Biometrics18. Implement<strong>at</strong>ion <strong>of</strong> Fingerprinting Algorithms, 2006 – 2007Abinanthan, Bhavani ThuraisinghamImplemented a novel fingerprinting m<strong>at</strong>ching algorithm and associ<strong>at</strong>ed system.19. Face Detection Algorithms, 2006 – 2007Parveen Pallabi and Bhavani ThuraisinghamDeveloped a system th<strong>at</strong> detects facial fe<strong>at</strong>ures using neural networks. <strong>The</strong> algorithm combines SVMand ANN and uses Dempster-Shafer theory for fusing the results.Social Networks and Security20. Design and Implement<strong>at</strong>ion <strong>of</strong> a Secure Social Network System, 2005 – 2006Ryan Layfield, Bhavani Thuraisingham, L<strong>at</strong>ifur KhanDeveloped a prototype secure social network system and analyzed the properties using the Enron d<strong>at</strong>aset.21. Access Control Model for Social Networks, 2009 – 2010Raymond We<strong>at</strong>herly, Mur<strong>at</strong> Kantarcioglu, Barbara Carmin<strong>at</strong>i, Elena FerrariPrototype developed for a system <strong>of</strong> a secure social network using a novel access control model.22. TweetHood, 2010 – PresentS<strong>at</strong>yen Abrol, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamLoc<strong>at</strong>ion-aware tweet mining.Cloud D<strong>at</strong>a Management and Security23. Feder<strong>at</strong>ed Query Processing in Clouds, 2008 – 2009Farhan Husain, Pankil Doshi, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamDeveloped a cloud computing pl<strong>at</strong>form with Hadoop and MapReduce and implemented securefeder<strong>at</strong>ed query processing and optimiz<strong>at</strong>ion algorithms on top <strong>of</strong> this pl<strong>at</strong>form.24. Secure Query Processing in Cloud with HIVE, 2009 – 2010Vaibhav Khadilkar, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamThis system is a query rewriting system th<strong>at</strong> will examine the XACML policies and implement queryprocessing in a cloud using Hadoop/MapReduce framework.25. SPARQL Query Optimizer, 2009 – 2010Farhan Husain, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamThis system is developing a SPARQL query optimizer for the Hadoop/MapReduce framework.26. Secure Query Processing in Cloud with Semantic Web D<strong>at</strong>a, 2009 – 2010Farhan Husain, L<strong>at</strong>ifur Khan, Bhavani ThuraisinghamThis system is a query rewriting system th<strong>at</strong> will examine the XACML policies and implement queryprocessing in a cloud with SPARQL, Hadoop/MapReduce framework. It uses the framework we havebuilt in the system discussed under the previous project. Two versions <strong>of</strong> the prototype have beendeveloped.27. Secure XACML Implement<strong>at</strong>ion with Hadoop, 2009 – PresentIn progress. This system essentially explores the Hadoop s<strong>of</strong>tware and incorpor<strong>at</strong>es XACML policybasedaccess control. It will be <strong>of</strong>fered as open source.Blackbook Enhancements and GOTS (Government Off the Shelf)96
1. Geosp<strong>at</strong>ial Proximity Algorithm, 2008 – 2009Sonia Chib, Bhavani Thuraisingham, Jyothsna Rachapalli, L<strong>at</strong>ifur KhanImplemented geosp<strong>at</strong>ial proximity algorithms using Google maps for Blackbook users.2. REST Interface and Integr<strong>at</strong>ion <strong>of</strong> Amazon.com Web Services into Blackbook, 2008 – 2009Pranav Parikh, Mur<strong>at</strong> Kantarcioglu, Bhavani ThuraisinghamImplemented the REST Interface to Blackbook. <strong>The</strong>n using this interface integr<strong>at</strong>ed Blackbook withAmazon.com webs services for query processing.3. MALLET/Blackbook Integr<strong>at</strong>ion, 2009 – 2010Pranav Parikh, Bhavani ThuraisinghamDeveloped a pr<strong>of</strong>essionaliz<strong>at</strong>ion service for the MALLET Machine learning algorithms and integr<strong>at</strong>edinto Blackbook.4. NIST NVD Ontology Management, 2009Jyothsna Rachapalli, Vaibhav Khadilkar, Bhavani Thuraisingham, NISTDeveloped an ontology based system for specifying the d<strong>at</strong>a in the NIST NVD D<strong>at</strong>abases.Open Source S<strong>of</strong>tware <strong>at</strong> <strong>The</strong> <strong>University</strong> <strong>of</strong> <strong>Texas</strong> <strong>at</strong> <strong>Dallas</strong>1. SCRUB toolhttp://scrub-tcpdump.sourceforge.net/index.phphttp://sourceforge.net/projects/scrub-tcpdump/2. JENA Contributions, Very Large RDF Graphshttp://jena.sourceforge.net/contrib/contributions.htmlhttp://cs.utdallas.edu/semanticweb/jenaextension.htmlTool Repositories developed and hosted <strong>at</strong> UTDD<strong>at</strong>a Mining Toolshttp://dml.utdallas.edu/Mehedy/Anonymiz<strong>at</strong>ion Toolshttp://cs.utdallas.edu/dspl/cgi-bin/toolbox/index.phpSemantic Web Toolshttp://cs.utdallas.edu/semanticweb/index.htmlSecure Cloud Repositoryhttp://cs.utdallas.edu/secure-cloud-repository/97
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24:
Current (2004 - Present)The Univers
- Page 25 and 26:
Object Databases (1 day course taug
- Page 27 and 28:
Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30:
Thesis Committees: Serving/served o
- Page 31 and 32:
Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34:
PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36:
3. CIA: As manager of fifteen resea
- Page 37 and 38:
15. Multilevel Security Issues in D
- Page 39 and 40:
48. E-Mail Worm Detection Using Dat
- Page 41 and 42:
79. Information Demands Drive Data
- Page 43 and 44:
2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73 and 74: 14. Concurrency Control in Real-tim
- Page 75 and 76: 17. Data Management Systems Evoluti
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95: Simulated algorithms for informatio
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126: NSF Grants to Help Create Next-Gene
- Page 127: SECTION 21. CYBER SECURITY RESEARCH