74. Building a Geosp<strong>at</strong>ial Semantic Web, 4th Intern<strong>at</strong>ional Conference on Frontier <strong>of</strong> Computer Scienceand Technology, Shanghai, China, December 2009.75. Assured Inform<strong>at</strong>ion Sharing: Opportunities and Challenges for Indo-US Collabor<strong>at</strong>ion, Presented <strong>at</strong>the Info-US Summit on Infrastructure Security, Bangalore, India, January 2010 (sponsored by NSFand IUSSTF).76. Secure Semantic Sensor Web and Pervasive Computing, keynote address, IEEE Intern<strong>at</strong>ionalConference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Newport Beach,CA, June 2010 (presented by Pr<strong>of</strong>. L<strong>at</strong>ifur Khan).77. Assured Inform<strong>at</strong>ion Sharing: Detecting Malicious Code, keynote address <strong>at</strong> the PAKDD PAISI,Hyderabad, India, June 2010.78. Assured Cloud Computing, keynote address, IEEE COMPSAC Conference Workshop on Securityand Privacy, Seoul, South Korea, July 2010.79. Building Trustworthy Semantic Web, IEEE Semantic Computing Conference, Pittsburgh, September2010 (Mini-keynote: special session with Pr<strong>of</strong>s. Tom Mitchell and Manuela M. Veloso).80. Cloud Computing, NIT Warangal, India. Technozion 2010, Video Keynote given from <strong>Dallas</strong> TX,September 2010.81. Secure Cloud D<strong>at</strong>a Management, CloudCom Security Workshop, November 2010, Indianapolis, IN.82. D<strong>at</strong>a Mining for Malware Detection, SDPS Annual Conference, Jeju Island, S. Korea, June 2011.83. D<strong>at</strong>a Mining for Malware Detection, European Intelligence and Security Inform<strong>at</strong>ics, September2011, Athens, Greece.84. D<strong>at</strong>a Mining for Malware Detection, DFW MetroCon, October 2011, Arlington, TX.85. Assured Cloud-based Inform<strong>at</strong>ion Sharing, IEEE Intern<strong>at</strong>ional Conference on Dependable,Autonomic and Secure Computing (DASC), December 2011, Sydney, Australia.II. PANEL PAPERS AND PRESENTATIONS(some present<strong>at</strong>ions published as proceeding papers)1. Inference Problem in D<strong>at</strong>abase Security, Panel present<strong>at</strong>ion <strong>at</strong> the 1st RADC D<strong>at</strong>abase SecurityWorkshop, (Chair: M. Morgenstern) 1988. Proceedings paper published by Springer Verlag, MeloPark, CA, 1992 (Editor: T. Lunt).2. Issues in Trusted Distributed D<strong>at</strong>abase Management Systems - A Position Paper, Proceedings <strong>of</strong> the13th N<strong>at</strong>ional Computer Security Conference, Washington DC, October 1990 (Chair: J. Campbell).3. Issues in Multilevel Secure Object-Oriented D<strong>at</strong>abase Management Systems - A Position Paper,Proceedings <strong>of</strong> the 13th N<strong>at</strong>ional Computer Security Conference, Washington, DC , October 1990(Chair: R. Sandhu).4. D<strong>at</strong>abase Security - Thre<strong>at</strong>s, Solutions, Designs and Products, Panel present<strong>at</strong>ion <strong>at</strong> the 6thIntern<strong>at</strong>ional D<strong>at</strong>a Engineering Conference, Los Angeles, CA, February 1990 (Chair: I. Kameny).78
5. Recent Developments in Some Trusted D<strong>at</strong>abase Management Systems, Proceedings <strong>of</strong> the 14thN<strong>at</strong>ional Computer Security Conference, Washington DC, October 1991 (Chair: J. Campbell).6. Approaches to Handling the Inference Problem, Proceedings <strong>of</strong> the 14th N<strong>at</strong>ional Computer SecurityConference, Washington DC, October 1991 (Chair: T. Lunt).7. Security Issues for Feder<strong>at</strong>ed D<strong>at</strong>abase Systems, Presented <strong>at</strong> the 5th IFIP WG 11.3 Conference onD<strong>at</strong>abase Security, November 1991, Proceedings by North Holland, 1992, Shepherdstown, WV(Chair: M. Morgenstern).8. Security Issues for Heterogeneous D<strong>at</strong>abase Systems, Presented <strong>at</strong> the 11th Phoenix IEEEIntern<strong>at</strong>ional Conference on Computers and Communic<strong>at</strong>ions, April 1992, Phoenix AZ (Chair: O.Sheng).9. Secure Distributed D<strong>at</strong>abase Management Systems, Presented <strong>at</strong> the 6th IFIP WG 11.3 Conference onD<strong>at</strong>abase Security, Vancouver, BC, Canada, August 1992 (Chair: C. McCollum).10. Approaches to Designing Trusted DBMSs, Presented <strong>at</strong> the 18th Intern<strong>at</strong>ional Conference on VeryLarge D<strong>at</strong>abases (VLDB), Vancouver, BC, Canada, August 1992 (Chair: M. Morgenstern).11. Object-oriented Approach to the Interoperability <strong>of</strong> Trusted D<strong>at</strong>abase Management Systems,Proceedings <strong>of</strong> the 16th N<strong>at</strong>ional Computer Security Conference, Baltimore, MD, September 1993(Chair: J. Williams).12. Integr<strong>at</strong>ing Object-oriented and Security Technologies, Panel Chair, OOPSLA Conference,Washington, DC, September 1993 (conference proceedings).13. Realtime Systems: From Research to Technology to Applic<strong>at</strong>ions, 2nd IEEE Real-time SystemsApplic<strong>at</strong>ions Workshop, Calverton, MD, July 1994 (Chair: Bob Harrison).14. Inference Problem, Panel Chair, 17th NCSC Conference, Baltimore, MD, October 1994 (paperpublished in the proceedings).15. Real-time and CORBA, Object World West, San Francisco, August 1995 (Chair: F. Kuhl -present<strong>at</strong>ion in proceedings).16. Real-time and CORBA , IEEE Workshop on Object-Oriented Real-time Systems, February 1996,Laguna Beach (Chair: R. Soley).17. Distributed Systems Standards, IEEE Distributed Systems Conference, Hong Kong, May 1996, panelpaper (Chair: R. Soley).18. Standards for ADADS, Panel <strong>at</strong> IEEE ISADS 1997, Berlin, Germany (Chair: K. Kim; paper inproceedings .19. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining Overview and Security, Panels <strong>at</strong> N<strong>at</strong>ional Computer SystemsSecurity Conference, October 1996, Baltimore, MD (Chairs: J. Campbell, J. Davis).20. D<strong>at</strong>a Mining, D<strong>at</strong>a Warehousing, and Security, Panel discussion, Proceedings IFIP D<strong>at</strong>abase SecurityWorkshop, 1997 (Chapman and Hall, 1998) (Chair).21. D<strong>at</strong>a Mining <strong>of</strong> Text and Images, Panel <strong>at</strong> MIT Media Lab Forum, October 1997, Boston, MA (Chair:N. Adam).79
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77: 54. Data Mining for National Securi
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH