17. A Note on Security Constraint Processing in a Multilevel Secure D<strong>at</strong>abase Management System,April 1991, Proceedings <strong>of</strong> the 4th RADC D<strong>at</strong>abase Security Workshop, Little Compton, RI (coauthor:W. Ford, M. Collins).18. Trusted Distributed D<strong>at</strong>abase Management Systems R & D - A Progress Report, April 1991,Proceedings <strong>of</strong> the 4th RADC D<strong>at</strong>abase Security Workshop, Little Compton, RI, (co-authors: H.Rubinovitz).19. Handling Security Constraints During Multilevel D<strong>at</strong>abase Design, April 1991, Proceedings <strong>of</strong> the4th RADC D<strong>at</strong>abase Security Workshop, Little Compton, RI.20. Implement<strong>at</strong>ion and Simul<strong>at</strong>ion <strong>of</strong> Secure Distributed Query Processing Algorithms, Proceedings <strong>of</strong>the 1991 Computer Simul<strong>at</strong>ion Conference, Baltimore, MD, (co-author: H. Rubinovitz).21. A Nonmonotonic Typed Multilevel Logic for Multilevel Secure D<strong>at</strong>a/Knowledge Base ManagementSystem - II, June 1991, Proceedings <strong>of</strong> the 4th IEEE Computer Security Found<strong>at</strong>ions Workshop,Franconia, NH.22. Issues on the Design and Implement<strong>at</strong>ion <strong>of</strong> an Intelligent D<strong>at</strong>abase Inference Controller,Proceedings <strong>of</strong> the 1991 IEEE Intern<strong>at</strong>ional Conference on Systems, Man, and Cybernetics,Charlottesville, VA (co-author: W. Ford).23. <strong>The</strong> Use <strong>of</strong> Conceptual Structures to Handle the Inference Problem, Proceedings <strong>of</strong> the 5th IFIP WG11.3 Conference on D<strong>at</strong>abase Security, Shepherdstown, VA. , November 1991 (Also published byNorth Holland, 1992)24. Security Constraint Processing During the Upd<strong>at</strong>e Oper<strong>at</strong>ion in a Multilevel Secure D<strong>at</strong>abaseSystem, Proceedings <strong>of</strong> the 7th IEEE Computer Security Applic<strong>at</strong>ions Conference, San Antonio, TX,December 1991 (co-authors: M. Collins, W. Ford).25. Design and Simul<strong>at</strong>ion <strong>of</strong> Secure Distributed Concurrency Control Algorithms, Proceedings <strong>of</strong> the1992 Computer Simul<strong>at</strong>ion Conference, Nevada, July 1992. (co-author: H. Rubinovitz).26. A Nonmonotonic Typed Multilevel Logic for Multilevel D<strong>at</strong>abase Management Systems - II, June1992, Proceedings <strong>of</strong> the 5th IEEE Computer Security Found<strong>at</strong>ions Workshop, Franconia, NH.27. Knowledge-based Inference Controlin a Multilevel Secure D<strong>at</strong>abase Management System,Proceedings <strong>of</strong> the 15th N<strong>at</strong>ional Computer Security Conference, Baltimore, MD, October 1992.28. A Note on the Security Impact on Real-time D<strong>at</strong>abase Management Systems, Proceedings <strong>of</strong> the 5thRADC D<strong>at</strong>abase Security Workshop, New York, October 1992.29. Secure Computing with the ACTOR Paradigm, Presented <strong>at</strong> the ACM/SIGSAC New ComputerSecurity Paradigms Workshop, Little Compton, RI, September 1992. (Proceedings published byACM Press, 1993)30. An Object-Oriented Approach to Modeling Multilevel D<strong>at</strong>abase Applic<strong>at</strong>ions, Proceedings <strong>of</strong> theACM Conference Workshop on Object-Oriented Programming Language, Systems, and Applic<strong>at</strong>ions,Vancouver, B.C., October 1992 (co-author: P. Sell).31. Towards the Design and Implement<strong>at</strong>ion <strong>of</strong> a Multilevel Secure Deductive D<strong>at</strong>abase ManagementSystem, Proceedings <strong>of</strong> the 26th Hawaii Intern<strong>at</strong>ional Conference on Systems Sciences, January 1993.44
32. Parallel Processing and Trusted D<strong>at</strong>abase Management Systems - Applying One Technology to theOther, Proceedings <strong>of</strong> the 1993 ACM Conference in Computer Science, Indianapolis, Indiana (coauthor:W. Ford).33. Security and Integrity Constraint Processing in a Multilevel Secure Distributed Environment,MILCOM 93, October 1993 (classified session) (co-authors: A. Abreu, H. Rubinovitz, M. Collins).34. Towards a Multilevel Secure D<strong>at</strong>abase Management System for Realtime Applic<strong>at</strong>ions, Proceedings<strong>of</strong> the First IEEE Workshop in Realtime Computing, May 1993 (co-author: S. Son).35. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed D<strong>at</strong>abase Inference Controller, Proceedings <strong>of</strong> the 17thIEEE COMPSAC Conference, November 1993. (co-authors: H. Rubinovitz, D. Foti, A. Abreu).36. Security and Integrity in Distributed D<strong>at</strong>abase System, D<strong>at</strong>abase Colloquium 93, San Diego, CA,August 1993 (co-authors: D. Small, D. Goldsmith) (proceedings available in electronic media).37. Applying OMT for Multilevel D<strong>at</strong>abase Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the 7th IFIP WorkingConference on D<strong>at</strong>abase Security, Huntsville, Alabama, September 1993. (co-author: P. Sell) (alsopublished as book chapter by North Holland, 1994).38. Object-oriented Approach to Interconnecting Trusted D<strong>at</strong>abase Management Systems, September1993, ACM OOPSLA-93 Conference Workshop on Object Persistence in Heterogeneous D<strong>at</strong>abaseEnvironments, Washington D.C. (co-author: H. Rubinovitz).39. Security Constraint Processing in a Distributed D<strong>at</strong>abase Environment, Proceedings <strong>of</strong> the 1994ACM Computer Science Conference, Phoenix, AZ, March 1994. (co-author: H. Rubinovitz).40. D<strong>at</strong>abase Inference Control, Proceedings <strong>of</strong> the DoD D<strong>at</strong>abase Security Workshop, Maine, June1994 (co-authors: M. Collins and H. Rubinovitz).41. MLS D<strong>at</strong>abase Applic<strong>at</strong>ion Design, Proceedings <strong>of</strong> the DoD D<strong>at</strong>abase Security Workshop, Maine,June 1994 (co-authors: S. Lewis, D. Marks, P. Sell, S. Wiseman).42. Hypersemantic D<strong>at</strong>a Modeling for Inference Analysis, Proceedings <strong>of</strong> the 8th IFIP WorkingConference in D<strong>at</strong>abase Security, Hildesheim, Germany, August 1994. (co-authors: D. Marks, L.Binns) (also published as book chapter by North Holland 1995).43. A Fine-grained Access Control Model for Object-oriented DBMS, Proceedings <strong>of</strong> the 8th IFIPWorking Conference in D<strong>at</strong>abase Security, Hildesheim, Germany, August 1994 (co-authors: A.Rosenthal et al) (also as book chapter by North Holland, 1995).44. An Adaptive Policy for Improved Timeliness in Secure D<strong>at</strong>abase Systems, Proceedings <strong>of</strong> the 9th IFIPWorking Conference in D<strong>at</strong>abase Security, New York, August 1995. (co-authors: S. Son and R.David, also as book chapter by North Holland 1996).45. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller Utilizing a Deductive Object-Oriented D<strong>at</strong>a Model, Proceedings <strong>of</strong> the 13th DOD D<strong>at</strong>abase Colloquium, San Diego, CA, August1996. (co-authors: M. Collins, D. Marks, B. Newman).46. Survivability Issues for Evolvable Real-time Command and Control Systems, Proceedings <strong>of</strong> theInform<strong>at</strong>ion Survivability Workshop, February 1997 (co-authors: P. Krupp, J. Maurer).47. Adaptable Object Request Brokers for Inform<strong>at</strong>ion Survivability <strong>of</strong> Command and Control Systems,Proceedings <strong>of</strong> the Inform<strong>at</strong>ion Survivability Workshop, October 1998 (co-author: J. Maurer et al).45
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43: 2. Foundations of Multilevel Databa
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96:
Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH