10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section 18: DISCUSSION OF COMPLETE RESEARCH ANDPUBLICATIONS (1980 – Present)18.1 INTRODUCTIONIn this note I give a detailed overview <strong>of</strong> the research I have carried out since I started my pr<strong>of</strong>essionalcareer in August 1980 after my PhD. It shows the depth and breadth <strong>of</strong> my work. Please note th<strong>at</strong> asynopsis <strong>of</strong> my research record is given in Section 3 describing the significance <strong>of</strong> my research withspecific references and cit<strong>at</strong>ions.I first describe my research focus <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> (UTD) since October 2004, andthen describe my research contributions to computer science from 1980-2004. Research <strong>at</strong> UTD,discussed in Section 18.2, is focusing in two major areas: D<strong>at</strong>a Security and Privacy (Assured Inform<strong>at</strong>ionSharing; Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management and Secure Social Networks) and Inform<strong>at</strong>ion Management(Semantic Web, D<strong>at</strong>a Mining). In particular, we are developing novel d<strong>at</strong>a mining techniques and securesemantic web technologies to solve problems mainly for cyber security and n<strong>at</strong>ional security.In addition to computability theory research which I carried out while a visiting faculty, my priorresearch, was carried out mainly while I was in industry. It has focused on d<strong>at</strong>a security, d<strong>at</strong>amanagement, distributed systems and d<strong>at</strong>a mining and is discussed in Section 18.3. My research spansfrom theory to system design, modeling and implement<strong>at</strong>ion to applic<strong>at</strong>ion design to technology transferto big-picture/vision. I have discussed my research in five areas (Computability <strong>The</strong>ory, Inform<strong>at</strong>ionSecurity, Distributed Systems and Real-time Objects, D<strong>at</strong>a Management, and Homeland Security).My main research area since 1985 has been in Secure Dependable D<strong>at</strong>a Management and still continues.My research has resulted in over 100 journal papers, over 200 conference/workshop papers, over 80keynote present<strong>at</strong>ions, 3 p<strong>at</strong>ents and 12 books (10 published, 2 in prepar<strong>at</strong>ion).18.2 RESEARCH AT THE UNIVERSITY OF TEXAS AT DALLAS(October 2004 – Present: D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Inform<strong>at</strong>ion Management)Research is proceeding in two main areas: D<strong>at</strong>a Security and Privacy, and Inform<strong>at</strong>ion Management.Public<strong>at</strong>ions: Several journal public<strong>at</strong>ions including IEEE Transactions on Systems, Man andCybernetics, Very Large D<strong>at</strong>abase Journal, Computer Systems Science and Engineering, MultimediaTools, ACM Transactions on Inform<strong>at</strong>ion Systems Security, IEEE Transactions on Dependable andSecure Systems, D<strong>at</strong>a and Knowledge Engineering. Conferences include ACM SACMAT, IFIP D<strong>at</strong>aSecurity, IEEE ICDM, ACM GIS, IEEE ISORC, PKDD.I. D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityArea 1: Assured Inform<strong>at</strong>ion Sharing: Funding from AFOSR, NSF (2004 - Present)In the area <strong>of</strong> assured inform<strong>at</strong>ion sharing, the goal is for organiz<strong>at</strong>ions to share d<strong>at</strong>a and <strong>at</strong> the same timeenforce policies. We are investig<strong>at</strong>ing confidentiality, privacy, trust, integrity, provenance, standards andinfrastructure aspects. In particular, we are examining three scenarios. In the first scenario, we assumeth<strong>at</strong> the partners <strong>of</strong> a coalition are trustworthy (e.g, US, UK, Australia). However, each partner may wantto enforce various security policies. We are investig<strong>at</strong>ing RBAC and UCON policies for such a scenario,carrying out d<strong>at</strong>a mining and conducting experimental studies as to the amount <strong>of</strong> inform<strong>at</strong>ion th<strong>at</strong> is lostby enforcing policies. We are also investig<strong>at</strong>ing ways to transfer our technologies to programs such asDoD’s NCES (Network Centric Enterprise Services).In the second scenario, we assume th<strong>at</strong> the partners are semi-trustworthy. In this case, we want to playgames with the partners and extract as much inform<strong>at</strong>ion as possible without giving out inform<strong>at</strong>ion aboutourselves. We are using results from game theory to formul<strong>at</strong>e str<strong>at</strong>egies for such a scenario and have113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!