Team Members: Bhavani Thuraisingham, William Herndon, Arnon Rosenthal, Richard Graubart,Jim Williams4. Secure Client Server ComputingUS Army CECOM, FY94 (1 staff year)Investig<strong>at</strong>ed security issues for client-server computing and identified security for object requestbrokers.Team Members: Bhavani Thuraisingham, Brian Kahn5. Research Directions in D<strong>at</strong>abase Security, Special topics in D<strong>at</strong>abase Security(Secure Feder<strong>at</strong>ed D<strong>at</strong>a Management, Found<strong>at</strong>ions <strong>of</strong> Inference Problem, D<strong>at</strong>a Mining andPrivacy)NSA FY91 (0.5 staff year), FY92 (1.5 staff years), FY93 – FY95 (0.5 staff year/yr), FY96 (1 staffyear). Project continued under Dr. Chris Clifton, FY97Team Members: Bhavani Thuraisingham, Mark Nadel, Leonard Monk, Chris CliftonNSA Team Members: Leonard Binns, Don Marks, Peter Sell6. Research Directions in Massive Digital D<strong>at</strong>a Systems (MDDS), D<strong>at</strong>a Mining for Text D<strong>at</strong>abasesCIA MDDS FY93 – FY99 (1.5 staff year/yr)Text mining (initi<strong>at</strong>ed project for 2 staff years/yr in FY96 – subcontractor: Stanford <strong>University</strong>,project managed by Dr. Chris Clifton and continued until FY99)Team Members: Bhavani Thuraisingham, Maria Zemankova, Beth Lavender, Henry Bayard,Marcia Kerchner, Manette Lazar, Chip Paradise, Chris Clifton, Arnon Rosenthal7. Research in Real-time D<strong>at</strong>a Management and Real-time MiddlewareUSAF Rome Lab, FY93 – FY99 (Principal investig<strong>at</strong>or for Real-time D<strong>at</strong>a Management portion<strong>of</strong> project: 2 staff year/yr). Part <strong>of</strong> larger project, approx. 5 – 7 staff year/yr managed by JohnMaurer)Team members: Bhavani Thuraisingham, Alice Shafer, Gary Gengo, Mike Squadrito, RomanGinis, Victor Fay-Wolfe, Steve Wohlever, Eric Hughes8. Research Directions in D<strong>at</strong>a ManagementMITRE Research FY95 – FY97 (1 staff year/yr)Team Members: Bhavani Thuraisingham, Barbara Blaustein, Arnon Rosenthal, Len Seligman,Penny Chase, Tom Mowbray9. XML SecurityPart <strong>of</strong> independent research from NSF IPA (20% <strong>of</strong> my time, FY02 – FY04)II. Other Research Analysis/Technology Transfer Projects:1. Treasury research credit (evalu<strong>at</strong>ed research conducted by Fortune 100 corpor<strong>at</strong>ions FY99 –FY01), work report in Wall Street Journal, December 2000. Part <strong>of</strong> a team instrumental inbringing this project to MITRE FY99 – FY01.2. Technology Transfer to Services: (i) Air Force: AWACS project; Secure Distributed Queryprocessing – IMOM Applic<strong>at</strong>ion (ii) Navy: Inference problem analysis for oper<strong>at</strong>ional systems;and (iii) Army: Technology transfer <strong>of</strong> secure distributed d<strong>at</strong>abase researchIII. Research Management1. MITRE: Department Head <strong>of</strong> MITRE, managed budget <strong>of</strong> approx. $5 million/yr for 4+ years.2. MITRE: Head, MITRE’s research in IT, managed a budget <strong>of</strong> approx. $4million/yr for 3 years.34
3. CIA: As manager <strong>of</strong> fifteen research projects for CIA, managed a budget <strong>of</strong> approx. $3 million/yrfor 6 years.Honeywell Inc. (1986 – 1989)1. Air Force, Response to BAA: Secure Distributed D<strong>at</strong>a ViewsAs project contributor, worked on proposals for various research projects and contributed toprojects, e.g. Secure Distributed D<strong>at</strong>a Views (SDDS), RADC. Became the principal investig<strong>at</strong>orduring the 2 nd year <strong>of</strong> the three year SDDS project. (January 1986 – December 1988); managed 3staff years/yrTeam Members: P<strong>at</strong> Dwyer, Emanual Oneugbe, Paul Stachour, Tom Haigh, Earl Boebert, BlairDillaway2. Air Force, Response to BAA: Engineering Inform<strong>at</strong>ion Systems As project contributor, led thed<strong>at</strong>a modeling part <strong>of</strong> the project for Engineering Inform<strong>at</strong>ion Systems; project funded by WrightP<strong>at</strong>terson AFB (October 1987 - December 1988); managed 2 staff years /yr (Team member:Venk<strong>at</strong> Venk<strong>at</strong>raman)3. NASA, Response to BAA: Distributed Systems Project contributor on the distributed systemsproject for NASA; principal investig<strong>at</strong>or <strong>of</strong> the Network Oper<strong>at</strong>ing Systems portion <strong>of</strong> the project(November 1986- October 1987); managed 2 staff year /yr4. Internally funded research projects:Distributed D<strong>at</strong>a Dictionary Systems: Honeywell’s Residential Controls Division, 1986 – 1987Team members: Krishna Mikkileneni, Hongjun LuExpert Systems for Control Systems, Honeywell Industrial Autom<strong>at</strong>ion Systems Division 1987 –1988Team members: Ferit Konar, Paul FelixExpert Systems for Network Management: Honeywell Building Controls Division, 1987 – 1988Object Technology for Building Control Systems, Honeywell’s Building Controls Division, 1987– 1988Cost Modeling <strong>of</strong> S<strong>of</strong>tware Str<strong>at</strong>egies, Honeywell Corpor<strong>at</strong>e, 1987 – 1988Team member: Ron CroweHeterogeneous Knowledge Integr<strong>at</strong>ion, Honeywell Industrial Autom<strong>at</strong>ion Systems Division, 1988– 1989Infrastructure Development FundingI have supported my colleagues in the NSA Capacity building efforts for 2007 (Mur<strong>at</strong> Kantarcioglu), 2008(Kevin Hamlen) and 2010 (L<strong>at</strong>ifur Khan). In 2011, we received infrastructure funding from AFOSR. In2011 w also received capacity building funds from NSF SFS (for courses in assured cloud computing)35
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33: PI: L. KhanAmount: $260,00020. Nati
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86:
19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH