115. Secure D<strong>at</strong>a Storage and Retrieval in the Cloud, Collabor<strong>at</strong>eCom 2010, Chicago, IL (co-authors: V.Khadilkar et al)116. An Evalu<strong>at</strong>ion <strong>of</strong> Privacy, Risks and Utility with Provenance, Proceedings, Secure KnowledgeManagement (SKM) Workshop, November 2010, New Brunswick, NJ (co-authors: T. Cadenhead etal)117. Identity Management for Cloud, Proceedings Cyber Security and Inform<strong>at</strong>ion Intelligence ResearchWorkshop, Oak Ridge N<strong>at</strong>ional Labor<strong>at</strong>ory, Oak Ridge, TN, October 2011.118. A Language for Provenance Access Control, Proceedings <strong>of</strong> 1 st ACM Conference on D<strong>at</strong>a andApplic<strong>at</strong>ion Security and Privacy (CODASPY) 2011, San Antonio, TX (co-authors: T. Cadenhead,V. Khadilkar, M. Kantarcioglu).119. Differenti<strong>at</strong>ing Code from D<strong>at</strong>a in x86 Binaries, Proceedings <strong>of</strong> ECML/PKDD 2011 (Vol. 3) p. 522 -536, Athens, Greece (co-authors: R. Wartell, Y. Zhou, K. Hamlen, M. Kantarcioglu).120. Transforming Provenance Using Redaction, Proceedings <strong>of</strong> SACMAT 2011, Innsbruck, Austria (coauthors:T. Cadenhead, V. Khadilkar, M. Kantarcioglu).121. Secure D<strong>at</strong>a Processing in a Hybrid Cloud, Computing Research Repository (CoRR) abs/1105.1982,2011 (co-authors: V. Khadilkar, M. Kantarcioglu, S. Mehrotra).122. On Secure and Resilient Telesurgery over Unreliable Networks, <strong>The</strong> First Intern<strong>at</strong>ional Workshop onCyber-Physical Networking Systems, p. 725 – 730, Shanghai, China, April 2011, (co-authors: M. E.Tozal, Y. Wang, E. Al-Shaer, K. Sarac, B. Chu).Real-time Processing: Objects, D<strong>at</strong>a Management and Networks123. Implementing a Real Time System on Local Area Network, October 1987, Presented <strong>at</strong> the 12th IEEELocal Computer Network Conference, Minneapolis, MN, Proceedings, pp. 142 (co-authors: W. T.Tsai, K. W. Hwang, abstract in proceedings, paper distributed <strong>at</strong> conference).124. MCNIU- A High Performance FDDI Local Area Network for Space St<strong>at</strong>ion Applic<strong>at</strong>ion, October1987, Proceedings <strong>of</strong> the Fiber Optic Communic<strong>at</strong>ion Local Area Network Conference (FOC/LAN),Anaheim, CA, pp. 69-73, (co-authors: P. Gonia, D. Myers and T. Chan).125. RT-OMT: A Real-time Object Modeling Technique for Designing Real-time D<strong>at</strong>abase Applic<strong>at</strong>ions:A Position Paper, Proceedings <strong>of</strong> the 2nd IEEE Realtime Systems Applic<strong>at</strong>ions Workshop, July 1994,Maryland, (co-author: A. Schafer).126. On Realtime Extensions to the Common Object Request Broker Architecture, Proceedings <strong>of</strong> theOOPSLA 94 Conference Workshop on CORBA, Portland, OR. September 1994, (co-authors: P.Krupp, A. Schafer, V. Wolfe)127. An Integr<strong>at</strong>ed Architecture for Constraint Processing in Real-time D<strong>at</strong>abase Management Systems,Proceedings <strong>of</strong> the 1995 High Performance Computing Symposium, Phoenix, AZ, April 1995.128. Evolvable Real-time C3 Systems, Proceedings <strong>of</strong> the 1st IEEE Complex Systems Conference,November 1995, Florida,(co-authors: E. Bensley et al).129. Real-time Extensions to Remote Procedure Call, Proceedings <strong>of</strong> the IEEE High PerformanceComputing Conference, December 1995, India, (co-authors: V. Wolfe et al).50
130. Object-oriented Implement<strong>at</strong>ion <strong>of</strong> an Infrastructure and D<strong>at</strong>a Manager for Real-time Command andControl Systems, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented Real-time DependableSystems (WORDS 1996), Laguna Beach, CA, February 1996, (co-author: E. Bensley et al).131. Design and Implement<strong>at</strong>ion <strong>of</strong> an Active Real-time D<strong>at</strong>abase Management System, Proceedings <strong>of</strong> theIntelligent Inform<strong>at</strong>ion Systems Management Conference, June 1996, Washington DC, (co-authors:G. Gengo).132. Towards Priority Ceilings in Object-based Semantic Real-time Concurrency Control, Proceedings <strong>of</strong>the 1st Real-time D<strong>at</strong>abase Workshop, March 1996, Newport Beach, CA (co-authors: V. Wolfe).133. Evolvable Real-time C3 Systems - II, Proceedings <strong>of</strong> the 2nd IEEE Complex Systems Conference,October 1996, Montreal, Canada (co-authors: E. Bensley et al).134. Active Real-time D<strong>at</strong>a Management for Command and Control Applic<strong>at</strong>ions, Proceedings DARTWorkshop, CIKM Conference, Maryland, November 1996, (co-author: E. Hughes et al).135. Object Technology for the Integr<strong>at</strong>ion <strong>of</strong> the Infrastructure, D<strong>at</strong>a Manager, and Tracker forCommand and Control Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented RealtimeDependable Systems (WORDS), Newport Beach, CA, February 1997 (co-authors: M. G<strong>at</strong>es)136. D<strong>at</strong>a Manager for Evolvable Real-time Command and Control, Proceedings VLDB 1997, Athens,Greece (co-author: R. Ginis et al).137. Object-oriented D<strong>at</strong>a Management and Distribution for Real-time Command and Control Systems,Proceedings Intern<strong>at</strong>ional Workshop on Real Time D<strong>at</strong>abases 1997, Burlington, VT (co-author: R.Ginis, E. Hughes, et al).138. Schedule and Priority Mapping for St<strong>at</strong>ic and Real-time Middleware, Proceedings RT Middlewareworkshop, San Francisco, CA 1997, (also published in Springer book: Real Time Systems, Vol. 20,No. 2, March 2001) (co-authors: V. Wolfe et al).139. Concurrency Control in Real-time Object-oriented Systems, Proceedings IEEE ISORC, Kyoto, April1998, (co-authors: M. Squadrito, et al).140. Distributed Adaptable Object-based Architecture for Evolvable Command and Control Systems, WebProceedings <strong>of</strong> the DARPA/OMG Workshop on Compositional S<strong>of</strong>tware Architecture, January 1998(co-author: P. Krupp et al), Monterey, CA.141. Adaptable Real-time Distributed Object Management for Command and Control Systems,Proceedings <strong>of</strong> the IEEE ISADS Conference, March 1999, Tokyo, Japan (co-author: J. Maurer et al).142. CORBA-based Real-time Trader Service for Adaptable Command and Control Systems, Proceedings<strong>of</strong> the IEEE ISORC Conference, May 1999, St. Malo, France (co-author: S. Wohlever et al).143. Dependable Objects for D<strong>at</strong>abases, Middleware, and Methodologies, Proceedings IEEE WORDS99F, Monterey, CA. (co-author: Dr. Marion Ceruti).144. Towards a Real-time Agent Architecture: A White Paper, Proceedings IEEE WORDS 99F, Monterey,CA, (co-author: L. DiPippo).145. Benchmarking Distributed Real-time Objects, Proceedings IEEE ISORC 2000, Newport Beach, CA(co-author: John Maurer et al).51
- Page 1: Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6: EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49: 99. Data Mining for Cyber Security
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102:
Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104:
conceptual structures (e.g., semant
- Page 105 and 106:
1990s, we designed and implemented
- Page 107 and 108:
inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH