3 Multimedia D<strong>at</strong>abase Management Systems, Kluwer Public<strong>at</strong>ions, 1996 (co-editors: B. Berra, K.Nwosu).4. D<strong>at</strong>a Management Handbook Supplement, Auerbach Public<strong>at</strong>ions, 1996 (Guest Editor).5. Directions in Multimedia D<strong>at</strong>abase Management, Kluwer, 1997 (co-editors: B. Berra, K. Nwosu).6. D<strong>at</strong>a Management Handbook, 1998 (Consulting Editor).7. Knowledge Management, MIT Press, 2001 (co-editors: M. Maybury et al).8. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Kluwer 2001; enhanced version <strong>of</strong> Proceedings <strong>of</strong> IFIP D<strong>at</strong>abaseSecurity Conference, 2000 (co-editors: R. van der Riet et al).9. Heterogeneous Inform<strong>at</strong>ion Exchange, Kluwer 2002, editorial introduction, 2002 (co-editors: H.Besteg<strong>of</strong>f et al).10. Web Inform<strong>at</strong>ion Management Security, Artech House, 2005 (co-editor: E. Ferrari).11. System Integrity and Control, Springer, 2006 (co-editor S. Wang et al).III. CONFERENCE AND WORKSHOP PROCEEDINGS EDITED1. Proceedings <strong>of</strong> the 3rd RADC D<strong>at</strong>abase Security Workshop, Published as MITRE Technical Report,MTP 385, May 1991.2. Proceedings <strong>of</strong> the 6th IFIP 11.3 Working Conference in D<strong>at</strong>abase Security, August 1992.3. Proceedings <strong>of</strong> the OOPSLA-93 Conference Workshop on Integr<strong>at</strong>ing Object-oriented technologyand Security Technology, September 1993 (co-editors: R. Sandhu and T.C. Ting).4. Proceedings <strong>of</strong> the Massive Digital D<strong>at</strong>a Systems Workshop, March 1994, published by theCommunity Management Staff, Intelligence Community (co-authors: B. Lavender et al).5. Proceedings <strong>of</strong> the OOPSLA 94, 95, and 96 Conference Workshop on Object-Oriented Technologyfor Medical Inform<strong>at</strong>ion Systems, October 1994, 95, 96 (co-editor: M. Ibrahim et al).6. Proceedings <strong>of</strong> the ACM Multimedia Conference Workshop on Multimedia D<strong>at</strong>abase ManagementSystems, October 1994, November 95 (co-editors: B. Berra, K. Nwosu).7. Proceedings WORDS 1999 by IEEE CS Press, August 1999 (also edited preliminary conferenceproceedings in January 1999).8. Proceedings <strong>of</strong> the 14th IFIP 11.3 Working Conference in D<strong>at</strong>abase Security, August 2000. (coeditor:R. van der Riet et al).9. Proceedings ISI Conference, Springer, 2006 (co-editor: H. Chen et al).10. SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, SophiaAntipolis, France, June 20-22, 2007, Proceedings ACM 2007 (co-editor: V. Lotz)11. NSF D<strong>at</strong>a and Applic<strong>at</strong>ions Security Workshop, February 200962
12. Proceedings ISI Conference, IEEE, 2009 (co-editor: H. Chen et al).IV. WORKSHOP AND SPECIAL SESSION REPORTS1. Workshop Summary, 7th IFIP 11.3 D<strong>at</strong>abase Security Conference, IFIP Transactions in D<strong>at</strong>abaseSecurity VII, North Holland, 1994 (Editors: Keefe and Landwehr).2. Workshop Summary, OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems,Addendum to the Proceedings <strong>of</strong> the ACM OOPSLA 93 Conference, OOPS Messenger, Vol. 5, No.2,April 1994.3. Panel Summary, ACM OOPSLA-93 Conference Panel on Integr<strong>at</strong>ing Object-Oriented and SecurityTechnologies, Addendum to the Proceedings <strong>of</strong> the OOPSLA 93 Conference, OOPS Messenger, Vol.5, No.2, April 1994.4. Workshop Summary, ACM OOPSLA-94 Conference Workshop on Object Technology in HealthcareInform<strong>at</strong>ion Systems, Addendum to the Proceedings <strong>of</strong> the ACM OOPSLA 94 Conference, ACMOOPS Messenger, 1995 (co-authors: M. Ibrahim, S. Arora, T. C. Ting).5. Workshop Summary, ACM Multimedia '94 Conference Workshop on Multimedia D<strong>at</strong>abaseManagement Systems, ACM SIGMOD Record, 1995.6. Interactive D<strong>at</strong>a Mining, Workgroup Session Report, D<strong>at</strong>abases in visualiz<strong>at</strong>ion workshop 1995,Springer Verlag, 1996.7. D<strong>at</strong>a Mining and Security, Special session <strong>at</strong> the 1995 IFIP D<strong>at</strong>abase Security Conference, Jointarticle in conference proceedings book chapter published by Chapman and Hall, 1996. (co-authors:T.Y. Lin, T. Hinke, D. Marks).8. Workshop Discussion, Interactive D<strong>at</strong>a Mining, IEEE D<strong>at</strong>abase and Visualiz<strong>at</strong>ion workshop, Atlanta,GA (proceedings published by Springer), 1996.9. Workshop Summary, D<strong>at</strong>a and Applic<strong>at</strong>ions Security, IFIP 11.3, August 2001.10. Workshop Summary, Secure Semantic Web, ICDE Conference, 2008 (Co-chair: B. Carmin<strong>at</strong>i)V. MITRE Public<strong>at</strong>ions Edited1. Special Issue Editorial, Edge D<strong>at</strong>a Mining Issue, MITRE, 20002. Conferences Co-Chaired: First Applied D<strong>at</strong>abase Technology Day, 1994; First D<strong>at</strong>abase Vendor Day1995, Second Applied D<strong>at</strong>abase Technology Day, 1995, First Object technology Day, 199663
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12: secure query processing for cloud.
- Page 13 and 14: Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16: Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114:
Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116:
Publications: Several journal publi
- Page 117 and 118:
Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH