65. Directions for Cyber Security, Panel <strong>at</strong> Cyber Security Symposium, Arizona St<strong>at</strong>e <strong>University</strong>, April2008, Tempe, AZ (Chair: S. Yau).66. Secure Distributed Systems, Panel IFIP D<strong>at</strong>a Security Conference, July 2008, London, UK(Proceedings) (Chair: S. Barker).67. Directions for Sensor and Pervasive Applic<strong>at</strong>ions, TRUST, December 2008, Shanghai, China, (Chair:S. Yau).68. Women in Cyber Security, Secure Knowledge Management Conference, November 2008, <strong>Dallas</strong>, TX(Chair).69. D<strong>at</strong>a Security for Outsourcing, DFW Outsourcing Associ<strong>at</strong>ion, January 2009, Addison, TX (Chair:Attorney Mr. Peter Vogel).70. Intelligence and Security Inform<strong>at</strong>ics, ISI, June 2009, <strong>Dallas</strong>, TX (Panel Chair).71. D<strong>at</strong>a and Applic<strong>at</strong>ions Security, Riend van der Riet Panel, IFIP D<strong>at</strong>a and Applic<strong>at</strong>ions SecurityConference, 2009, Montreal, Canada (Panel Chair).72. Challenges <strong>of</strong> Effective Applic<strong>at</strong>ions <strong>of</strong> Cloud Computing, <strong>The</strong> 4th Intern<strong>at</strong>ional Conference onFrontier <strong>of</strong> Computer Science and Technology, December 2009, Shanghai, China (Chair: S. Yau).73. Challenges for COMPSAC, Plenary Panel, , July 2010, Seoul, S Korea (Chair: S. Yau)74. Challenges for ISI, July 2011, IEEE ISI, July 2011, Beijing, China (Panel Chair).75. Security for Cloud Computing, IEEE Intern<strong>at</strong>ional Workshop on Future Trends <strong>of</strong> DistributedComputing System (FTDCS) 2011, September 2011, Banff, Canada.III. CONFERENCE/WORKSHOP PRESENTATIONS (Informal or no Proceedings)D<strong>at</strong>a and Applic<strong>at</strong>ions Security1. M<strong>at</strong>hem<strong>at</strong>ical Formalisms for Multilevel Object-Oriented Systems, paper presented <strong>at</strong> the Workshopon Object-Oriented D<strong>at</strong>abase Security, April 1990, Karlshrue, West Germany.2. Neural Network Applic<strong>at</strong>ions in Intrusion Detection, paper distributed and presented <strong>at</strong> the 7thIntrusion Detection Workshop, May 1991, Menlo Park, CA (co-author: W. Ford).3. Secure Interoperability <strong>of</strong> Trusted D<strong>at</strong>abase Management Systems, Technical paper presented <strong>at</strong> theACM Workshop on D<strong>at</strong>a Management Security and Privacy Standards, December 1991, SanAntonio, TX, (Held in conjunction with the 7th IEEE Computer Security Applic<strong>at</strong>ions Conference).4. Object-oriented Approach to Interconnecting Trusted D<strong>at</strong>abase Management Systems, technicalpaper presented <strong>at</strong> the ACM Workshop on D<strong>at</strong>a Management Security and Privacy Standards,December 1992 , San Antonio, TX (Held in conjunction with the 8th IEEE Computer SecurityApplic<strong>at</strong>ions Conference) (co-author: H. Rubinovitz).5. Fuzzy Logic and Multilevel D<strong>at</strong>abases, presented <strong>at</strong> the 1st Boston Area Fuzzy Logic Workshop,February 1993.82
6. Towards a Global Multilevel D<strong>at</strong>a Model in a Secure Heterogeneous D<strong>at</strong>abase System, Presented <strong>at</strong>the TIMS/ORSA Conference, October 1993 (abstract in proceedings).7. Security and Integrity Constraint Processing in a Multilevel Secure Distributed Environment,Inform<strong>at</strong>ion Security for the 90s, AFCEA Conference, , May 1993, Ft. Monmouth, NJ (co-authors:A. Abreu, H. Rubinovitz, M. Collins).8. Technologies and Security Issues for the Semantic Web, D<strong>at</strong>a and Knowledge Engineering Workshop,May 2002, Sonoma, CA.9. Geosp<strong>at</strong>ial RDF and Secure GRDF, presented <strong>at</strong> the Geosp<strong>at</strong>ial Semantic Web workshop <strong>at</strong> SemanticWeb Symposium, Athens, GA, November 2006 (co-author: A. Ashraful).10. Building Trustworthy Geosp<strong>at</strong>ial Semantic Web, Geosp<strong>at</strong>ial Technologies in Homeland SecurityConference, November 2006, College St<strong>at</strong>ion, TX.11. Sensor and Geosp<strong>at</strong>ial D<strong>at</strong>a Management for Border P<strong>at</strong>rol and Crime Analysis, MITRE SensorCommunity Workshop, Poster Present<strong>at</strong>ion, May 2007, McLean, VA (co-authors: A. Ashraful, S.Shekar, K. Lhan, G. Subbiah).12. D<strong>at</strong>a Mining, Security and Privacy, Position Paper, NSF Workshop, September 2007, Arlington, VA.13. Security and Ontologies, Micros<strong>of</strong>t Workshop on Semantic Technologies, June 2007, Se<strong>at</strong>tle WA(co-author: K. Hamlen).14. Geosp<strong>at</strong>ial D<strong>at</strong>a Mining for Crime Analysis, Next Gener<strong>at</strong>ion D<strong>at</strong>a Mining Conference, October2007, Baltimore, MD (co-author: S. Shekhar et al).Distributed Systems Management/AI Applic<strong>at</strong>ions/Real-time Processing15. Transaction Management for Real-time Command and Control Systems, Paper distributed andpresented <strong>at</strong> ATMA, September 1996, Goa, India (co-author: P. Krupp, et al).16. RT-OMT: An Object-Oriented Design and Analysis Methodology for Real-time D<strong>at</strong>abase SystemsApplic<strong>at</strong>ions, Proceedings <strong>of</strong> the OOPSLA Conference Workshop on Object-Oriented Real-timeSystems Analysis, October 1994, Portland, OR (co-author: A. Schafer).17. Adaptable Real-time Command and Control Systems, Work in Progress Session, RTSS, 1998,Madrid, Spain (co-author: S. Wohlever et al) (paper in workshop report proceedings).IV. SIGNIFICANT EXTERNAL TECHNOLOGY EXCHANGE MEETINGS ANDPRESENTATIONS1. Algorithmic Inform<strong>at</strong>ion <strong>The</strong>ory, <strong>University</strong> <strong>of</strong> Minnesota, Seminar Series, February 1982.2. LDV: Design <strong>of</strong> a Secure D<strong>at</strong>abase System, RADC Technology Exchange, December 1987, Rome,NY.3. Trusted D<strong>at</strong>abase Management Systems: Where are we? Where should we go?, TechnologyExchange SPAWAR, Washington DC, February 1991, and NSA, March 1991, Ft. Meade, MD.83
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81: 44. Data Engineering Directions, IE
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH