4. Multilevel Security for Multimedia Systems, Technology Exchange SPAWAR, February 1991,Washington, DC, (co-presenters: H. Rubinovitz and M. Collins).5. Towards Developing SDDT: A Secure Distributed D<strong>at</strong>abase Testbed System, presented <strong>at</strong> the RomeLabor<strong>at</strong>ory Technology Exchange Meeting, November 1991, Rome, NY.6. Inference Problem in Secure D<strong>at</strong>abases, <strong>University</strong> <strong>of</strong> Connecticut, April 1992.7. Multilevel Security Impact on D<strong>at</strong>abase Management Systems Interface Standards, presented to theNext Gener<strong>at</strong>ion Computer Systems D<strong>at</strong>abase Management Systems Interface Standards WorkingGroup, , Newport, RI, June 1992 (co-presenter: A. Carengelo).8. Approaches to Designing Secure D<strong>at</strong>abase Systems, NGCR (Navy Next Gener<strong>at</strong>ion ComputingResources) Meeting, August 1992, San Diego, CA.9. Towards a Multilevel D<strong>at</strong>a Model, NGCR (Navy Next Gener<strong>at</strong>ion Computing Resources) Meeting,October 1992, Orlando, FL.10. Present<strong>at</strong>ions on Multilevel Security for Object-Oriented D<strong>at</strong>abase Systems; Security and IntegrityConstraint Processing in a Multilevel Secure Distributed Environment ; Applying OMT forMultilevel D<strong>at</strong>abase Applic<strong>at</strong>ion Design ; NSA Technology Exchange Conference, July 27, 1993, Ft.Meade, MD, (Proceedings) (co-authors: H. Rubinovitz, M. Collins, L. Binns, P. Sell).11. Transaction Processing for MDDS: Developments and Directions; Massive Digital D<strong>at</strong>a SystemsWorkshop (Community Management Staff) February 1 and 2, 1994, Reston, VA.12. RT-OMT: A Realtime Object Modeling Technique for Designing Real-time D<strong>at</strong>abase Applic<strong>at</strong>ions,presented to the Next Gener<strong>at</strong>ion Computer Systems D<strong>at</strong>abase Management Systems InterfaceStandards Working Group, April 1994, Alexandria, VA (also presented to OMG in Helsinki, July1998).13. Real-time Processing and CORBA, presented <strong>at</strong> the Next Gener<strong>at</strong>ion Computer Systems, D<strong>at</strong>abaseManagement Systems Interface Standards Working Group, June 1994, Newport, RI; a version givenas a guest present<strong>at</strong>ion <strong>at</strong> the Department <strong>of</strong> the Navy NRaD's Distributed Systems TechnologyConference, March 1995 (San Diego).14. Evolvable Real-time C3 Systems Initi<strong>at</strong>ive, Navy SPAWAR, San Diego, August 1994; RomeLabor<strong>at</strong>ory Technology Exchange Meeting, Rome, NY, October 1994; NGCR Meeting, Salt LakeCity, November 1994; enhanced versions <strong>at</strong> Ministry <strong>of</strong> Defense, Adelaide-Australia 1996; INRIA,Sophia Antipolis-France, November 1996; <strong>University</strong> <strong>of</strong> Kyoto, April 1997; EPFL Lausanne-Switzerland, May 1998; N<strong>at</strong>ional <strong>University</strong> <strong>of</strong> Singapore, May 1999.15. Massive Digital D<strong>at</strong>a Systems, Rome Lab Workshop, Boston, October 1995; INRIA, Paris-FranceNovember 1996; NEC Research Labs, San Jose, April 1997; HPCC, Maui, May 1998; <strong>University</strong> <strong>of</strong>Rhode Island, June 1996; N<strong>at</strong>ional <strong>University</strong> <strong>of</strong> Singapore, August 1997; Tokyo Institute <strong>of</strong>Technology, May 1999; Hiroshima <strong>University</strong>, April 1998.16. Real-time D<strong>at</strong>abase Management: IEEE Computer Society, Special Present<strong>at</strong>ion, Boston ChapterJanuary 1996; version also given in Madrid, Spain <strong>at</strong> OMG Meeting, July 1996.17. Internet D<strong>at</strong>abase Management, OMG Meeting, Internet SIG, June 1996, Washington DC.18. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining and Security (version <strong>of</strong> IFIP 1996 keynote), seminars <strong>at</strong> IBMZurich and <strong>University</strong> <strong>of</strong> Zurich (Switzerland), 1996.84
19. Object Technology for C4I Applic<strong>at</strong>ions, kick<strong>of</strong>f present<strong>at</strong>ion <strong>at</strong> OMG Meeting C4I FoundingWorking Group, June 1996, Washington DC.20. Real-time Object Modeling, OMG Meeting, July 1998, Helsinki.21. D<strong>at</strong>a Mining, <strong>University</strong> <strong>of</strong> Cambridge, 1999, <strong>University</strong> <strong>of</strong> Stockholm 1999, IEEE Lecture <strong>at</strong> MIT2000, <strong>University</strong> <strong>of</strong> Wales, UK, 2001.22. Directions for Securing Semantic Web Technologies, NSF-EU Workshop on Semantic Web (SophiaAntipolis, France), October 2001. Also version presented <strong>at</strong> NSF workshop on Semantic Web, March2002, Amicalola, GA.23. Research Directions in D<strong>at</strong>a Management, NSF EPSCOR Conference, <strong>University</strong> <strong>of</strong> Arkansas(November 2001, Little Rock), Louisiana St<strong>at</strong>e <strong>University</strong> (April 2002, B<strong>at</strong>on Rouge).24. Seminars on D<strong>at</strong>a and Applic<strong>at</strong>ions Security and XML Security, Wright St<strong>at</strong>e <strong>University</strong>, February2003; <strong>University</strong> <strong>of</strong> Illinois, Urbana, Champagne, April 2003; George Mason <strong>University</strong>, April 2003;<strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>, November 2003; <strong>University</strong> <strong>of</strong> Minnesota, December 2003.25. Directions for Research in D<strong>at</strong>a and Applic<strong>at</strong>ions Security and CyberTrust, New England D<strong>at</strong>abaseMeeting, September 2003.26. D<strong>at</strong>a and Applic<strong>at</strong>ions Security and Discovery Inform<strong>at</strong>ics, Seminar series kick<strong>of</strong>f present<strong>at</strong>ion, JohnsHopkins <strong>University</strong>, October 2003.27. Computer and Inform<strong>at</strong>ion Science <strong>at</strong> NSF, NSF EPSCOR Conference, <strong>University</strong> <strong>of</strong> Oklahoma,January 2004.28. Third Party Public<strong>at</strong>ions <strong>of</strong> XML Documents, Seminar series, Ohio St<strong>at</strong>e <strong>University</strong>, January 2004;<strong>University</strong> <strong>of</strong> California <strong>at</strong> Riverside January 2004; Penn St<strong>at</strong>e <strong>University</strong>, April 2004; <strong>The</strong> MITRECorpor<strong>at</strong>ion, March 2005.29. D<strong>at</strong>a Mining for Security Applic<strong>at</strong>ions, Plano Security Symposium, April 2005, Plano, TX.30. D<strong>at</strong>a Mining for Counter-terrorism, IEEE <strong>Dallas</strong> Chapter Present<strong>at</strong>ion, February 2005, <strong>Dallas</strong>, TX.31. D<strong>at</strong>a Mining for Cyber Security, ACM <strong>Dallas</strong> Chapter Present<strong>at</strong>ion, April 2005, <strong>Dallas</strong>, TX.32. D<strong>at</strong>a Mining, Security and Civil Liberties, present<strong>at</strong>ion to N<strong>at</strong>ional White Collar Crime Center, June2005, TX.33. Confidentiality, Privacy and Trust for the Semantic Web, <strong>The</strong> MITRE Corpor<strong>at</strong>ion, November 2005.Bedford, MA.34. D<strong>at</strong>a Security Research <strong>at</strong> UTD, Raytheon Corpor<strong>at</strong>ion, January 2006, Richardson, TX.35. D<strong>at</strong>a Mining for Security and Counter-terrorism, CIA Seminar Series, May 2006 (CIAHeadquarters)VA.36. Inform<strong>at</strong>ion Oper<strong>at</strong>ions: Assured Inform<strong>at</strong>ion Sharing, AFOSR Technology Exchange Conference,August 2006, Utica, NY; June 2007, Syracuse, NY; June 2008, Washington DC.37. Intellectual Property Protection, NAFTA Meeting, December 2006, <strong>Dallas</strong>, TX.85
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83: 6. Towards a Global Multilevel Data
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH