Section 19: PROFESSIONAL ACTIVITIESEditor-in-ChiefComputer Standards and Interface Journal, June 2005 – January 2009Editorial BoardsJournal <strong>of</strong> Computer Security, 1990 – 2000IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, 1996 – 2000Computer Standards and Interfaces, 1993 – 2005ACM Transactions on Inform<strong>at</strong>ion Systems Security, 2004 – 2007IEEE Transactions on Secure and Dependable Computing, 2004 – 2010Journal <strong>of</strong> Distributed Sensor Networks, 2004 –Journal <strong>of</strong> Computer Science and Network Security, 2006 –Journal <strong>of</strong> Inform<strong>at</strong>ion and Computer Security, 2005 –Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, 2006 –Very Large D<strong>at</strong>abase Journal, 2007 – 2011Advisory BoardsPurdue <strong>University</strong>, Computer Science Department, 2004 – 2006Journal <strong>of</strong> Privacy Technologies, 2004 –Journal <strong>of</strong> Computer Security, 2000 –IASTED, 2001 – 2004General Conference Chair/Co-ChairIEEE WORDS Conference, Rome, Italy, January 2001IFIP D<strong>at</strong>a Integrity and Control Conference, Warrenton, VA, November 2005Intelligence and Security Inform<strong>at</strong>ics, ISI, San Diego, CA, May 2006Secure Knowledge Management, <strong>Dallas</strong>, TX, November 2008Intelligence and Security Inform<strong>at</strong>ics, ISI, <strong>Dallas</strong>, TX, June 2009NSF Workshop on D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Arlington, VA, February 2009Program Chair/Co-Chair1. IFIP D<strong>at</strong>abase Security Conference, Vancouver, Canada, August 1992 (Chair)2. ACM OOPSLA Conference Workshop on Secure Object, Washington DC, Sept 1993 (Co-chair)3. ACM Multimedia Conference Workshop on Multimedia D<strong>at</strong>a, San Francisco, CA, October 1994(Co-chair)4. ACM OOPSLA Conference Workshop on Objects in Healthcare, Portland, OR, October 1994 (Cochair)5. IEEE Workshop on Multimedia D<strong>at</strong>abase Systems, Blue Mountain Lake, NY, August 1995 (Cochair)6. ACM OOPSLA Conference Workshop on Objects in Healthcare, Austin, TX, October 1995 (Cochair)7. ACM Multimedia Conference Workshop on Multimedia D<strong>at</strong>abase, San Francisco, CA, November1995 (Co-chair)8. IEEE Metad<strong>at</strong>a Conference, Silver Spring, MD, April 1996 (Founding Chair)9. ACM OOPSLA Conference Workshop on Objects in Healthcare, San Jose, CA, October 1996 (Cochair)10. Federal D<strong>at</strong>a Mining Symposium, Washington DC, December 1997 (Founding Co-Chair)11. IEEE Multimedia D<strong>at</strong>abase Workshop, Dayton, OH August 1998 (Co-chair),12. IEEE COMPSAC Conference, Vienna, Austria, 1998 (Co-chair)118
13. IEEE WORDS Workshop, Santa Barbara, CA, January 1999 (Chair)14. IEEE ISORC, Newport Beach, CA, March 2000 (Co-chair)15. IFIP D<strong>at</strong>abase Security Conference, Amsterdam, Netherlands, August 2000 (Primary Co-chair)16. CODATA Symposium on Integr<strong>at</strong>ing Heterogeneous D<strong>at</strong>a, Stressa Italy, October 2000 (Co-chair)17. IEEE ISADS Conference, <strong>Dallas</strong>, TX, March 2001 (Chair)18. IEEE COMPSAC Conference Workshop on Web Security, Oxford, UK, August 2002 (Co-chair)19. IEEE ISORC, Korea, April 2006 (Co-chair)20. ACM SACMAT Conference, Sophia Antipolis, France, June 2007 (Chair)21. ICDE Secure Semantic Web Workshop, Mexico, April 2008 (Co-chair)22. ICWS Security Workshop, Los Angeles, CA, July 2009 (Co-chair)23. PASSAT, Vancouver, Canada, August 2009 (Chair)24. Indo-US Summit in Infrastructure Security, Bangalore, January 2010 (Co-chair)Program Vice Chair and/or Special Roles1. IEEE ICDE Conference, Mexico, 2008, Vice Chair for Security2. IEEE ICDE Conference, Sydney, 1999, Panel Chair3. Computer Security Applic<strong>at</strong>ions Conference, 1990, Chair, D<strong>at</strong>abase Security TrackProgram Committee Member (Sample, not a complete list)1. IEEE Local Area Networks Conference, Minneapolis, MN, October 19872. ACM Computer and Communic<strong>at</strong>ions Security Conference, Fairfax, VA, November 19943. ACM SAC 1994, Phoenix, AZ, March 19944. ACM SAC 1995, Nashville, TN, February 19955. IEEE ICECCS Conference, Ft. Lauderdale, FL, October 19956. ACM SIGMOD Conference Workshop on D<strong>at</strong>a Mining, Montreal, Canada, June 19967. Pacific Workshop on Distributed Multimedia Systems, Hong Kong, June 19968. IEEE ICECCS, Montreal, Canada, October 19969. IEEE WORDS Workshop, Newport Beach, CA, February 199710. Rough Sets and S<strong>of</strong>t Computing Workshop, Raleigh, NC, March, 199711. Pacific Workshop on Distributed Multimedia Systems, July 199712. Real-time D<strong>at</strong>abase Systems Workshop, Burlington, VT, September 199713. IEEE COMPSAC, Bethesda, MD, August 199714. Compugraphics and Visualiz<strong>at</strong>ion Conference, Algarve, Portugal, December 199715. IEEE ICDE, Orlando, FL, February 199816. IEEE ISORC, Kyoto, Japan, April 199817. PAKDD, Melbourne, Australia, April 199818. Real-time Systems Applic<strong>at</strong>ions Conference, Denver, CO, June199819. Euro micro Workshop on Multimedia and Communic<strong>at</strong>ions, Vesteras, Sweden, August 199820. ASSET, <strong>Dallas</strong>, TX, March 199921. IEEE ISADS, Tokyo, Japan, March 199922. DASFAA, Taiwan, April 199923. Federal D<strong>at</strong>a Mining Symposium, McLean, VA, March 199924. IEEE COMPSAC, Tempe, AZ, October 199925. IEEE WORDS 1999F, Monterey, CA November 199926. E-Commerce and Web-based Inform<strong>at</strong>ion Systems Workshop, San Jose, CA, April 199927. PAKDD, Beijing, China, April 199928. Federal D<strong>at</strong>a Mining Symposium, Washington DC, March 200029. PAKDD, Kyoto, Japan, April 200030. ACM CCS Workshop on E-Commerce Security, Athens, Greece, November 200031. IEEE ISORC, Magdeberg, Germany, May 2001119
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54:
161. XIMKON- An Expert Simulation a
- Page 55 and 56:
194. Ontology Alignment Using Multi
- Page 57 and 58:
225. RETRO: A Framework for Semanti
- Page 59 and 60:
5. Inference Problem in Database Se
- Page 61 and 62:
I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64:
12. Proceedings ISI Conference, IEE
- Page 65 and 66:
Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117: Research and Technology Transfer in
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH