10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

our papers on this topic has appeared in the prestigious Journal <strong>of</strong> Web Semantics. A book on Buildingand Securing the Cloud is expected to be published in early 2012.1. Selective and Authentic Third-Party Distribution <strong>of</strong> XML Documents, IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, Vol. 16, No. 10, p. 1263-1278, 2004 (co-authors: ElisaBertino, Barbara Carmin<strong>at</strong>i, et al) Co-AuthorMy Contribution: I initi<strong>at</strong>ed the ideas in this paper. <strong>The</strong> detailed design was carried out bycolleagues and students <strong>at</strong> the <strong>University</strong> <strong>of</strong> Insubria. <strong>The</strong> paper was part <strong>of</strong> the student’s (MsCarmin<strong>at</strong>i) PhD thesis. I commented on the design and the paper.2. PP-trust-X: A system for privacy preserving trust negoti<strong>at</strong>ions. ACM Transactions onInform<strong>at</strong>ion Systems Security (TISSEC), Vol. 10, No. 3, 2007 (co-authors: Anna CinziaSquicciarini, Elisa Bertino, et al) Co-AuthorMy Contribution: This was the second <strong>of</strong> two papers th<strong>at</strong> I collabor<strong>at</strong>ed with colleagues andstudents <strong>at</strong> the <strong>University</strong> <strong>of</strong> Milan. <strong>The</strong> detailed design was carried out by the student (Ms.Squicciarini) as part <strong>of</strong> her thesis. I commented on the paper and wrote some <strong>of</strong> the introductoryand conclusion sections.3. Security Standards for Semantic Web, Computer Standards and Interface Journal, March 2005,Vol. 27 (North Holland). Sole AuthorMy Contribution: This is 100% my work.4. Using RDF for Policy Specific<strong>at</strong>ion and Enforcement, Proceedings <strong>of</strong> the IEEE DEXA Workshopon Web Semantics, Spain, August 2004 (co-authors: B. Carmin<strong>at</strong>i, E. Ferrari). Co-AuthorMy Contribution: I initi<strong>at</strong>ed the ideas in this paper. <strong>The</strong> details were carried by colleagues <strong>at</strong> the<strong>University</strong> <strong>of</strong> Insubria. <strong>The</strong> paper was written jointly.5. A Rel<strong>at</strong>ional Wrapper for RDF Reific<strong>at</strong>ion, Third IFIP WG 11.11 Intern<strong>at</strong>ional Conference onTrust Management (IFIPTM), West Lafayette, USA, June 15-19, 2009, (co-authors: S.Ramanujam, A. Gupta, L. Khan, and S. Seida). Co-AuthorMy Contribution: This is a team effort and is part <strong>of</strong> the student’s (Ms. Ramanujan) thesis. <strong>The</strong>student wrote the paper and I gave comments. Mr. Gupta carried out the implement<strong>at</strong>ion. Pr<strong>of</strong>.Khan jointly supervised the students with me and Mr. Seida funded this effort from Raytheon.Ms. Ramanujan wrote much <strong>of</strong> the paper with comments from the others.6. Scalable and Efficient Reasoning for Enforcing Role-Based Access Control, Proceedings <strong>of</strong> IFIP11.3, Rome, Italy, June 2010 (co-authors: T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham)Co-AuthorMy Contribution: I conceived the ideas and the student carried out the detailed design andimplement<strong>at</strong>ion. <strong>The</strong> student wrote much <strong>of</strong> the paper with comments from Pr<strong>of</strong>. Kantarcioglu andme.7. Design and Implement<strong>at</strong>ion <strong>of</strong> a Framework for Assured Inform<strong>at</strong>ion Sharing AcrossOrganiz<strong>at</strong>ional Boundaries, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, Vol. 2,No. 4, 2008. (Y. Harsha Kumar et al). Lead AuthorMy Contribution: I carried out the initial design. My student (Ms. Harsha Kumar) carried out theimplement<strong>at</strong>ion. I wrote the paper from the technical report.8. Geosp<strong>at</strong>ial Resource Description Framework (GRDF) and Security Constructs, ComputerStandards and Interfaces Journal, Vol. 33, No. 1, p. 35 – 41, January 2011 (special issuefrom IEEE ICDE conference workshop) (co-authors: A. Alam, L. Khan). Co-AuthorMy Contribution: I conceived the initial ideas. My student Mr. Alam carried out the detaileddesign and wrote much <strong>of</strong> the paper.108

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!