4. Adaptable Real-time Distributed Object Management for Command and Control Systems,Proceedings <strong>of</strong> the IEEE Intern<strong>at</strong>ional Symposium on Autonomous De-centralized Systems(ISADS) Conference, March 1999, Tokyo, Japan (co-authors: J. Maurer, R. Ginis, R. Freedman,M. Squadrito, S. Wohlever). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the design teamincluded John Maurer (Principal Investig<strong>at</strong>or), Peter Krupp, and myself. <strong>The</strong> others carried out theimplement<strong>at</strong>ion. I wrote the entire paper from the technical reports.5. Real-time CORBA, IEEE Transactions on Parallel and Distributed Systems, October 2000 (coauthors:V. Fay-Wolfe, L. DiPippo, G. Cooper, R. Johnston, P. Kortmann). Co-AuthorMy Contribution: I conceived the idea <strong>of</strong> real-time CORBA in 1994. Since then MITRE,<strong>University</strong> <strong>of</strong> Rhode Island and the Navy carried out the design together with the OMG standardsteam. <strong>The</strong> paper was a team effort. Much <strong>of</strong> the writing was carried out by the <strong>University</strong> <strong>of</strong> RI..6. Inform<strong>at</strong>ion Survivability for Real-time Command and Control Systems, IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, January 1999 (co-author: J. Maurer). Lead AuthorMy Contribution: I was the main designer <strong>of</strong> the system described in this paper and wrote thepaper. John Maurer (the project leader) gave comments on this paper.7. Dependable and Secure TMO Scheme, Proceedings IEEE Intern<strong>at</strong>ional Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006) (co-author: J. Kim). Lead AuthorMy Contribution: I worked on the design <strong>of</strong> the system with my student Mr. Kim. My studentcarried out the implement<strong>at</strong>ion. I wrote the paper from my student’s MS <strong>The</strong>sis.17.4 SEMANTIC WEB, WEB SERVICES AND SECURITYI began my research on XML Security in December 1998 when I visited the <strong>University</strong> <strong>of</strong> Milan researchgroup to exchange ideas. I initi<strong>at</strong>ed a research project with this group led by Pr<strong>of</strong>. Bertino on securingXML documents. Two students worked on the project, one on access control and authentic public<strong>at</strong>ion <strong>of</strong>XML documents and the other on privacy and trust for XML documents. Subsequently when I joined NSFin October 2001, I continued with my research on securing the secure semantic web by exploring alllayers <strong>of</strong> the semantic web technology stack. Th<strong>at</strong> same month I particip<strong>at</strong>ed in an NSF-EU workshop <strong>at</strong>Sophia Antipolis and gave a present<strong>at</strong>ion on securing the semantic web technologies. This was the firstsuch present<strong>at</strong>ion on the topic. A major part <strong>of</strong> my current research is in this area.XML Security: Paper #1 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering) describes myresearch with the <strong>University</strong> <strong>of</strong> Milan group on XML security. We developed an approach for controllingaccess to XML documents as well as to securely publish XML documents <strong>at</strong> the third party site. Wefocused on authenticity and completeness <strong>of</strong> the query responses. This approach has been recommendedfor secure d<strong>at</strong>a outsourcing. Paper #2 (ACM Transactions on Inform<strong>at</strong>ion and Systems Security) describesprivacy problems th<strong>at</strong> could occur due to the specific<strong>at</strong>ion <strong>of</strong> trust policies. In particular, we developed asecurity model, privacy-enhanced trust management algorithms and a pro<strong>of</strong> <strong>of</strong> concept prototype <strong>of</strong> thealgorithms.RDF Security and Inference Control: Paper #3 (Computer Standards and Interface Journal) describesthe various security standards for semantic web. It describes XML security, RDF security and security forontologies. <strong>The</strong>n I started focusing on securing RDF. My work on RDF security was novel <strong>at</strong> th<strong>at</strong> timeand I collabor<strong>at</strong>ed with pr<strong>of</strong>essors <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria and together we developed securityarchitecture for RDF documents. This research was published in Paper #4 (DEXA conference workshop).Paper #5 (IFIPTM) continues with RDF security. In this paper, together with students I jointly supervisedwith another pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, instead <strong>of</strong> explicitly coming up with accesscontrol for RDF documents, we use the Reific<strong>at</strong>ion principle already in RDF to control access to variousparts <strong>of</strong> the document. For example, we can make reific<strong>at</strong>ion st<strong>at</strong>ements <strong>of</strong> an RDF document such as“John has access to the RDF document”. This way we can use the reasoning capabilities in RDF tomanage security. Paper #6 (IFIP D<strong>at</strong>a Security Conference) makes a significant contribution to the106
inference problem. Back in the early 1990s, I designed an inference controller. Th<strong>at</strong> d<strong>at</strong>abase was arel<strong>at</strong>ional d<strong>at</strong>abase and policies were specified as rules in d<strong>at</strong>alog. However, now with semantic web, onecan use Jena for the RDF engine and Pellet as the reasoner. Furthermore, both d<strong>at</strong>a and policies can beuniformly represented in RDF. Together with a student and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong><strong>Dallas</strong>, we designed and developed a semantic web-based inference controller. During the past threemonths, we have made considerable enhancements to the design described in Paper #6. In particular, wehave developed a semantic web-based privacy controller for provenance d<strong>at</strong>a.Assured Inform<strong>at</strong>ion Sharing: While continuing to conduct research on securing XML, RDF andontologies, I also focused on five applic<strong>at</strong>ion areas to apply secure semantic web technologies. <strong>The</strong>seapplic<strong>at</strong>ions are discussed in the next five papers. In Paper #7, (Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ionSecurity and Privacy) I utilized semantic web technologies for Assured Inform<strong>at</strong>ion Sharing applic<strong>at</strong>ions.Together with a student and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, we were the first to designand develop an assured inform<strong>at</strong>ion sharing system using XACML-based policies enforced acrossorganiz<strong>at</strong>ions. This research focused on sharing inform<strong>at</strong>ion while <strong>at</strong> the same time ensuring th<strong>at</strong>appropri<strong>at</strong>e policies are enforced.Secure Semantic Geosp<strong>at</strong>ial D<strong>at</strong>a Management: I also expanded into the geosp<strong>at</strong>ial domain and startedfocusing on developing a secure geosp<strong>at</strong>ial semantic web with students and a pr<strong>of</strong>essor <strong>at</strong> <strong>The</strong> <strong>University</strong><strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>. One major obstacle back in 2005 was th<strong>at</strong> there were no standards for geosp<strong>at</strong>ialsemantic web. <strong>The</strong>refore, we designed and developed GRDF (geosp<strong>at</strong>ial RDF) and Secure GRDF. Thiswas a significant contribution. We presented this research in the IEEE Intern<strong>at</strong>ional Conference on D<strong>at</strong>aEngineering workshop and we were then invited to submit a paper to the special issue <strong>of</strong> ComputerStandards and Interface Journal. Our results are published in Paper #8 (Computer Standards andInterface).Secure Semantic Social Networks: Another significant contribution I have made is applying securesemantic web technologies for the security and privacy <strong>of</strong> social networks. Together with a colleague andstudent <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, as well as with colleagues <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria, wedeveloped both an access control model and privacy model for social networks, represented the policies inRDF and OWL and then used RDF and OWL d<strong>at</strong>a managers and reasoners to reason about the policies.This work was published in Paper #9 (ACM SACMAT). It was one <strong>of</strong> the few papers on this topic. Wewere invited for a journal special issue and the journal version will appear in Elsevier’s Computers andSecurity Journal.Secure Web Services: Paper #10 (IEEE Intern<strong>at</strong>ional Conference on Web Services) describes myresearch in secure web services which was carried out with a colleague and a student. We noted th<strong>at</strong> much<strong>of</strong> the work on secure web services was in access control. <strong>The</strong>refore, we focused on other aspects anddeveloped new security models for web services. In particular, we have developed deleg<strong>at</strong>ion-basedmodels for web services as well as inform<strong>at</strong>ion flow models. We have combined both these models into aunique model. We have also designed and implemented a system th<strong>at</strong> utilizes the models. We were thefirst to introduce such an integr<strong>at</strong>ed model into secure web services.Secure Cloud Computing: Paper #11 (Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy) is in theemerging area <strong>of</strong> secure cloud computing. I have designed a framework for secure cloud computing whichconsists <strong>of</strong> a virtual machine layer, storage layer and d<strong>at</strong>a layer. <strong>The</strong>n I collabor<strong>at</strong>ed with colleagues todesign algorithms for each <strong>of</strong> the layers. We have designed a model for secure query processing forsemantic web d<strong>at</strong>a based on principles <strong>of</strong> query optimiz<strong>at</strong>ion and have subsequently developed algorithmsfor secure query processing in a cloud. We expect to continue to make significant impact in secure clouds.My work on secure semantic web and web services has also appeared in numerous other journals andconferences including IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering; IEEE Transactions onSystems, Man and Cybernetics; and IEEE Transactions on Dependable and Secure Computing. One area Iam focusing on now is to integr<strong>at</strong>e my research on secure web services with secure semantic web andbuild secure semantic web services. My book on this topic was published in December 2010. Other areasmy team is focusing on are ontology alignment, schema m<strong>at</strong>ching and investig<strong>at</strong>ing security issues. One <strong>of</strong>107
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54:
161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105: 1990s, we designed and implemented
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH