10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

conceptual structures (e.g., semantic nets and conceptual graphs) to model the applic<strong>at</strong>ions. Policies weretaken into consider<strong>at</strong>ion during the modeling phase. <strong>The</strong>n the reasoners used by semantic nets andconceptual graphs were applied to reason about the applic<strong>at</strong>ion and detect potential security viol<strong>at</strong>ions.This was a novel idea <strong>at</strong> th<strong>at</strong> time and spawned many avenues for subsequent research. Also as a backendto this reasoner, I designed an expert system for inference control. <strong>The</strong> implement<strong>at</strong>ion <strong>of</strong> this system wascarried out with a colleague <strong>at</strong> MITRE. A U.S. p<strong>at</strong>ent was obtained on this system.Logic for Secure D<strong>at</strong>abases: Finally in Paper #11 (Computer Security Found<strong>at</strong>ions Workshop) I appliedthe theory <strong>of</strong> logic and d<strong>at</strong>abases to multilevel d<strong>at</strong>abases. Since first order logic did not handle nonmonotonicreasoning and since non-monotonic logics <strong>at</strong> th<strong>at</strong> time did not reason across security levels, Ideveloped a logic called NTML (Non-monotonic Typed Multilevel Logic) and subsequently designed amultilevel logic d<strong>at</strong>abase system. <strong>The</strong> significance <strong>of</strong> this work is th<strong>at</strong> the logical reasoner can be used toprocess queries and control unauthorized inferences. A U.S. p<strong>at</strong>ent was obtained on this system.1. Design <strong>of</strong> LDV - A Multilevel Secure Rel<strong>at</strong>ional D<strong>at</strong>abase Management System, June 1990, IEEETransactions on Knowledge and D<strong>at</strong>a Engineering, Vol. 2, No. 2, June 1990, (co-author: P.Stachour). Lead AuthorMy Contribution: This is a Honeywell Team effort. <strong>The</strong> principal members <strong>of</strong> the team includedPaul Stachour (Principal Investig<strong>at</strong>or), P<strong>at</strong>ricia Dwyer, Emmanuel Onuegbe, Tom Haigh andmyself. I designed both the upd<strong>at</strong>e and metad<strong>at</strong>a pipelines. Furthermore, I wrote the entire paperfrom the technical reports we published.2. Secure Query Processing Str<strong>at</strong>egies, IEEE Computer, March 1989, Vol. 22, No. 3, (invited paper– co-authors: T. F. Keefe and W. T. Tsai). Co-Author (for the conference version I was the leadauthor)My Contribution: I designed the algorithms and write the initial paper for the conference bymyself. Because I had to leave on vac<strong>at</strong>ion I requested my colleague and his student to edit thepaper and submit. <strong>The</strong> paper received the best paper award. <strong>The</strong> journal version was anenhancement <strong>of</strong> the conference paper and the student Tom Keefe was mainly responsible for theenhancements.3. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems – II, Computers andSecurity Journal (Elsevier), Volume 10, No.8, December 1991. Sole AuthorMy Contribution: This is 100% my work.4. Design and Implement<strong>at</strong>ion <strong>of</strong> a Query Processor for a Trusted Distributed D<strong>at</strong>abaseManagement Systems, April 1993, Journal <strong>of</strong> Systems and S<strong>of</strong>tware (North Holland), Vol. 21,No. 1 (co-author: Harvey Rubinovitz).My Contribution: I designed the algorithms. <strong>The</strong>n my colleague Dr. Rubinovitz implemented thealgorithm. Together we designed the experiments. I wrote the paper from the technical reports.5. Mand<strong>at</strong>ory Security in Object-Oriented D<strong>at</strong>abase Systems, October 1989, Proceedings <strong>of</strong> theACM Conference on Object-Oriented Programming, Systems, Languages and Applic<strong>at</strong>ions(ACM OOPSLA) Conference, New Orleans, LA. Sole AuthorMy Contribution: This is 100% my work.6. Towards the Design <strong>of</strong> a Multilevel Secure Object-Oriented D<strong>at</strong>abase Management System,Journal <strong>of</strong> Object-Oriented Programming, Vol. 8, No. 3, p. 42 – 49, June 1995. Sole AuthorMy Contribution: This is 100% my work.7. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem in D<strong>at</strong>abase Security, June 1990,Presented <strong>at</strong> the 3rd IEEE Workshop on Found<strong>at</strong>ions <strong>of</strong> Computer Security, Franconia, NH(public release was not obtained in time for proceedings; printed as MITRE Paper M291, May1990). Sole AuthorMy Contribution: This is 100% my work.103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!