10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

99. D<strong>at</strong>a Mining for Cyber Security Applic<strong>at</strong>ions, <strong>The</strong> 3rd Intern<strong>at</strong>ional Workshop onTrustworthiness, Reliability and Service in Ubiquitous and Sensor Networks (TRUST), EUC2008, Shanghai, China, (co-authors: L. Khan, K. Hamlen et al).100. Trustworthy Semantic Web Technologies for Secure Knowledge Management, TSP 2008,Shanghai, China (co-author: P. Parikh).101. Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems, IEEE HighAssurance Systems Engineering Symposium (HASE) 2008, Nanjing, China (co-author: Y. Yeet al).102. Enhancing Security Modeling for Web Services Using Deleg<strong>at</strong>ion and Pass-On,<strong>The</strong> IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS) 2008, Beijing, China (co-author: She,Wei; Yen, I-Ling).103. Flow-based Identific<strong>at</strong>ion <strong>of</strong> Botnet Traffic by Mining Multiple Log Files, In proceedings <strong>of</strong> theIntern<strong>at</strong>ional Conference on Distributed Frameworks & Applic<strong>at</strong>ions (DFMA), Penang, Malaysia,Oct. 2008, (co-authors: M. Masud, T. Al-kh<strong>at</strong>eeb, L. Khan, K. Hamlen).104. Incentive and Trust Issues in Assured Inform<strong>at</strong>ion Sharing, Invited Paper, Collabor<strong>at</strong>eCom, Orlando,FL, November 2008 (co-authors: R. Layfield and M. Kantarcioglu).105. Privacy Preserving Decision Tree Mining from Perturbed D<strong>at</strong>a, HICSS 2009, Hawaii: 1-10,Nomin<strong>at</strong>ed for best paper award (co-authors: Li Liu and Mur<strong>at</strong> Kantarcioglu).106. Effective and Efficient Implement<strong>at</strong>ion <strong>of</strong> an Inform<strong>at</strong>ion Flow Control Protocol for ServiceComposition, Proceedings <strong>of</strong> the Service Oriented Computing And Applic<strong>at</strong>ions Workshop, Taipei,Taiwan, Jan. 2009 (co-authors: W. She, I. Yen, E. Bertino).107. <strong>The</strong> SCIFC Model for Inform<strong>at</strong>ion Flow Control in Web Service Composition<strong>The</strong> IEEE Intern<strong>at</strong>ional Conference on Web Services (ICWS) 2009, Los Angeles, CA (co-authors: W.She, I. Yen, E. Bertino).108. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, IEEE ISI Conference Workshop onSocial Computing, 2009, <strong>Dallas</strong> TX (co-authors: R. Layfield et al).109. Assured Inform<strong>at</strong>ion Sharing Life Cycle, IEEE ISI Conference workshop on Social Computing, 2009(co-author: T. Finin et al), <strong>Dallas</strong>, TX.110. A Semantic Web Based Framework for Social Network Access Control, SACMAT 2009: Italy, 177-186, (co-authors: E. Ferrari, B. Carmin<strong>at</strong>i, , R. He<strong>at</strong>herly, M. Kantarcioglu).111. Inferring Priv<strong>at</strong>e Inform<strong>at</strong>ion Using Social Network D<strong>at</strong>a, World Wide Web (WWW) Conference2009, p. 1145-1146, Madrid, Spain (co-authors: J. Lindamood et al).112. Policy-Driven Service Composition with Inform<strong>at</strong>ion Flow Control, <strong>The</strong> IEEE Intern<strong>at</strong>ionalConference on Web Services (ICWS) 2010, Miami, FL (coauthors: W.She, I. Yen and E. Bertino)113. Scalable and Efficient Reasoning for Enforcing Role-based Access Control, IFIP 11.3, Rome, Italy2010 (co-authors: T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham).114. A Token-based Access Control System for RDF D<strong>at</strong>a in the Clouds, IEEE CloudCom 2010,Indianapolis, IN (co-authors: M. Farhan Husain, K. Hamlen et al).49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!