10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4. Distributed Object Management System Approach to Integr<strong>at</strong>ing Heterogeneous D<strong>at</strong>abase Systems,Local Area Network Handbook, 1995 (Auerbach Publishers, invited paper, ed: R. Maybry).5. Internet D<strong>at</strong>abase Management, D<strong>at</strong>abase Management, 1996 (Auerbach Publishers, ed: R. Mabry).6. Secure d<strong>at</strong>abase management, Handbook <strong>of</strong> D<strong>at</strong>abase Management, McGraw Hill 1996 (Ed: P.Fortier, co-author: S. Son et al).7. Multimedia d<strong>at</strong>abase management, Handbook <strong>of</strong> D<strong>at</strong>abase Management, McGraw Hill, 1996 (Ed: P.Fortier, co-author: S. Dao).8. Secure D<strong>at</strong>abase Systems, Advances on D<strong>at</strong>a Management, 2000 (Editor: O. Diaz and M. Pi<strong>at</strong>tini; coauthor:E. Ferrari - Artech House).9. KM for Heterogeneous inform<strong>at</strong>ion exchange, Kluwer Book (co-author: A Gupta et al), 2002.10. Managing Cyber Thre<strong>at</strong>s: Issues and Challenges, Kluwer (editor: V. Kumar et al), 2004.11. D<strong>at</strong>a Mining for Counter-terrorism, AAAI Press (editor: H. Kargupta et al), 2004 (MGDMConference, 2002).13. Secure Semantic Grids, Web and Inform<strong>at</strong>ion Systems Security, co-author: L. Khan (editors: E.Ferrari et al) Idea Group.14. Assured Inform<strong>at</strong>ion Sharing Across Organiz<strong>at</strong>ion Boundaries, D<strong>at</strong>a Mining for Counter-terrorism,Springer, 2006 (editor: H. Chen).15. Secure Semantic Web Services, Springer, (editor: M. Gertz), 200816. Assured Inform<strong>at</strong>ion Sharing: Technologies, Challenges and Directions,Intelligence and Security Inform<strong>at</strong>ics 2008: 1-15.17. Secure Semantic Web Services, Handbook <strong>of</strong> D<strong>at</strong>abase Security, Springer, 2008, p. 231 - 245 (Editor:S. Jajodia and M Gertz)18. Policy Management for the Semantic Web, Handbooks in Inform<strong>at</strong>ion Systems, Volume 4, Ch. 6, p.159 – 191, 2009, Elsevier (Editors: H. Raghav Rao, Shambhu Upadhyaya)19. Security and Privacy for Social Networks, Springer, co-authors: B. Carmin<strong>at</strong>i et al (Editor: E. Ferrari)V. TECHNICAL ARTICLES1. Decision Problems for System Functions, March 1980, Recursive Function <strong>The</strong>ory Letters.2. Recent Developments in D<strong>at</strong>abase Security, September 1989, Tutorial Proceedings <strong>of</strong> the IEEECOMPSAC Conference, Orlando, FL.3. An Object-Oriented Approach for Designing Secure Systems, Fall 1989, IEEE CIPHER (co-author:F.Chase).4. Computing Transitive Closures <strong>of</strong> Multilevel Rel<strong>at</strong>ions, September 1990, ACM SIGMOD Record,Vol. 19, No. 3.58

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!