23. Challenges and Future Directions <strong>of</strong> S<strong>of</strong>tware Technology: Secure S<strong>of</strong>tware Development.COMPSAC 2010, Bhavani M. Thuraisingham, Kevin W. Hamlen24. Secure Semantic Sensor Web and Pervasive Computing. Bhavani M. Thuraisingham, Kevin W.Hamlen SUTC/UMC 2010: 5-10VI. MITRE JOURNALS1. Multilevel Secure Object-Oriented D<strong>at</strong>a Model - Issues on Noncomposite Objects, CompositeObjects, <strong>The</strong> MITRE Journal, 1992 (Version <strong>of</strong> Journal <strong>of</strong> Object-Oriented Programming paper,1991).2. Object-Oriented Approach to PACS Applic<strong>at</strong>ions, MITRE Inform<strong>at</strong>ion Systems Engineering Journal,Fall 1993.3. Design and Implement<strong>at</strong>ion <strong>of</strong> a D<strong>at</strong>abase Inference Controller, the MITRE Journal, 1994, (coauthors:W. Ford, M. Collins, J. O'Keeffe; version <strong>of</strong> D<strong>at</strong>a and Knowledge Engineering Paper, 1993).60
I. JOURNAL SPECIAL ISSUES EDITEDSection 11: EDITED WORKS1. Special issue in Security and Standards, Computer Standards and Interface Journal, 1995 (coeditor:J. Williams, editorial introduction).2. Special issue in Secure D<strong>at</strong>abase Systems Technology, IEEE Transactions on Knowledge and D<strong>at</strong>aEngineering, February 1996 (co-editor: T. Ting, editorial introduction).3. Special issue in Multimedia D<strong>at</strong>abase Management, Multimedia Tools and Applic<strong>at</strong>ions Journal,1997, (co-editors: K. Nwosu, B. Berra – also version published as book by Kluwer).4. Special issue in Multimedia D<strong>at</strong>abases, IEEE Multimedia (co-editors: Nwosu, Berra, editorialintroduction), 19975. Special Issue in D<strong>at</strong>a and Applic<strong>at</strong>ions Security, D<strong>at</strong>a and Knowledge Engineering Journal,November 2002 (co-editor: R. van der Riet).6. Special Issue in D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Journal <strong>of</strong> Computer Security, 2003 (co-editor R.van der Riet).7. Special Issue in D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Journal <strong>of</strong> Intelligent Inform<strong>at</strong>ion Systems, 2004.8. Privacy-preserving D<strong>at</strong>a Management, VLDB Journal, September 2006 (co-editor: E. Ferrari).9. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Intern<strong>at</strong>ional Journal <strong>of</strong> Inform<strong>at</strong>ion Security (co-editor: E. Ferrari).10. Editorial for Computer Standards and Interface Journal as Editor-in-Chief, November 2006.11. Foreword for book on Security Standards for Web Services (Editor: Eduardo Fernandez-Medina).12. Special Issue ACM Transactions on Inform<strong>at</strong>ion and System Security (TISSEC) 2010.13. Inform<strong>at</strong>ion and Communic<strong>at</strong>ions Security, Privacy and Trust: Standards and Regul<strong>at</strong>ions. ComputerStandards & Interfaces, Elsevier, Vol. 32, No. 5-6, 2010 (co-editor: Stefanos Gritzalis).14. Special Issue Computer Standards and Interface Journal on Secure Semantic Web, 2012 (co-editor:Barbara Carmin<strong>at</strong>i)15. Special Issue on D<strong>at</strong>a Security, IEEE Transactions on Dependable and Security Computing, 2012(co-editor: E. Ferrari).II. BOOKS EDITED1. D<strong>at</strong>abase Security VI: St<strong>at</strong>us and Prospects, 1993, Book by North Holland (co-editor: C.Landwehr). (Enhanced version <strong>of</strong> Proceedings <strong>of</strong> 6th IFIP 11.3 Working Conference in D<strong>at</strong>abaseSecurity, 1992).2. Security for Object-Oriented Systems, Book by Springer Verlag, 1994 (co-editor: R. Sandhu, T.C.Ting, Enhanced version <strong>of</strong> ACM OOPSLA Workshop Proceedings on Secure Object Systems).61
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10: the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59: 5. Inference Problem in Database Se
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112:
Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH