8. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller, December 1993, D<strong>at</strong>a andKnowledge Engineering Journal (North Holland), Vol. 11, No. 3, p. 271 - 297 (co-authors: W.Ford, M. Collins, J. O'Keeffe); (Article reprinted by the MITRE Journal, 1994). Lead AuthorMy Contribution: I designed the entire system. My colleagues Mr. Ford and Mr. O’Keeffeimplemented the query processor. My colleague Ms. Collins implemented the upd<strong>at</strong>e processor. Iwrote the entire paper from the technical reports.9. Security Constraint Processing in a Multilevel Secure Distributed D<strong>at</strong>abase Management System,IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, April 1995 (coauthor: W. Ford). LeadAuthorMy Contribution: I designed the entire system. My colleague Mr. Ford implemented the system.I wrote the entire paper from the technical reports.10. <strong>The</strong> Use <strong>of</strong> Conceptual Structures to Handle the Inference Problem, November 1991,Proceedings <strong>of</strong> the 5th IFIP WG 11.3 Conference on D<strong>at</strong>abase Security, p. 333-362,Shepherdstown, VA. (Also published by North Holland, 1992, D<strong>at</strong>abase Security V: St<strong>at</strong>us andProspects, p. 333 - 362). Sole AuthorMy Contribution: This is 100% my work.11. A Nonmonotonic Typed Multilevel Logic for Multilevel D<strong>at</strong>abase Management Systems, June1991, Proceedings <strong>of</strong> the 4th IEEE Computer Security Found<strong>at</strong>ions Workshop, Franconia, NH.My Contribution: This is 100% my work.17.3 DEPENDABLE DATA MANAGEMENT SYSTEMSI began my research on dependable d<strong>at</strong>a management systems around 1992 and this research stillcontinues. I describe seven <strong>of</strong> my papers on this topic.Evolvable Real-time Systems: My research in the early to mid 1990s was on building an object-orientedd<strong>at</strong>a manager and infrastructure for next gener<strong>at</strong>ion command and control systems. At th<strong>at</strong> time the legacysystems were hardcoded and running on mainframes. <strong>The</strong> goal was to develop flexible systems th<strong>at</strong> couldaccommod<strong>at</strong>e changes. <strong>The</strong>re were no commercial systems available <strong>at</strong> th<strong>at</strong> time. D<strong>at</strong>a was arriving <strong>at</strong> avery rapid speed. This d<strong>at</strong>a had to be captured, stored, analyzed and decisions had to be made. Togetherwith my colleagues <strong>at</strong> MITRE, we were the first to develop an object-based, real-time infrastructure andd<strong>at</strong>a manager. <strong>The</strong> infrastructure consisted <strong>of</strong> several services including inter-process communic<strong>at</strong>ion,memory management and scheduling. <strong>The</strong> real-time d<strong>at</strong>a manager was a main memory d<strong>at</strong>a manager andwe designed a real-time priority ceiling protocol for transaction processing. <strong>The</strong> results are documented inPaper #1 (IEEE WORDS 1996). <strong>The</strong>n we integr<strong>at</strong>ed the infrastructure and d<strong>at</strong>a manager with the multisensorfusion applic<strong>at</strong>ions and carried out an integr<strong>at</strong>ed design and implement<strong>at</strong>ion. This integr<strong>at</strong>ion workis discussed in Paper #2 (IEEE WORDS 1997). <strong>The</strong> research was demonstr<strong>at</strong>ed to the Air Force and thetechnology was transferred to the AWACS program and subsequently Boeing and Lockheed took many <strong>of</strong>the ideas to implement into the oper<strong>at</strong>ional systems.Real-time Transaction Processing: One <strong>of</strong> the challenges in designing a real-time d<strong>at</strong>a manager is todesign transaction processing algorithms th<strong>at</strong> meet timing constraints. <strong>The</strong>re were a number <strong>of</strong> algorithmsdeveloped th<strong>at</strong> had to meet the requirements <strong>of</strong> AWACS. After examining and evalu<strong>at</strong>ing severalalgorithms, we felt th<strong>at</strong> the priority ceiling algorithm would be most suited. However, the priority ceilingalgorithm had to be adapted to meet the different criteria. I presented the initial design to the team inMarch 1995. <strong>The</strong>n I collabor<strong>at</strong>ed with a pr<strong>of</strong>essor <strong>at</strong> the <strong>University</strong> <strong>of</strong> Rhode Island and co-supervisedstudents who carried out the detailed design and implement<strong>at</strong>ion <strong>of</strong> the algorithm in 1996 - 1997. Thisalgorithm is presented in Paper #3 (Real-time Systems Journal).Adaptive Real-time Systems: In this paper, we introduced some novel ideas into the infrastructuredesign. While in the earlier papers we considered only non-adaptive protocols, in our research in the l<strong>at</strong>e104
1990s, we designed and implemented flexible systems th<strong>at</strong> could handle adaptive protocols. This meantthe system can select the protocol such as TCP/IP or UDP or in the case <strong>of</strong> the d<strong>at</strong>a manager, the type <strong>of</strong>transaction algorithm to be used. This was the first effort th<strong>at</strong> considered adaptive approaches. Wedocumented the results in Paper #4 (IEEE ISADS).Secure Real-time Object Management: One significant impact <strong>of</strong> our research is the transfer <strong>of</strong> thetechnology to standards effort. In 1994 with some inputs from colleagues, I developed concepts onintegr<strong>at</strong>ing real-time and security into object request brokers. This work was presented <strong>at</strong> the ACMOOPSLA conference workshop in real-time object systems on real-time object request brokers. This paperis widely cited. I was then invited to give talks <strong>at</strong> several panels on this topic. <strong>The</strong> Object ManagementGroup was interested and invited me to help establish a special interest group in 1996. Together with theMITRE team, we continued to enhance the research and collabor<strong>at</strong>ed with the <strong>University</strong> <strong>of</strong> Rhode Islandand the Navy and subsequently contributed substantially towards the research <strong>of</strong> real-time object requestbrokers. <strong>The</strong> research was published as a team paper in Paper #5 (IEEE Transactions on Parallel andDistributed Systems).Secure Real-time Systems: In Paper #6 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering) Iexamined the integr<strong>at</strong>ion <strong>of</strong> security into the infrastructure. I was the first to introduce security with realtimeprocessing back in 1992. <strong>The</strong>refore, I expanded my earlier research and developed a solution for aninfrastructure and d<strong>at</strong>a manager th<strong>at</strong> incorpor<strong>at</strong>ed both security and real-time processing with some inputsfrom my colleague <strong>at</strong> MITRE. I continued with this research when I joined the university in 2004 and one<strong>of</strong> my students was very interested in following up on the ideas I presented in Paper #4. Together with mystudent, we designed and developed a system called Real-time TMO (Time-Triggered Message-TriggeredObject) which incorpor<strong>at</strong>ed security into the TMO system. TMO was designed <strong>at</strong> the <strong>University</strong> <strong>of</strong>California Irvine and is a real-time object system. By incorpor<strong>at</strong>ing security into the system, I believe th<strong>at</strong>we developed the first real-time and secure system based on objects. This research was published in Paper#7 (IEEE ISORC). This research has spawned many new research directions including the Cyber PhysicalSystems th<strong>at</strong> are very popular today.1. Object-oriented Implement<strong>at</strong>ion <strong>of</strong> an Infrastructure and D<strong>at</strong>a Manager for Real-time Commandand Control Systems, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented Real-time Systems,Laguna Beach, CA, February 1996 (co-authors: E. Bensley, P. Krupp, R.A. Sigel, M. Squadrito,T. Wheeler). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the team included EdBensley (Principal Investig<strong>at</strong>or), Peter Krupp, Tom Wheeler and myself. I was responsible for thedesign <strong>of</strong> the real-time d<strong>at</strong>a manager and a key member <strong>of</strong> the infrastructure component. I wrotethe entire paper from the technical reports.2. Object Technology for the Integr<strong>at</strong>ion <strong>of</strong> Infrastructure, D<strong>at</strong>a Manager, and Tracker forCommand and Control Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the IEEE Workshop on Object-OrientedReal-time Systems (WORDS), Newport Beach, CA, February 1997 (co-authors: M. G<strong>at</strong>es, P.Krupp, J. Maurer, M. Squadrito, T. Wheeler). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the team included EdBensley (Principal Investig<strong>at</strong>or), Peter Krupp, Tom Wheeler, Mike G<strong>at</strong>es. Mike Squadrito andmyself. I was responsible for the design <strong>of</strong> the real-time d<strong>at</strong>a manager and supervised theimplement<strong>at</strong>ion by Mr. Squadrito. I wrote the entire paper from the technical reports.3. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-time Middleware, Real-time Systems Journal(Kluwer), Vol. 20, No. 2, p. 155-182, 2001 (co-author: V. Wolfe, L. DiPippo et al). Co-AuthorMy Contribution: I conceived the idea <strong>of</strong> applying the priority ceiling algorithm to our problemfor AWACS and developed the initial algorithm. <strong>The</strong> details were carried out by the students <strong>at</strong>the <strong>University</strong> <strong>of</strong> Rhode Island. Much <strong>of</strong> the writing was carried out by the <strong>University</strong> <strong>of</strong> RI.105
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103: conceptual structures (e.g., semant
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH