10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

65. Directions for Cyber Security, Panel <strong>at</strong> Cyber Security Symposium, Arizona St<strong>at</strong>e <strong>University</strong>, April2008, Tempe, AZ (Chair: S. Yau).66. Secure Distributed Systems, Panel IFIP D<strong>at</strong>a Security Conference, July 2008, London, UK(Proceedings) (Chair: S. Barker).67. Directions for Sensor and Pervasive Applic<strong>at</strong>ions, TRUST, December 2008, Shanghai, China, (Chair:S. Yau).68. Women in Cyber Security, Secure Knowledge Management Conference, November 2008, <strong>Dallas</strong>, TX(Chair).69. D<strong>at</strong>a Security for Outsourcing, DFW Outsourcing Associ<strong>at</strong>ion, January 2009, Addison, TX (Chair:Attorney Mr. Peter Vogel).70. Intelligence and Security Inform<strong>at</strong>ics, ISI, June 2009, <strong>Dallas</strong>, TX (Panel Chair).71. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Riend van der Riet Panel, IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityConference, 2009, Montreal, Canada (Panel Chair).72. Challenges <strong>of</strong> Effective Applic<strong>at</strong>ions <strong>of</strong> Cloud Computing, <strong>The</strong> 4th Intern<strong>at</strong>ional Conference onFrontier <strong>of</strong> Computer Science and Technology, December 2009, Shanghai, China (Chair: S. Yau).73. Challenges for COMPSAC, Plenary Panel, , July 2010, Seoul, S Korea (Chair: S. Yau)74. Challenges for ISI, July 2011, IEEE ISI, July 2011, Beijing, China (Panel Chair).75. Security for Cloud Computing, IEEE Intern<strong>at</strong>ional Workshop on Future Trends <strong>of</strong> DistributedComputing System (FTDCS) 2011, September 2011, Banff, Canada.III. CONFERENCE/WORKSHOP PRESENTATIONS (Informal or no Proceedings)D<strong>at</strong>a and Applic<strong>at</strong>ions Security1. M<strong>at</strong>hem<strong>at</strong>ical Formalisms for Multilevel Object-Oriented Systems, paper presented <strong>at</strong> the Workshopon Object-Oriented D<strong>at</strong>abase Security, April 1990, Karlshrue, West Germany.2. Neural Network Applic<strong>at</strong>ions in Intrusion Detection, paper distributed and presented <strong>at</strong> the 7thIntrusion Detection Workshop, May 1991, Menlo Park, CA (co-author: W. Ford).3. Secure Interoperability <strong>of</strong> Trusted D<strong>at</strong>abase Management Systems, Technical paper presented <strong>at</strong> theACM Workshop on D<strong>at</strong>a Management Security and Privacy Standards, December 1991, SanAntonio, TX, (Held in conjunction with the 7th IEEE Computer Security Applic<strong>at</strong>ions Conference).4. Object-oriented Approach to Interconnecting Trusted D<strong>at</strong>abase Management Systems, technicalpaper presented <strong>at</strong> the ACM Workshop on D<strong>at</strong>a Management Security and Privacy Standards,December 1992 , San Antonio, TX (Held in conjunction with the 8th IEEE Computer SecurityApplic<strong>at</strong>ions Conference) (co-author: H. Rubinovitz).5. Fuzzy Logic and Multilevel D<strong>at</strong>abases, presented <strong>at</strong> the 1st Boston Area Fuzzy Logic Workshop,February 1993.82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!