10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Policy management: While discretionary security for rel<strong>at</strong>ional d<strong>at</strong>abase is a m<strong>at</strong>ure technology, there isa lot to do in discretionary security for XML and RDF d<strong>at</strong>abases. For example, how can we specifypolicies? How can we incorpor<strong>at</strong>e policies for provenance d<strong>at</strong>a management with trust, confidentiality andprivacy? How can semantic web d<strong>at</strong>a be secured? Wh<strong>at</strong> sorts <strong>of</strong> temporal authoriz<strong>at</strong>ion models areappropri<strong>at</strong>e for the emerging d<strong>at</strong>abase systems? <strong>The</strong>se are all interesting challenges.Multilevel security: We have focused on multilevel security for various types <strong>of</strong> d<strong>at</strong>abases. Whileresearch in this area is not as active as it used to be, we have learned a lot in conducting research inMLS/DBMSs. Furthermore, such systems are still needed for military and intelligence applic<strong>at</strong>ions. <strong>The</strong>challenges here include developing new kinds <strong>of</strong> models and architectures for MLS/DBMSs as well asbuilding high assurance systems.Inference Problem: While this is a very difficult problem, it continues to fascin<strong>at</strong>e researchers. We needto build policy managers th<strong>at</strong> are more efficient and can manage prior knowledge. We also need toexamine the complexity <strong>of</strong> the problem. <strong>The</strong>re is a lot <strong>of</strong> interesting theoretical work to do in this area.Secure Distributed and Heterogeneous D<strong>at</strong>abases: While some progress has been made, we need anextensive investig<strong>at</strong>ion <strong>of</strong> security for distributed, heterogeneous and feder<strong>at</strong>ed d<strong>at</strong>abases. Wh<strong>at</strong> sorts <strong>of</strong>access control models are appropri<strong>at</strong>e for such systems? How can we share d<strong>at</strong>a and still have security andautonomy? How can security policies be integr<strong>at</strong>ed across organiz<strong>at</strong>ions? How can distributedtransactions be executed securely?Secure Object D<strong>at</strong>abases and Applic<strong>at</strong>ions: <strong>The</strong>re has been work in both discretionary and mand<strong>at</strong>orysecurity for object d<strong>at</strong>abases. How can we apply the principles for object-rel<strong>at</strong>ional systems since suchsystems are domin<strong>at</strong>ing the marketplace? Are the security mechanisms for distributed object managementsystems sufficient? How can we provide fine-grained access control? How can UML be used to designsecure applic<strong>at</strong>ions?Secure D<strong>at</strong>a Warehousing: <strong>The</strong>re are many challenges here. How can we build a secure warehouse fromthe d<strong>at</strong>a sources? How can we develop an integr<strong>at</strong>ed security policy? Wh<strong>at</strong> is the security impact on thefunctions <strong>of</strong> a warehouse?Secure Web D<strong>at</strong>a and Inform<strong>at</strong>ion Management: <strong>The</strong>re is a lot <strong>of</strong> work to be done on secure web d<strong>at</strong>aand inform<strong>at</strong>ion management. For example, how can we build secure web d<strong>at</strong>abase systems? Wh<strong>at</strong> are thesecurity issues for digital libraries? How do we secure the semantic web? How can we maintain trust onthe web? How can we secure emerging applic<strong>at</strong>ions such as knowledge management, multimedia,collabor<strong>at</strong>ion, e-commerce and peer-to-peer d<strong>at</strong>a management? Also securing the semantic web and webservices will be major research areas.D<strong>at</strong>a Mining, Security and Privacy: Without a doubt, d<strong>at</strong>a mining has many applic<strong>at</strong>ions in security.However, privacy is a major concern. We need better techniques for detecting novel classes. Furthermore,we need to detect the malware before they change p<strong>at</strong>terns. Privacy research includes privacy-preservingd<strong>at</strong>a mining, building privacy controllers and analyzing the complexity <strong>of</strong> the privacy problem. Privacy isa multidisciplinary research topic between computer scientists and social scientists.Assured Inform<strong>at</strong>ion Sharing: <strong>The</strong> 9/11 commission report has st<strong>at</strong>ed th<strong>at</strong> we have to migr<strong>at</strong>e from aneed to know to a need to share environment. We need appropri<strong>at</strong>e policy management techniques forsharing d<strong>at</strong>a. More importantly, we need incentives for d<strong>at</strong>a sharing. This is a multidisciplinary researcharea between computer scientists and social scientists.111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!