22. Web D<strong>at</strong>a Mining, Inaugural Panel <strong>at</strong> IEEE ICTAI 97, November 1997, Newport Beach, CA (Chairs:Wei Syan Li, J. Srivastava)23. Multimedia D<strong>at</strong>a Mining, AFCEA Technet Panel, June 1997, (Chair: T. Nyland); also version <strong>at</strong>AFCEA D<strong>at</strong>a Mining Symposium Panel, December 1997, Washington, DC.24. CIO Conference on Object Security, FEDOOTS 1997, Washington DC (Chair).25. Privacy for D<strong>at</strong>a Mining and Web, Panel discussion, proceedings IFIP D<strong>at</strong>abase Security Conference,1998 (Book chapter by Kluwer) (Chair).26. Web and D<strong>at</strong>a Security, Panels <strong>at</strong> IEEE COMPSAC 1998 (Proceedings) Vienna, Austria (Chair).27. Web and D<strong>at</strong>a Security, IEEE D<strong>at</strong>a Engineering March 1999, Sydney, Australia (Chair).28. Migr<strong>at</strong>ing Legacy D<strong>at</strong>abases, IEEE D<strong>at</strong>a Engineering Conference, 1998 (Chair) (proceedings),Orlando, FL.29. Directions for S<strong>of</strong>tware Technology, IEEE COMPSAC Distinguished panel, 1998, Vienna, Austria(Chair: S. Yau).30. Ecommerce Directions, IEEE KDEX 1998, Taipei, Taiwan (Chair: J. Tsai).31. Future Research in Multimedia D<strong>at</strong>abase Semantics, IFIP 2.6 panel discussion, Rotarua, NewZealand, January 1999 (Chair).32. Open ADADS Systems, IEEE ISADS, Tokyo, March 1999 (Proceedings).33. Web and Network Security Panel, IEEE COMPSAC October 2000, Taipei, Taiwan (Chair).34. Web and Network Security, IEEE ISADS, March 2001, <strong>Dallas</strong>, TX (Chair).35. Real-time S<strong>of</strong>tware Engineering, ASSET, March 2000, <strong>Dallas</strong>, TX (Chair: I. Yen).36. D<strong>at</strong>a Mining, Protecting Children from Inappropri<strong>at</strong>e Content on Web, N<strong>at</strong>ional Academy <strong>of</strong>Sciences, July 2000, Washington DC, (Chair: R. Thornburgh, Former US Attorney General).37. D<strong>at</strong>a Fusion for Counter-terrorism, N<strong>at</strong>ional Academy <strong>of</strong> Sciences, June 2002 Washington DC,(Chair: G. Strong).38. D<strong>at</strong>a Security Directions, IFIP 11.3 Amsterdam, August 2000, <strong>The</strong> Netherlands, (Chair; proceedingsKluwer 2001).39. Directions for ISADS, Distinguished panel, IEEE ISADS, March 2001, <strong>Dallas</strong> TX (Chair: S. Yau).40. Secure Semantic Web, Future Distributed Computing Panel, IEEE FTDCS, November 2001, Bologna,Italy (Chair: S. Yau).41. D<strong>at</strong>a Integrity, IICIS Panel, November 2001, Proceedings Brussels, Belgium (Chair: L. Straus).42. XML Security Panel, IFIP 11.3 July 2001, Proceedings, Niagara, Canada (Chair: S. Osborne).43. Web Mining/Security Panel, April 2002 (SIAM D<strong>at</strong>a Mining Conf.) Crystal City/Washington DC.80
44. D<strong>at</strong>a Engineering Directions, IEEE D<strong>at</strong>a Engineering Plenary Panel, March 2002, San Jose, CA.45. D<strong>at</strong>abase Technologies, Security and Privacy Stanford <strong>University</strong> D<strong>at</strong>abase workshop, March 2002,Stanford, CA (Chair: J. Ullman).46. Privacy, IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions Conference, July 2002, Cambridge, UK, (Book chapter 2003,Chair: P. Samar<strong>at</strong>i).47. Cyber Security and Terrorism, Panel <strong>at</strong> the United N<strong>at</strong>ions Conference on Cyber Security, September2002, New York, (Chair: M. Lacey).48. ADADS for N<strong>at</strong>ional Security, Panel Paper, published Proceedings IEEE ISADS 2003 (Chair: L.Cordell; did not <strong>at</strong>tend conference due to another commitment <strong>at</strong> NSF).49. CRA-W Panel on Writing Career Proposals, CRA-W Workshop, San Diego, CA, June 2003.50. Privacy and D<strong>at</strong>a Mining: Friends or Foes? KDD Panel, Washington DC, August 2003 (Chair: R.Agrawal).51. Future <strong>of</strong> XML D<strong>at</strong>abases, Panel <strong>at</strong> XML D<strong>at</strong>a Workshop <strong>at</strong> EDBT, March 2004, Crete, Greece(Chair: M. Mastitis; position paper in Springer).52. D<strong>at</strong>abases for Virtual Organiz<strong>at</strong>ions, Panel <strong>at</strong> DIVO Workshop, ACM SIGMOD Conference, June2004, Paris, France,.53. Secure Web Services, Panel <strong>at</strong> IEEE Web Services Conference, July 2004, San Diego, CA.54. D<strong>at</strong>abase Security for Homeland Security, IFIP D<strong>at</strong>abase Security Conference, July 2004, Barcelona,Spain.55. Women and Cyber Security, Secure Knowledge Management Workshop, September 2004, Buffalo,NY.56. Sensor Inform<strong>at</strong>ion Management, MITRE Community Workshop, October 2005, McLean, VA.57. D<strong>at</strong>a Mining for Cyber Security, Collin County Security Conference, April 2006, Plano, TX.58. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, Plenary Panel, Inform<strong>at</strong>ion and Security Inform<strong>at</strong>ics, May2006, San Diego, CA.59. Directions in Access Control, ACM SACMAT, 2006, Lake Tahoe, CA (Chair: R. Sandhu).60. Security Engineering Educ<strong>at</strong>ion, Panel <strong>at</strong> IEEE COMPSAC Conference on S<strong>of</strong>tware EngineeringEduc<strong>at</strong>ion, September 2006, Chicago, IL (Chair: D. Simmons).61. Geosp<strong>at</strong>ial Semantic Web and Interoperability, OGC Interoperability Day, October 2006, Tyson’sCorner, VA.62. Inform<strong>at</strong>ion Security, DFW Chamber <strong>of</strong> Commerce, March 2007, <strong>Dallas</strong>, TX.63. Assured Inform<strong>at</strong>ion Sharing, ACM SACMAT June 2007, Sophia Antipolis, France (Chair).64. Inform<strong>at</strong>ion Security Educ<strong>at</strong>ion, S<strong>of</strong>tware Engineering and Computer Science, August 2007, <strong>Dallas</strong>,TX.81
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79: 5. Recent Developments in Some Trus
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH