4. Distributed Object Management System Approach to Integr<strong>at</strong>ing Heterogeneous D<strong>at</strong>abase Systems,Local Area Network Handbook, 1995 (Auerbach Publishers, invited paper, ed: R. Maybry).5. Internet D<strong>at</strong>abase Management, D<strong>at</strong>abase Management, 1996 (Auerbach Publishers, ed: R. Mabry).6. Secure d<strong>at</strong>abase management, Handbook <strong>of</strong> D<strong>at</strong>abase Management, McGraw Hill 1996 (Ed: P.Fortier, co-author: S. Son et al).7. Multimedia d<strong>at</strong>abase management, Handbook <strong>of</strong> D<strong>at</strong>abase Management, McGraw Hill, 1996 (Ed: P.Fortier, co-author: S. Dao).8. Secure D<strong>at</strong>abase Systems, Advances on D<strong>at</strong>a Management, 2000 (Editor: O. Diaz and M. Pi<strong>at</strong>tini; coauthor:E. Ferrari - Artech House).9. KM for Heterogeneous inform<strong>at</strong>ion exchange, Kluwer Book (co-author: A Gupta et al), 2002.10. Managing Cyber Thre<strong>at</strong>s: Issues and Challenges, Kluwer (editor: V. Kumar et al), 2004.11. D<strong>at</strong>a Mining for Counter-terrorism, AAAI Press (editor: H. Kargupta et al), 2004 (MGDMConference, 2002).13. Secure Semantic Grids, Web and Inform<strong>at</strong>ion Systems Security, co-author: L. Khan (editors: E.Ferrari et al) Idea Group.14. Assured Inform<strong>at</strong>ion Sharing Across Organiz<strong>at</strong>ion Boundaries, D<strong>at</strong>a Mining for Counter-terrorism,Springer, 2006 (editor: H. Chen).15. Secure Semantic Web Services, Springer, (editor: M. Gertz), 200816. Assured Inform<strong>at</strong>ion Sharing: Technologies, Challenges and Directions,Intelligence and Security Inform<strong>at</strong>ics 2008: 1-15.17. Secure Semantic Web Services, Handbook <strong>of</strong> D<strong>at</strong>abase Security, Springer, 2008, p. 231 - 245 (Editor:S. Jajodia and M Gertz)18. Policy Management for the Semantic Web, Handbooks in Inform<strong>at</strong>ion Systems, Volume 4, Ch. 6, p.159 – 191, 2009, Elsevier (Editors: H. Raghav Rao, Shambhu Upadhyaya)19. Security and Privacy for Social Networks, Springer, co-authors: B. Carmin<strong>at</strong>i et al (Editor: E. Ferrari)V. TECHNICAL ARTICLES1. Decision Problems for System Functions, March 1980, Recursive Function <strong>The</strong>ory Letters.2. Recent Developments in D<strong>at</strong>abase Security, September 1989, Tutorial Proceedings <strong>of</strong> the IEEECOMPSAC Conference, Orlando, FL.3. An Object-Oriented Approach for Designing Secure Systems, Fall 1989, IEEE CIPHER (co-author:F.Chase).4. Computing Transitive Closures <strong>of</strong> Multilevel Rel<strong>at</strong>ions, September 1990, ACM SIGMOD Record,Vol. 19, No. 3.58
5. Inference Problem in D<strong>at</strong>abase Security, IEEE CIPHER, Winter 1991.6. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem, IEEE CIPHER, Winter 1991.7. A Note on the Recursive Enumerability <strong>of</strong> the Inference Problem in Multilevel Secure D<strong>at</strong>abaseManagement Systems, Recursive Function <strong>The</strong>ory Letters, 19928. Current St<strong>at</strong>us <strong>of</strong> R&D in Trusted D<strong>at</strong>abase Management Systems, ACM SIGMOD Record, Vol. 21,#3, September 1992.9. Concurrency Control in Trusted D<strong>at</strong>abase Management Systems, ACM SIGMOD Record, December1993 (co-author: H. Ko).10. Engineering Real-time Complex Systems, IEEE Complex Systems, 1994/1995, (co-authors: P. Krupp,A. Kanevsky).11. D<strong>at</strong>a Management Research <strong>at</strong> the MITRE Corpor<strong>at</strong>ion, ACM SIGMODRecord, September 1995 (co-authors: Rosenthal, et al).12. Improving Timeliness in Real Time Secure D<strong>at</strong>abase Systems, ACM SIGMOD Record. 1996 (coauthor:S. Son et al).13. D<strong>at</strong>a Mining, N<strong>at</strong>ional Security, Privacy and Civil Liberties, ACM SIGKDD, December 2002.14. Semantic Web, Encyclopedia <strong>of</strong> Human Computer Interaction, Berkshire Publishers, (Editor: W.Bainbridge), 2004.15. Security, Encyclopedia <strong>of</strong> Human Computer Interaction, Berkshire Publishers, Editor: W. Bainbridge,2004.16. Homeland Security, D<strong>at</strong>a Mining Link Analysis for N<strong>at</strong>ional Security, Essays in the Encyclopedia <strong>of</strong>D<strong>at</strong>a Warehousing and Mining, Editor: J. Wang, 2005.17. Security and Privacy for Geosp<strong>at</strong>ial D<strong>at</strong>a Management, Encyclopedia <strong>of</strong> Geosp<strong>at</strong>ial D<strong>at</strong>aManagement, Springer, 2007 (co-authors: L. Khan et al).18. Managing and Mining Multimedia D<strong>at</strong>a, Anim<strong>at</strong>ions and Annot<strong>at</strong>ions, Proceedings WileyEncyclopedia, 2007 (co-authors: B. Prabhakaran, L. Khan).19. Multilevel Secure D<strong>at</strong>a Management, Encyclopedia on D<strong>at</strong>abase Security, (Editor: E. Ferrari), 2007.20. Mand<strong>at</strong>ory Security, Encyclopedia <strong>of</strong> Inform<strong>at</strong>ion Security, (Editor: E. Ferrari).20. Privacy and Security Challenges in GIS, Encyclopedia <strong>of</strong> GIS (Springer)2008: 898-902 (co-authorsL<strong>at</strong>ifur Khan, Ganesh Subbiah, Ashraful Alam, Mur<strong>at</strong> Kantarcioglu).21. Geosp<strong>at</strong>ial Semantic Web, Definition. Encyclopedia <strong>of</strong> GIS 2008: 398 (co-authors: L<strong>at</strong>ifur Khan,Ganesh Subbiah, Ashraful Alam, Mur<strong>at</strong> Kantarcioglu).22. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions and Its Privacy Implic<strong>at</strong>ions, Lecture Notes in ComputerScience, Springer Verlag, (Based on keynote address <strong>at</strong> SIGKDD workshop 2008).59
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8: Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57: 225. RETRO: A Framework for Semanti
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110:
9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH