48. D<strong>at</strong>a Mining, D<strong>at</strong>a Warehousing and Security, Proceedings <strong>of</strong> the IFIP Conference Book, Chapmanand Hall, 1997 (version <strong>of</strong> keynote address <strong>at</strong> conference, 1996; editor: P. Samar<strong>at</strong>i and R. Sandhu)(also presented <strong>at</strong> CODATA Conference, Paris, June 1999).49. Adaptable Object Request Brokers for Inform<strong>at</strong>ion Survivability <strong>of</strong> Evolvable Real Time Commandand Control Systems, proceedings IEEE FTDCS Conference, Cape Town, South Africa, December1999 (co-author: J. Maurer).50. Directions for Web and E-Commerce Security, Proceedings WET ICE June 2001, Boston, MA (coauthors:C. Clifton, E. Bertino et al).51. D<strong>at</strong>a and Applic<strong>at</strong>ions Security: Developments and Directions Proceedings IEEE COMPSAC, 2002,Oxford, UK.52. Building Secure Survivable Semantic Webs, Proceedings IEEE ICTAI 2002, Washington DC. .53. Security Issues for the Semantic Web, Proceedings IEEE COMPSAC 2003, <strong>Dallas</strong>, TX.54. Dependable Computing for N<strong>at</strong>ional Security: A Position Paper, Proceedings <strong>of</strong> the 6 th Intern<strong>at</strong>ionalSymposium on Autonomous Decentralized Systems, April 2003, Pisa, Italy (ISADS).55. D<strong>at</strong>a and Applic<strong>at</strong>ions Security: Past, Present and Future, Proceedings <strong>of</strong> IFIP Conference Book(Kluwer), 2004 (version <strong>of</strong> keynote address <strong>at</strong> conference, Colorado, 2003; editor: I. Ray)56. Security and Privacy for Web D<strong>at</strong>abases and Services, Proceedings <strong>of</strong> the EDBT Conference, March2003, Crete, Greece (co-author: E. Ferrari) (based on keynote address <strong>at</strong> EDBT).57. Using RDF for Policy Specific<strong>at</strong>ion and Enforcement, Proceedings <strong>of</strong> the DEXA Workshop on WebSemantics, Zaragoza, Spain, August 2004 (co-author: B. Carmin<strong>at</strong>i et al).58. On the Complexity <strong>of</strong> the Privacy Problem in D<strong>at</strong>abases, Proceedings Found<strong>at</strong>ions <strong>of</strong> D<strong>at</strong>a Mining,Workshop, England, 2004 (Proceedings by lecture notes, Springer).59. Towards Access Control for Visual Web Model Management, Proceedings IEEE E-CommerceWorkshop, Hong Kong, May 2005 (co-author: G. Song et al).60. Trust Management in a Distributed Environment, Proceedings <strong>of</strong> the 29 th Annual Intern<strong>at</strong>ionalComputer S<strong>of</strong>tware and Applic<strong>at</strong>ions Conference (COMPSAC), Edinburgh, Scotland, July 2005.61. Secure Model Management Oper<strong>at</strong>ions for the Web, Proceedings IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityConference, Connecticut, August 2005 (co-authors: G. Song et al).62. Multilevel Secure Teleconferencing over Public Switched Telephone Network, IFIP D<strong>at</strong>a andApplic<strong>at</strong>ions Security Conference, Connecticut, 2005 (co-author: I. Youn et al).63. Dependable Real-time D<strong>at</strong>a Mining, Proceedings ISORC 2005, Se<strong>at</strong>tle (co-author: L. Khan et al).64. A Framework for a Video Analysis Tool for Suspicious Event Detection, ACM SIGKDD MultimediaD<strong>at</strong>a Mining Workshop, Chicago, IL 2005 (co-author: G. Lavee et al).65. Message Correl<strong>at</strong>ion in Autom<strong>at</strong>ed Communic<strong>at</strong>ion Surveillance through Singular ValueDecomposition, Proceedings ACM MM Workshop, Chicago, IL, 2005 (co-author: R. Layfield, et al).46
66. Privacy Preserving D<strong>at</strong>a Mining, Proceedings IEEE ICDM Workshop on Privacy preserving D<strong>at</strong>aMining, Houston, TX, 2005.67. Dependable and Secure TMO Scheme, Proceedings <strong>of</strong> the 9th IEEE ISORC, Gyeongju, South Korea,April 2006 (co-author: J. Kim).68. Design <strong>of</strong> a Secure CAMIN Applic<strong>at</strong>ion Systems based on Secure and Dependable TMO, ProceedingsISORC, May 2007, Santorini, Greec, (co-author: J. Kim).69. Security for Web Services, Proceedings ACM Workshop in Secure Web Services, May 2006 (coauthor:C. Farkas et al) (California)70. Detection and Resolution <strong>of</strong> Anomalies in Firewall Policy Rules, Proceedings IFIP D<strong>at</strong>a andApplic<strong>at</strong>ions Security Conference, Sophia Antipolis, France, 2006 (co-author: M. Abedin et al).71. A Knowledge Based Approach to Detect New Malicious Executables, Proceedings Second SKMWorkshop, Brooklyn, NY, September 2006 (co-author: L. Khan et al; enhanced version appeared inInform<strong>at</strong>ion Systems Frontiers).72. Access Control for Geosp<strong>at</strong>ial Web Services, Proceedings ACM CCS Conference Workshop, andNovember 2006. Fairfax, VA (co-author: A. Ashraful et al).73. Geosp<strong>at</strong>ial RDF, ISWC Conference on Geosp<strong>at</strong>ial Semantic Web, Athens, GA, Nov. 2006 (coauthor:A. Ashraful).74. Face Recognition Using Multiple Classifiers, IEEE ICTAI Conference Proceedings, November 2006Washington DC, (co-author: P. Parveen).75. <strong>The</strong> Applicability <strong>of</strong> the Perturb<strong>at</strong>ion Model-based Privacy-preserving D<strong>at</strong>a Mining, ProceedingsIEEE ICDM Conference Workshop on Privacy Preserving D<strong>at</strong>a Mining, Hong Kong, December2006. (enhanced version appeared in DKE 2008) (co-author: L. Liu).76. Design and Simul<strong>at</strong>ion <strong>of</strong> Trust Management Techniques for a Coalition D<strong>at</strong>a Sharing Environment,Proceedings FTDCS, 2007, Sedona, Arizona (co-author: S. Iyer).77. Fingerprint M<strong>at</strong>ching Algorithm, Proceedings ARES, Vienna, Austria, April 2007.78. Extended RBAC - Based Design and Implement<strong>at</strong>ion for a Secure D<strong>at</strong>a Warehouse, ProceedingsARES, April 2007, Vienna Austria, (enhanced version appeared in d<strong>at</strong>a warehousing journal) (coauthor:S. Iyer).79. Risk Management and Security, Proceedings Decision and Risk Analysis Conference, Richardson,TX, May 2007.80. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for N<strong>at</strong>ional Security, Proceedings ISI, New Brunswick, NJ, May 2007 (coauthor:Chuanjun et al).81. Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web, Proceedings <strong>of</strong> the 8 thIEEE Intern<strong>at</strong>ional Workshop on Policies for Distributed Systems and Networks (POLICY), Bologna,Italy, June 2007.82. A Hybrid Model to Detect Malicious Executables, Proceedings ICC 2007, Glasgow, Scotland (coauthors:M. Masud, L. Khan).47
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45: 32. Parallel Processing and Trusted
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98:
1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH