10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Public<strong>at</strong>ions: Several journal public<strong>at</strong>ions including IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, IEEE Transactions on S<strong>of</strong>tware Engineering, IEEE Transactions on Parallel and DistributedProcessing, Journal <strong>of</strong> Computer and Systems Sciences, Notre Dame Journal <strong>of</strong> Formal Logic, Computersand Security and IEEE Computer as well as several conference public<strong>at</strong>ions including in ICDE, VLDB,ACSAC, IFIP D<strong>at</strong>a Security, and OOPSLA.Area 1: Computability <strong>The</strong>oryMuch <strong>of</strong> my research in the early 1980s was on computability theory. I studied various decision problemsfor combin<strong>at</strong>orial systems such as systems functions and proved several results on the unsolvability and thecomplexity <strong>of</strong> the problems. I also invented the concept <strong>of</strong> an N-cylinder and this enabled me to giveseveral counter-examples for the complexity problems. I have also applied the results in these papers to mywork on the complexity <strong>of</strong> the inference problem. This complexity work was st<strong>at</strong>ed by NSA (N<strong>at</strong>ionalSecurity Agency) to be a significant development in d<strong>at</strong>abase security in 1990 (Proceedings N<strong>at</strong>ionalComputer Security Conference). I am now applying the results to the privacy problem. Several papers werepublished in the Journal <strong>of</strong> Computer and Systems Sciences and the Notre Dame Journal <strong>of</strong> Formal Logicbetween 1980 and 1993.Area 2: Secure D<strong>at</strong>a ManagementMy research in inform<strong>at</strong>ion security and secure d<strong>at</strong>abase systems started in 1985 and still continues.Around 70% <strong>of</strong> my public<strong>at</strong>ions are in this area. This work has had a major impact on the researchcommunity, as well as on the commercial and government communities. I have been invited to givenumerous keynote addresses on my research, as well as advice to the government on inform<strong>at</strong>ion security.My earlier contributions have been on secure rel<strong>at</strong>ional d<strong>at</strong>abases, secure object d<strong>at</strong>abases, securedistributed d<strong>at</strong>abases and the inference problem. My research in the early 2000s was on secure XMLd<strong>at</strong>abases, privacy constraint processing, and secure sensor inform<strong>at</strong>ion management. My current researchis discussed in Section 17.2. A summary <strong>of</strong> my research between 1985 and 2004 is given below.Secure Rel<strong>at</strong>ional Systems: In the mid to l<strong>at</strong>e1980s, I was part <strong>of</strong> a team <strong>at</strong> Honeywell designing one <strong>of</strong>the prominent secure rel<strong>at</strong>ional d<strong>at</strong>abase systems. This system was called Lock D<strong>at</strong>a Views (LDV) built ontop <strong>of</strong> a LOCK secure oper<strong>at</strong>ing system. Issues investig<strong>at</strong>ed in this research had an impact on some <strong>of</strong> thecommercial products th<strong>at</strong> were emerging in the l<strong>at</strong>e 1980s and early 1990s. We developed a securitypolicy, security model and designed modules for query, upd<strong>at</strong>e, and metad<strong>at</strong>a management. We alsodeveloped a multilevel rel<strong>at</strong>ional d<strong>at</strong>a model.Secure Objects: I investig<strong>at</strong>ed security for object d<strong>at</strong>abase systems based on MCC’s ORION. I was one <strong>of</strong>the first to carry out such an investig<strong>at</strong>ion. This work had a major impact on the secure d<strong>at</strong>abase researchcommunity. Subsequently I published a policy, model and design <strong>of</strong> a system. I also examined the use <strong>of</strong>object models for designing secure systems.Secure Distributed D<strong>at</strong>abases: In the early 1990s, I led a team and conducted research on securedistributed d<strong>at</strong>abase systems. Algorithms for secure query processing and transaction management weredesigned. Prototypes were implemented. We connected systems in Massachusetts, Washington DC andNew Jersey and built applic<strong>at</strong>ions. This was a very novel idea <strong>at</strong> th<strong>at</strong> time. Simul<strong>at</strong>ion studies were alsocarried out on secure query and transaction processing.Inference Problem/Secure Deductive D<strong>at</strong>abases: I was one <strong>of</strong> the first to conduct research on theinference problem and deductive d<strong>at</strong>abases and also cre<strong>at</strong>ed a logic for secure d<strong>at</strong>abases called NTML(Nonmonotonic Typed Multilevel Logic). I also proved th<strong>at</strong> the inference problem is unsolvable and thiswork was cited as one <strong>of</strong> the significant developments in d<strong>at</strong>abase security in 1990 by Dr. John Campbell<strong>of</strong> NSA in the Proceedings <strong>of</strong> the 1990 N<strong>at</strong>ional Computer Security Conference. I was successfully able touse my research on computability theory to study the complexity <strong>of</strong> the inference problem. I also led a teamth<strong>at</strong> conducted research on security constraint processing and designed and developed systems to processconstraints. We extended the prototypes to work in a distributed environment.Emerging Security Technologies: More recently my research has been on secure web d<strong>at</strong>a management.In particular I have examined security for XML d<strong>at</strong>abases and the semantic web. I am also investig<strong>at</strong>ing115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!