I. JOURNAL PAPERSD<strong>at</strong>a and Applic<strong>at</strong>ions SecuritySection 10: PUBLICATIONSAuthored Works (Journals, Conferences, Books, etc.)1. Multilevel Security in D<strong>at</strong>abase Management Systems, Computers and Security Journal, June 1987(North Holland), Vol. 6, No. 3, pp. 252-260, (co-authors: P. Dwyer, G. Jel<strong>at</strong>is).2. Security Checking in Rel<strong>at</strong>ional D<strong>at</strong>abase Management Systems Augmented with Inference Engines,Computers and Security Journal, December 1987 (North Holland), Vol. 6, No. 6, pp. 479-492.3. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems, Computers and SecurityJournal August 1988 (North Holland), Vol. 7, No. 4, (co-author: J. McHugh).4. Secure Query Processing Str<strong>at</strong>egies, IEEE Computer, March 1989, Vol. 22, No. 3 (invited paper, coauthors:T. F. Keefe and W. T. Tsai).5. SODA - A Secure Object-Oriented D<strong>at</strong>abase System, Computers and Security Journal, Vol. 8 , October1989 (co-authors: W. T. Tsai and T. F. Keefe).6. Prototyping to Explore MLS/DBMS Design, Computers and Security Journal, May 1989 (Elsevier,formerly North Holland), Vol. 8, No. 3(co-authors: W. T.Tsai and D. Thomsen).7. A Functional View <strong>of</strong> Multilevel D<strong>at</strong>abases, Computers and Security Journal (Elsevier), Vol. 8, No. 8,December 1989.8. Towards the Design <strong>of</strong> a Secure D<strong>at</strong>a/Knowledge Base Management System, D<strong>at</strong>a and KnowledgeEngineering Journal, March 1990, (North Holland), Vol. 5, No. 1.9. Security in Object-Oriented D<strong>at</strong>abase Systems, Journal <strong>of</strong> Object-Oriented Programming, March/April1990, Vol. 2, No. 6. (also reprinted in book on object-oriented d<strong>at</strong>abase management systems by SIGpublishers).10. Design <strong>of</strong> LDV - A Multilevel Secure D<strong>at</strong>abase Management System, IEEE Transactions on Knowledgeand D<strong>at</strong>a Engineering, June 1990, Vol. 2, No. 2 (co-author: P. Stachour).11. SQL Extensions for Security Assertions, Computer Standards and Interfaces Journal, 1990 (NorthHolland), Vol. 11, No.1, 5-14 (co-author: P. Stachour).12. AI Applic<strong>at</strong>ions in Multilevel D<strong>at</strong>abase Security, Computer Security Journal, , 1990 (Miller FreemanPublishers), Vol. 6, No. 1, (co-authors: W. Tsai, T. Keefe, and D. Thomsen)13. Multilevel Secure Object-Oriented D<strong>at</strong>a Model - Issues on Noncomposite Objects, Composite Objects,and Versioning, Journal <strong>of</strong> Object-Oriented Programming, Volume 4, November/December 1991.(Version <strong>of</strong> the article reprinted by the MITRE Journal, 1992.) (Also reprinted in book on objectorientedd<strong>at</strong>abase management systems by SIG publishers.)14. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems – II, Computers and SecurityJournal (Elsevier), Volume 10, No. 8, December 1991.36
15. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management - III, Computers and Security(Elsevier), Vol. 11, November 1992 (co-author: H. Rubinovitz).16. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed Query Processor for a Trusted Distributed D<strong>at</strong>abaseManagement Systems, Journal <strong>of</strong> Systems and S<strong>of</strong>tware, April 1993 (North Holland), Vol. 21, No. 1(co-author: Harvey Rubinovitz).17. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller, D<strong>at</strong>a and Knowledge EngineeringJournal, December 1993 (North Holland), Vol. 11, No. 3, p. 271 – 297, (co-authors: W. Ford, M.Collins, J. O'Keeffe); (Article reprinted by the MITRE Journal, 1994).18. Integr<strong>at</strong>ing Intelligent D<strong>at</strong>abase Technology and Trusted D<strong>at</strong>abase Technology, Computer SecurityJournal, 1993 (Miller Freeman Publishers).19. Simul<strong>at</strong>ion <strong>of</strong> Join Query Processing Algorithms for a Trust Distributed D<strong>at</strong>abase ManagementSystem, Inform<strong>at</strong>ion and S<strong>of</strong>tware Technology Journal (Chapman and Hall), Vol. 35, No. 5, 1993(co-author: Harvey Rubinovitz) (version <strong>of</strong> conference paper published in Simul<strong>at</strong>ion Conference,1991).20. Towards Developing a Standard Multilevel Rel<strong>at</strong>ional D<strong>at</strong>a Model for Representing a MultilevelUniverse, Computer Standards and Interfaces Journal (North Holland), Vol. 15, No. 1, 1993 (alsopublished by Computer Standards Interface Journal special issue in 1999 as one <strong>of</strong> the seminalpapers to appear in the journal).21. Multilevel Security for Inform<strong>at</strong>ion Retrieval Systems, Inform<strong>at</strong>ion and Management Journal (NorthHolland) Vol. 24, 1993.22. User-Role Based Security for Collabor<strong>at</strong>ive Computing Environment, Multimedia Review: <strong>The</strong>Journal <strong>of</strong> Multimedia Computing (Penton Media publishers), Summer 1993 (co-authors: S.Demurjian and T.C. Ting).23. Security Issues for Feder<strong>at</strong>ed D<strong>at</strong>abase Systems, Computers and Security (North Holland), Vol. 13,No. 6, p. 509 – 525, December 1994.24. Multilevel Security in Inform<strong>at</strong>ion Retrieval Systems - II, Inform<strong>at</strong>ion and Management Journal(North Holland), Vol. 28, No. 1, 1995.25. Security Constraint Processing in a Multilevel Secure Distributed D<strong>at</strong>abase Management System,IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering, April 1995 (co-author: W. Ford).26. Towards the Design <strong>of</strong> a Multilevel Secure Object-Oriented D<strong>at</strong>abase Management System, Journal<strong>of</strong> Object-Oriented Programming, June 1995.27. MOMT: A Multilevel Object Modeling Technique for designing Secure D<strong>at</strong>abase Applic<strong>at</strong>ions,Journal <strong>of</strong> Object-Oriented Programming, 1996 (co-authors: D. Marks and P. Sell).28. Adaptable Object Request Brokers for Inform<strong>at</strong>ion Survivability for Real-time Command andControl Systems, Distributed Computer Systems, 1999, p. 242 – 245 (co-author: J. Maurer).29. Secure Distributed D<strong>at</strong>abase Systems, Inform<strong>at</strong>ion Security Journal (Elsevier Science special issue inD<strong>at</strong>abase Security), 2001.30. Selective and Authentic Third-Party Public<strong>at</strong>ion <strong>of</strong> XML Documents, IEEE Transactions onKnowledge and D<strong>at</strong>a Engineering, Vol. 16, No. 10, p. 1263 – 1278, 2004 (co-author: E. Bertino et37
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35: 3. CIA: As manager of fifteen resea
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88:
59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH