10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1980s and early 1990s by Oracle, Sybase, Informix and Ingres. This was a team effort with colleagues <strong>at</strong>Honeywell.Secure Query Processing: Paper #2 (IEEE Computer) describes secure query processing str<strong>at</strong>egies.Essentially, I enhanced the query str<strong>at</strong>egies developed by Lock D<strong>at</strong>a Views and introduced ideas from thefield <strong>of</strong> logic and d<strong>at</strong>abases. I developed query str<strong>at</strong>egies based on the re-writing principles. Various types<strong>of</strong> policies were considered in the design. This paper was first submitted to the Hawaii Intern<strong>at</strong>ionalConference on Systems Sciences in 1988 and won the best paper award. I was then invited to submit thejournal version <strong>of</strong> the paper to IEEE Computer which has the largest audience in computer science. <strong>The</strong>n,together with my colleague <strong>at</strong> the <strong>University</strong> <strong>of</strong> Minnesota and a student, this paper was enhanced andpublished in IEEE Computer.Secure Distributed D<strong>at</strong>a Management: <strong>The</strong> third and fourth papers describe aspects <strong>of</strong> securedistributed d<strong>at</strong>abase systems. In Paper #3 (Computers and Security Journal) I was the first to exploremultilevel security for distributed d<strong>at</strong>abase systems. I designed a multilevel d<strong>at</strong>a model, query processingstr<strong>at</strong>egies and transaction management str<strong>at</strong>egies. This paper resulted in several research directionsincluding the algorithms I designed for both query and transaction management. One such algorithm andimplement<strong>at</strong>ion carried out together with a colleague <strong>at</strong> MITRE, is reported in Paper #4 (Journal <strong>of</strong>Systems and S<strong>of</strong>tware). In particular, we developed a system th<strong>at</strong> enforced multilevel security for queryprocessing in a distributed environment. We demonstr<strong>at</strong>ed the system by connecting secure d<strong>at</strong>amanagement systems in Bedford, MA, McLean, VA and Fort Monmouth, NJ in 1991. Such an integr<strong>at</strong>ionwas novel <strong>at</strong> th<strong>at</strong> time and the research was transferred to Army’s maneuver control systems.Secure Object D<strong>at</strong>a Management: <strong>The</strong> next two papers (Paper #5 and #6) describe my work inmultilevel secure object d<strong>at</strong>abase systems. Paper #5 (ACM OOPSLA) describes a widely cited securemodel for object d<strong>at</strong>abase systems. This paper describes several security properties for the object model.<strong>The</strong>n these policies were incorpor<strong>at</strong>ed into the design <strong>of</strong> the system and published in Paper #6 (Journal <strong>of</strong>Object-Oriented Programming). Subsequently together with a colleague <strong>at</strong> MITRE, we developed pro<strong>of</strong> <strong>of</strong>concept demonstr<strong>at</strong>ions <strong>of</strong> the design using the Object Store d<strong>at</strong>a management system in 1992. Thisresearch had an impact on several secure object d<strong>at</strong>a management systems’ research and developmentefforts by others. In addition, we also transferred the research to a system developed by OntosCorpor<strong>at</strong>ion.Found<strong>at</strong>ions <strong>of</strong> the Inference Problem: <strong>The</strong> next four papers describe my work on the Inferenceproblem. I have been commended for this work from researchers as well as government sponsors. In Paper#7 (Computer Security Found<strong>at</strong>ions Workshop), I was the first to prove th<strong>at</strong> the inference problem wasunsolvable and presented it <strong>at</strong> the 3 rd IEEE Computer Security Found<strong>at</strong>ions Workshop. <strong>The</strong> paper did notappear in the proceedings as the paper was not publicly released in time for the workshop. This researchwas also quoted by Dr. John Campbell <strong>of</strong> the N<strong>at</strong>ional Security Agency as the most significant research insecure d<strong>at</strong>a management system in 1990. His quote appeared in the Proceedings <strong>of</strong> the 1990 N<strong>at</strong>ionalComputer Security Conference.Inference Controllers: Once I proved th<strong>at</strong> the inference problem was unsolvable, then I designed ad<strong>at</strong>abase inference controller th<strong>at</strong> handled policies during query, upd<strong>at</strong>e and d<strong>at</strong>abases oper<strong>at</strong>ions.Together with colleagues <strong>at</strong> MITRE, my design was implemented and published in Paper #8 (D<strong>at</strong>a andKnowledge Engineering Journal). This was the first inference controller to be developed and a p<strong>at</strong>ent wasobtained. Our integr<strong>at</strong>ed inference controller processed some policies during d<strong>at</strong>abase query, somepolicies during d<strong>at</strong>abase upd<strong>at</strong>es and some policies during d<strong>at</strong>abase design and this concept was novel <strong>at</strong>th<strong>at</strong> time. <strong>The</strong>n in Paper #9 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering), I designedalgorithms for extending the inference controller design to a distributed environment and th<strong>at</strong> resulted inthe first distributed inference controller. Together with a colleague, this design was implemented. In thissystem users could pose queries from multiple sites, but the system would examine the policies across allthe sites and only give out inform<strong>at</strong>ion th<strong>at</strong> the user was authorized to know. <strong>The</strong> inference controllerswere distributed and communic<strong>at</strong>ed with each other to process queries and upd<strong>at</strong>es.Designing Secure Applic<strong>at</strong>ions: In Paper #10 (IFIP D<strong>at</strong>a Security Conference), I looked <strong>at</strong> the inferencefrom a different angle. Here I tried to handle the problem when the applic<strong>at</strong>ion was designed. I used102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!