al). (version also published as MIT Working Paper, 2002)31. Secure Sensor Inform<strong>at</strong>ion Management & Mining, IEEE Signal Processing, May 2004.32. Security and Privacy for Sensor D<strong>at</strong>abases, Sensor Letters, Inaugural Issue (American Scientific),Vol. 2, No.1, March 2004.33. Security and Privacy for Multimedia D<strong>at</strong>abase Management Systems, Multimedia Tools (Kluwer),Vol. 33, No. 1, October 2007 (keynote <strong>at</strong> IEEE Multimedia S<strong>of</strong>tware Engineering and DistributedMultimedia 2003).34. Privacy-preserving D<strong>at</strong>a Mining: Developments and Directions, Journal <strong>of</strong> D<strong>at</strong>abase Management,(special issue in D<strong>at</strong>abase Technologies for N<strong>at</strong>ional Security), p. 75 – 87, March 2005.35. Privacy Constraint Processing in a Privacy-Enhanced D<strong>at</strong>abase Management System, D<strong>at</strong>a andKnowledge Engineering Journal, Vol. 55, No. 2, p. 159 - 188 (North Holland), 2005.36. Security Standards for the Semantic Web, Computer Standards and Interface Journal (NorthHolland), Vol. 27, p. 257 – 268, March 2005 (version <strong>of</strong> COMPSAC Conference workshop paper,2003).37. Access Control for Web D<strong>at</strong>a: Models and Policy Languages, Invited Paper - Annales desTelecommunic<strong>at</strong>ions, p. 245, Vol. 61, No. 3-4, March/April 2006 (co-authors: B. Carmin<strong>at</strong>a, E.Ferrari).38. Directions for Security and Privacy for Semantic E-Business Applic<strong>at</strong>ions, Invited Paper,Communic<strong>at</strong>ions <strong>of</strong> ACM, December 2005.39. A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering,VLDB Journal, Vol. 16, No. 1, January 2007 (co-authors: M. Awad et al).40. A Framework for a Video Analysis Tool for Suspicious Event Detection, Multimedia Tools, Vol. 35No. 1, October 2007 (co-author: G. Lavee et al).41. Standards for Secure D<strong>at</strong>a Sharing Across Organiz<strong>at</strong>ions, Computer Standards and InterfaceJournal, Vol. 29, No. 1, January 2007 (co-author: D. Harris et al).42. Secure Knowledge Management: Confidentiality, Trust and Privacy, IEEE Transactions on Systems,Man and Cybernetics, May 2006 (co-authors: E. Bertino et al) (based on keynote presented <strong>at</strong> SKM2004).43. PP-trust-X: A System for Privacy Preserving Trust Negoti<strong>at</strong>ion, ACM Transactions on Inform<strong>at</strong>ionand Systems Security, Vol. 10, No. 3, Article 12, July 2007 (co-author: E. Bertino et al).44. Administering the Semantic Web: Confidentiality, Privacy and Trust Management, Intern<strong>at</strong>ionalJournal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, January 2007 (co-author: N. Tsybulnik, A. Ashraful).45. Secure Grid Computing, Intern<strong>at</strong>ional Journal <strong>of</strong> Computer Science and Network Security, August2006 (co-author: J. Zhu).46. Security for ERP Systems, Inform<strong>at</strong>ion Systems Security Journal, May 2007 (co-author: W. She).47. Secure D<strong>at</strong>a Warehousing, D<strong>at</strong>a Warehousing Journal, IDEA Press, 2007 (co-authors: Srinivasan, M.Kantarcioglu).38
48. E-Mail Worm Detection Using D<strong>at</strong>a Mining. Mohammad M. Masud, L<strong>at</strong>ifur Khan, Bhavani M.Thuraisingham: IJISP 1(4):47-61 (2007)49. Design and Implement<strong>at</strong>ion <strong>of</strong> a Framework for Assured Inform<strong>at</strong>ion Sharing AcrossOrganiz<strong>at</strong>ional Boundaries, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, 2008.(co-authors: Y. Harsha Kumar et al).50. A Scalable Multi-level Fe<strong>at</strong>ure Extraction Technique to Detect Malicious Executables,Inform<strong>at</strong>ion Systems Frontiers, (Springer Netherlands), Vol. 10, No. 1, Page 33-45, March2008 (co-authors: M. Masud, L. Khan).51. <strong>The</strong> Applicability <strong>of</strong> the Perturb<strong>at</strong>ion Based Privacy Preserving D<strong>at</strong>a Mining for Real-WorldD<strong>at</strong>a,, " D<strong>at</strong>a and Knowledge Engineering (DKE), Vol. 65, No. 1, p.5-21, 2008 LeadingJournal (co-authors: L. Liu, M. Kantarcioglu).52. A Risk Management Approach to RBAC, Risk and Decision Analysis Journal, 2008 (coauthors:E. Celikel, M. Kantarcioglu, E. Bertino).53. Exploiting an Antivirus Interface, Computer Standards & Interfaces, Vol. 31, No. 6, p. 1182-1189, November 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan).54. Privacy Preserv<strong>at</strong>ion in Wireless Sensor Networks: A St<strong>at</strong>e-<strong>of</strong>-the-art Survey, Ad-HocNetworks Journal, Vol. 7, No. 8, November 2009 (co-authors: L. Na et al).55. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, Computer Systems Scienceand Engineering, Vol. 24, No. 2, March 2009 (co-authors: R. Layfield et al).56. Deleg<strong>at</strong>ion Model for Web Services, Journal <strong>of</strong> Web Services Research 2009 (co-authors: W.She, I. Yen).57. Rel<strong>at</strong>ionaliz<strong>at</strong>ion <strong>of</strong> Provenance D<strong>at</strong>a in Complex RDF Reific<strong>at</strong>ion Nodes, Special Issue <strong>of</strong> ElectronicCommerce Research Journal on Trust and Privacy Aspects <strong>of</strong> Electronic Commerce, 2009 (coauthors:S. Sriram et al).58. Classific<strong>at</strong>ion and Novel Class Detection in Concept-Drifting D<strong>at</strong>a Streams under TimeConstraints, Accepted and to appear in IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering,2010 (co-authors: M. Masud, L. Khan, J. Han).59. Semantic Web, D<strong>at</strong>a Mining and Security, IEEE Intelligent Systems Special Issue, 2010 (coauthors:M. Kantarcioglu and L. Khan).60. Secure D<strong>at</strong>a Objects Replic<strong>at</strong>ion in D<strong>at</strong>a Grid, IEEE Transactions on Dependable and SecureComputing, January 2010 (co-authors: Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham,and L<strong>at</strong>ifur Khan).61. Security Issues for Cloud Computing, Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy, Vol. 4, No. 2,2010, p. 36 – 48 (coauthors: K. Hamlen, L. Khan, M. Kantarcioglu).62. Policy Management for Assured Inform<strong>at</strong>ion Sharing, Journal <strong>of</strong> Inform<strong>at</strong>ion Security and Privacy,September 2010 (co-authors: M. Awad et al).39
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37: 15. Multilevel Security Issues in D
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90:
2. A Seminar on Secure Database Sys
- Page 91 and 92:
VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH