Secure Social Networks: With Facebook and other social networking sites, privacy is beingcompromised. In addition, we need security <strong>of</strong> the d<strong>at</strong>a. <strong>The</strong>refore, we need novel models and techniquesfor securing social networks and ensuring th<strong>at</strong> the privacy <strong>of</strong> the individuals is maintained.Dependable D<strong>at</strong>a Management: Little work has been reported on integr<strong>at</strong>ing security and real-time d<strong>at</strong>amanagement. For example, how can we build systems with flexible policies th<strong>at</strong> can handle security, realtimeprocessing, fault tolerance and integrity? How can we secure sensor d<strong>at</strong>abase systems? Wh<strong>at</strong> are thesecurity issues for wireless inform<strong>at</strong>ion management?Emerging Security Technologies: Research directions include security for biometrics technologies,digital forensics and secure applic<strong>at</strong>ions such as identity management, and insider thre<strong>at</strong> analysis. I haveconducted some research in biometrics and digital forensics. My main focus now is in identitymanagement and insider thre<strong>at</strong> analysis.112
Section 18: DISCUSSION OF COMPLETE RESEARCH ANDPUBLICATIONS (1980 – Present)18.1 INTRODUCTIONIn this note I give a detailed overview <strong>of</strong> the research I have carried out since I started my pr<strong>of</strong>essionalcareer in August 1980 after my PhD. It shows the depth and breadth <strong>of</strong> my work. Please note th<strong>at</strong> asynopsis <strong>of</strong> my research record is given in Section 3 describing the significance <strong>of</strong> my research withspecific references and cit<strong>at</strong>ions.I first describe my research focus <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> (UTD) since October 2004, andthen describe my research contributions to computer science from 1980-2004. Research <strong>at</strong> UTD,discussed in Section 18.2, is focusing in two major areas: D<strong>at</strong>a Security and Privacy (Assured Inform<strong>at</strong>ionSharing; Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management and Secure Social Networks) and Inform<strong>at</strong>ion Management(Semantic Web, D<strong>at</strong>a Mining). In particular, we are developing novel d<strong>at</strong>a mining techniques and securesemantic web technologies to solve problems mainly for cyber security and n<strong>at</strong>ional security.In addition to computability theory research which I carried out while a visiting faculty, my priorresearch, was carried out mainly while I was in industry. It has focused on d<strong>at</strong>a security, d<strong>at</strong>amanagement, distributed systems and d<strong>at</strong>a mining and is discussed in Section 18.3. My research spansfrom theory to system design, modeling and implement<strong>at</strong>ion to applic<strong>at</strong>ion design to technology transferto big-picture/vision. I have discussed my research in five areas (Computability <strong>The</strong>ory, Inform<strong>at</strong>ionSecurity, Distributed Systems and Real-time Objects, D<strong>at</strong>a Management, and Homeland Security).My main research area since 1985 has been in Secure Dependable D<strong>at</strong>a Management and still continues.My research has resulted in over 100 journal papers, over 200 conference/workshop papers, over 80keynote present<strong>at</strong>ions, 3 p<strong>at</strong>ents and 12 books (10 published, 2 in prepar<strong>at</strong>ion).18.2 RESEARCH AT THE UNIVERSITY OF TEXAS AT DALLAS(October 2004 – Present: D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Inform<strong>at</strong>ion Management)Research is proceeding in two main areas: D<strong>at</strong>a Security and Privacy, and Inform<strong>at</strong>ion Management.Public<strong>at</strong>ions: Several journal public<strong>at</strong>ions including IEEE Transactions on Systems, Man andCybernetics, Very Large D<strong>at</strong>abase Journal, Computer Systems Science and Engineering, MultimediaTools, ACM Transactions on Inform<strong>at</strong>ion Systems Security, IEEE Transactions on Dependable andSecure Systems, D<strong>at</strong>a and Knowledge Engineering. Conferences include ACM SACMAT, IFIP D<strong>at</strong>aSecurity, IEEE ICDM, ACM GIS, IEEE ISORC, PKDD.I. D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityArea 1: Assured Inform<strong>at</strong>ion Sharing: Funding from AFOSR, NSF (2004 - Present)In the area <strong>of</strong> assured inform<strong>at</strong>ion sharing, the goal is for organiz<strong>at</strong>ions to share d<strong>at</strong>a and <strong>at</strong> the same timeenforce policies. We are investig<strong>at</strong>ing confidentiality, privacy, trust, integrity, provenance, standards andinfrastructure aspects. In particular, we are examining three scenarios. In the first scenario, we assumeth<strong>at</strong> the partners <strong>of</strong> a coalition are trustworthy (e.g, US, UK, Australia). However, each partner may wantto enforce various security policies. We are investig<strong>at</strong>ing RBAC and UCON policies for such a scenario,carrying out d<strong>at</strong>a mining and conducting experimental studies as to the amount <strong>of</strong> inform<strong>at</strong>ion th<strong>at</strong> is lostby enforcing policies. We are also investig<strong>at</strong>ing ways to transfer our technologies to programs such asDoD’s NCES (Network Centric Enterprise Services).In the second scenario, we assume th<strong>at</strong> the partners are semi-trustworthy. In this case, we want to playgames with the partners and extract as much inform<strong>at</strong>ion as possible without giving out inform<strong>at</strong>ion aboutourselves. We are using results from game theory to formul<strong>at</strong>e str<strong>at</strong>egies for such a scenario and have113
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54:
161. XIMKON- An Expert Simulation a
- Page 55 and 56:
194. Ontology Alignment Using Multi
- Page 57 and 58:
225. RETRO: A Framework for Semanti
- Page 59 and 60:
5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111: Policy management: While discretion
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH