designs for privacy constraint processing which is along the lines <strong>of</strong> my work on the inference problem. Iam exploring some new directions such as security for sensor inform<strong>at</strong>ion systems.Other Inform<strong>at</strong>ion: Some <strong>of</strong> my research in secure d<strong>at</strong>abases was carried out in collabor<strong>at</strong>ion with the<strong>University</strong> <strong>of</strong> Minnesota in the 1980s and I supervised MS and PhD students there. At MITRE I hadstudents working on my projects in secure d<strong>at</strong>abases from CMU and Cornell. I have also collabor<strong>at</strong>ed withthe <strong>University</strong> <strong>of</strong> Milan and supervised a PhD student. I mentored junior staff <strong>at</strong> the NSA <strong>at</strong> the request <strong>of</strong>the chief between 1991 and 1997 and wrote joint papers. I also reviewed university research proposals forNSA in this area between 1991 and 1996. I invented three US p<strong>at</strong>ents for MITRE on d<strong>at</strong>abase inferencecontrol and have authored a very comprehensive book in d<strong>at</strong>abase and applic<strong>at</strong>ions security. I served onthe editorial board <strong>of</strong> the Journal <strong>of</strong> Computer Security for ten years and now serve on the editorial boards<strong>of</strong> two <strong>of</strong> the major journals in security: ACM Transactions on Inform<strong>at</strong>ion Systems Security and IEEETransactions on Dependable and Secure Computing. In addition, I serve on the editorial and advisoryboards <strong>of</strong> four other security journals. My research in secure d<strong>at</strong>abases has also resulted in being elected aFellow <strong>of</strong> IEEE, AAAS and the British Computer Society. I received the IEEE CS 1997 TechnicalAchievement award for this work and was also quoted by Silicon India as one <strong>of</strong> top seven technologyinnov<strong>at</strong>ors <strong>of</strong> South Asian origin (other six are from Stanford, Berkeley, MIT, NASA, HP Labs andPARC). Several articles have appeared in IEEE Computer, IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, ACM OOPSLA, Journal <strong>of</strong> Object-Oriented Programming, Computers and Security Journal,D<strong>at</strong>a and Knowledge Engineering, and Journal <strong>of</strong> Systems and S<strong>of</strong>tware.Area 3: Dependable D<strong>at</strong>a ManagementDistributed Systems: I believe strongly th<strong>at</strong> to carry out security research one needs a good understanding<strong>of</strong> systems. <strong>The</strong>refore, while conducting security research since 1985, I have also worked in systemsincluding d<strong>at</strong>abase systems, distributed systems and networks. Some <strong>of</strong> my early work with the <strong>University</strong><strong>of</strong> Minnesota in the 1980s was on distributed fault tolerant systems. We worked on binary tree task modelsfor fault tolerant computing. I supervised PhD students in this area. While <strong>at</strong> Honeywell, I spent part <strong>of</strong> mytime designing a network oper<strong>at</strong>ing system for space st<strong>at</strong>ion networks. Prior to Honeywell, I had over 2years <strong>of</strong> product development experience with CDCNET <strong>at</strong> Control D<strong>at</strong>a Corpor<strong>at</strong>ion.Survivable Real-time Object Systems: Between 1993 and 2000 I worked with a team <strong>at</strong> MITRE and the<strong>University</strong> <strong>of</strong> Rhode Island conducting research for next gener<strong>at</strong>ion AWACS (Airborne Warning andControl System). My goal was to integr<strong>at</strong>e my security research with real-time processing and faulttolerance techniques to build survivable systems. We designed and developed an infrastructure and d<strong>at</strong>amanager based on objects for next gener<strong>at</strong>ion AWACS and transferred the technology to Air Forceprograms. We also investig<strong>at</strong>ed aspects <strong>of</strong> integr<strong>at</strong>ing security, real-time processing and fault toleranceissues. I led the real-time inform<strong>at</strong>ion management part <strong>of</strong> the project and also helped found the real-timeobject request broker group <strong>at</strong> the Object Management Group. We were the first to propose real-timeaspects for Object Request Brokers in 1994. We continued our investig<strong>at</strong>ion on real-time CORBA and alsoinvestig<strong>at</strong>ed scheduling for real-time middleware. We also designed and developed new concurrencycontrol algorithms for real-time object d<strong>at</strong>abases. This research had a major impact not only on Air Forceprograms but also on other DoD programs. We influenced the standards community, the commercialcommunity (for real-time CORBA) and the research community (e.g., real-time concurrency control). Ialso supervised MS and PhD students in this area from <strong>University</strong> <strong>of</strong> Rhode Island and North Eastern<strong>University</strong>. Several papers on fault tolerant and real-time computing were published including articles inIEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, IEEE Transactions on S<strong>of</strong>tware Engineering, IEEE Symposium <strong>of</strong> Object-Oriented Real-timeComputing, Real-time Systems Journal, IEEE Network, VLDB Conference, and Computer SystemsScience and Engineering.Area 4: D<strong>at</strong>a and Inform<strong>at</strong>ion Management116
Research and Technology Transfer in D<strong>at</strong>a Management: During the mid to l<strong>at</strong>e 1980s while <strong>at</strong>Honeywell Computer Sciences Center, I worked with a team on a number <strong>of</strong> research projects funded bythe commercial divisions. In one effort we developed an applic<strong>at</strong>ion gener<strong>at</strong>or toolkit to help the residentialcontrol division programmers develop d<strong>at</strong>abase applic<strong>at</strong>ions. In another effort, we explored the use <strong>of</strong>expert systems technology for designing process control systems such as Honeywell’s TDC3000 forIndustrial Autom<strong>at</strong>ion division. We also designed and developed a distributed d<strong>at</strong>a dictionary system forHoneywell’s Residential control division. While my main research has been in d<strong>at</strong>a and applic<strong>at</strong>ionssecurity, I have a solid background in d<strong>at</strong>abase systems, as I believe strongly th<strong>at</strong> to conduct securityresearch in d<strong>at</strong>a management, one needs a good understanding <strong>of</strong> d<strong>at</strong>abase systems.D<strong>at</strong>a, Inform<strong>at</strong>ion and Knowledge Management: At MITRE, in the mid to l<strong>at</strong>e 1990s and early 2000, Imanaged a research group in Inform<strong>at</strong>ion Management (which included d<strong>at</strong>a management, multimedia,inform<strong>at</strong>ion management, d<strong>at</strong>a mining and knowledge management) for several years. I also advised thegovernment and MITRE on d<strong>at</strong>a/inform<strong>at</strong>ion management and wrote five books in the field for technicalmanagers. I managed university research programs for the Intelligence Community for six years. Severaljournal and conference papers were published in Knowledge and Process Management Journal, ComputerStandards and Interface Journal and the IEEE D<strong>at</strong>a Engineering Conference. I also served on the editorialboard <strong>of</strong> IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering for four years. Having a strong systemsbackground has helped my security research a gre<strong>at</strong> deal as security is not a stand-alone field and has to beintegr<strong>at</strong>ed with systems.Area 5: Inform<strong>at</strong>ion Technologies for Homeland SecuritySince 9/11 I have been very active <strong>at</strong> NSF on interagency research in homeland security. In particular, Ihave set the direction for d<strong>at</strong>a mining for counter-terrorism and gave keynote present<strong>at</strong>ions <strong>at</strong> the WhiteHouse and the United N<strong>at</strong>ions. I consulted for DHHS (Health and Human Services) on bioterrorism andalso wrote a book on d<strong>at</strong>a mining for counter-terrorism. I am also very aware <strong>of</strong> privacy concerns and aspart <strong>of</strong> my research on inform<strong>at</strong>ion security, I am addressing privacy. I will continue to contribute tohomeland security areas. I am using my expertise in areas such as d<strong>at</strong>a security, real-time systems and d<strong>at</strong>amining and theory to investig<strong>at</strong>e problems in n<strong>at</strong>ional security. Also, to get a better understanding <strong>of</strong>terrorist behavior, I completed the certific<strong>at</strong>ion in terrorism studies <strong>at</strong> <strong>University</strong> <strong>of</strong> St. Andrews inScotland in Summer 2010.117
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54:
161. XIMKON- An Expert Simulation a
- Page 55 and 56:
194. Ontology Alignment Using Multi
- Page 57 and 58:
225. RETRO: A Framework for Semanti
- Page 59 and 60:
5. Inference Problem in Database Se
- Page 61 and 62:
I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64:
12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115: Publications: Several journal publi
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH