Section 14. SOFTWARE PROTOTYPES DEVELOPEDControl D<strong>at</strong>a Corpor<strong>at</strong>ionCDCNET, 1983 – 1986Transport, Session and Network Layers as well as Memory Management Algorithms and CommandProcessors for CDCNET. Release 1 December 1985Approx 60 members in the CDCNET TeamHoneywell Inc.1. Lock D<strong>at</strong>a Views, 1986 – 1988Paul Stachour, Bhavani Thuraisingham, P<strong>at</strong> Dwyer, Emmanuel Onuegbe, Tom Haigh, Dick O’BrienDesigned a Multilevel Secure Rel<strong>at</strong>ional D<strong>at</strong>abase System Design Contract from RADC(implement<strong>at</strong>ion contract was awarded to Honeywell using Oracle in 1989, but I did not work on this.)2. Distributed D<strong>at</strong>a Dictionary System, 1986 – 1987Krishna Mikkilineni, Hongjun Lu, Bhavani Thuraisingham, Cho-Li HoDesigned and implemented a system for Honeywell Divisions using NIST IRDS System.3. Network Oper<strong>at</strong>ing System, 1987Bhavani Thuraisingham, Tammy Chan, P<strong>at</strong> GoniaDesigned a Network Oper<strong>at</strong>ing System as part <strong>of</strong> MCNIU network for NASA (implement<strong>at</strong>ioncontract was also awarded, but I did not work on this.)4. XIMKON, 1988 – 1989Ferit Konar, Paul Felix, Bhavani ThuraisinghamDesigned and implemented an expert process control system.<strong>The</strong> MITRE Corpor<strong>at</strong>ionSecure D<strong>at</strong>a Management1. Multilevel Secure D<strong>at</strong>a Management System, 1989Amiel Kamon, Bhavani ThuraisingjamPrototype system developed using Sybase for the backend system and SUN Unix for front-end.Security <strong>at</strong> the front-end was simul<strong>at</strong>ed.2. Inference Control during Query Processing, 1989 – 1990William Ford, Bhavani Thuraisingham, Jon<strong>at</strong>han O’KeeffeSecure Sybase running on Ultrix for MLS/DBMS and built inference controller for query processingas an applic<strong>at</strong>ion.3. Inference Control during Upd<strong>at</strong>e Processing,1990Marie Collins, Bhavani ThuraisinghamSecure Sybase running on Ultrix for MLS/DBMS and built inference controller for upd<strong>at</strong>e processingwas built as an applic<strong>at</strong>ion.4. Inference Control during D<strong>at</strong>abase Design, 1993 – 1994Marie Collins, Bhavani ThuraisinghamUsed CLIPS expert system and implemented in COOL.92
5. Secure Distributed Query Processing, 1989 – 1991Harvey Rubinovitz, Bhavani ThuraisinghamBuilt Secure Distributed Processor DQP th<strong>at</strong> connected multiple Secure Sybase Server running onUltrix oper<strong>at</strong>ing system.6. Simul<strong>at</strong>ion <strong>of</strong> Secure Transaction Processing, 1990 – 1992Harvey Rubinovitz and Bhavani ThuraisinghamSimul<strong>at</strong>ion tool was developed to simul<strong>at</strong>e multiple secure concurrency control algorithms andcompare performance.7. Multilevel Secure Multimedia System, 1990 – 1991Marie Collins, Harvey Rubinovitz and Bhavani ThuraisinghamImplemented a multilevel multimedia system on the MAC environment. Simul<strong>at</strong>ed security fe<strong>at</strong>uresfor text image, audio, anim<strong>at</strong>ion and video.8. Multilevel Secure Object System, 1991Harvey Rubinovitz and Bhavani ThuraisinghamSimul<strong>at</strong>ed security fe<strong>at</strong>ures for Object Store Object DBMS. Implement<strong>at</strong>ion in C++.9. Distributed Secure Query Constraint Processor, 1991 – 1993Harvey Rubinovitz, Bhavani Thuraisingham, David FotiUtilized the DQP and built a distributed inference controller for query processing. Utilized SecureSybase Server on Ultrix.10. Distributed Secure Upd<strong>at</strong>e Constraint processor, 1992 – 1993Harvey Urbanity and Bhavani ThuraisinghamUtilized the Distributed Upd<strong>at</strong>e Processor and built an Inference Controller for processing upd<strong>at</strong>es,1991 – 1993.11. Secure Distributed Processor for Army Applic<strong>at</strong>ions, 1994 – 1996Harvey Rubinovitz, Marie Collins and Bhavani Thuraisingham,Implemented a system with Army MCS applic<strong>at</strong>ion utilizing the distributed constraint processor .Real-time Infrastructure and D<strong>at</strong>a Manager12. Active Real-time D<strong>at</strong>a Manager, 1994Gary Gengo, Bhavani ThuraisinghamUsing ZIP-RTDBMS, built a rule processor for processing rules in real-time.13. Infrastructure for Real-time Applic<strong>at</strong>ions, 1994 – 1996Peter Krupp, Bhavani Thuraisingham, John Maurer, Mike SquadritoDeveloped an ORB-based infrastructure on Lynx oper<strong>at</strong>ing system for command and controlapplic<strong>at</strong>ions with AWACS as an example.14. Real-time Main Memory D<strong>at</strong>a Manager, 1995 – 1996Mike Squadrito, Victor Wolfe, Bhavani Thuraisingham, Peter KruppDeveloped a main memory d<strong>at</strong>a manager and concurrency control algorithms for real-timeapplic<strong>at</strong>ions hosted on the infrastructure.15. Adaptive Real-time Infrastructure, 1997 – 1999Mike Squadrito, Roman Ginis, Peter Krupp, Bhavani ThuraisinghamDesigned and implemented an adaptive component based infrastructure for real-time applic<strong>at</strong>ions.93
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91: VIII. The University of Texas at Da
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH