UTDCS-51-09UTDCS-01-10Secure Dependable and HighPerformance Cloud StorageSemantic Web Implement<strong>at</strong>ionScheme for N<strong>at</strong>ional VulnerabilityCommon Pl<strong>at</strong>form Enumer<strong>at</strong>ion D<strong>at</strong>aYunqi YeI-Ling YenLiangliang XiaoFarohk Bastani,Bhavani ThuraisinghamVaibhav KhadilkarJyothsna RachapalliBhavani ThuraisinghamUTDCS-02-10 Security Issues for Cloud Computing Kevin HamlenL<strong>at</strong>ifur KhanMur<strong>at</strong> KantarciogluBhavani ThuraisinghamUTDCS-03-10 Securing the Execution Environment Elisa Bertino, Gabriel Ghinita ,Kevin Hamlen, Mur<strong>at</strong> Kantarcioglu,Hsien-Hsin S. Lee, Ninghui LiCalton Pu, Ravi Sandhu, WaleedSmari, Bhavani ThuraisinghamGene Tsudik, Dongyan XuShouhuai Xu11/0901/1001/1002/10UTDCS-04-10Ranking Entities from MultipleOntologies to Facilit<strong>at</strong>e Feder<strong>at</strong>edQueriesNeda Alipanah, Julie RauerL<strong>at</strong>ifur Khan, Steven B. SeidaBhavani Thuraisingham02/10UTDCS-13-10Bi-Directional Transl<strong>at</strong>ion <strong>of</strong> Rel<strong>at</strong>ionalD<strong>at</strong>a into Virtual RDF StoresSunitha Ramanujam, VaibhavKhadilkar, L<strong>at</strong>ifur Khan, StevenSeida, Mur<strong>at</strong> Kantarcioglu, BhavaniThuraisingham05/10UTDCS-19-10Selected Papers in Security StudiesVolume 1: Terrorism Tactics, Trendsand TechnologiesBhavani Thuraisingham07/10UTDCS-20-10RBF Neural Network-based FaultLocaliz<strong>at</strong>ionW. Eric Wong, Vidroha Deboy,Bhavani Thuraisingham, RichardGolden07/10UTDCS-23-10Selected Papers in Security StudiesVolume 2: Inform<strong>at</strong>ion SharingStr<strong>at</strong>egies <strong>of</strong> the United St<strong>at</strong>es FederalGovernment and Its Allies andOur Contributions TowardsImplementing <strong>The</strong>se Str<strong>at</strong>egiesBhavani Thuraisingham08/10UTDCS-24-10A Comparison <strong>of</strong> Approaches for Large-Scale D<strong>at</strong>a MiningAmy Xuyang TanValerie Li LiuMur<strong>at</strong> KantarciogluBhavani Thuraisingham08/10UTDCS-27-10Ontology-driven Query ExpansionMethods to Facilit<strong>at</strong>e Feder<strong>at</strong>ed QueriesNeda Alipanah, Parveen Pallabi,Sheetal Menezes, L<strong>at</strong>ifur Khan,Steven Seida, BhavaniThuraisingham09/10UTDCS-12-11Feder<strong>at</strong>ed Query Processing UsingOntology Structure and Ranking In aService Oriented EnvironmentNeda Alipanah, Parveen Pallabi,L<strong>at</strong>ifur Khan, BhavaniThuraisingham03/11UTDCS-22-11RETRO: A Framework for SemanticsPreserving SQL-to-SPARQL Transl<strong>at</strong>ionJyothsna Rachapalli, VaibhavKhadilkar, Mur<strong>at</strong> Kantarcioglu, andBhavani Thuraisingham08/1168
UTDCS-27-11Towards the Design and Implement<strong>at</strong>ion<strong>of</strong> a Cloud-Centric Assured Inform<strong>at</strong>ionSharingBhavani Thuraisingham, VaibhavKhadilkar, Tyrone Cadenhead,Jyothsna Rachapalli, Mur<strong>at</strong>Kantarcioglu, Kevin Hamlen09/11UTDCS-30-11Optimized Ontology-Driven QueryExpansion Using Map-ReduceFramework to Facilit<strong>at</strong>e Feder<strong>at</strong>edQueriesNeda Alipanah, L<strong>at</strong>ifur Khan andBhavani Thuraisingham11/11UTDCS-31-11Risk-Aware D<strong>at</strong>a Processing in HybridCloudsBhavani Thuraisingham, VaibhavKhadilkar, Kerim Yasin Oktay, BijitHore, Mur<strong>at</strong> Kantarcioglu andSharad Mehrotra,11/11UTDCS-35-11Selected Papers in Security StudiesVolume 6: <strong>The</strong> Continued War onTerrorism – How to Maintain Long-Range Terrorist DeterrenceJan Kallberg, BhavaniThuraisingham11/11UTDCS-36-11Selected Papers in Security StudiesVolume 7: Supply Chain Managementfor Inctive and Risk-based AssuredInform<strong>at</strong>ion SharingBhavani Thuraisingham12/11II. Technical Reports <strong>at</strong> MITRE1. Security Issues in Distributed D<strong>at</strong>abase Management Systems, September 1989, Technical Report,M89-52, Vol. 1.2. Research Directions in Distributed D<strong>at</strong>abase Management Systems, September 1989, TechnicalReport, M89-52, Vol. 2).3. <strong>The</strong> Inference Problem in D<strong>at</strong>abase Security, September 1989, Technical Report, M89-52, Vol. 3.4. Directions for Future Research and Development in Trusted Distributed D<strong>at</strong>abase ManagementSystems, September 1989, Technical Report, M89-52, Vol. 4,5. Recursion <strong>The</strong>oretic Properties <strong>of</strong> the Inference Problem in D<strong>at</strong>abase Security, May 1990, TechnicalReport, MTP-291, (From Report No. 190).6. Secure Query Processing in Trusted D<strong>at</strong>abase Management Systems - Design and PerformanceStudies, May 1990, Technical Report, MTP-292, (From Report No. 189).7. M<strong>at</strong>hem<strong>at</strong>ical Formalisms for Multilevel Object-Oriented Systems, June 1990, Technical Report,MTP-291.8. Multilevel Security Issues in Distributed D<strong>at</strong>abase Management Systems, July 1990, TechnicalReport, MTP-297, (From Reports No. 188, No. 189).9. Handling Associ<strong>at</strong>ion Constraints in Multilevel D<strong>at</strong>abases, July 1990, Technical Report, WP-28904.10. A Nonmonotonic Typed Multilevel Logic for Formalizing Multilevel D<strong>at</strong>abase Systems, June 1990,Technical Report, MTR-10935.69
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18: Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67: UTDCS-32-08A Practical Approach to
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120:
13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH