #1 (IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering) in this section describes the design <strong>of</strong> this system. LDV was one <strong>of</strong> thefirst two high assurance secure d<strong>at</strong>a management systems developed and was designed to meet the A1assurance level with respect to the Orange book (th<strong>at</strong> is, the Trusted Computer Systems Evalu<strong>at</strong>ioncriteria). It’s unique in th<strong>at</strong> it is designed to oper<strong>at</strong>e on Lock oper<strong>at</strong>ing system which is an A1 system andhas three pipelines designed to enforce non-interference properties. <strong>The</strong> security policy was based on theBell and LaPadula model as well as the non-interference model. Additional policies based on content andcontext were introduced for the first time in a multilevel environment. In addition, a multilevel rel<strong>at</strong>ionald<strong>at</strong>a model was developed. We also handled the notion <strong>of</strong> polyinstanti<strong>at</strong>ion where multiple users can havedifferent views <strong>of</strong> the same entity and developed a theory <strong>of</strong> multilevel rel<strong>at</strong>ional d<strong>at</strong>a model. Utilizingthis d<strong>at</strong>a model, we then developed designs <strong>of</strong> three major modules: the query processor, the upd<strong>at</strong>eprocessor and the metad<strong>at</strong>a manager. This paper has been widely cited and some <strong>of</strong> the ideas were adoptedin the four commercial secure rel<strong>at</strong>ional d<strong>at</strong>a management systems th<strong>at</strong> were being developed in the l<strong>at</strong>e101


1980s and early 1990s by Oracle, Sybase, Informix and Ingres. This was a team effort with colleagues <strong>at</strong>Honeywell.Secure Query Processing: Paper #2 (IEEE Computer) describes secure query processing str<strong>at</strong>egies.Essentially, I enhanced the query str<strong>at</strong>egies developed by Lock D<strong>at</strong>a Views and introduced ideas from thefield <strong>of</strong> logic and d<strong>at</strong>abases. I developed query str<strong>at</strong>egies based on the re-writing principles. Various types<strong>of</strong> policies were considered in the design. This paper was first submitted to the Hawaii Intern<strong>at</strong>ionalConference on Systems Sciences in 1988 and won the best paper award. I was then invited to submit thejournal version <strong>of</strong> the paper to IEEE Computer which has the largest audience in computer science. <strong>The</strong>n,together with my colleague <strong>at</strong> the <strong>University</strong> <strong>of</strong> Minnesota and a student, this paper was enhanced andpublished in IEEE Computer.Secure Distributed D<strong>at</strong>a Management: <strong>The</strong> third and fourth papers describe aspects <strong>of</strong> securedistributed d<strong>at</strong>abase systems. In Paper #3 (Computers and Security Journal) I was the first to exploremultilevel security for distributed d<strong>at</strong>abase systems. I designed a multilevel d<strong>at</strong>a model, query processingstr<strong>at</strong>egies and transaction management str<strong>at</strong>egies. This paper resulted in several research directionsincluding the algorithms I designed for both query and transaction management. One such algorithm andimplement<strong>at</strong>ion carried out together with a colleague <strong>at</strong> MITRE, is reported in Paper #4 (Journal <strong>of</strong>Systems and S<strong>of</strong>tware). In particular, we developed a system th<strong>at</strong> enforced multilevel security for queryprocessing in a distributed environment. We demonstr<strong>at</strong>ed the system by connecting secure d<strong>at</strong>amanagement systems in Bedford, MA, McLean, VA and Fort Monmouth, NJ in 1991. Such an integr<strong>at</strong>ionwas novel <strong>at</strong> th<strong>at</strong> time and the research was transferred to Army’s maneuver control systems.Secure Object D<strong>at</strong>a Management: <strong>The</strong> next two papers (Paper #5 and #6) describe my work inmultilevel secure object d<strong>at</strong>abase systems. Paper #5 (ACM OOPSLA) describes a widely cited securemodel for object d<strong>at</strong>abase systems. This paper describes several security properties for the object model.<strong>The</strong>n these policies were incorpor<strong>at</strong>ed into the design <strong>of</strong> the system and published in Paper #6 (Journal <strong>of</strong>Object-Oriented Programming). Subsequently together with a colleague <strong>at</strong> MITRE, we developed pro<strong>of</strong> <strong>of</strong>concept demonstr<strong>at</strong>ions <strong>of</strong> the design using the Object Store d<strong>at</strong>a management system in 1992. Thisresearch had an impact on several secure object d<strong>at</strong>a management systems’ research and developmentefforts by others. In addition, we also transferred the research to a system developed by OntosCorpor<strong>at</strong>ion.Found<strong>at</strong>ions <strong>of</strong> the Inference Problem: <strong>The</strong> next four papers describe my work on the Inferenceproblem. I have been commended for this work from researchers as well as government sponsors. In Paper#7 (Computer Security Found<strong>at</strong>ions Workshop), I was the first to prove th<strong>at</strong> the inference problem wasunsolvable and presented it <strong>at</strong> the 3 rd IEEE Computer Security Found<strong>at</strong>ions Workshop. <strong>The</strong> paper did notappear in the proceedings as the paper was not publicly released in time for the workshop. This researchwas also quoted by Dr. John Campbell <strong>of</strong> the N<strong>at</strong>ional Security Agency as the most significant research insecure d<strong>at</strong>a management system in 1990. His quote appeared in the Proceedings <strong>of</strong> the 1990 N<strong>at</strong>ionalComputer Security Conference.Inference Controllers: Once I proved th<strong>at</strong> the inference problem was unsolvable, then I designed ad<strong>at</strong>abase inference controller th<strong>at</strong> handled policies during query, upd<strong>at</strong>e and d<strong>at</strong>abases oper<strong>at</strong>ions.Together with colleagues <strong>at</strong> MITRE, my design was implemented and published in Paper #8 (D<strong>at</strong>a andKnowledge Engineering Journal). This was the first inference controller to be developed and a p<strong>at</strong>ent wasobtained. Our integr<strong>at</strong>ed inference controller processed some policies during d<strong>at</strong>abase query, somepolicies during d<strong>at</strong>abase upd<strong>at</strong>es and some policies during d<strong>at</strong>abase design and this concept was novel <strong>at</strong>th<strong>at</strong> time. <strong>The</strong>n in Paper #9 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering), I designedalgorithms for extending the inference controller design to a distributed environment and th<strong>at</strong> resulted inthe first distributed inference controller. Together with a colleague, this design was implemented. In thissystem users could pose queries from multiple sites, but the system would examine the policies across allthe sites and only give out inform<strong>at</strong>ion th<strong>at</strong> the user was authorized to know. <strong>The</strong> inference controllerswere distributed and communic<strong>at</strong>ed with each other to process queries and upd<strong>at</strong>es.Designing Secure Applic<strong>at</strong>ions: In Paper #10 (IFIP D<strong>at</strong>a Security Conference), I looked <strong>at</strong> the inferencefrom a different angle. Here I tried to handle the problem when the applic<strong>at</strong>ion was designed. I used102


conceptual structures (e.g., semantic nets and conceptual graphs) to model the applic<strong>at</strong>ions. Policies weretaken into consider<strong>at</strong>ion during the modeling phase. <strong>The</strong>n the reasoners used by semantic nets andconceptual graphs were applied to reason about the applic<strong>at</strong>ion and detect potential security viol<strong>at</strong>ions.This was a novel idea <strong>at</strong> th<strong>at</strong> time and spawned many avenues for subsequent research. Also as a backendto this reasoner, I designed an expert system for inference control. <strong>The</strong> implement<strong>at</strong>ion <strong>of</strong> this system wascarried out with a colleague <strong>at</strong> MITRE. A U.S. p<strong>at</strong>ent was obtained on this system.Logic for Secure D<strong>at</strong>abases: Finally in Paper #11 (Computer Security Found<strong>at</strong>ions Workshop) I appliedthe theory <strong>of</strong> logic and d<strong>at</strong>abases to multilevel d<strong>at</strong>abases. Since first order logic did not handle nonmonotonicreasoning and since non-monotonic logics <strong>at</strong> th<strong>at</strong> time did not reason across security levels, Ideveloped a logic called NTML (Non-monotonic Typed Multilevel Logic) and subsequently designed amultilevel logic d<strong>at</strong>abase system. <strong>The</strong> significance <strong>of</strong> this work is th<strong>at</strong> the logical reasoner can be used toprocess queries and control unauthorized inferences. A U.S. p<strong>at</strong>ent was obtained on this system.1. Design <strong>of</strong> LDV - A Multilevel Secure Rel<strong>at</strong>ional D<strong>at</strong>abase Management System, June 1990, IEEETransactions on Knowledge and D<strong>at</strong>a Engineering, Vol. 2, No. 2, June 1990, (co-author: P.Stachour). Lead AuthorMy Contribution: This is a Honeywell Team effort. <strong>The</strong> principal members <strong>of</strong> the team includedPaul Stachour (Principal Investig<strong>at</strong>or), P<strong>at</strong>ricia Dwyer, Emmanuel Onuegbe, Tom Haigh andmyself. I designed both the upd<strong>at</strong>e and metad<strong>at</strong>a pipelines. Furthermore, I wrote the entire paperfrom the technical reports we published.2. Secure Query Processing Str<strong>at</strong>egies, IEEE Computer, March 1989, Vol. 22, No. 3, (invited paper– co-authors: T. F. Keefe and W. T. Tsai). Co-Author (for the conference version I was the leadauthor)My Contribution: I designed the algorithms and write the initial paper for the conference bymyself. Because I had to leave on vac<strong>at</strong>ion I requested my colleague and his student to edit thepaper and submit. <strong>The</strong> paper received the best paper award. <strong>The</strong> journal version was anenhancement <strong>of</strong> the conference paper and the student Tom Keefe was mainly responsible for theenhancements.3. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems – II, Computers andSecurity Journal (Elsevier), Volume 10, No.8, December 1991. Sole AuthorMy Contribution: This is 100% my work.4. Design and Implement<strong>at</strong>ion <strong>of</strong> a Query Processor for a Trusted Distributed D<strong>at</strong>abaseManagement Systems, April 1993, Journal <strong>of</strong> Systems and S<strong>of</strong>tware (North Holland), Vol. 21,No. 1 (co-author: Harvey Rubinovitz).My Contribution: I designed the algorithms. <strong>The</strong>n my colleague Dr. Rubinovitz implemented thealgorithm. Together we designed the experiments. I wrote the paper from the technical reports.5. Mand<strong>at</strong>ory Security in Object-Oriented D<strong>at</strong>abase Systems, October 1989, Proceedings <strong>of</strong> theACM Conference on Object-Oriented Programming, Systems, Languages and Applic<strong>at</strong>ions(ACM OOPSLA) Conference, New Orleans, LA. Sole AuthorMy Contribution: This is 100% my work.6. Towards the Design <strong>of</strong> a Multilevel Secure Object-Oriented D<strong>at</strong>abase Management System,Journal <strong>of</strong> Object-Oriented Programming, Vol. 8, No. 3, p. 42 – 49, June 1995. Sole AuthorMy Contribution: This is 100% my work.7. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem in D<strong>at</strong>abase Security, June 1990,Presented <strong>at</strong> the 3rd IEEE Workshop on Found<strong>at</strong>ions <strong>of</strong> Computer Security, Franconia, NH(public release was not obtained in time for proceedings; printed as MITRE Paper M291, May1990). Sole AuthorMy Contribution: This is 100% my work.103


8. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller, December 1993, D<strong>at</strong>a andKnowledge Engineering Journal (North Holland), Vol. 11, No. 3, p. 271 - 297 (co-authors: W.Ford, M. Collins, J. O'Keeffe); (Article reprinted by the MITRE Journal, 1994). Lead AuthorMy Contribution: I designed the entire system. My colleagues Mr. Ford and Mr. O’Keeffeimplemented the query processor. My colleague Ms. Collins implemented the upd<strong>at</strong>e processor. Iwrote the entire paper from the technical reports.9. Security Constraint Processing in a Multilevel Secure Distributed D<strong>at</strong>abase Management System,IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, April 1995 (coauthor: W. Ford). LeadAuthorMy Contribution: I designed the entire system. My colleague Mr. Ford implemented the system.I wrote the entire paper from the technical reports.10. <strong>The</strong> Use <strong>of</strong> Conceptual Structures to Handle the Inference Problem, November 1991,Proceedings <strong>of</strong> the 5th IFIP WG 11.3 Conference on D<strong>at</strong>abase Security, p. 333-362,Shepherdstown, VA. (Also published by North Holland, 1992, D<strong>at</strong>abase Security V: St<strong>at</strong>us andProspects, p. 333 - 362). Sole AuthorMy Contribution: This is 100% my work.11. A Nonmonotonic Typed Multilevel Logic for Multilevel D<strong>at</strong>abase Management Systems, June1991, Proceedings <strong>of</strong> the 4th IEEE Computer Security Found<strong>at</strong>ions Workshop, Franconia, NH.My Contribution: This is 100% my work.17.3 DEPENDABLE DATA MANAGEMENT SYSTEMSI began my research on dependable d<strong>at</strong>a management systems around 1992 and this research stillcontinues. I describe seven <strong>of</strong> my papers on this topic.Evolvable Real-time Systems: My research in the early to mid 1990s was on building an object-orientedd<strong>at</strong>a manager and infrastructure for next gener<strong>at</strong>ion command and control systems. At th<strong>at</strong> time the legacysystems were hardcoded and running on mainframes. <strong>The</strong> goal was to develop flexible systems th<strong>at</strong> couldaccommod<strong>at</strong>e changes. <strong>The</strong>re were no commercial systems available <strong>at</strong> th<strong>at</strong> time. D<strong>at</strong>a was arriving <strong>at</strong> avery rapid speed. This d<strong>at</strong>a had to be captured, stored, analyzed and decisions had to be made. Togetherwith my colleagues <strong>at</strong> MITRE, we were the first to develop an object-based, real-time infrastructure andd<strong>at</strong>a manager. <strong>The</strong> infrastructure consisted <strong>of</strong> several services including inter-process communic<strong>at</strong>ion,memory management and scheduling. <strong>The</strong> real-time d<strong>at</strong>a manager was a main memory d<strong>at</strong>a manager andwe designed a real-time priority ceiling protocol for transaction processing. <strong>The</strong> results are documented inPaper #1 (IEEE WORDS 1996). <strong>The</strong>n we integr<strong>at</strong>ed the infrastructure and d<strong>at</strong>a manager with the multisensorfusion applic<strong>at</strong>ions and carried out an integr<strong>at</strong>ed design and implement<strong>at</strong>ion. This integr<strong>at</strong>ion workis discussed in Paper #2 (IEEE WORDS 1997). <strong>The</strong> research was demonstr<strong>at</strong>ed to the Air Force and thetechnology was transferred to the AWACS program and subsequently Boeing and Lockheed took many <strong>of</strong>the ideas to implement into the oper<strong>at</strong>ional systems.Real-time Transaction Processing: One <strong>of</strong> the challenges in designing a real-time d<strong>at</strong>a manager is todesign transaction processing algorithms th<strong>at</strong> meet timing constraints. <strong>The</strong>re were a number <strong>of</strong> algorithmsdeveloped th<strong>at</strong> had to meet the requirements <strong>of</strong> AWACS. After examining and evalu<strong>at</strong>ing severalalgorithms, we felt th<strong>at</strong> the priority ceiling algorithm would be most suited. However, the priority ceilingalgorithm had to be adapted to meet the different criteria. I presented the initial design to the team inMarch 1995. <strong>The</strong>n I collabor<strong>at</strong>ed with a pr<strong>of</strong>essor <strong>at</strong> the <strong>University</strong> <strong>of</strong> Rhode Island and co-supervisedstudents who carried out the detailed design and implement<strong>at</strong>ion <strong>of</strong> the algorithm in 1996 - 1997. Thisalgorithm is presented in Paper #3 (Real-time Systems Journal).Adaptive Real-time Systems: In this paper, we introduced some novel ideas into the infrastructuredesign. While in the earlier papers we considered only non-adaptive protocols, in our research in the l<strong>at</strong>e104


1990s, we designed and implemented flexible systems th<strong>at</strong> could handle adaptive protocols. This meantthe system can select the protocol such as TCP/IP or UDP or in the case <strong>of</strong> the d<strong>at</strong>a manager, the type <strong>of</strong>transaction algorithm to be used. This was the first effort th<strong>at</strong> considered adaptive approaches. Wedocumented the results in Paper #4 (IEEE ISADS).Secure Real-time Object Management: One significant impact <strong>of</strong> our research is the transfer <strong>of</strong> thetechnology to standards effort. In 1994 with some inputs from colleagues, I developed concepts onintegr<strong>at</strong>ing real-time and security into object request brokers. This work was presented <strong>at</strong> the ACMOOPSLA conference workshop in real-time object systems on real-time object request brokers. This paperis widely cited. I was then invited to give talks <strong>at</strong> several panels on this topic. <strong>The</strong> Object ManagementGroup was interested and invited me to help establish a special interest group in 1996. Together with theMITRE team, we continued to enhance the research and collabor<strong>at</strong>ed with the <strong>University</strong> <strong>of</strong> Rhode Islandand the Navy and subsequently contributed substantially towards the research <strong>of</strong> real-time object requestbrokers. <strong>The</strong> research was published as a team paper in Paper #5 (IEEE Transactions on Parallel andDistributed Systems).Secure Real-time Systems: In Paper #6 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering) Iexamined the integr<strong>at</strong>ion <strong>of</strong> security into the infrastructure. I was the first to introduce security with realtimeprocessing back in 1992. <strong>The</strong>refore, I expanded my earlier research and developed a solution for aninfrastructure and d<strong>at</strong>a manager th<strong>at</strong> incorpor<strong>at</strong>ed both security and real-time processing with some inputsfrom my colleague <strong>at</strong> MITRE. I continued with this research when I joined the university in 2004 and one<strong>of</strong> my students was very interested in following up on the ideas I presented in Paper #4. Together with mystudent, we designed and developed a system called Real-time TMO (Time-Triggered Message-TriggeredObject) which incorpor<strong>at</strong>ed security into the TMO system. TMO was designed <strong>at</strong> the <strong>University</strong> <strong>of</strong>California Irvine and is a real-time object system. By incorpor<strong>at</strong>ing security into the system, I believe th<strong>at</strong>we developed the first real-time and secure system based on objects. This research was published in Paper#7 (IEEE ISORC). This research has spawned many new research directions including the Cyber PhysicalSystems th<strong>at</strong> are very popular today.1. Object-oriented Implement<strong>at</strong>ion <strong>of</strong> an Infrastructure and D<strong>at</strong>a Manager for Real-time Commandand Control Systems, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented Real-time Systems,Laguna Beach, CA, February 1996 (co-authors: E. Bensley, P. Krupp, R.A. Sigel, M. Squadrito,T. Wheeler). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the team included EdBensley (Principal Investig<strong>at</strong>or), Peter Krupp, Tom Wheeler and myself. I was responsible for thedesign <strong>of</strong> the real-time d<strong>at</strong>a manager and a key member <strong>of</strong> the infrastructure component. I wrotethe entire paper from the technical reports.2. Object Technology for the Integr<strong>at</strong>ion <strong>of</strong> Infrastructure, D<strong>at</strong>a Manager, and Tracker forCommand and Control Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the IEEE Workshop on Object-OrientedReal-time Systems (WORDS), Newport Beach, CA, February 1997 (co-authors: M. G<strong>at</strong>es, P.Krupp, J. Maurer, M. Squadrito, T. Wheeler). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the team included EdBensley (Principal Investig<strong>at</strong>or), Peter Krupp, Tom Wheeler, Mike G<strong>at</strong>es. Mike Squadrito andmyself. I was responsible for the design <strong>of</strong> the real-time d<strong>at</strong>a manager and supervised theimplement<strong>at</strong>ion by Mr. Squadrito. I wrote the entire paper from the technical reports.3. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-time Middleware, Real-time Systems Journal(Kluwer), Vol. 20, No. 2, p. 155-182, 2001 (co-author: V. Wolfe, L. DiPippo et al). Co-AuthorMy Contribution: I conceived the idea <strong>of</strong> applying the priority ceiling algorithm to our problemfor AWACS and developed the initial algorithm. <strong>The</strong> details were carried out by the students <strong>at</strong>the <strong>University</strong> <strong>of</strong> Rhode Island. Much <strong>of</strong> the writing was carried out by the <strong>University</strong> <strong>of</strong> RI.105


4. Adaptable Real-time Distributed Object Management for Command and Control Systems,Proceedings <strong>of</strong> the IEEE Intern<strong>at</strong>ional Symposium on Autonomous De-centralized Systems(ISADS) Conference, March 1999, Tokyo, Japan (co-authors: J. Maurer, R. Ginis, R. Freedman,M. Squadrito, S. Wohlever). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the design teamincluded John Maurer (Principal Investig<strong>at</strong>or), Peter Krupp, and myself. <strong>The</strong> others carried out theimplement<strong>at</strong>ion. I wrote the entire paper from the technical reports.5. Real-time CORBA, IEEE Transactions on Parallel and Distributed Systems, October 2000 (coauthors:V. Fay-Wolfe, L. DiPippo, G. Cooper, R. Johnston, P. Kortmann). Co-AuthorMy Contribution: I conceived the idea <strong>of</strong> real-time CORBA in 1994. Since then MITRE,<strong>University</strong> <strong>of</strong> Rhode Island and the Navy carried out the design together with the OMG standardsteam. <strong>The</strong> paper was a team effort. Much <strong>of</strong> the writing was carried out by the <strong>University</strong> <strong>of</strong> RI..6. Inform<strong>at</strong>ion Survivability for Real-time Command and Control Systems, IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, January 1999 (co-author: J. Maurer). Lead AuthorMy Contribution: I was the main designer <strong>of</strong> the system described in this paper and wrote thepaper. John Maurer (the project leader) gave comments on this paper.7. Dependable and Secure TMO Scheme, Proceedings IEEE Intern<strong>at</strong>ional Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006) (co-author: J. Kim). Lead AuthorMy Contribution: I worked on the design <strong>of</strong> the system with my student Mr. Kim. My studentcarried out the implement<strong>at</strong>ion. I wrote the paper from my student’s MS <strong>The</strong>sis.17.4 SEMANTIC WEB, WEB SERVICES AND SECURITYI began my research on XML Security in December 1998 when I visited the <strong>University</strong> <strong>of</strong> Milan researchgroup to exchange ideas. I initi<strong>at</strong>ed a research project with this group led by Pr<strong>of</strong>. Bertino on securingXML documents. Two students worked on the project, one on access control and authentic public<strong>at</strong>ion <strong>of</strong>XML documents and the other on privacy and trust for XML documents. Subsequently when I joined NSFin October 2001, I continued with my research on securing the secure semantic web by exploring alllayers <strong>of</strong> the semantic web technology stack. Th<strong>at</strong> same month I particip<strong>at</strong>ed in an NSF-EU workshop <strong>at</strong>Sophia Antipolis and gave a present<strong>at</strong>ion on securing the semantic web technologies. This was the firstsuch present<strong>at</strong>ion on the topic. A major part <strong>of</strong> my current research is in this area.XML Security: Paper #1 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering) describes myresearch with the <strong>University</strong> <strong>of</strong> Milan group on XML security. We developed an approach for controllingaccess to XML documents as well as to securely publish XML documents <strong>at</strong> the third party site. Wefocused on authenticity and completeness <strong>of</strong> the query responses. This approach has been recommendedfor secure d<strong>at</strong>a outsourcing. Paper #2 (ACM Transactions on Inform<strong>at</strong>ion and Systems Security) describesprivacy problems th<strong>at</strong> could occur due to the specific<strong>at</strong>ion <strong>of</strong> trust policies. In particular, we developed asecurity model, privacy-enhanced trust management algorithms and a pro<strong>of</strong> <strong>of</strong> concept prototype <strong>of</strong> thealgorithms.RDF Security and Inference Control: Paper #3 (Computer Standards and Interface Journal) describesthe various security standards for semantic web. It describes XML security, RDF security and security forontologies. <strong>The</strong>n I started focusing on securing RDF. My work on RDF security was novel <strong>at</strong> th<strong>at</strong> timeand I collabor<strong>at</strong>ed with pr<strong>of</strong>essors <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria and together we developed securityarchitecture for RDF documents. This research was published in Paper #4 (DEXA conference workshop).Paper #5 (IFIPTM) continues with RDF security. In this paper, together with students I jointly supervisedwith another pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, instead <strong>of</strong> explicitly coming up with accesscontrol for RDF documents, we use the Reific<strong>at</strong>ion principle already in RDF to control access to variousparts <strong>of</strong> the document. For example, we can make reific<strong>at</strong>ion st<strong>at</strong>ements <strong>of</strong> an RDF document such as“John has access to the RDF document”. This way we can use the reasoning capabilities in RDF tomanage security. Paper #6 (IFIP D<strong>at</strong>a Security Conference) makes a significant contribution to the106


inference problem. Back in the early 1990s, I designed an inference controller. Th<strong>at</strong> d<strong>at</strong>abase was arel<strong>at</strong>ional d<strong>at</strong>abase and policies were specified as rules in d<strong>at</strong>alog. However, now with semantic web, onecan use Jena for the RDF engine and Pellet as the reasoner. Furthermore, both d<strong>at</strong>a and policies can beuniformly represented in RDF. Together with a student and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong><strong>Dallas</strong>, we designed and developed a semantic web-based inference controller. During the past threemonths, we have made considerable enhancements to the design described in Paper #6. In particular, wehave developed a semantic web-based privacy controller for provenance d<strong>at</strong>a.Assured Inform<strong>at</strong>ion Sharing: While continuing to conduct research on securing XML, RDF andontologies, I also focused on five applic<strong>at</strong>ion areas to apply secure semantic web technologies. <strong>The</strong>seapplic<strong>at</strong>ions are discussed in the next five papers. In Paper #7, (Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ionSecurity and Privacy) I utilized semantic web technologies for Assured Inform<strong>at</strong>ion Sharing applic<strong>at</strong>ions.Together with a student and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, we were the first to designand develop an assured inform<strong>at</strong>ion sharing system using XACML-based policies enforced acrossorganiz<strong>at</strong>ions. This research focused on sharing inform<strong>at</strong>ion while <strong>at</strong> the same time ensuring th<strong>at</strong>appropri<strong>at</strong>e policies are enforced.Secure Semantic Geosp<strong>at</strong>ial D<strong>at</strong>a Management: I also expanded into the geosp<strong>at</strong>ial domain and startedfocusing on developing a secure geosp<strong>at</strong>ial semantic web with students and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong><strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>. One major obstacle back in 2005 was th<strong>at</strong> there were no standards for geosp<strong>at</strong>ialsemantic web. <strong>The</strong>refore, we designed and developed GRDF (geosp<strong>at</strong>ial RDF) and Secure GRDF. Thiswas a significant contribution. We presented this research in the IEEE Intern<strong>at</strong>ional Conference on D<strong>at</strong>aEngineering workshop and we were then invited to submit a paper to the special issue <strong>of</strong> ComputerStandards and Interface Journal. Our results are published in Paper #8 (Computer Standards andInterface).Secure Semantic Social Networks: Another significant contribution I have made is applying securesemantic web technologies for the security and privacy <strong>of</strong> social networks. Together with a colleague andstudent <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, as well as with colleagues <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria, wedeveloped both an access control model and privacy model for social networks, represented the policies inRDF and OWL and then used RDF and OWL d<strong>at</strong>a managers and reasoners to reason about the policies.This work was published in Paper #9 (ACM SACMAT). It was one <strong>of</strong> the few papers on this topic. Wewere invited for a journal special issue and the journal version will appear in Elsevier’s Computers andSecurity Journal.Secure Web Services: Paper #10 (IEEE Intern<strong>at</strong>ional Conference on Web Services) describes myresearch in secure web services which was carried out with a colleague and a student. We noted th<strong>at</strong> much<strong>of</strong> the work on secure web services was in access control. <strong>The</strong>refore, we focused on other aspects anddeveloped new security models for web services. In particular, we have developed deleg<strong>at</strong>ion-basedmodels for web services as well as inform<strong>at</strong>ion flow models. We have combined both these models into aunique model. We have also designed and implemented a system th<strong>at</strong> utilizes the models. We were thefirst to introduce such an integr<strong>at</strong>ed model into secure web services.Secure Cloud Computing: Paper #11 (Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy) is in theemerging area <strong>of</strong> secure cloud computing. I have designed a framework for secure cloud computing whichconsists <strong>of</strong> a virtual machine layer, storage layer and d<strong>at</strong>a layer. <strong>The</strong>n I collabor<strong>at</strong>ed with colleagues todesign algorithms for each <strong>of</strong> the layers. We have designed a model for secure query processing forsemantic web d<strong>at</strong>a based on principles <strong>of</strong> query optimiz<strong>at</strong>ion and have subsequently developed algorithmsfor secure query processing in a cloud. We expect to continue to make significant impact in secure clouds.My work on secure semantic web and web services has also appeared in numerous other journals andconferences including IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering; IEEE Transactions onSystems, Man and Cybernetics; and IEEE Transactions on Dependable and Secure Computing. One area Iam focusing on now is to integr<strong>at</strong>e my research on secure web services with secure semantic web andbuild secure semantic web services. My book on this topic was published in December 2010. Other areasmy team is focusing on are ontology alignment, schema m<strong>at</strong>ching and investig<strong>at</strong>ing security issues. One <strong>of</strong>107


our papers on this topic has appeared in the prestigious Journal <strong>of</strong> Web Semantics. A book on Buildingand Securing the Cloud is expected to be published in early 2012.1. Selective and Authentic Third-Party Distribution <strong>of</strong> XML Documents, IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, Vol. 16, No. 10, p. 1263-1278, 2004 (co-authors: ElisaBertino, Barbara Carmin<strong>at</strong>i, et al) Co-AuthorMy Contribution: I initi<strong>at</strong>ed the ideas in this paper. <strong>The</strong> detailed design was carried out bycolleagues and students <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria. <strong>The</strong> paper was part <strong>of</strong> the student’s (MsCarmin<strong>at</strong>i) PhD thesis. I commented on the design and the paper.2. PP-trust-X: A system for privacy preserving trust negoti<strong>at</strong>ions. ACM Transactions onInform<strong>at</strong>ion Systems Security (TISSEC), Vol. 10, No. 3, 2007 (co-authors: Anna CinziaSquicciarini, Elisa Bertino, et al) Co-AuthorMy Contribution: This was the second <strong>of</strong> two papers th<strong>at</strong> I collabor<strong>at</strong>ed with colleagues andstudents <strong>at</strong> the <strong>University</strong> <strong>of</strong> Milan. <strong>The</strong> detailed design was carried out by the student (Ms.Squicciarini) as part <strong>of</strong> her thesis. I commented on the paper and wrote some <strong>of</strong> the introductoryand conclusion sections.3. Security Standards for Semantic Web, Computer Standards and Interface Journal, March 2005,Vol. 27 (North Holland). Sole AuthorMy Contribution: This is 100% my work.4. Using RDF for Policy Specific<strong>at</strong>ion and Enforcement, Proceedings <strong>of</strong> the IEEE DEXA Workshopon Web Semantics, Spain, August 2004 (co-authors: B. Carmin<strong>at</strong>i, E. Ferrari). Co-AuthorMy Contribution: I initi<strong>at</strong>ed the ideas in this paper. <strong>The</strong> details were carried by colleagues <strong>at</strong> the<strong>University</strong> <strong>of</strong> Insubria. <strong>The</strong> paper was written jointly.5. A Rel<strong>at</strong>ional Wrapper for RDF Reific<strong>at</strong>ion, Third IFIP WG 11.11 Intern<strong>at</strong>ional Conference onTrust Management (IFIPTM), West Lafayette, USA, June 15-19, 2009, (co-authors: S.Ramanujam, A. Gupta, L. Khan, and S. Seida). Co-AuthorMy Contribution: This is a team effort and is part <strong>of</strong> the student’s (Ms. Ramanujan) thesis. <strong>The</strong>student wrote the paper and I gave comments. Mr. Gupta carried out the implement<strong>at</strong>ion. Pr<strong>of</strong>.Khan jointly supervised the students with me and Mr. Seida funded this effort from Raytheon.Ms. Ramanujan wrote much <strong>of</strong> the paper with comments from the others.6. Scalable and Efficient Reasoning for Enforcing Role-Based Access Control, Proceedings <strong>of</strong> IFIP11.3, Rome, Italy, June 2010 (co-authors: T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham)Co-AuthorMy Contribution: I conceived the ideas and the student carried out the detailed design andimplement<strong>at</strong>ion. <strong>The</strong> student wrote much <strong>of</strong> the paper with comments from Pr<strong>of</strong>. Kantarcioglu andme.7. Design and Implement<strong>at</strong>ion <strong>of</strong> a Framework for Assured Inform<strong>at</strong>ion Sharing AcrossOrganiz<strong>at</strong>ional Boundaries, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, Vol. 2,No. 4, 2008. (Y. Harsha Kumar et al). Lead AuthorMy Contribution: I carried out the initial design. My student (Ms. Harsha Kumar) carried out theimplement<strong>at</strong>ion. I wrote the paper from the technical report.8. Geosp<strong>at</strong>ial Resource Description Framework (GRDF) and Security Constructs, ComputerStandards and Interfaces Journal, Vol. 33, No. 1, p. 35 – 41, January 2011 (special issuefrom IEEE ICDE conference workshop) (co-authors: A. Alam, L. Khan). Co-AuthorMy Contribution: I conceived the initial ideas. My student Mr. Alam carried out the detaileddesign and wrote much <strong>of</strong> the paper.108


9. A Semantic Web Based Framework for Social Network Access Control, Proceedings <strong>of</strong> ACMSymposium on Access Control Models and Technologies (SACMAT 2009), p. 177-186, (coauthors:B. Carmin<strong>at</strong>i, E. Ferrari, R. He<strong>at</strong>herly, M Kantarcioglu). Co-AuthorMy Contribution: I conceived the idea. Much <strong>of</strong> the design was carried out by Pr<strong>of</strong>. Kantarciogluand Pr<strong>of</strong>. Carmin<strong>at</strong>i. <strong>The</strong> student (Mr. He<strong>at</strong>herly) carried out the implement<strong>at</strong>ion. <strong>The</strong> paper waswritten by all.10. <strong>The</strong> SCIFC Model for Inform<strong>at</strong>ion Flow Control in Web Service Composition, ProceedingsIEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS 2009) (co-authors: W. She, I. Yen,E. Bertino). Co-AuthorMy Contribution: I conceived the initial ideas. Our student carried out the detailed designand implement<strong>at</strong>ion. Much <strong>of</strong> the paper was written by Pr<strong>of</strong>. Yen.11. Security Issues for Cloud Computing, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy,Vol. 4, No. 2, 2010, p. 36 – 48 (co-authors: K. Hamlen, L. Khan, M. Kantarcioglu). Lead AuthorMy Contribution: I conceived the ideas and the high level design. My colleagues contributed todetails <strong>of</strong> the design. I wrote the paper.17.5 DATA MINING FOR MALWARE DETECTIONI gave several keynote present<strong>at</strong>ions on D<strong>at</strong>a Mining, Security, Privacy and Civil Liberties starting in1996 and wrote a position paper while <strong>at</strong> NSF th<strong>at</strong> resulted in significant emphasis on privacy research.However, I also continued with d<strong>at</strong>a mining for security applic<strong>at</strong>ions research both for n<strong>at</strong>ional securityand cyber security. When I joined <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, I collabor<strong>at</strong>ed with a pr<strong>of</strong>essor andstudents and together we designed and developed a number <strong>of</strong> d<strong>at</strong>a mining algorithms for malwaredetection. We have also developed a d<strong>at</strong>a mining toolkit based on our algorithm.D<strong>at</strong>a Mining for Intrusion Detection: Our initial focus was on applying d<strong>at</strong>a mining for intrusiondetection. We applied various d<strong>at</strong>a mining techniques based on Support Vector Machines (SVM) as wellas developed a novel technique called dynamical growing self-organizing tree (DGSOT) and comparedthe results to the work <strong>of</strong> others. This research was published in Paper #1 th<strong>at</strong> appeared in the prestigiousVery Large D<strong>at</strong>abase Journal. We also included this paper as part <strong>of</strong> a book th<strong>at</strong> we published in 2009 onthe Design and Implement<strong>at</strong>ion <strong>of</strong> D<strong>at</strong>a Mining Tools.D<strong>at</strong>a Mining for Malware Detection: We then started a focused research program on d<strong>at</strong>a miningapplic<strong>at</strong>ions in cyber security funded by the Air Force. In Paper #2 (ICC), we developed a hybrid modelth<strong>at</strong> examined both byte code and assembly code for detecting malicious code. This was a novel approach<strong>at</strong> th<strong>at</strong> time. <strong>The</strong>n in Paper #3 (Inform<strong>at</strong>ion Systems Frontiers), we developed scalable solutions to fe<strong>at</strong>ureextraction for detecting buffer overflow as well as malicious executables.Stream Mining for Fault Detection: <strong>The</strong> research for the last two papers are jointly carried out with the<strong>University</strong> <strong>of</strong> Illinois <strong>at</strong> Urbana Champaign and funded by NASA. Here our goal was to develop d<strong>at</strong>amining techniques for fault detection. D<strong>at</strong>a is eman<strong>at</strong>ing from multiple sources in the form <strong>of</strong> streams. Wehave developed novel stream mining techniques for classifying d<strong>at</strong>a streams. Our approach is based onexamining multiple and hierarchical chunks <strong>of</strong> d<strong>at</strong>a. <strong>The</strong> results are published in Paper #4 (ICDM).However, with our previous approach, new faults cannot be detected. <strong>The</strong>refore, we have come up with abreakthrough technique where novel classes can be detected with high accuracy. This result is publishedin Paper #5 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering).Active Defense: <strong>The</strong> results in Papers #2 and #3 focus on defensive detection mechanisms. <strong>The</strong> challengewe face now is th<strong>at</strong> the malicious code will change its p<strong>at</strong>terns, thereby making it very difficult to detect.<strong>The</strong>refore, we have developed a breakthrough approach to be able to detect the malicious code before thevirus is detected. Our results are published in Paper #6 (Computer Standards and Interface Journal).109


We also have additional papers accepted/published in prestigious conferences including IEEE ICDM andECML/PKDD. Together with our colleagues <strong>at</strong> the <strong>University</strong> <strong>of</strong> Illinois, we have applied for a p<strong>at</strong>ent onthe Novel Class Detection System with <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> as the primary inventor. Wehave assembled all <strong>of</strong> the work described in Papers 1 - 3 as well as our additional papers on this topic andhave written a book titled D<strong>at</strong>a Mining Tools for Malware Detection (to be published l<strong>at</strong>er in the year).1. A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering,VLDB Journal, Vol. 16, 2007 (co-authors: M. Awad, L. Khan). Co-AuthorMy Contribution: Pr<strong>of</strong>. Khan and his student Mr. Awad carried out the design andimplement<strong>at</strong>ion. I gave comments and wrote much <strong>of</strong> the paper from the thesis.2. A Hybrid Model to Detect Malicious Executables, Proceedings IEEE Intern<strong>at</strong>ional Conference onCommunic<strong>at</strong>ion (ICC 2007) (co-authors: M. Masud, L. Khan). Co-AuthorMy Contribution: This was a team effort. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was written by thestudent and I gave comments.3. A Scalable Multi-level Fe<strong>at</strong>ure Extraction Technique to Detect Malicious Executables,Inform<strong>at</strong>ion Systems Frontiers, Vol. 10, No. 1, p.33-45, March 2008 (co-authors: M. Masud, L.Khan). Co-AuthorMy Contribution: This was a team effort. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was written by thestudent and I gave comments.4. A Practical Approach to Classify Evolving D<strong>at</strong>a Streams: Training with Limited Amount <strong>of</strong>Labeled D<strong>at</strong>a, Proceedings Intern<strong>at</strong>ional Conference on D<strong>at</strong>a Mining (ICDM 2008) (co-authors:M. Masud, J. Gao, L. Kahn, J. Han). Co-AuthorMy Contribution: This was a team effort between <strong>The</strong> <strong>University</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> and the<strong>University</strong> <strong>of</strong> Illinois <strong>at</strong> Urbana Champaign. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was mainly written bythe student and I gave comments.5. Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>a Streams under TimeConstraints, IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, , Vol. 23, No. 6, p. 859 –874, June 2011 (co-authors: M. Masud, J. Gao, L. Khan, J. Han). Co-AuthorMy Contribution: This was a team effort between <strong>The</strong> <strong>University</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> and the<strong>University</strong> <strong>of</strong> Illinois <strong>at</strong> Urbana Champaign. Pr<strong>of</strong>. Khan and I supervised the student (Mr. Masud).<strong>The</strong> student carried out the detailed design and implement<strong>at</strong>ion. <strong>The</strong> paper was mainly written bythe student and I gave comments.6. Exploiting an Antivirus Interface, Computer Standards and Interface Journal, Vol. 31,No.6, 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan). Co-AuthorMy Contribution: I conceived the idea. This was a team effort between Pr<strong>of</strong>. Hamlen, Pr<strong>of</strong>. Khan,myself and our students, Mr. Masud and Mr. Mohan. <strong>The</strong> students carried out the detailed designand implement<strong>at</strong>ion. <strong>The</strong> paper was mainly written by Pr<strong>of</strong>. Hamlen and I gave comments.17.6 CONCLUSIONIn this section, I have presented a sample <strong>of</strong> my papers and described my research contributions in securedependable d<strong>at</strong>a management. Section 17.1 provided a sample <strong>of</strong> my papers in multilevel secure d<strong>at</strong>amanagement. Section 17.2 provided a sample <strong>of</strong> my papers in dependable d<strong>at</strong>a management. Section 17.3provided a sample <strong>of</strong> my papers in semantic web, web services security and Section 17.4 provided asample <strong>of</strong> my papers in d<strong>at</strong>a mining for malware detection. My research is continuing in these areas aswell as in additional areas. Below I provide an overview.110


Policy management: While discretionary security for rel<strong>at</strong>ional d<strong>at</strong>abase is a m<strong>at</strong>ure technology, there isa lot to do in discretionary security for XML and RDF d<strong>at</strong>abases. For example, how can we specifypolicies? How can we incorpor<strong>at</strong>e policies for provenance d<strong>at</strong>a management with trust, confidentiality andprivacy? How can semantic web d<strong>at</strong>a be secured? Wh<strong>at</strong> sorts <strong>of</strong> temporal authoriz<strong>at</strong>ion models areappropri<strong>at</strong>e for the emerging d<strong>at</strong>abase systems? <strong>The</strong>se are all interesting challenges.Multilevel security: We have focused on multilevel security for various types <strong>of</strong> d<strong>at</strong>abases. Whileresearch in this area is not as active as it used to be, we have learned a lot in conducting research inMLS/DBMSs. Furthermore, such systems are still needed for military and intelligence applic<strong>at</strong>ions. <strong>The</strong>challenges here include developing new kinds <strong>of</strong> models and architectures for MLS/DBMSs as well asbuilding high assurance systems.Inference Problem: While this is a very difficult problem, it continues to fascin<strong>at</strong>e researchers. We needto build policy managers th<strong>at</strong> are more efficient and can manage prior knowledge. We also need toexamine the complexity <strong>of</strong> the problem. <strong>The</strong>re is a lot <strong>of</strong> interesting theoretical work to do in this area.Secure Distributed and Heterogeneous D<strong>at</strong>abases: While some progress has been made, we need anextensive investig<strong>at</strong>ion <strong>of</strong> security for distributed, heterogeneous and feder<strong>at</strong>ed d<strong>at</strong>abases. Wh<strong>at</strong> sorts <strong>of</strong>access control models are appropri<strong>at</strong>e for such systems? How can we share d<strong>at</strong>a and still have security andautonomy? How can security policies be integr<strong>at</strong>ed across organiz<strong>at</strong>ions? How can distributedtransactions be executed securely?Secure Object D<strong>at</strong>abases and Applic<strong>at</strong>ions: <strong>The</strong>re has been work in both discretionary and mand<strong>at</strong>orysecurity for object d<strong>at</strong>abases. How can we apply the principles for object-rel<strong>at</strong>ional systems since suchsystems are domin<strong>at</strong>ing the marketplace? Are the security mechanisms for distributed object managementsystems sufficient? How can we provide fine-grained access control? How can UML be used to designsecure applic<strong>at</strong>ions?Secure D<strong>at</strong>a Warehousing: <strong>The</strong>re are many challenges here. How can we build a secure warehouse fromthe d<strong>at</strong>a sources? How can we develop an integr<strong>at</strong>ed security policy? Wh<strong>at</strong> is the security impact on thefunctions <strong>of</strong> a warehouse?Secure Web D<strong>at</strong>a and Inform<strong>at</strong>ion Management: <strong>The</strong>re is a lot <strong>of</strong> work to be done on secure web d<strong>at</strong>aand inform<strong>at</strong>ion management. For example, how can we build secure web d<strong>at</strong>abase systems? Wh<strong>at</strong> are thesecurity issues for digital libraries? How do we secure the semantic web? How can we maintain trust onthe web? How can we secure emerging applic<strong>at</strong>ions such as knowledge management, multimedia,collabor<strong>at</strong>ion, e-commerce and peer-to-peer d<strong>at</strong>a management? Also securing the semantic web and webservices will be major research areas.D<strong>at</strong>a Mining, Security and Privacy: Without a doubt, d<strong>at</strong>a mining has many applic<strong>at</strong>ions in security.However, privacy is a major concern. We need better techniques for detecting novel classes. Furthermore,we need to detect the malware before they change p<strong>at</strong>terns. Privacy research includes privacy-preservingd<strong>at</strong>a mining, building privacy controllers and analyzing the complexity <strong>of</strong> the privacy problem. Privacy isa multidisciplinary research topic between computer scientists and social scientists.Assured Inform<strong>at</strong>ion Sharing: <strong>The</strong> 9/11 commission report has st<strong>at</strong>ed th<strong>at</strong> we have to migr<strong>at</strong>e from aneed to know to a need to share environment. We need appropri<strong>at</strong>e policy management techniques forsharing d<strong>at</strong>a. More importantly, we need incentives for d<strong>at</strong>a sharing. This is a multidisciplinary researcharea between computer scientists and social scientists.111


Secure Social Networks: With Facebook and other social networking sites, privacy is beingcompromised. In addition, we need security <strong>of</strong> the d<strong>at</strong>a. <strong>The</strong>refore, we need novel models and techniquesfor securing social networks and ensuring th<strong>at</strong> the privacy <strong>of</strong> the individuals is maintained.Dependable D<strong>at</strong>a Management: Little work has been reported on integr<strong>at</strong>ing security and real-time d<strong>at</strong>amanagement. For example, how can we build systems with flexible policies th<strong>at</strong> can handle security, realtimeprocessing, fault tolerance and integrity? How can we secure sensor d<strong>at</strong>abase systems? Wh<strong>at</strong> are thesecurity issues for wireless inform<strong>at</strong>ion management?Emerging Security Technologies: Research directions include security for biometrics technologies,digital forensics and secure applic<strong>at</strong>ions such as identity management, and insider thre<strong>at</strong> analysis. I haveconducted some research in biometrics and digital forensics. My main focus now is in identitymanagement and insider thre<strong>at</strong> analysis.112


Section 18: DISCUSSION OF COMPLETE RESEARCH ANDPUBLICATIONS (1980 – Present)18.1 INTRODUCTIONIn this note I give a detailed overview <strong>of</strong> the research I have carried out since I started my pr<strong>of</strong>essionalcareer in August 1980 after my PhD. It shows the depth and breadth <strong>of</strong> my work. Please note th<strong>at</strong> asynopsis <strong>of</strong> my research record is given in Section 3 describing the significance <strong>of</strong> my research withspecific references and cit<strong>at</strong>ions.I first describe my research focus <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> (UTD) since October 2004, andthen describe my research contributions to computer science from 1980-2004. Research <strong>at</strong> UTD,discussed in Section 18.2, is focusing in two major areas: D<strong>at</strong>a Security and Privacy (Assured Inform<strong>at</strong>ionSharing; Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management and Secure Social Networks) and Inform<strong>at</strong>ion Management(Semantic Web, D<strong>at</strong>a Mining). In particular, we are developing novel d<strong>at</strong>a mining techniques and securesemantic web technologies to solve problems mainly for cyber security and n<strong>at</strong>ional security.In addition to computability theory research which I carried out while a visiting faculty, my priorresearch, was carried out mainly while I was in industry. It has focused on d<strong>at</strong>a security, d<strong>at</strong>amanagement, distributed systems and d<strong>at</strong>a mining and is discussed in Section 18.3. My research spansfrom theory to system design, modeling and implement<strong>at</strong>ion to applic<strong>at</strong>ion design to technology transferto big-picture/vision. I have discussed my research in five areas (Computability <strong>The</strong>ory, Inform<strong>at</strong>ionSecurity, Distributed Systems and Real-time Objects, D<strong>at</strong>a Management, and Homeland Security).My main research area since 1985 has been in Secure Dependable D<strong>at</strong>a Management and still continues.My research has resulted in over 100 journal papers, over 200 conference/workshop papers, over 80keynote present<strong>at</strong>ions, 3 p<strong>at</strong>ents and 12 books (10 published, 2 in prepar<strong>at</strong>ion).18.2 RESEARCH AT THE UNIVERSITY OF TEXAS AT DALLAS(October 2004 – Present: D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Inform<strong>at</strong>ion Management)Research is proceeding in two main areas: D<strong>at</strong>a Security and Privacy, and Inform<strong>at</strong>ion Management.Public<strong>at</strong>ions: Several journal public<strong>at</strong>ions including IEEE Transactions on Systems, Man andCybernetics, Very Large D<strong>at</strong>abase Journal, Computer Systems Science and Engineering, MultimediaTools, ACM Transactions on Inform<strong>at</strong>ion Systems Security, IEEE Transactions on Dependable andSecure Systems, D<strong>at</strong>a and Knowledge Engineering. Conferences include ACM SACMAT, IFIP D<strong>at</strong>aSecurity, IEEE ICDM, ACM GIS, IEEE ISORC, PKDD.I. D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityArea 1: Assured Inform<strong>at</strong>ion Sharing: Funding from AFOSR, NSF (2004 - Present)In the area <strong>of</strong> assured inform<strong>at</strong>ion sharing, the goal is for organiz<strong>at</strong>ions to share d<strong>at</strong>a and <strong>at</strong> the same timeenforce policies. We are investig<strong>at</strong>ing confidentiality, privacy, trust, integrity, provenance, standards andinfrastructure aspects. In particular, we are examining three scenarios. In the first scenario, we assumeth<strong>at</strong> the partners <strong>of</strong> a coalition are trustworthy (e.g, US, UK, Australia). However, each partner may wantto enforce various security policies. We are investig<strong>at</strong>ing RBAC and UCON policies for such a scenario,carrying out d<strong>at</strong>a mining and conducting experimental studies as to the amount <strong>of</strong> inform<strong>at</strong>ion th<strong>at</strong> is lostby enforcing policies. We are also investig<strong>at</strong>ing ways to transfer our technologies to programs such asDoD’s NCES (Network Centric Enterprise Services).In the second scenario, we assume th<strong>at</strong> the partners are semi-trustworthy. In this case, we want to playgames with the partners and extract as much inform<strong>at</strong>ion as possible without giving out inform<strong>at</strong>ion aboutourselves. We are using results from game theory to formul<strong>at</strong>e str<strong>at</strong>egies for such a scenario and have113


obtained some interesting simul<strong>at</strong>ion results. In the third scenario, we assume th<strong>at</strong> the partners areuntrustworthy. Here, we apply d<strong>at</strong>a mining to defend our systems from virus and worms and <strong>at</strong> the sametime try to probe into our partners’ systems.This research has now resulted in a MURI project. We are investig<strong>at</strong>ing incentive-based inform<strong>at</strong>ionsharing and risk-based access control.Area 2: Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management: Funding from NGA, RaytheonIn the area <strong>of</strong> secure geosp<strong>at</strong>ial d<strong>at</strong>a management, we are developing technologies for geosp<strong>at</strong>ial semanticweb and d<strong>at</strong>a mining. We are specifying extensions to GML for access control policies, as well asdeveloping ontologies for geosp<strong>at</strong>ial d<strong>at</strong>a. Using these ontologies, we are conducting d<strong>at</strong>a mining. Inaddition, we are also developing geosp<strong>at</strong>ial web services. Finally, we are developing a new languagecalled GRDF (Geosp<strong>at</strong>ial Resource Description Framework) and Secure GRDF for a geosp<strong>at</strong>ial semanticweb. While we are developing various pieces <strong>of</strong> technologies, our goal is to work through standardsorganiz<strong>at</strong>ions such as OGC (Open Geosp<strong>at</strong>ial Consortium) and corpor<strong>at</strong>ions such as Raytheon to transferour research to standards and oper<strong>at</strong>ional programs. We are members <strong>of</strong> both OGC and USGIF. We arealso members <strong>of</strong> UTD’s Geosciences program.Area 3: D<strong>at</strong>a Mining Applic<strong>at</strong>ions in Security, Funding from <strong>Texas</strong> Enterprise Funds, NASA,AFOSR (2007 - Present)Our main research in d<strong>at</strong>a mining applic<strong>at</strong>ions is to develop tools for intrusion detection and maliciouscode detection. In addition, we are developing tools for fault detection. We have also applied d<strong>at</strong>a miningfor surveillance and biometrics. In the area <strong>of</strong> surveillance and biometrics, our goal is to developtechnologies for detecting suspicious events. We developed a surveillance system to detect suspiciousevents. We identified normal events and used d<strong>at</strong>a mining techniques and determined whether an event issuspicious. In the area <strong>of</strong> biometrics, we developed tools for face recognition and fingerprint detection. Inaddition, we are conducting research on integr<strong>at</strong>ing robotics and security.Area 4: Secure Grid/Cloud and Web Services AFOSR (2008-Present)Here we are developing a deleg<strong>at</strong>ion model for web services. In addition, we are developing algorithmsfor secure storage <strong>of</strong> grid systems, as well as accountability policies for grid systems. We have alsodesigned and implemented secure query processing and inform<strong>at</strong>ion sharing in a cloud.Area 5: Secure Social Networks , Funding from AFOSR (2008 - Present),Here we are applying semantic web technologies to represent social networks and investig<strong>at</strong>e security andprivacy (jointly with <strong>University</strong> <strong>of</strong> Insubria).Area 6: Complexity <strong>The</strong>ory (2008 - Present)My PhD research, as well as early research in my career, was in computability theory (please see section3). After 25 years, I have gotten back into the field <strong>of</strong> co-advising students on complexity theory forsensory networks and security. This is more <strong>of</strong> a hobby <strong>at</strong> present.II.Inform<strong>at</strong>ion ManagementSemantic Web: Funding from IARPA (2007 - Present)Our research is in semantic web applic<strong>at</strong>ions for social networks, as well as knowledge management. Weare conducting research in enhancing JENA, building query techniques with Hadoop, as well asinvestig<strong>at</strong>ing security for semantic web and social networks. We are also exploring security for semanticweb and privacy for social networks.18.3 RESEARCH CONTRIBUTIONS TO CS (AUGUST 1980 – SEPTEMBER 2004)My research between 1980 and 2004 proceeded in five main areas: Computability <strong>The</strong>ory, D<strong>at</strong>a Security,Distributed Processing, D<strong>at</strong>a Management and Inform<strong>at</strong>ion Technologies for Homeland Security.114


Public<strong>at</strong>ions: Several journal public<strong>at</strong>ions including IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, IEEE Transactions on S<strong>of</strong>tware Engineering, IEEE Transactions on Parallel and DistributedProcessing, Journal <strong>of</strong> Computer and Systems Sciences, Notre Dame Journal <strong>of</strong> Formal Logic, Computersand Security and IEEE Computer as well as several conference public<strong>at</strong>ions including in ICDE, VLDB,ACSAC, IFIP D<strong>at</strong>a Security, and OOPSLA.Area 1: Computability <strong>The</strong>oryMuch <strong>of</strong> my research in the early 1980s was on computability theory. I studied various decision problemsfor combin<strong>at</strong>orial systems such as systems functions and proved several results on the unsolvability and thecomplexity <strong>of</strong> the problems. I also invented the concept <strong>of</strong> an N-cylinder and this enabled me to giveseveral counter-examples for the complexity problems. I have also applied the results in these papers to mywork on the complexity <strong>of</strong> the inference problem. This complexity work was st<strong>at</strong>ed by NSA (N<strong>at</strong>ionalSecurity Agency) to be a significant development in d<strong>at</strong>abase security in 1990 (Proceedings N<strong>at</strong>ionalComputer Security Conference). I am now applying the results to the privacy problem. Several papers werepublished in the Journal <strong>of</strong> Computer and Systems Sciences and the Notre Dame Journal <strong>of</strong> Formal Logicbetween 1980 and 1993.Area 2: Secure D<strong>at</strong>a ManagementMy research in inform<strong>at</strong>ion security and secure d<strong>at</strong>abase systems started in 1985 and still continues.Around 70% <strong>of</strong> my public<strong>at</strong>ions are in this area. This work has had a major impact on the researchcommunity, as well as on the commercial and government communities. I have been invited to givenumerous keynote addresses on my research, as well as advice to the government on inform<strong>at</strong>ion security.My earlier contributions have been on secure rel<strong>at</strong>ional d<strong>at</strong>abases, secure object d<strong>at</strong>abases, securedistributed d<strong>at</strong>abases and the inference problem. My research in the early 2000s was on secure XMLd<strong>at</strong>abases, privacy constraint processing, and secure sensor inform<strong>at</strong>ion management. My current researchis discussed in Section 17.2. A summary <strong>of</strong> my research between 1985 and 2004 is given below.Secure Rel<strong>at</strong>ional Systems: In the mid to l<strong>at</strong>e1980s, I was part <strong>of</strong> a team <strong>at</strong> Honeywell designing one <strong>of</strong>the prominent secure rel<strong>at</strong>ional d<strong>at</strong>abase systems. This system was called Lock D<strong>at</strong>a Views (LDV) built ontop <strong>of</strong> a LOCK secure oper<strong>at</strong>ing system. Issues investig<strong>at</strong>ed in this research had an impact on some <strong>of</strong> thecommercial products th<strong>at</strong> were emerging in the l<strong>at</strong>e 1980s and early 1990s. We developed a securitypolicy, security model and designed modules for query, upd<strong>at</strong>e, and metad<strong>at</strong>a management. We alsodeveloped a multilevel rel<strong>at</strong>ional d<strong>at</strong>a model.Secure Objects: I investig<strong>at</strong>ed security for object d<strong>at</strong>abase systems based on MCC’s ORION. I was one <strong>of</strong>the first to carry out such an investig<strong>at</strong>ion. This work had a major impact on the secure d<strong>at</strong>abase researchcommunity. Subsequently I published a policy, model and design <strong>of</strong> a system. I also examined the use <strong>of</strong>object models for designing secure systems.Secure Distributed D<strong>at</strong>abases: In the early 1990s, I led a team and conducted research on securedistributed d<strong>at</strong>abase systems. Algorithms for secure query processing and transaction management weredesigned. Prototypes were implemented. We connected systems in Massachusetts, Washington DC andNew Jersey and built applic<strong>at</strong>ions. This was a very novel idea <strong>at</strong> th<strong>at</strong> time. Simul<strong>at</strong>ion studies were alsocarried out on secure query and transaction processing.Inference Problem/Secure Deductive D<strong>at</strong>abases: I was one <strong>of</strong> the first to conduct research on theinference problem and deductive d<strong>at</strong>abases and also cre<strong>at</strong>ed a logic for secure d<strong>at</strong>abases called NTML(Nonmonotonic Typed Multilevel Logic). I also proved th<strong>at</strong> the inference problem is unsolvable and thiswork was cited as one <strong>of</strong> the significant developments in d<strong>at</strong>abase security in 1990 by Dr. John Campbell<strong>of</strong> NSA in the Proceedings <strong>of</strong> the 1990 N<strong>at</strong>ional Computer Security Conference. I was successfully able touse my research on computability theory to study the complexity <strong>of</strong> the inference problem. I also led a teamth<strong>at</strong> conducted research on security constraint processing and designed and developed systems to processconstraints. We extended the prototypes to work in a distributed environment.Emerging Security Technologies: More recently my research has been on secure web d<strong>at</strong>a management.In particular I have examined security for XML d<strong>at</strong>abases and the semantic web. I am also investig<strong>at</strong>ing115


designs for privacy constraint processing which is along the lines <strong>of</strong> my work on the inference problem. Iam exploring some new directions such as security for sensor inform<strong>at</strong>ion systems.Other Inform<strong>at</strong>ion: Some <strong>of</strong> my research in secure d<strong>at</strong>abases was carried out in collabor<strong>at</strong>ion with the<strong>University</strong> <strong>of</strong> Minnesota in the 1980s and I supervised MS and PhD students there. At MITRE I hadstudents working on my projects in secure d<strong>at</strong>abases from CMU and Cornell. I have also collabor<strong>at</strong>ed withthe <strong>University</strong> <strong>of</strong> Milan and supervised a PhD student. I mentored junior staff <strong>at</strong> the NSA <strong>at</strong> the request <strong>of</strong>the chief between 1991 and 1997 and wrote joint papers. I also reviewed university research proposals forNSA in this area between 1991 and 1996. I invented three US p<strong>at</strong>ents for MITRE on d<strong>at</strong>abase inferencecontrol and have authored a very comprehensive book in d<strong>at</strong>abase and applic<strong>at</strong>ions security. I served onthe editorial board <strong>of</strong> the Journal <strong>of</strong> Computer Security for ten years and now serve on the editorial boards<strong>of</strong> two <strong>of</strong> the major journals in security: ACM Transactions on Inform<strong>at</strong>ion Systems Security and IEEETransactions on Dependable and Secure Computing. In addition, I serve on the editorial and advisoryboards <strong>of</strong> four other security journals. My research in secure d<strong>at</strong>abases has also resulted in being elected aFellow <strong>of</strong> IEEE, AAAS and the British Computer Society. I received the IEEE CS 1997 TechnicalAchievement award for this work and was also quoted by Silicon India as one <strong>of</strong> top seven technologyinnov<strong>at</strong>ors <strong>of</strong> South Asian origin (other six are from Stanford, Berkeley, MIT, NASA, HP Labs andPARC). Several articles have appeared in IEEE Computer, IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, ACM OOPSLA, Journal <strong>of</strong> Object-Oriented Programming, Computers and Security Journal,D<strong>at</strong>a and Knowledge Engineering, and Journal <strong>of</strong> Systems and S<strong>of</strong>tware.Area 3: Dependable D<strong>at</strong>a ManagementDistributed Systems: I believe strongly th<strong>at</strong> to carry out security research one needs a good understanding<strong>of</strong> systems. <strong>The</strong>refore, while conducting security research since 1985, I have also worked in systemsincluding d<strong>at</strong>abase systems, distributed systems and networks. Some <strong>of</strong> my early work with the <strong>University</strong><strong>of</strong> Minnesota in the 1980s was on distributed fault tolerant systems. We worked on binary tree task modelsfor fault tolerant computing. I supervised PhD students in this area. While <strong>at</strong> Honeywell, I spent part <strong>of</strong> mytime designing a network oper<strong>at</strong>ing system for space st<strong>at</strong>ion networks. Prior to Honeywell, I had over 2years <strong>of</strong> product development experience with CDCNET <strong>at</strong> Control D<strong>at</strong>a Corpor<strong>at</strong>ion.Survivable Real-time Object Systems: Between 1993 and 2000 I worked with a team <strong>at</strong> MITRE and the<strong>University</strong> <strong>of</strong> Rhode Island conducting research for next gener<strong>at</strong>ion AWACS (Airborne Warning andControl System). My goal was to integr<strong>at</strong>e my security research with real-time processing and faulttolerance techniques to build survivable systems. We designed and developed an infrastructure and d<strong>at</strong>amanager based on objects for next gener<strong>at</strong>ion AWACS and transferred the technology to Air Forceprograms. We also investig<strong>at</strong>ed aspects <strong>of</strong> integr<strong>at</strong>ing security, real-time processing and fault toleranceissues. I led the real-time inform<strong>at</strong>ion management part <strong>of</strong> the project and also helped found the real-timeobject request broker group <strong>at</strong> the Object Management Group. We were the first to propose real-timeaspects for Object Request Brokers in 1994. We continued our investig<strong>at</strong>ion on real-time CORBA and alsoinvestig<strong>at</strong>ed scheduling for real-time middleware. We also designed and developed new concurrencycontrol algorithms for real-time object d<strong>at</strong>abases. This research had a major impact not only on Air Forceprograms but also on other DoD programs. We influenced the standards community, the commercialcommunity (for real-time CORBA) and the research community (e.g., real-time concurrency control). Ialso supervised MS and PhD students in this area from <strong>University</strong> <strong>of</strong> Rhode Island and North Eastern<strong>University</strong>. Several papers on fault tolerant and real-time computing were published including articles inIEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, IEEE Transactions on S<strong>of</strong>tware Engineering, IEEE Symposium <strong>of</strong> Object-Oriented Real-timeComputing, Real-time Systems Journal, IEEE Network, VLDB Conference, and Computer SystemsScience and Engineering.Area 4: D<strong>at</strong>a and Inform<strong>at</strong>ion Management116


Research and Technology Transfer in D<strong>at</strong>a Management: During the mid to l<strong>at</strong>e 1980s while <strong>at</strong>Honeywell Computer Sciences Center, I worked with a team on a number <strong>of</strong> research projects funded bythe commercial divisions. In one effort we developed an applic<strong>at</strong>ion gener<strong>at</strong>or toolkit to help the residentialcontrol division programmers develop d<strong>at</strong>abase applic<strong>at</strong>ions. In another effort, we explored the use <strong>of</strong>expert systems technology for designing process control systems such as Honeywell’s TDC3000 forIndustrial Autom<strong>at</strong>ion division. We also designed and developed a distributed d<strong>at</strong>a dictionary system forHoneywell’s Residential control division. While my main research has been in d<strong>at</strong>a and applic<strong>at</strong>ionssecurity, I have a solid background in d<strong>at</strong>abase systems, as I believe strongly th<strong>at</strong> to conduct securityresearch in d<strong>at</strong>a management, one needs a good understanding <strong>of</strong> d<strong>at</strong>abase systems.D<strong>at</strong>a, Inform<strong>at</strong>ion and Knowledge Management: At MITRE, in the mid to l<strong>at</strong>e 1990s and early 2000, Imanaged a research group in Inform<strong>at</strong>ion Management (which included d<strong>at</strong>a management, multimedia,inform<strong>at</strong>ion management, d<strong>at</strong>a mining and knowledge management) for several years. I also advised thegovernment and MITRE on d<strong>at</strong>a/inform<strong>at</strong>ion management and wrote five books in the field for technicalmanagers. I managed university research programs for the Intelligence Community for six years. Severaljournal and conference papers were published in Knowledge and Process Management Journal, ComputerStandards and Interface Journal and the IEEE D<strong>at</strong>a Engineering Conference. I also served on the editorialboard <strong>of</strong> IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering for four years. Having a strong systemsbackground has helped my security research a gre<strong>at</strong> deal as security is not a stand-alone field and has to beintegr<strong>at</strong>ed with systems.Area 5: Inform<strong>at</strong>ion Technologies for Homeland SecuritySince 9/11 I have been very active <strong>at</strong> NSF on interagency research in homeland security. In particular, Ihave set the direction for d<strong>at</strong>a mining for counter-terrorism and gave keynote present<strong>at</strong>ions <strong>at</strong> the WhiteHouse and the United N<strong>at</strong>ions. I consulted for DHHS (Health and Human Services) on bioterrorism andalso wrote a book on d<strong>at</strong>a mining for counter-terrorism. I am also very aware <strong>of</strong> privacy concerns and aspart <strong>of</strong> my research on inform<strong>at</strong>ion security, I am addressing privacy. I will continue to contribute tohomeland security areas. I am using my expertise in areas such as d<strong>at</strong>a security, real-time systems and d<strong>at</strong>amining and theory to investig<strong>at</strong>e problems in n<strong>at</strong>ional security. Also, to get a better understanding <strong>of</strong>terrorist behavior, I completed the certific<strong>at</strong>ion in terrorism studies <strong>at</strong> <strong>University</strong> <strong>of</strong> St. Andrews inScotland in Summer 2010.117


Section 19: PROFESSIONAL ACTIVITIESEditor-in-ChiefComputer Standards and Interface Journal, June 2005 – January 2009Editorial BoardsJournal <strong>of</strong> Computer Security, 1990 – 2000IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, 1996 – 2000Computer Standards and Interfaces, 1993 – 2005ACM Transactions on Inform<strong>at</strong>ion Systems Security, 2004 – 2007IEEE Transactions on Secure and Dependable Computing, 2004 – 2010Journal <strong>of</strong> Distributed Sensor Networks, 2004 –Journal <strong>of</strong> Computer Science and Network Security, 2006 –Journal <strong>of</strong> Inform<strong>at</strong>ion and Computer Security, 2005 –Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, 2006 –Very Large D<strong>at</strong>abase Journal, 2007 – 2011Advisory BoardsPurdue <strong>University</strong>, Computer Science Department, 2004 – 2006Journal <strong>of</strong> Privacy Technologies, 2004 –Journal <strong>of</strong> Computer Security, 2000 –IASTED, 2001 – 2004General Conference Chair/Co-ChairIEEE WORDS Conference, Rome, Italy, January 2001IFIP D<strong>at</strong>a Integrity and Control Conference, Warrenton, VA, November 2005Intelligence and Security Inform<strong>at</strong>ics, ISI, San Diego, CA, May 2006Secure Knowledge Management, <strong>Dallas</strong>, TX, November 2008Intelligence and Security Inform<strong>at</strong>ics, ISI, <strong>Dallas</strong>, TX, June 2009NSF Workshop on D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Arlington, VA, February 2009Program Chair/Co-Chair1. IFIP D<strong>at</strong>abase Security Conference, Vancouver, Canada, August 1992 (Chair)2. ACM OOPSLA Conference Workshop on Secure Object, Washington DC, Sept 1993 (Co-chair)3. ACM Multimedia Conference Workshop on Multimedia D<strong>at</strong>a, San Francisco, CA, October 1994(Co-chair)4. ACM OOPSLA Conference Workshop on Objects in Healthcare, Portland, OR, October 1994 (Cochair)5. IEEE Workshop on Multimedia D<strong>at</strong>abase Systems, Blue Mountain Lake, NY, August 1995 (Cochair)6. ACM OOPSLA Conference Workshop on Objects in Healthcare, Austin, TX, October 1995 (Cochair)7. ACM Multimedia Conference Workshop on Multimedia D<strong>at</strong>abase, San Francisco, CA, November1995 (Co-chair)8. IEEE Metad<strong>at</strong>a Conference, Silver Spring, MD, April 1996 (Founding Chair)9. ACM OOPSLA Conference Workshop on Objects in Healthcare, San Jose, CA, October 1996 (Cochair)10. Federal D<strong>at</strong>a Mining Symposium, Washington DC, December 1997 (Founding Co-Chair)11. IEEE Multimedia D<strong>at</strong>abase Workshop, Dayton, OH August 1998 (Co-chair),12. IEEE COMPSAC Conference, Vienna, Austria, 1998 (Co-chair)118


13. IEEE WORDS Workshop, Santa Barbara, CA, January 1999 (Chair)14. IEEE ISORC, Newport Beach, CA, March 2000 (Co-chair)15. IFIP D<strong>at</strong>abase Security Conference, Amsterdam, Netherlands, August 2000 (Primary Co-chair)16. CODATA Symposium on Integr<strong>at</strong>ing Heterogeneous D<strong>at</strong>a, Stressa Italy, October 2000 (Co-chair)17. IEEE ISADS Conference, <strong>Dallas</strong>, TX, March 2001 (Chair)18. IEEE COMPSAC Conference Workshop on Web Security, Oxford, UK, August 2002 (Co-chair)19. IEEE ISORC, Korea, April 2006 (Co-chair)20. ACM SACMAT Conference, Sophia Antipolis, France, June 2007 (Chair)21. ICDE Secure Semantic Web Workshop, Mexico, April 2008 (Co-chair)22. ICWS Security Workshop, Los Angeles, CA, July 2009 (Co-chair)23. PASSAT, Vancouver, Canada, August 2009 (Chair)24. Indo-US Summit in Infrastructure Security, Bangalore, January 2010 (Co-chair)Program Vice Chair and/or Special Roles1. IEEE ICDE Conference, Mexico, 2008, Vice Chair for Security2. IEEE ICDE Conference, Sydney, 1999, Panel Chair3. Computer Security Applic<strong>at</strong>ions Conference, 1990, Chair, D<strong>at</strong>abase Security TrackProgram Committee Member (Sample, not a complete list)1. IEEE Local Area Networks Conference, Minneapolis, MN, October 19872. ACM Computer and Communic<strong>at</strong>ions Security Conference, Fairfax, VA, November 19943. ACM SAC 1994, Phoenix, AZ, March 19944. ACM SAC 1995, Nashville, TN, February 19955. IEEE ICECCS Conference, Ft. Lauderdale, FL, October 19956. ACM SIGMOD Conference Workshop on D<strong>at</strong>a Mining, Montreal, Canada, June 19967. Pacific Workshop on Distributed Multimedia Systems, Hong Kong, June 19968. IEEE ICECCS, Montreal, Canada, October 19969. IEEE WORDS Workshop, Newport Beach, CA, February 199710. Rough Sets and S<strong>of</strong>t Computing Workshop, Raleigh, NC, March, 199711. Pacific Workshop on Distributed Multimedia Systems, July 199712. Real-time D<strong>at</strong>abase Systems Workshop, Burlington, VT, September 199713. IEEE COMPSAC, Bethesda, MD, August 199714. Compugraphics and Visualiz<strong>at</strong>ion Conference, Algarve, Portugal, December 199715. IEEE ICDE, Orlando, FL, February 199816. IEEE ISORC, Kyoto, Japan, April 199817. PAKDD, Melbourne, Australia, April 199818. Real-time Systems Applic<strong>at</strong>ions Conference, Denver, CO, June199819. Euro micro Workshop on Multimedia and Communic<strong>at</strong>ions, Vesteras, Sweden, August 199820. ASSET, <strong>Dallas</strong>, TX, March 199921. IEEE ISADS, Tokyo, Japan, March 199922. DASFAA, Taiwan, April 199923. Federal D<strong>at</strong>a Mining Symposium, McLean, VA, March 199924. IEEE COMPSAC, Tempe, AZ, October 199925. IEEE WORDS 1999F, Monterey, CA November 199926. E-Commerce and Web-based Inform<strong>at</strong>ion Systems Workshop, San Jose, CA, April 199927. PAKDD, Beijing, China, April 199928. Federal D<strong>at</strong>a Mining Symposium, Washington DC, March 200029. PAKDD, Kyoto, Japan, April 200030. ACM CCS Workshop on E-Commerce Security, Athens, Greece, November 200031. IEEE ISORC, Magdeberg, Germany, May 2001119


32. IEEE COMPSAC, Chicago, IL, October 200133. Intern<strong>at</strong>ional Workshop on Multimedia Middleware, Ottowa, Canada, November 200134. IEEE FTDCS, Bologna, Italy, November 200135. IEEE WORDS, San Diego, CA, January 200236. IASTED Applied Inform<strong>at</strong>ics, Innsbruck, Austria, February 200237. PAKDD Workshop on Rough Sets and D<strong>at</strong>a Mining, Taiwan, May 200238. IEEE ISORC, Washington DC, May 200239. IEEE ICDM, 2002, Maebashi City, Japan, December 200240. ACM SACMAT, Monterey, CA, June 200241. Second Semantic Web Symposium, Sardinia, Italy, June 200242. IEEE COMPSAC, Oxford, UK, August 200243. COOPIS, Irvine, CA, October 200244. IEEE ICTAI 2002, Crystal City, VA, November 200245. IFIP Integrity and Control Conference, Bonn, Germany, November 200246. NSF/NIJ Symposium on Security Inform<strong>at</strong>ics, Tucson, AZ, June 200347. IASTED Applied Inform<strong>at</strong>ics, Innsbruck, Austria, February 200348. IEEE ISADS, Pisa, Italy, April 200349. IEEE ISORC, Japan, May 200350. IFIP D<strong>at</strong>a Security, Colorado Springs, CO , August 200351. IEEE WORDS 2003F, Capri Island, Italy, October 200352. IFIP Integrity and Control Conference, Lausanne, Switzerland, November 200353. ACM Computer and Communic<strong>at</strong>ions Security, Washington DC, October 200354. IEEE ICTAI, Sacramento, CA, November 200355. IEEE COMPSAC, <strong>Dallas</strong>, TX, November 200356. IFIP D<strong>at</strong>abase Security Conference, Estes Park, CO, August 200357. IEEE ISORC, Vienna, Austria, May 200458. NSF/NIJ Symposium on Security Inform<strong>at</strong>ics, Tucson, AZ, June 200459. ACM SACMAT, Yorktown Heights, NY, June 200460. ACM SIGMOD Workshop on D<strong>at</strong>abases in Virtual Organiz<strong>at</strong>ions, Paris, France, June 200461. IFIP D<strong>at</strong>abase Security Conference, Sitges, Spain, July 200462. DEXA Workshop on Web Security, Zaragoza, Spain, August 200463. DEXA Workshop on Trust and Privacy in Digital Business, Zaragoza, Spain, August 200464. IEEE COMPSAC, Hong Kong, September 200465. IEEE SRDS, Florianapolis, Brazil, October 200466. IEEE ISADS, Chengdu, China, March 200567. IEEE ICDE, Tokyo, Japan, April 200568. ACM SACMAT, Stockholm, Sweden, June 200569. ACM SIGMOD, Baltimore, MD, June 200570. IEEE Distributed Systems in Sensor Systems, Marina del Rey, CA, July 200571. IFIP D<strong>at</strong>abase Security Conference, Storrs, CT, August 200572. Privacy in D<strong>at</strong>a Mining Workshop, November 200573. ACM SACMAT, Lake Tahoe, CA, June 200674. ACM SIGKDD, Philadelphia, PA, August 200675. IFIP D<strong>at</strong>abase Security Conference, Sophia Antipolis, France, August 200676. IEEE COMPSAC, Chicago, IL, September 200677. IEEE SRDS, London, England, October 200678. ISWC, Montreax, Switzerland, October 200679. CIKM, Arlington, VA, November 200680. Privacy in D<strong>at</strong>a Mining Workshop, December 200681. ACM SIGKDD, San Jose, CA, August 2007120


82. AAAI, Vancouver, BC, Canada, July 200783. IEEE POLICY, Bologna, Italy, June 200784. IFIP D<strong>at</strong>abase Security Conference, Redondo Beach, CA, July 200785. IEEE POLICY, Palisades, NY, June 200886. ACM SACMAT, Estes Park, CO, June 200887. ASIACCS, Sydney, Australia, March 200988. IEEE ICDE, Shanghai, China, March 200989. ACM SACMAT, Stresa, Italy, June 200990. ICWS, Los Angeles, CA, July 200991. DHS/CPS Workshop, 200992. IEEE Globecom, Honolulu, HI, November – December, 200993. IEEE ACSAC, Honolulu, HI, December 200994. IEEE ACSAC, Austin, TX December 201095. COCOA, Big Island Hawaii, December 201096. ACM CODASPY 2011, San Antonio, TX 201197. ASIACCS, Hong Kong 201198. IEEE ISADS 2011(I am compiling a list <strong>of</strong> all conferences I served as program committee member)Other Boards and Activities1. Member, N<strong>at</strong>ional Academy Panel on Protecting Children from Inappropri<strong>at</strong>e Content on theInternet, 2000 (Chair, Hon. Dick Thornburgh)2. Vice Chair, AF SAB Panel on Migr<strong>at</strong>ing Legacy D<strong>at</strong>abases, 20003. Member, N<strong>at</strong>ional Academy Workshop on GIS, 2001 (particip<strong>at</strong>ed from NSF)4. Member, N<strong>at</strong>ional Academy Panel on Inform<strong>at</strong>ion Fusion and Counter-terrorism, 2002 (particip<strong>at</strong>edfrom NSF; Chair: T. Mitchell)5. Member, <strong>Curriculum</strong> Committee, K-6, 7-12, USGIF, 2006 (Geosp<strong>at</strong>ial Intelligence)6. IEEE Distinguished Lecturer (2002 – 2005)7. IEEE Conferences and Tutorials Board (1997 – 1998)8. NSF Panel Member: Oct. 1992, Dec. 1994 (twice), Jan. 1996, Nov. 1998, May 1999, May 2000,Dec 2000, Jan. 2001, Nov. 2005, Dec. 2007, March 2008, Nov. 2009, Dec. 20109. Reviewer for numerous journals and conferences including IEEE Computer, IEEE TSE, IEEETKDE, ACM TODS10. Steering committee for conferences and workshops11. Session chair for numerous conferences and workshops (100+)12. Reviewer <strong>of</strong> proposals for NSA-URP (1992, 1993, 1994), CMS-MDDS (1993, 1994, 1995)Internal ActivitiesCS Department Head Search Committee Chair, 2008 – 2009Engineering School Dean Search Committee Member, 2007 – 2008CS Faculty Search Committee, 2005 – PresentCS Tenure and Promotion Committee Chair, 2005 – 2006, 2006 – 2007, 2007 – 2008, 2010 – 2011CS Promotion Committee Member: 2009 – 2010<strong>University</strong>, Science School Dean Search Committee Member, 2006 – 2007<strong>University</strong>, Vice President for Business Search Committee Member, 2005 – 2006121


Section 20: MEDIA REPORTSTelevision InterviewsHow Technology Tracks Most Of Wh<strong>at</strong> You Dohttp://www.the33tv.com/about/st<strong>at</strong>ion/newsteam/kdaf-how-technology-tracks-much-<strong>of</strong>wh<strong>at</strong>-you-do-20111109,0,7814325.storyFacebook Privacyhttp://www.the33tv.com/news/kdaf-facebook-privacy-story,0,5566137.storyCyber Securityhttp://www.the33tv.com/news/kdaf-jim-cyber-czar-story,0,571554.storyExternal ArticlesThuraisingham receives IEEE Computer Society’s 1997 Technical Achievement Award;IEEE Computer Magazine, October 1997http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=625320Managing the Web, Silicon India, May 2002 (on Leading Seven Technology Innov<strong>at</strong>ors <strong>of</strong>South Asian Origin in USA)http://www.siliconindia.com/magazine/articledesc.php?articleid=HPK497612166&errid=7Security Be<strong>at</strong>, N<strong>at</strong>ional Defense Magazine, 2004http://www.n<strong>at</strong>ionaldefensemagazine.org/archive/2004/July/Pages/Security_Be<strong>at</strong>3512.aspxTaking a Byte out <strong>of</strong> Cyber Crime, <strong>Dallas</strong> Morning News, Sunday Edition, February 26,2005Dr. Bhavani Thuraisingham, AFCEA-PDC Instructor Pr<strong>of</strong>ile, SIGNAL Magazine,February 2005<strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, Faculty pr<strong>of</strong>ile, June 2005, December 2005http://www.utdallas.edu/pr<strong>of</strong>iles/thuraisingham.html<strong>The</strong> Terrorist Hunter, D-Magazine, July 2005 (Monthly Magazine for DFW)http://www.dmagazine.com/Home/2005/07/01/Pulse.aspx?p=1Cyber Security, DFW Metroplex Technology Magazine, January 2006Lonely <strong>at</strong> the Top, <strong>Dallas</strong> Morning News Educ<strong>at</strong>ion Supplement, February 22, 2006<strong>The</strong> Semantic Web, Deep in the Heart <strong>of</strong> <strong>Texas</strong>, Semanticweb.com, November 19, 2008http://semanticweb.com/the-semantic-web-deep-in-the-heart-<strong>of</strong>-texas_b195Air Safety D<strong>at</strong>a Mining Research Ongoing (Avi<strong>at</strong>ion Safety Week), July 14, 2008122


http://findarticles.com/p/articles/mi_m0UBT/is_27_22/ai_n27916054/Seminar <strong>at</strong> Purdue <strong>University</strong>, Video Present<strong>at</strong>ionhttp://www.cerias.purdue.edu/news_and_events/events/security_seminar/flash.php?uid=ckjq5ef1oaga6g2kquu42f7350@google.comAFOSR-Funded Initi<strong>at</strong>ive Cre<strong>at</strong>es More Secure Environment for Cloud Computinghttp://www.wpafb.af.mil/news/story.asp?id=123209377Raytheon Enters New Arena, <strong>Dallas</strong> Business Journal, October 22, 2010http://www.bizjournals.com/dallas/print-edition/2010/10/22/raytheon-enters-newarena.htmlMTBC Supports Cloud Computing Trend With New Special Interest Grouphttp://www.metroplextbc.org/index.php?src=news&refno=56&c<strong>at</strong>egory=L<strong>at</strong>est%20NewsMassacre Forces New Look <strong>at</strong> Security in Europehttp://news.yahoo.com/massacre-forces-look-security-europe-102740973.htmlAccuvant Launches Advisory Boardhttp://www.reuters.com/article/2011/09/13/idUS195401+13-Sep-2011+BW20110913$$517704580Cyber Center Joins D<strong>at</strong>a Security Efforthttp://www.insideindianabusiness.com/newsitem.asp?ID=51155UT <strong>Dallas</strong> Press ReleasesNSF Grant Funds Search for Ways to Ensure D<strong>at</strong>a Authenticityhttp://www.utdallas.edu/news/2011/12/12-14651_NSF-Grant-Funds-Search-for-Ways-to-Ensure-D<strong>at</strong>a-Aut_article-wide.htmlResearcher Seeks Ways to Keep Old D<strong>at</strong>a Securehttp://www.utdallas.edu/news/2011/11/14-14021_Researcher-Seeks-Ways-to-Keep-Old-D<strong>at</strong>a-Secure_article.htmlNSF Funds Search for New Computer Virus Defensehttp://www.utdallas.edu/news/2011/8/29-12341_NSF-Funds-Search-for-New-Computer-Virus-Defense_article.htmlComputer Scientist Receives Prestigious Degree from <strong>University</strong> <strong>of</strong> Bristolhttp://ecs.utdallas.edu/news-events/news/thuraisingham-degree.html123


Investment in Cloud Computing Research Pays Offhttp://www.utdallas.edu/news/2011/4/19-10311_Investment-in-Cloud-Computing-Research-Pays-Off_article.htmlScholars to Help Fortify N<strong>at</strong>ion's Cyberdefenseshttp://www.utdallas.edu/news/2010/9/29-5961_Scholars-to-Help-Fortify-N<strong>at</strong>ions-Cyberdefenses_article.htmlGrants Further Bolster Cybersecurity Researchhttp://www.utdallas.edu/news/2010/8/25-5121_Grants-Further-Bolster-Cybersecurity-Research_article.htmlTeam Releases Tools for Secure Cloud Computinghttp://www.utdallas.edu/news/2010/8/2-4651_Team-Releases-Tools-for-Secure-Cloud-Computing_article.htmlUT <strong>Dallas</strong> Computer Scientist Receives Prestigious Honorhttp://ecs.utdallas.edu/newsandevents/cs-award-6-10.htmlPr<strong>of</strong>essor Delivers Keynote Address on Stream Mininghttp://ecs.utdallas.edu/newsandevents/Khankeynoteaddress.htmlL<strong>at</strong>est Computer Thre<strong>at</strong> Could Be Worst Yethttp://www.utdallas.edu/news/2010/5/20-3571_L<strong>at</strong>est-Computer-Thre<strong>at</strong>-Could-Be-Worst-Yet_article.htmlCyber Security Center Offers D<strong>at</strong>a Mining Toolshttp://www.utdallas.edu/news/2010/01/26-003.phpProject Seeks to Safeguard Privacy <strong>of</strong> Genomics D<strong>at</strong>ahttp://www.utdallas.edu/news//2009/12/02-003.phpResearchers Help Ensure Security <strong>of</strong> Military Logisticshttp://www.utdallas.edu/news//2009/10/20-002.phpPr<strong>of</strong> Warns <strong>of</strong> Risks Hiding on Social Network Siteshttp://www.utdallas.edu/news//2009/10/07-003.phpSmarter Searches: Technology Merges Images, D<strong>at</strong>a and Knowledgehttp://www.utdallas.edu/news/2009/04/10-001.phpAdvances in D<strong>at</strong>a Safety Drawing Wider Attentionhttp://www.utdallas.edu/news/2009/03/25-002.phpNSF Award Funds D<strong>at</strong>a-Privacy Research Projecthttp://www.utdallas.edu/news/2009/02/09-001.php124


NSF Grants to Help Cre<strong>at</strong>e Next-Gener<strong>at</strong>ion Webhttp://www.utdallas.edu/news/2008/10/08-003.phpSecurity Researcher Lands Defense Scholarshiphttp://www.utdallas.edu/news/2008/09/25-003.phpPr<strong>of</strong> Gives Keynote Speech on D<strong>at</strong>a Mining and Privacyhttp://www.utdallas.edu/news/2008/09/04-002.phpUT <strong>Dallas</strong> Leads $2.2 Million Effort to Build Secure Inform<strong>at</strong>ion Grid for the U.S. Air Forcehttp://www.utdallas.edu/news/2008/08/12-001.phpD<strong>at</strong>a Mining for Flight Safetyhttp://www.utdallas.edu/news/2008/07/07-002.phpUT <strong>Dallas</strong> Researchers to Play Key Role in $7.5 Million Department <strong>of</strong> Defense MURIhttp://www.utdallas.edu/news/2008/03/25-002.phpResearcher Lands Computer Security Grant from Air Forcehttp://www.utdallas.edu/news/2007/11/18-002.htmlCyber Security Research Center <strong>at</strong> UT <strong>Dallas</strong> Tops $1 Million in Fundinghttp://www.utdallas.edu/news/archive/2007/09-11-001.htmlCyber Security Conference Planned For April 20-21 <strong>at</strong> U. T. <strong>Dallas</strong>Symposium to Fe<strong>at</strong>ure Leading Researchers, Policymakershttp://www.utdallas.edu/news/archive/2005/security-conference.htmlCyber Security Expert Joins the <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>http://www.utdallas.edu/news/archive/2004/cyber-security.htmlMITRE Articles1. MITRE M<strong>at</strong>ters Short Write-ups on AchievementsMITRE has a strong showing <strong>at</strong> AFCEA DoD D<strong>at</strong>abase ColloquiumPress releases 1994, 1995, 19962. P<strong>at</strong>ent awards, MITRE M<strong>at</strong>tersSeptember 1995, November 19963. Author <strong>of</strong> the Month, MITRE M<strong>at</strong>tersJuly 1997, April 19994. Uniquely MITRE, MITRE M<strong>at</strong>ters June 2000 (fe<strong>at</strong>ure article)125


5. I Really Want to be Challenged, MITRE M<strong>at</strong>ters February 2003 (fe<strong>at</strong>ure)6. MITRE Internal News Releases on IEEE Fellow, AAAS Fellow among others126


SECTION 21. CYBER SECURITY RESEARCH CENTER ANDAFFILIATED LABSCyber Security Research Center (Bhavani Thuraisingham)http://csrc.utdallas.edu/http://csepi.utdallas.edu/D<strong>at</strong>a Security and Privacy Lab (Mur<strong>at</strong> Kantarcioglu)http://cs.utdallas.edu/dspl/cgi-bin/index.phpD<strong>at</strong>a Mining Lab (L<strong>at</strong>ifur Khan)http://www.utdallas.edu/~lkhan/dmlab.htmlSecure Systems and Languages Lab (Kevin Hamlen)http://www.utdallas.edu/~hamlen/index.htmlSecurity Analysis and Inform<strong>at</strong>ion Assurance LabCloud Computing LabDigital Forensics Labhttp://csrc.utdallas.edu/Facilities.htmlS3 (System and S<strong>of</strong>tware Security) Lab (Zhiqiang Lin)http://www.utdallas.edu/~zhiqiang.lin/s3.html127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!