on Query Flocks <strong>at</strong> ACM SIGMOD which is widely cited. Although I was invited to join as a co-author, Ideclined as I only put my name on a paper if I have made technical contributions to th<strong>at</strong> paper. At thesame time, I got the MITRE team to write an article on d<strong>at</strong>a management research <strong>at</strong> MITRE and got itpublished in the highly visible ACM SIGMOD RECORD. This article instantly put MITRE on the map asa player in d<strong>at</strong>a management and d<strong>at</strong>a mining.In my position, by the l<strong>at</strong>e 1990s, I had to interact with people <strong>at</strong> many levels. <strong>The</strong>se included researchers,government sponsors, and management <strong>at</strong> MITRE among others. In addition, I had my own research todo. <strong>The</strong>refore, I felt th<strong>at</strong> I had to write some books th<strong>at</strong> would educ<strong>at</strong>e the high level managers andgovernment sponsors about the key concepts. <strong>The</strong>refore, I started writing a few books on d<strong>at</strong>amanagement and d<strong>at</strong>a mining. Th<strong>at</strong> has now evolved into twelve books on d<strong>at</strong>a management, d<strong>at</strong>a miningand d<strong>at</strong>a security. Around the l<strong>at</strong>e 1990s, being <strong>at</strong> MITRE I felt th<strong>at</strong> I was getting more and more removedfrom wh<strong>at</strong> industry was doing. By th<strong>at</strong> time, my six years in industry <strong>at</strong> Control D<strong>at</strong>a and Honeywell inthe 1980s seemed so long ago. <strong>The</strong>refore, when the IRS (Internal Revenue Service) consulting opportunityfor examining s<strong>of</strong>tware research credit arose <strong>at</strong> MITRE, I took the position without any hesit<strong>at</strong>ion. Thisgave me insights (and continues to give me insights) into wh<strong>at</strong> the Fortun<strong>at</strong>e 500 companies do and wh<strong>at</strong>they ought to do with respect to s<strong>of</strong>tware. <strong>The</strong>refore, now I have such an excellent understanding <strong>of</strong> wh<strong>at</strong>industry is doing which is helping me a lot with my own university spin-<strong>of</strong>f company.In January 2001, I felt I was ready for the big move to Washington to see wh<strong>at</strong> it is like to be inside thegovernment. My plan was to go there for one year to manage the d<strong>at</strong>a management program. But I endedup spending three years. I started the d<strong>at</strong>a and applic<strong>at</strong>ions security program and co-founded the cybertrust theme. I started my own research in secure semantic web and d<strong>at</strong>a privacy and worked with the<strong>University</strong> <strong>of</strong> Milan team on XML Security. Our joint research papers were published in two prestigiousjournals: IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering on Third Party Public<strong>at</strong>ion <strong>of</strong> D<strong>at</strong>a andin ACM Transactions on Inform<strong>at</strong>ion and Systems Security on Privacy for Trust Management. While <strong>at</strong>NSF, I also began to get a clear picture and understand the government’s needs. With this knowledge, Ithen joined <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>.My task <strong>at</strong> the university was to establish a cyber security research center. While I had some startup fundsfor my own research, I did not have funds to start the center. <strong>The</strong>refore, I decided to focus on d<strong>at</strong>asecurity. After 9/11, there was a huge demand for inform<strong>at</strong>ion sharing. <strong>The</strong>refore, I started a project withthe Air Force and worked on assured inform<strong>at</strong>ion sharing. Our papers were published in several journalsincluding the Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy. More importantly, I wrote the one page paperth<strong>at</strong> went into the DoD MURI BAA (Department <strong>of</strong> Defense Multidisciplinary <strong>University</strong> ResearchIniti<strong>at</strong>ive Broad Agency Announcement). This resulted in a very large research project on this topic.While my team’s focus is on incentives-based inform<strong>at</strong>ion sharing, which is an interdisciplinary projectbetween economists, management scientists, social scientists and computer scientists, my work alsocontinued to be in policy management for semantic web and I expanded it to social networks. Our paperpublished in ACM SACMT in 2009 was one <strong>of</strong> the early papers on security for social networks based onsemantic web and an enhanced version <strong>of</strong> this paper has appeared in the Computers and Security Journal.In addition to policy management and inform<strong>at</strong>ion sharing, my research also focused on ontologyalignment and d<strong>at</strong>a mining for security applic<strong>at</strong>ions. In the area <strong>of</strong> ontology alignment, we used geosp<strong>at</strong>iald<strong>at</strong>a as the applic<strong>at</strong>ions domain. Our papers were published in the prestigious conference ACM GIS threeyears in a row (2007-2009) and a paper was published in the highly prestigious Journal <strong>of</strong> Web Semantics.In the area <strong>of</strong> d<strong>at</strong>a mining for security applic<strong>at</strong>ions, we have made tremendous progress in developingnovel techniques as well as tools. Several papers have been published including in prestigious conferencessuch as IEEE ICDM, and ECML/PKDD as well as in ACM Transactions on Management Inform<strong>at</strong>ionSystems and IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering. A p<strong>at</strong>ent on stream mining as wellas another on social network mining have been filed. A small part <strong>of</strong> my time is spent on investig<strong>at</strong>ingissues on dependable systems and we have a paper accepted in IEEE Transactions on Reliability on thistopic.Last but not least, one <strong>of</strong> the major areas for our government sponsors is secure cloud computing. Wehave a fairly large project on this topic and are building a secure cloud infrastructure to demonstr<strong>at</strong>e theassured inform<strong>at</strong>ion sharing concept. We are one <strong>of</strong> the first to get into this area and have developed10
secure query processing for cloud. Papers on this topic have appeared in prestigious conferences andjournals such as IEEE Cloud Computing and IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering.We have also developed secure storage for grids and this paper was published in IEEE Transactions onDependable and Secure Computing. My current challenge is to look <strong>at</strong> virtual machines and hypervisorssuch as XEN being developed <strong>at</strong> the <strong>University</strong> <strong>of</strong> Cambridge, examine security issues and bring it intoour cloud infrastructure. Due to the excellent work we have done in this area, the US Air Force did a pressrelease on our research on their web site which has given us a lot <strong>of</strong> visibility (seehttp://www.wpafb.af.mil/news/story.asp?id=123209377) Several other articles have appeared about ourwork, including some internal press releases, and some comments from external organiz<strong>at</strong>ions andagencies. <strong>The</strong>se press releases are listed in Section H.I am very pleased with the way my research has progressed over the past 30 years. Coming from industryand government has helped me to understand real world problems and address these problems in myresearch. However, I have a very strong fundamental background with a B.Sc in M<strong>at</strong>hem<strong>at</strong>ics and Physicsfrom the <strong>University</strong> <strong>of</strong> Ceylon (1 st class), M.Sc in M<strong>at</strong>hem<strong>at</strong>ical Logic from the <strong>University</strong> <strong>of</strong> Bristol, anda PhD in Computability <strong>The</strong>ory from the <strong>University</strong> <strong>of</strong> Wales, Swansea. <strong>The</strong>refore, I believe th<strong>at</strong> to buildsystems th<strong>at</strong> can last and be evolvable and adaptable, we need to build them with sound theoreticalprinciples. While continuing my research <strong>at</strong> the university will be my main priority, the university spin-<strong>of</strong>fcompany we have started would give us an opportunity to transfer our technologies into products and spurjob cre<strong>at</strong>ion which is one <strong>of</strong> the challenges we are faced with today. I would also like to point out somest<strong>at</strong>istics <strong>of</strong> my work as <strong>of</strong> December 4, 2010. In Google Scholar, 339 public<strong>at</strong>ions are listed between1982 and 2010. <strong>The</strong>se 339 public<strong>at</strong>ions have a total cit<strong>at</strong>ion <strong>of</strong> 3,099. <strong>The</strong> average cit<strong>at</strong>ion per paper is9.14. My H-Index is 27 and G-Index is 42. My research has resulted in numerous awards and fellowshipsfrom IEEE and ACM, among others. More importantly it earned me the higher doctor<strong>at</strong>e degree <strong>of</strong> Doctor<strong>of</strong> Engineering <strong>at</strong> the <strong>University</strong> <strong>of</strong> Bristol (ranked #23 among the world universities by the US News andWorld Report in 2010) for my thesis consisting <strong>of</strong> my published work on secure dependable d<strong>at</strong>amanagement,After spending three years <strong>at</strong> the N<strong>at</strong>ional Science Found<strong>at</strong>ion and establishing programs in d<strong>at</strong>a andapplic<strong>at</strong>ion security, I joined UTD in October 2004. At UTD I have developed two areas: (i) CyberSecurity, in particular D<strong>at</strong>a and Applic<strong>at</strong>ions Security and (ii) Inform<strong>at</strong>ion Management. In the area <strong>of</strong>D<strong>at</strong>a and Applic<strong>at</strong>ions Security, I have focused on four areas. (a) Assured inform<strong>at</strong>ion sharing: My teamin the CS department collabor<strong>at</strong>es with the School <strong>of</strong> Management and Economics and Policy Sciences todevelop an interdisciplinary approach for incentive-based inform<strong>at</strong>ion sharing. (b) In addition, we havealso explored research issues in secure and priv<strong>at</strong>e social networks. (c) We also developed novel privacypreservingd<strong>at</strong>a mining and d<strong>at</strong>a integr<strong>at</strong>ion techniques. (d) Policy management-based on semantic webtechnologies. (e) D<strong>at</strong>a mining tools for security applic<strong>at</strong>ions. Notable among these tools are those basedon novel class detection for stream mining. In the area <strong>of</strong> Inform<strong>at</strong>ion Management, our focus has been ondeveloping technologies for n<strong>at</strong>ional security in two major areas. (a) We have designed ontologyalignment algorithms critical for homeland security applic<strong>at</strong>ions and (b) developed geosp<strong>at</strong>ial d<strong>at</strong>amanagement and mining techniques. In addition to d<strong>at</strong>a security and inform<strong>at</strong>ion management, my teamhas also focused on secure cloud computing and in-line reference monitors. In addition to collabor<strong>at</strong>ingwith two <strong>of</strong> my colleagues and contributing to assured inform<strong>at</strong>ion sharing as well as to the d<strong>at</strong>a miningtools, my main research has been on policy management based on semantic web technologies. Our goal isto build inference controllers based on RDF d<strong>at</strong>a engines and RDF reasoning engines. Essentially, thisresearch extends my earlier work on the inference problem utilizing semantic web technologies. I havealso developed prototypes for policy management in a coalition environment.We are developing a multi-pronged approach to research. Our major goal is to publish papers in the mostprestigious journals and conferences. Since 2005, I have papers published in IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, IEEE Transactions on Dependable and Secure Computing, ACMTransactions on Inform<strong>at</strong>ion and Systems Security, IEEE Transactions on Systems, Man and Cybernetics,and Very Large D<strong>at</strong>abase Journal. Prestigious conferences include IEEE Conference on D<strong>at</strong>a Mining(ICDM) and ACM Conference <strong>of</strong> Access Control and Models (SACMAT). My team has published severalmore papers in IEEE as well as in ACM Transactions. Our second goal is to build systems. We havedeveloped several prototypes and tools and have published open source s<strong>of</strong>tware. <strong>The</strong>se tools are being11
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9: the concepts in semantic nets and c
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62:
I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64:
12. Proceedings ISI Conference, IEE
- Page 65 and 66:
Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68:
UTDCS-32-08A Practical Approach to
- Page 69 and 70:
UTDCS-27-11Towards the Design and I
- Page 71 and 72:
29. A Seminar on Real-time Database
- Page 73 and 74:
14. Concurrency Control in Real-tim
- Page 75 and 76:
17. Data Management Systems Evoluti
- Page 77 and 78:
54. Data Mining for National Securi
- Page 79 and 80:
5. Recent Developments in Some Trus
- Page 81 and 82:
44. Data Engineering Directions, IE
- Page 83 and 84:
6. Towards a Global Multilevel Data
- Page 85 and 86:
19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH