32. IEEE COMPSAC, Chicago, IL, October 200133. Intern<strong>at</strong>ional Workshop on Multimedia Middleware, Ottowa, Canada, November 200134. IEEE FTDCS, Bologna, Italy, November 200135. IEEE WORDS, San Diego, CA, January 200236. IASTED Applied Inform<strong>at</strong>ics, Innsbruck, Austria, February 200237. PAKDD Workshop on Rough Sets and D<strong>at</strong>a Mining, Taiwan, May 200238. IEEE ISORC, Washington DC, May 200239. IEEE ICDM, 2002, Maebashi City, Japan, December 200240. ACM SACMAT, Monterey, CA, June 200241. Second Semantic Web Symposium, Sardinia, Italy, June 200242. IEEE COMPSAC, Oxford, UK, August 200243. COOPIS, Irvine, CA, October 200244. IEEE ICTAI 2002, Crystal City, VA, November 200245. IFIP Integrity and Control Conference, Bonn, Germany, November 200246. NSF/NIJ Symposium on Security Inform<strong>at</strong>ics, Tucson, AZ, June 200347. IASTED Applied Inform<strong>at</strong>ics, Innsbruck, Austria, February 200348. IEEE ISADS, Pisa, Italy, April 200349. IEEE ISORC, Japan, May 200350. IFIP D<strong>at</strong>a Security, Colorado Springs, CO , August 200351. IEEE WORDS 2003F, Capri Island, Italy, October 200352. IFIP Integrity and Control Conference, Lausanne, Switzerland, November 200353. ACM Computer and Communic<strong>at</strong>ions Security, Washington DC, October 200354. IEEE ICTAI, Sacramento, CA, November 200355. IEEE COMPSAC, <strong>Dallas</strong>, TX, November 200356. IFIP D<strong>at</strong>abase Security Conference, Estes Park, CO, August 200357. IEEE ISORC, Vienna, Austria, May 200458. NSF/NIJ Symposium on Security Inform<strong>at</strong>ics, Tucson, AZ, June 200459. ACM SACMAT, Yorktown Heights, NY, June 200460. ACM SIGMOD Workshop on D<strong>at</strong>abases in Virtual Organiz<strong>at</strong>ions, Paris, France, June 200461. IFIP D<strong>at</strong>abase Security Conference, Sitges, Spain, July 200462. DEXA Workshop on Web Security, Zaragoza, Spain, August 200463. DEXA Workshop on Trust and Privacy in Digital Business, Zaragoza, Spain, August 200464. IEEE COMPSAC, Hong Kong, September 200465. IEEE SRDS, Florianapolis, Brazil, October 200466. IEEE ISADS, Chengdu, China, March 200567. IEEE ICDE, Tokyo, Japan, April 200568. ACM SACMAT, Stockholm, Sweden, June 200569. ACM SIGMOD, Baltimore, MD, June 200570. IEEE Distributed Systems in Sensor Systems, Marina del Rey, CA, July 200571. IFIP D<strong>at</strong>abase Security Conference, Storrs, CT, August 200572. Privacy in D<strong>at</strong>a Mining Workshop, November 200573. ACM SACMAT, Lake Tahoe, CA, June 200674. ACM SIGKDD, Philadelphia, PA, August 200675. IFIP D<strong>at</strong>abase Security Conference, Sophia Antipolis, France, August 200676. IEEE COMPSAC, Chicago, IL, September 200677. IEEE SRDS, London, England, October 200678. ISWC, Montreax, Switzerland, October 200679. CIKM, Arlington, VA, November 200680. Privacy in D<strong>at</strong>a Mining Workshop, December 200681. ACM SIGKDD, San Jose, CA, August 2007120
82. AAAI, Vancouver, BC, Canada, July 200783. IEEE POLICY, Bologna, Italy, June 200784. IFIP D<strong>at</strong>abase Security Conference, Redondo Beach, CA, July 200785. IEEE POLICY, Palisades, NY, June 200886. ACM SACMAT, Estes Park, CO, June 200887. ASIACCS, Sydney, Australia, March 200988. IEEE ICDE, Shanghai, China, March 200989. ACM SACMAT, Stresa, Italy, June 200990. ICWS, Los Angeles, CA, July 200991. DHS/CPS Workshop, 200992. IEEE Globecom, Honolulu, HI, November – December, 200993. IEEE ACSAC, Honolulu, HI, December 200994. IEEE ACSAC, Austin, TX December 201095. COCOA, Big Island Hawaii, December 201096. ACM CODASPY 2011, San Antonio, TX 201197. ASIACCS, Hong Kong 201198. IEEE ISADS 2011(I am compiling a list <strong>of</strong> all conferences I served as program committee member)Other Boards and Activities1. Member, N<strong>at</strong>ional Academy Panel on Protecting Children from Inappropri<strong>at</strong>e Content on theInternet, 2000 (Chair, Hon. Dick Thornburgh)2. Vice Chair, AF SAB Panel on Migr<strong>at</strong>ing Legacy D<strong>at</strong>abases, 20003. Member, N<strong>at</strong>ional Academy Workshop on GIS, 2001 (particip<strong>at</strong>ed from NSF)4. Member, N<strong>at</strong>ional Academy Panel on Inform<strong>at</strong>ion Fusion and Counter-terrorism, 2002 (particip<strong>at</strong>edfrom NSF; Chair: T. Mitchell)5. Member, <strong>Curriculum</strong> Committee, K-6, 7-12, USGIF, 2006 (Geosp<strong>at</strong>ial Intelligence)6. IEEE Distinguished Lecturer (2002 – 2005)7. IEEE Conferences and Tutorials Board (1997 – 1998)8. NSF Panel Member: Oct. 1992, Dec. 1994 (twice), Jan. 1996, Nov. 1998, May 1999, May 2000,Dec 2000, Jan. 2001, Nov. 2005, Dec. 2007, March 2008, Nov. 2009, Dec. 20109. Reviewer for numerous journals and conferences including IEEE Computer, IEEE TSE, IEEETKDE, ACM TODS10. Steering committee for conferences and workshops11. Session chair for numerous conferences and workshops (100+)12. Reviewer <strong>of</strong> proposals for NSA-URP (1992, 1993, 1994), CMS-MDDS (1993, 1994, 1995)Internal ActivitiesCS Department Head Search Committee Chair, 2008 – 2009Engineering School Dean Search Committee Member, 2007 – 2008CS Faculty Search Committee, 2005 – PresentCS Tenure and Promotion Committee Chair, 2005 – 2006, 2006 – 2007, 2007 – 2008, 2010 – 2011CS Promotion Committee Member: 2009 – 2010<strong>University</strong>, Science School Dean Search Committee Member, 2006 – 2007<strong>University</strong>, Vice President for Business Search Committee Member, 2005 – 2006121
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46:
32. Parallel Processing and Trusted
- Page 47 and 48:
66. Privacy Preserving Data Mining,
- Page 49 and 50:
99. Data Mining for Cyber Security
- Page 51 and 52:
130. Object-oriented Implementation
- Page 53 and 54:
161. XIMKON- An Expert Simulation a
- Page 55 and 56:
194. Ontology Alignment Using Multi
- Page 57 and 58:
225. RETRO: A Framework for Semanti
- Page 59 and 60:
5. Inference Problem in Database Se
- Page 61 and 62:
I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64:
12. Proceedings ISI Conference, IEE
- Page 65 and 66:
Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68:
UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119: 13. IEEE WORDS Workshop, Santa Barb
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH