10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

74. Building a Geosp<strong>at</strong>ial Semantic Web, 4th Intern<strong>at</strong>ional Conference on Frontier <strong>of</strong> Computer Scienceand Technology, Shanghai, China, December 2009.75. Assured Inform<strong>at</strong>ion Sharing: Opportunities and Challenges for Indo-US Collabor<strong>at</strong>ion, Presented <strong>at</strong>the Info-US Summit on Infrastructure Security, Bangalore, India, January 2010 (sponsored by NSFand IUSSTF).76. Secure Semantic Sensor Web and Pervasive Computing, keynote address, IEEE Intern<strong>at</strong>ionalConference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Newport Beach,CA, June 2010 (presented by Pr<strong>of</strong>. L<strong>at</strong>ifur Khan).77. Assured Inform<strong>at</strong>ion Sharing: Detecting Malicious Code, keynote address <strong>at</strong> the PAKDD PAISI,Hyderabad, India, June 2010.78. Assured Cloud Computing, keynote address, IEEE COMPSAC Conference Workshop on Securityand Privacy, Seoul, South Korea, July 2010.79. Building Trustworthy Semantic Web, IEEE Semantic Computing Conference, Pittsburgh, September2010 (Mini-keynote: special session with Pr<strong>of</strong>s. Tom Mitchell and Manuela M. Veloso).80. Cloud Computing, NIT Warangal, India. Technozion 2010, Video Keynote given from <strong>Dallas</strong> TX,September 2010.81. Secure Cloud D<strong>at</strong>a Management, CloudCom Security Workshop, November 2010, Indianapolis, IN.82. D<strong>at</strong>a Mining for Malware Detection, SDPS Annual Conference, Jeju Island, S. Korea, June 2011.83. D<strong>at</strong>a Mining for Malware Detection, European Intelligence and Security Inform<strong>at</strong>ics, September2011, Athens, Greece.84. D<strong>at</strong>a Mining for Malware Detection, DFW MetroCon, October 2011, Arlington, TX.85. Assured Cloud-based Inform<strong>at</strong>ion Sharing, IEEE Intern<strong>at</strong>ional Conference on Dependable,Autonomic and Secure Computing (DASC), December 2011, Sydney, Australia.II. PANEL PAPERS AND PRESENTATIONS(some present<strong>at</strong>ions published as proceeding papers)1. Inference Problem in D<strong>at</strong>abase Security, Panel present<strong>at</strong>ion <strong>at</strong> the 1st RADC D<strong>at</strong>abase SecurityWorkshop, (Chair: M. Morgenstern) 1988. Proceedings paper published by Springer Verlag, MeloPark, CA, 1992 (Editor: T. Lunt).2. Issues in Trusted Distributed D<strong>at</strong>abase Management Systems - A Position Paper, Proceedings <strong>of</strong> the13th N<strong>at</strong>ional Computer Security Conference, Washington DC, October 1990 (Chair: J. Campbell).3. Issues in Multilevel Secure Object-Oriented D<strong>at</strong>abase Management Systems - A Position Paper,Proceedings <strong>of</strong> the 13th N<strong>at</strong>ional Computer Security Conference, Washington, DC , October 1990(Chair: R. Sandhu).4. D<strong>at</strong>abase Security - Thre<strong>at</strong>s, Solutions, Designs and Products, Panel present<strong>at</strong>ion <strong>at</strong> the 6thIntern<strong>at</strong>ional D<strong>at</strong>a Engineering Conference, Los Angeles, CA, February 1990 (Chair: I. Kameny).78

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!