10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

inference problem. Back in the early 1990s, I designed an inference controller. Th<strong>at</strong> d<strong>at</strong>abase was arel<strong>at</strong>ional d<strong>at</strong>abase and policies were specified as rules in d<strong>at</strong>alog. However, now with semantic web, onecan use Jena for the RDF engine and Pellet as the reasoner. Furthermore, both d<strong>at</strong>a and policies can beuniformly represented in RDF. Together with a student and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong><strong>Dallas</strong>, we designed and developed a semantic web-based inference controller. During the past threemonths, we have made considerable enhancements to the design described in Paper #6. In particular, wehave developed a semantic web-based privacy controller for provenance d<strong>at</strong>a.Assured Inform<strong>at</strong>ion Sharing: While continuing to conduct research on securing XML, RDF andontologies, I also focused on five applic<strong>at</strong>ion areas to apply secure semantic web technologies. <strong>The</strong>seapplic<strong>at</strong>ions are discussed in the next five papers. In Paper #7, (Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ionSecurity and Privacy) I utilized semantic web technologies for Assured Inform<strong>at</strong>ion Sharing applic<strong>at</strong>ions.Together with a student and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, we were the first to designand develop an assured inform<strong>at</strong>ion sharing system using XACML-based policies enforced acrossorganiz<strong>at</strong>ions. This research focused on sharing inform<strong>at</strong>ion while <strong>at</strong> the same time ensuring th<strong>at</strong>appropri<strong>at</strong>e policies are enforced.Secure Semantic Geosp<strong>at</strong>ial D<strong>at</strong>a Management: I also expanded into the geosp<strong>at</strong>ial domain and startedfocusing on developing a secure geosp<strong>at</strong>ial semantic web with students and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong><strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>. One major obstacle back in 2005 was th<strong>at</strong> there were no standards for geosp<strong>at</strong>ialsemantic web. <strong>The</strong>refore, we designed and developed GRDF (geosp<strong>at</strong>ial RDF) and Secure GRDF. Thiswas a significant contribution. We presented this research in the IEEE Intern<strong>at</strong>ional Conference on D<strong>at</strong>aEngineering workshop and we were then invited to submit a paper to the special issue <strong>of</strong> ComputerStandards and Interface Journal. Our results are published in Paper #8 (Computer Standards andInterface).Secure Semantic Social Networks: Another significant contribution I have made is applying securesemantic web technologies for the security and privacy <strong>of</strong> social networks. Together with a colleague andstudent <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, as well as with colleagues <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria, wedeveloped both an access control model and privacy model for social networks, represented the policies inRDF and OWL and then used RDF and OWL d<strong>at</strong>a managers and reasoners to reason about the policies.This work was published in Paper #9 (ACM SACMAT). It was one <strong>of</strong> the few papers on this topic. Wewere invited for a journal special issue and the journal version will appear in Elsevier’s Computers andSecurity Journal.Secure Web Services: Paper #10 (IEEE Intern<strong>at</strong>ional Conference on Web Services) describes myresearch in secure web services which was carried out with a colleague and a student. We noted th<strong>at</strong> much<strong>of</strong> the work on secure web services was in access control. <strong>The</strong>refore, we focused on other aspects anddeveloped new security models for web services. In particular, we have developed deleg<strong>at</strong>ion-basedmodels for web services as well as inform<strong>at</strong>ion flow models. We have combined both these models into aunique model. We have also designed and implemented a system th<strong>at</strong> utilizes the models. We were thefirst to introduce such an integr<strong>at</strong>ed model into secure web services.Secure Cloud Computing: Paper #11 (Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy) is in theemerging area <strong>of</strong> secure cloud computing. I have designed a framework for secure cloud computing whichconsists <strong>of</strong> a virtual machine layer, storage layer and d<strong>at</strong>a layer. <strong>The</strong>n I collabor<strong>at</strong>ed with colleagues todesign algorithms for each <strong>of</strong> the layers. We have designed a model for secure query processing forsemantic web d<strong>at</strong>a based on principles <strong>of</strong> query optimiz<strong>at</strong>ion and have subsequently developed algorithmsfor secure query processing in a cloud. We expect to continue to make significant impact in secure clouds.My work on secure semantic web and web services has also appeared in numerous other journals andconferences including IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering; IEEE Transactions onSystems, Man and Cybernetics; and IEEE Transactions on Dependable and Secure Computing. One area Iam focusing on now is to integr<strong>at</strong>e my research on secure web services with secure semantic web andbuild secure semantic web services. My book on this topic was published in December 2010. Other areasmy team is focusing on are ontology alignment, schema m<strong>at</strong>ching and investig<strong>at</strong>ing security issues. One <strong>of</strong>107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!