Woman <strong>of</strong> Color Technology Research Leadership Award Best Paper Award, IEEE Conference onSystems Sciences, 1988.Internal: Louis A. Beecherl, Jr. I Distinguished Pr<strong>of</strong>essorship, 2010; MITRE Corpor<strong>at</strong>ion’s ProgramAchievement Award (distributed real-time systems) 1997; IRS Program Award 2002 and 2005; DirectorAwards for d<strong>at</strong>a mining and distributed objects, 1998.III. SIGNIFICANCE OF RESEARCHMy early research was on theory <strong>of</strong> comput<strong>at</strong>ion and in particular, recursion theory. This research wascarried out as visiting pr<strong>of</strong>essor <strong>at</strong> the New Mexico Institute <strong>of</strong> Technology and <strong>at</strong> the <strong>University</strong> <strong>of</strong>Minnesota for three years. It resulted in several journal public<strong>at</strong>ions including in the Journal <strong>of</strong> Computerand Systems Sciences. Since 1985, my research has focused on d<strong>at</strong>a security. This research was carried outinitially <strong>at</strong> Honeywell, Inc. as well as the <strong>University</strong> <strong>of</strong> Minnesota as adjunct faculty <strong>of</strong> computer sciencefor over four years. I continued with this research <strong>at</strong> the MITRE Corpor<strong>at</strong>ion starting in 1989. Significantcontributions include design and development <strong>of</strong> Lock D<strong>at</strong>a Views Rel<strong>at</strong>ional D<strong>at</strong>abase System, designand development <strong>of</strong> secure distributed d<strong>at</strong>abase system, design and development <strong>of</strong> techniques to handlethe inference problem, design <strong>of</strong> NTML: a Non Monotonic Logic for Secure D<strong>at</strong>a and Knowledge BasedSystems, design and development <strong>of</strong> secure multimedia and object systems, and the design anddevelopment <strong>of</strong> an object-based real-time d<strong>at</strong>a manager and middleware for next gener<strong>at</strong>ion real-timecommand and control systems. I also used my background in theory and proved th<strong>at</strong> the inferenceproblem was unsolvable. This work has been quoted by Dr. John Campbell <strong>of</strong> NSA as a significantdevelopment in d<strong>at</strong>abase security in 1990. My main research now is focusing in four major areas: AssuredInform<strong>at</strong>ion Sharing; Securing the Semantic Web; Secure Geosp<strong>at</strong>ial D<strong>at</strong>a Management; KnowledgeDiscovery/D<strong>at</strong>a Mining for security applic<strong>at</strong>ions and their privacy implic<strong>at</strong>ions. I focus on developingsound theories and then build highly assured systems th<strong>at</strong> are founded on theories th<strong>at</strong> result in prototypes,some <strong>of</strong> which are transferred to oper<strong>at</strong>ional systems and products.IV. WORK EXPERIENCE(i) <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, Richardson, TX (October 2004 – Present): In October 2004, Ijoined the <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong> as Tenured Full Pr<strong>of</strong>essor <strong>of</strong> Computer Science and Director <strong>of</strong>the Cyber Security Research Center <strong>at</strong> the Erik Jonsson School <strong>of</strong> Engineering and Computer Science.This is my first tenure track faculty appointment. Over the past seven years, I have hired and mentoredseveral junior faculty in Cyber Security in general and D<strong>at</strong>a Security, in particular. Together we havesecured competitive research funding <strong>of</strong> over $14 million from several federal agencies including AirForce Office <strong>of</strong> Scientific Research, N<strong>at</strong>ional Science Found<strong>at</strong>ion, N<strong>at</strong>ional Geosp<strong>at</strong>ial IntelligenceAgency, N<strong>at</strong>ional Aeronautical and Space Administr<strong>at</strong>ion, and Intelligence Advanced Research ProjectsAgency. This funding also includes a prestigious DoD MURI award. In addition, we have established aclose research collabor<strong>at</strong>ion and partnership with Raytheon Corpor<strong>at</strong>ion in DFW. Together we have about30 Ph.D. students; I gradu<strong>at</strong>ed my first student in 2007. Due to our efforts, we were in the first group <strong>of</strong>universities to receive the NSA/DHS Center for Excellence in Research Award in 2008. My team hassignificantly enhanced UTD’s educ<strong>at</strong>ion program in Inform<strong>at</strong>ion Assurance by introducing severalcourses including D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Digital Forensics, Trustworthy Semantic Web,Biometrics, Privacy, Knowledge Discovery, Cryptography and Secure Programming Languages. UT<strong>Dallas</strong> is one <strong>of</strong> the top universities in the world in d<strong>at</strong>a security educ<strong>at</strong>ion.(ii) N<strong>at</strong>ional Science Found<strong>at</strong>ion, Arlington, VA (Oct. 1, 2001 – September 30, 2004)IPA Position: Director <strong>of</strong> Cyber Trust, D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Inform<strong>at</strong>ion and D<strong>at</strong>aManagement.As an IPA from the MITRE Corpor<strong>at</strong>ion <strong>at</strong> NSF for three years, I managed programs in Inform<strong>at</strong>ionManagement, Sensor Networks, D<strong>at</strong>a and Applic<strong>at</strong>ions Security and Cyber Trust. In addition, I initi<strong>at</strong>edthe program in d<strong>at</strong>a and applic<strong>at</strong>ions security and made it a focus area.(iii) <strong>The</strong> MITRE Corpor<strong>at</strong>ion, Bedford, MA (January 1989 – October 2004): My 15 plus yearsexperience <strong>at</strong> MITRE has given me the opportunity to work on research, development and technologytransfer projects. I secured research funding from a number <strong>of</strong> sponsors including the Air Force, Navy,16
Army, NSA, and CIA as well as consulted for the IRS. I led team research efforts and designed anddeveloped algorithms and prototypes for secure distributed d<strong>at</strong>abase systems, secure object systems andsecure deductive systems. I proved th<strong>at</strong> the inference problem was unsolvable and developed solutions tolimited aspects <strong>of</strong> this problem. We also developed distributed object-based real-time systems andtransferred the technology to the AWACS program. Additionally, I built MITRE’s programs and gavethem intern<strong>at</strong>ional visibility in d<strong>at</strong>a mining and d<strong>at</strong>a security. For 4 years, I managed a department <strong>of</strong>about 28 staff. I am currently a consultant to IRS through MITRE on the s<strong>of</strong>tware research credit program.(iv) Honeywell, Inc., Golden Valley, MN (January, 1986 – January, 1989) Position: PrincipalResearch Scientist / Engineer, Corpor<strong>at</strong>e Systems Development Division. I conducted research,development, and technology transfer activities in d<strong>at</strong>abase security, d<strong>at</strong>a management, distributedprocessing, inform<strong>at</strong>ion systems, process control systems, pay<strong>of</strong>f modeling, and AI applic<strong>at</strong>ions. Inaddition to reports and proprietary documents, papers were also published in refereed journals andconferences. Work was carried out for Honeywell internal divisions, as well as for the Air Force andNASA.(v) Control D<strong>at</strong>a Corpor<strong>at</strong>ion, Arden Hills, MN (December 1983 – January 1986) Position: SeniorProgrammer/ Analyst, Arden Hills programming Division. I was involved in the design and development<strong>of</strong> the CDCNET (Control D<strong>at</strong>a Communic<strong>at</strong>ions Network) product. Company proprietary documents werealso written. Specifically, I was responsible for the design and development <strong>of</strong> transport, network, sessionlayers as well as several other components <strong>of</strong> the network. Details are given under the Industry Experiencesection.V. RESEARCH ACCOMPLISHMENTSPublic<strong>at</strong>ions St<strong>at</strong>istics: Over 100 journal papers including articles in several IEEE Transactions, VeryLarge D<strong>at</strong>abase Journal, ACM Transactions, Journal <strong>of</strong> Computer and Systems Sciences and Notre DameJournal <strong>of</strong> Formal Logic. Over 200 Conference/Workshop Papers (IEEE, ACM and IFIP conferences),over 70 keynote/fe<strong>at</strong>ured present<strong>at</strong>ions, 12 books authored (d<strong>at</strong>a security, d<strong>at</strong>a management and d<strong>at</strong>amining), 12 books edited; 4 US p<strong>at</strong>ents (3 obtained and 1 filed in d<strong>at</strong>a security).Research Contracts/GrantsUT <strong>Dallas</strong>: Over $14 million in grants and contracts by my team in assured inform<strong>at</strong>ion sharing,geosp<strong>at</strong>ial inform<strong>at</strong>ion management, semantic web, d<strong>at</strong>a mining for security applic<strong>at</strong>ions, and securegrids. Sponsors include AFOSR, IARPA, NSF, NASA, NGA, ONR, NIH and Raytheon. Over $2 millionin educ<strong>at</strong>ion grants in cyber security from DoD and NSF.MITRE: I initi<strong>at</strong>ed and led several research projects for various sponsors including Navy (securedistributed d<strong>at</strong>abases, secure objects, inference problem/NTML), Army (inference problem, securityconstraint processing), Air Force (secure distributed d<strong>at</strong>abases and real-time d<strong>at</strong>abases/middleware), andN<strong>at</strong>ional Security Agency (secure feder<strong>at</strong>ed d<strong>at</strong>abases, designing secure systems and applic<strong>at</strong>ions). Eachproject th<strong>at</strong> I led consisted <strong>of</strong> about three – five staff, a third with Ph.D.’s and half with MS degrees; alsoincluded students from Carnegie Mellon <strong>University</strong>, Cornell, <strong>University</strong> <strong>of</strong> Rhode Island and NorthEastern <strong>University</strong>.Prototypes and Products: UT <strong>Dallas</strong>: My students are implementing several prototypes in secure d<strong>at</strong>a,inform<strong>at</strong>ion and knowledge management systems, d<strong>at</strong>a mining tools for security applic<strong>at</strong>ions, geosp<strong>at</strong>ialsemantic webs and social network tools. Some tools were transferred to the Raytheon program and we arehaving discussions on commercializing the d<strong>at</strong>a mining tools. Other: Developed parts <strong>of</strong> the CDCNETproduct <strong>at</strong> Control D<strong>at</strong>a Corpor<strong>at</strong>ion (extensive implement<strong>at</strong>ion in Cybil language). Oversaw theimplement<strong>at</strong>ion <strong>of</strong> expert process control system XIMKON <strong>at</strong> Honeywell as well as Network oper<strong>at</strong>ingsystem and students’ implement<strong>at</strong>ions <strong>at</strong> <strong>University</strong> <strong>of</strong> Minnesota (mostly C). Supervised very closely theimplement<strong>at</strong>ion <strong>of</strong> several prototypes based on my designs <strong>at</strong> MITRE. <strong>The</strong>se included secure distributedd<strong>at</strong>abase system prototypes, d<strong>at</strong>abase inference controller prototypes for query, upd<strong>at</strong>e, and d<strong>at</strong>abasedesign, multimedia system prototypes simul<strong>at</strong>ing security fe<strong>at</strong>ures, active real-time d<strong>at</strong>a managementprototype, and real-time d<strong>at</strong>a management hosted on an infrastructure for real-time applic<strong>at</strong>ions andd<strong>at</strong>a/text mining and knowledge management prototypes.17
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15: Section 5: RESUME SUMMARYName:Dr. B
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68:
UTDCS-32-08A Practical Approach to
- Page 69 and 70:
UTDCS-27-11Towards the Design and I
- Page 71 and 72:
29. A Seminar on Real-time Database
- Page 73 and 74:
14. Concurrency Control in Real-tim
- Page 75 and 76:
17. Data Management Systems Evoluti
- Page 77 and 78:
54. Data Mining for National Securi
- Page 79 and 80:
5. Recent Developments in Some Trus
- Page 81 and 82:
44. Data Engineering Directions, IE
- Page 83 and 84:
6. Towards a Global Multilevel Data
- Page 85 and 86:
19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH