September 22-24, 2010, Carnegie Mellon <strong>University</strong>, Pittsburgh, PA, USA). (co-authors: S.Ramanujam, V. Khadilkar, L. Khan, S. Seida, M. Kantarcioglu).96. Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing, IEEETransactions on Knowledge and D<strong>at</strong>a Engineering, Vol. 23, No. 9, p. 1312-1327, 2011 (co-authors:Mohammad Farhan Husain, James P. McGlothlin, Mohammad M. Masud, L<strong>at</strong>ifur R. Khan).97. Enhanced Geographically Typed Semantic Schema M<strong>at</strong>ching, Journal <strong>of</strong> Web Semantics, Vol. 9, No.1, p. 52-70, 2011 (co-authors: Jeffrey Partyka, Pallabi Parveen, L<strong>at</strong>ifur Khan, Shashi Shekhar).Computability/Complexity <strong>The</strong>ory98. Represent<strong>at</strong>ion <strong>of</strong> One-One Degrees by Decision Problems, 1982, Journal <strong>of</strong> Computer and SystemsSciences (Academic Press), Vol. 24, p. 373-377.99. Some Elementary Closure Properties <strong>of</strong> N-Cylinders, 1983, Notre Dame Journal <strong>of</strong> Formal Logic,Vol. 24, No. 2, p. 242-253.100. <strong>The</strong> Concept <strong>of</strong> N-Cylinder and its Rel<strong>at</strong>ionship to Simple Sets, 1983, Notre Dame Journal <strong>of</strong> FormalLogic, Vol. 24, No. 3, p. 328-336.101. Cylindrical Decision Problems, 1983, Notre Dame Journal <strong>of</strong> Formal Logic, Vol. 24, , No. 2, p. 188-198.102. System Functions and their Decision Problems, 1984, Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logik undGrundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 30, No. 7 - 8, p. 119-128. (now Journal <strong>of</strong> M<strong>at</strong>hem<strong>at</strong>ical Logic)103. <strong>The</strong> Concept <strong>of</strong> N-Cylinder and its Applic<strong>at</strong>ion , 1986, Zeitschrift fur M<strong>at</strong>hem<strong>at</strong>ische Logik undGrundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 32, No. 13 - 16, p. 211-219.104. Reducibility Rel<strong>at</strong>ionships Between Decision Problems for System Functions, 1987, Zeitschrift furM<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 33, No. 4, p. 305-312.105. Represent<strong>at</strong>ion <strong>of</strong> One-One Degrees by N-Cylindrical Decision Problems, 1988, Zeitschrift furM<strong>at</strong>hem<strong>at</strong>ische Logik und Grundlagen der M<strong>at</strong>hem<strong>at</strong>ik, Vol. 34, No. 6.106. System Function Languages, M<strong>at</strong>hem<strong>at</strong>ical Logic Quarterly, Vol. 39, No. 1, 1993.107. A Construction <strong>of</strong> Cartesian Authentic<strong>at</strong>ion Codes from Orthogonal Spaces over a Finite Field <strong>of</strong>Odd Characteristic, Discrete M<strong>at</strong>hem<strong>at</strong>ics, Algorithms and Applic<strong>at</strong>ions, Vol. 1, No. 1, March 2009(co-authors: Z. Li et al).108. A Better Approxim<strong>at</strong>ion for Minimum Average Routing P<strong>at</strong>h Clustering Problem in 2-D Underw<strong>at</strong>erSensor Networks, Discrete M<strong>at</strong>hem<strong>at</strong>ics, Algorithms and Applic<strong>at</strong>ions, Vol. 1, No. 2, June 2009 (coauthors:W. Wang et al).II. CONFERENCES PAPERSD<strong>at</strong>a and Applic<strong>at</strong>ions Security1. Secure Query Processing Using AI Techniques, January 1988, Proceedings <strong>of</strong> the IEEE HawaiiIntern<strong>at</strong>ional Conference on Systems Sciences, p. 561-570, (co-authors: W. T. Tsai and T. F. Keefe)- Best Paper Award for S<strong>of</strong>tware Tracks (enhanced version in IEEE Computer 1989).42
2. Found<strong>at</strong>ions <strong>of</strong> Multilevel D<strong>at</strong>abases, May 1988, Proceedings 1st RADC D<strong>at</strong>abase SecurityInvit<strong>at</strong>ional Workshop, Menlo Park, CA, (Proceedings published by Springer Verlag, 1992, Ed: T.Lunt – Book Chapter).3. Design <strong>of</strong> an Upd<strong>at</strong>e Processor for MLS/DBMS, October 1988, Invited paper, Proceedings <strong>of</strong> the 11thN<strong>at</strong>ional Computer Security Conference, Baltimore, MD; addendum to Proceedings (co-authors: P.Stachour and P. Dwyer).4. Query Processing in LDV: A Secure D<strong>at</strong>abase System, December 1988, Proceedings <strong>of</strong> the 4th IEEEAerospace Computer Security Conference, Orlando, FL (co-authors: P. Dwyer, E. Onuegbe and P.Stachour).5. A Multilevel Security Model for Object-Oriented Systems, October 1988, Proceedings <strong>of</strong> the 11thN<strong>at</strong>ional Computer Security Conference, Baltimore, MD, (co-authors: W. T. Tsai and T. F. Keefe).6. Prototyping as a Research Tool for MLS/DBMS, October 1988, Proceedings <strong>of</strong> the IFIP WG 11.3Conference on D<strong>at</strong>abase Security, Kingston, Ontario, Canada, (also published as book chapterby North Holland, 1989: D<strong>at</strong>abase Security II: St<strong>at</strong>us and Prospects) (co-authors: W. Tsai and D.Thomsen).7. Security Checking with Prolog-Extensions, May 1989, Proceedings <strong>of</strong> the 2nd RADC D<strong>at</strong>abaseSecurity Invit<strong>at</strong>ional Workshop, Franconia, NH.8. Mand<strong>at</strong>ory Security in Object-Oriented D<strong>at</strong>abase Systems, October 1989, Proceedings <strong>of</strong> the ACMConference on Object-Oriented Programming, Systems, Languages and Applic<strong>at</strong>ions (ACMOOPSLA) Conference, New Orleans, LA.9. A Multilevel Secure Object-Oriented D<strong>at</strong>a Model, October 1989, Proceedings <strong>of</strong> the 12th N<strong>at</strong>ionalComputer Security Conference, Baltimore, MD.10. Secure Query Processing in Intelligent D<strong>at</strong>abase Management Systems, December 1989, Proceedings<strong>of</strong> the 5th IEEE Computer Security Applic<strong>at</strong>ions Conference Tucson, AZ.11. Novel Approaches to Handle the Inference Problem, June 1990, Proceedings <strong>of</strong> the 3rd RADCD<strong>at</strong>abase Security Workshop, New York.12. <strong>The</strong> Inference Problem in Multilevel Secure D<strong>at</strong>abase Management Systems, June 1990, Proceedings<strong>of</strong> the 3rd RADC D<strong>at</strong>abase Security Workshop, New York (co-authors: W. Ford, M. Collins, J.O'Keeffe).13. Trusted Distributed D<strong>at</strong>abase Management Systems, June 1990, Proceedings <strong>of</strong> the 3rd RADCD<strong>at</strong>abase Security Workshop, New York, (co-author: H. Rubinovitz).14. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem in D<strong>at</strong>abase Security, June 1990, Presented<strong>at</strong> the 3rd IEEE Found<strong>at</strong>ions <strong>of</strong> Computer Security Workshop, Franconia, NH (public release was notobtained in time for proceedings; printed as MITRE Paper M291 May 1990).15. Multilevel Security for Multimedia D<strong>at</strong>abase Systems, September 1990, Proceedings <strong>of</strong> the 4th IFIPWG 11.3 Conference on D<strong>at</strong>abase Security, Halifax, England, (also published as book chapter byNorth Holland, 1991, p. 99 - 116).16. Secure Query Processing in Distributed D<strong>at</strong>abase Management Systems - Design and PerformanceStudy, December 1990, Proceedings <strong>of</strong> the 6th IEEE Computer Security Applic<strong>at</strong>ions Conference,Tucson, AZ, (co-author: A. Kamon).43
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41: 79. Information Demands Drive Data
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94:
5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH