83. Enforcing Honesty in Assured Inform<strong>at</strong>ion Sharing within a Distributed System, Proceedings IFIPD<strong>at</strong>a and Applic<strong>at</strong>ions Security, Redondo Beach, CA, July 2007 (co-authors: R. Layfield et al).84. SCRUB-tcpdump: A Multilevel Packet Anonymizer Demonstr<strong>at</strong>ing Privacy and Analysis Trade<strong>of</strong>fs,Proceedings SecureComm, Nice, France, September 2007 (co-authors: W. Yurcik, et al).85. Secure Peer-to-Peer Networks for Trusted Collabor<strong>at</strong>ion, Proceedings <strong>of</strong> the 2 nd IEEE Intern<strong>at</strong>ionalWorkshop on Trusted Collabor<strong>at</strong>ion (TrustCol), White Plains, NY November 2007.86. Centralized Security Labels in Decentralized P2P Networks, Computer Security Applic<strong>at</strong>ionsConference, Miami Beach, FL, December 2007 (ACSAC) (co-authors: N. Tsybulnik and K. Hamlen)87. Deleg<strong>at</strong>ion-Based Security Model for Web Services, IEEE Intern<strong>at</strong>ional Symposium on HighAssurance Systems Engineering (HASE), p. 82-91, <strong>Dallas</strong>, TX, November 2007 (co-authors: WeiShe, I. Yen).88. Building Secure Applic<strong>at</strong>ions for Peer to Peer Systems, Proceedings TRUST workshop, New York,November 2007.89. Detecting Remote Exploits Using D<strong>at</strong>a Mining, Proceedings IFIP Digital Forensics Conference,Kyoto, Japan, January 2008 (co-author: M. Masud et al).90. Geosp<strong>at</strong>ial Resource Description Framework (GRDF) and Security Constructs, Proceedings ICDEConference Workshop in Secure Semantic Web, April 2008, Cancun, Mexico (co-author: A. Alam etal).91. Toward Trusted Sharing <strong>of</strong> Network Packet Traces Using Anonymiz<strong>at</strong>ion: Single-FieldPrivacy/Analysis Trade<strong>of</strong>fs, Computing Research Repository (CoRR), abs/0710.3979: (2007) (coauthors:William Yurcik, Clay Woolam, Greg Hellings, L<strong>at</strong>ifur Khan).92. Measuring Anonymiz<strong>at</strong>ion Privacy/Analysis Trade<strong>of</strong>fs Inherent to Sharing Network D<strong>at</strong>a, NetworkOper<strong>at</strong>ions and Management Symposium (NOMS) 2008, p. 991-994, Salvador, Brazil (co-authors:W. Yurick et al).93. <strong>The</strong> SCRUB Security D<strong>at</strong>a Sharing Infrastructure, Network Oper<strong>at</strong>ions and Management Symposium(NOMS) 2008: 630-644, Salvador, Brazil (co-authors: Y. Yurick et al) (also s<strong>of</strong>tware available asOpensource).94. Making Quantit<strong>at</strong>ive Measurements <strong>of</strong> Privacy/Analysis Trade<strong>of</strong>fs Inherent to Packet TraceAnonymiz<strong>at</strong>ion, Financial Cryptography and D<strong>at</strong>a Security, 2008, p. 323-324, Cozumel, Mexico (coauthors:W. Yurick et al).95. Privacy/Analysis Trade<strong>of</strong>fs in Sharing Anonymized Packet Traces: Single-Field Case, Intern<strong>at</strong>ionalConference on Availability, Reliability and Security (ARES) 2008, p. 237-244, Barcelona, Spain (coauthors:W. Yurick et al).96. ROWLBAC - Representing Role Based Access Control in OWL, Proceedings ACM SACMAT June2008, Colorado, (co-authors: T. Finin, L Kagal et al).97. Accountability for Grid, DOE Conference on Cyber Security, Knoxville, TN, (co-author: E. Bertino)98. Role Based Access Control and OWL, Proceedings <strong>of</strong> the Fourth OWL: Experiences and DirectionsWorkshop, April 2008, Washington, DC (co-author: T. Finin et al).48
99. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, <strong>The</strong> 3rd Intern<strong>at</strong>ional Workshop onTrustworthiness, Reliability and Service in Ubiquitous and Sensor Networks (TRUST), EUC2008, Shanghai, China, (co-authors: L. Khan, K. Hamlen et al).100. Trustworthy Semantic Web Technologies for Secure Knowledge Management, TSP 2008,Shanghai, China (co-author: P. Parikh).101. Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems, IEEE HighAssurance Systems Engineering Symposium (HASE) 2008, Nanjing, China (co-author: Y. Yeet al).102. Enhancing Security Modeling for Web Services Using Deleg<strong>at</strong>ion and Pass-On,<strong>The</strong> IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS) 2008, Beijing, China (co-author: She,Wei; Yen, I-Ling).103. Flow-based Identific<strong>at</strong>ion <strong>of</strong> Botnet Traffic by Mining Multiple Log Files, In proceedings <strong>of</strong> theIntern<strong>at</strong>ional Conference on Distributed Frameworks & Applic<strong>at</strong>ions (DFMA), Penang, Malaysia,Oct. 2008, (co-authors: M. Masud, T. Al-kh<strong>at</strong>eeb, L. Khan, K. Hamlen).104. Incentive and Trust Issues in Assured Inform<strong>at</strong>ion Sharing, Invited Paper, Collabor<strong>at</strong>eCom, Orlando,FL, November 2008 (co-authors: R. Layfield and M. Kantarcioglu).105. Privacy Preserving Decision Tree Mining from Perturbed D<strong>at</strong>a, HICSS 2009, Hawaii: 1-10,Nomin<strong>at</strong>ed for best paper award (co-authors: Li Liu and Mur<strong>at</strong> Kantarcioglu).106. Effective and Efficient Implement<strong>at</strong>ion <strong>of</strong> an Inform<strong>at</strong>ion Flow Control Protocol for ServiceComposition, Proceedings <strong>of</strong> the Service Oriented Computing And Applic<strong>at</strong>ions Workshop, Taipei,Taiwan, Jan. 2009 (co-authors: W. She, I. Yen, E. Bertino).107. <strong>The</strong> SCIFC Model for Inform<strong>at</strong>ion Flow Control in Web Service Composition<strong>The</strong> IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS) 2009, Los Angeles, CA (co-authors: W.She, I. Yen, E. Bertino).108. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, IEEE ISI Conference Workshop onSocial Computing, 2009, <strong>Dallas</strong> TX (co-authors: R. Layfield et al).109. Assured Inform<strong>at</strong>ion Sharing Life Cycle, IEEE ISI Conference workshop on Social Computing, 2009(co-author: T. Finin et al), <strong>Dallas</strong>, TX.110. A Semantic Web Based Framework for Social Network Access Control, SACMAT 2009: Italy, 177-186, (co-authors: E. Ferrari, B. Carmin<strong>at</strong>i, , R. He<strong>at</strong>herly, M. Kantarcioglu).111. Inferring Priv<strong>at</strong>e Inform<strong>at</strong>ion Using Social Network D<strong>at</strong>a, World Wide Web (WWW) Conference2009, p. 1145-1146, Madrid, Spain (co-authors: J. Lindamood et al).112. Policy-Driven Service Composition with Inform<strong>at</strong>ion Flow Control, <strong>The</strong> IEEE Intern<strong>at</strong>ionalConference on Web Services (ICWS) 2010, Miami, FL (coauthors: W.She, I. Yen and E. Bertino)113. Scalable and Efficient Reasoning for Enforcing Role-based Access Control, IFIP 11.3, Rome, Italy2010 (co-authors: T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham).114. A Token-based Access Control System for RDF D<strong>at</strong>a in the Clouds, IEEE CloudCom 2010,Indianapolis, IN (co-authors: M. Farhan Husain, K. Hamlen et al).49
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47: 66. Privacy Preserving Data Mining,
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100:
Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH