11. Secure Distributed Query Processing Str<strong>at</strong>egies, June 1990, Technical Report, WP 28891, (coauthors:H. Rubinovitz and M. Collins)12. <strong>The</strong> Use <strong>of</strong> Conceptual Structures in Handling the Inference Problem in D<strong>at</strong>abase Security, August1990, Technical Report, M90-55. D<strong>at</strong>abase Inference Controller - An Overview, Technical Report,August 1990, MTR-10963, (co-authors: W. Ford, J. O'Keeffe).13. Secure Distributed Query Processor - An Overview, August 1990, Technical Report, MTR-10969,Volume 1 (co-author: H. Rubinovitz) (also published as RADC Technical Report).14. Issues on Developing a Multilevel Secure Object-Oriented D<strong>at</strong>a Model, Technical Report, MTP 384,December 1990.15. Security Issues for Feder<strong>at</strong>ed D<strong>at</strong>abase Systems to Manage Distributed, Heterogeneous, andAutonomous Multilevel D<strong>at</strong>abases, Technical Report, M91-78, November 1991.16. Enhancements to the Secure Distributed Query Processor Prototype to function in a LimitedHeterogeneous Environment, Technical Report, M91-86, December 1991.17. Security Constraint Processing in a Multilevel Secure Distributed Environment, Technical Report,MTR 11239, April 1992 (co-author: W. Ford).18. Simul<strong>at</strong>ion <strong>of</strong> Query Processing and Concurrency Control Algorithms for a Trusted DistributedD<strong>at</strong>abase Management System, June 1992, MTR92B0000077.19. COMPUSEC Training Course: D<strong>at</strong>abase Security and Issues, Technical Report, M92B0000102,Vol. 8, September 1992. (Based on half a day course given to AFCSC - see public<strong>at</strong>ion #270).20. Concurrency Control in Trusted D<strong>at</strong>abase Management Systems, Technical Report, M92B0000109,September 1992 (co-author: Hai-Ping Ko).21. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed D<strong>at</strong>abase Inference Controller - I, Technical Report,MTR92B0000168, December 1992 (co-authors: Harvey Rubinovitz, D. Foti).22. Multilevel Security for Object-Oriented D<strong>at</strong>abase Management Systems, Technical ReportWP92B0000375, February 1993 (co-authors: A. Rosenthal, W. Herndon, R. Graubart).23. Selected Research Topics on the Inference Problem, M93B0000024, Technical Report, March 1993.24. A Framework for Specifying MLSDB Requirements, MTR 93B0000089, Technical Report, June 1993(co-authors: L. Monk and M. Nadel).25. A Seminar on Object-Oriented D<strong>at</strong>abase Management Systems, Technical Report M93B0000175,December 1993.26. A Seminar on Distributed and Heterogeneous D<strong>at</strong>abase Systems, Technical Report M93B0000176,December 1993.27. Applying OMT for Designing Multilevel D<strong>at</strong>abase Applic<strong>at</strong>ions, Technical Report, M93B0000180,December 1993, (co-authors: P. Sell and D. Marks).28. Design and Implement<strong>at</strong>ion <strong>of</strong> a Distributed D<strong>at</strong>abase Inference Controller - II, Technical Report,MTR94B0000057, June 1994 (co-authors: Harvey Rubinovitz, M. Collins).70
29. A Seminar on Real-time D<strong>at</strong>abase Management Systems, Technical Report, MP 94B 0000124 July1994.30. Evolvable Systems Initi<strong>at</strong>ive for Real-time C3: Infrastructure Requirements: MTR 94B0000116, (coauthors:E. Bensley et al), September 1994 (Unclassified, NOFORN).31. Design and Implement<strong>at</strong>ion <strong>of</strong> an Active Real-time D<strong>at</strong>abase System, MP 94B 0000167, December1994 (co-authors: G. Gengo and A. Schafer).32. Massive Digital D<strong>at</strong>a Systems Issues MP 94B0000169, September 1994, (co-authors: H. Bayard, B.Lavender, M. Zemankova).33. Directions for D<strong>at</strong>a Management Technology Research <strong>at</strong> MITRE, MP 95B0000112, March 1995,(co-authors: B. Blaustein, L. Seligman, and A. Rosenthal).34. Final Report on the Inference Problem, Technical Report, June 1995 (co-authors: M. Collins, H.Rubinovitz).35. Program Plan for the Massive Digital D<strong>at</strong>a Systems Initi<strong>at</strong>ive, Technical Report, May 1995.36. Toward Developing a Testbed for MDDS, Technical Report, September 1995.37. Plan for ORD Labor<strong>at</strong>ory, Technical Report, September 1995 (co-author: C. Clifton et al.).38. Secure Client Server Computing, Working Note, MITRE, June 1995 (co-author: B. Kahn).39. Evolvable Systems Initi<strong>at</strong>ive for Real-time C3: Design and Implement<strong>at</strong>ion <strong>of</strong> the Infrastructure, D<strong>at</strong>aManagement, and Applic<strong>at</strong>ion, Technical Report (co-authors: E. Bensley et al), September 1995.40. Evolvable Systems Initi<strong>at</strong>ive for Real-time C3: Integr<strong>at</strong>ion <strong>of</strong> the Infrastructure, D<strong>at</strong>a Manager, andTracker Technical Report (co-authors: M. G<strong>at</strong>es et al), September 1996.41. Evolvable Interoperable Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE, Technical Report, September 1996(co-authors: P. Chase et al).42. Evolvable Interoperable Inform<strong>at</strong>ion Systems Initi<strong>at</strong>ive <strong>at</strong> MITRE: Final report, Technical Report,September 1997 (co-authors: P. Chase et al).43. Adaptable real-time CORBA, Technical report, Volume 1 September 1997 (co-author: R. Ginis, etal).44. Adaptable Real-time CORBA, Technical report, Volume 1I September 1998 (co-author: S. Wohleveret al).45. MDDS, Volume 1, Program Overview, MITRE Report May 1998.46. MDDS, Volume 2, Technology Overview, MITRE Report. June 1998.47. MDDS, Volume 3, D<strong>at</strong>a Mining, MITRE Report July 1998.48. MDDS, Volume 4, Multimedia D<strong>at</strong>abases, MITRE Report, August 1998.49. MDDS, Volume 5, Web Technologies, MITRE Report September 1998.71
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20: Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22: management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69: UTDCS-27-11Towards the Design and I
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122:
82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124:
http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH