Bhavani Thuraisingham

Bhavani Thuraisingham joined The University of Texas at Dallas (UTD) in October 2004 as a Professor of Computer Science and Director of the Cyber Security Research Center in the Erik Jonsson School of Engineering and Computer Science. She is an elected Fellow of three professional organizations: the IEEE (Institute for Electrical and Electronics Engineers), the AAAS (American Association for the Advancement of Science) and the BCS (British Computer Society) for her work in data security. She received the IEEE Computer Society’s prestigious 1997 Technical Achievement Award for “outstanding and innovative contributions to secure data management.” Prior to joining UTD, Dr. Thuraisingham was an IPA (Intergovernmental Personnel Act) at the National Science Foundation (NSF) in Arlington VA, from the MITRE Corporation. At NSF she established the Data and Applications Security Program and co-founded the Cyber Trust theme. She worked at MITRE in Bedford, MA between January 1989 and September 2001 first in the Information Security Center and was later a department head in Data and Information Management. Dr. Thuraisingham’s work in information security and information management has resulted in over 80 journal articles, over 200 refereed conference papers and workshops, and three US patents. She is the author of nine books in data management, data mining and data security and has given over 60 keynote addresses. Dr. Thuraisingham was educated in the United Kingdom both at the University of Bristol and at the University of Wales.

Publications

Foreword
Bhavani Thuraisingham. © 2012. 2 pages.
This Foreword is included in the book Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards.
Security Issues for Cloud Computing
Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham. © 2012. 13 pages.
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage...
Policy Enforcement System for Inter-Organizational Data Sharing
Mamoun Awad, Latifur Khan, Bhavani Thuraisingham. © 2012. 17 pages.
Sharing data among organizations plays an important role in security and data mining. In this paper, the authors describe a Data Sharing Miner and Analyzer (DASMA) system that...
Enhancing Security Modeling for Web Services Using Delegation and Pass-On
Wei She, I-Ling Yen, Bhavani Thuraisingham. © 2012. 22 pages.
In recent years, security issues in web service environments have been widely studied and various security standards and models have been proposed. However, most of these...
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries
Bhavani Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan. © 2011. 27 pages.
In this chapter we have designed and developed a framework for sharing data in an assured manner in case of emergencies. We focus especially on a need to share environment. It is...
Foreword
Bhavani Thuraisingham. © 2010. 2 pages.
This Foreword is included in the book Web Services Security Development and Architecture: Theoretical and Practical Issues.
Enhancing Security Modeling for Web Services Using Delegation and Pass-On
Wei She, I-Ling Yen, Bhavani Thuraisingham. © 2010. 21 pages.
In recent years, security issues in web service environments have been widely studied and various security standards and models have been proposed. However, most of these...
Security Issues for Cloud Computing
Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham. © 2010. 13 pages.
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage...
Policy Enforcement System for Inter-Organizational Data Sharing
Mamoun Awad, Latifur Khan, Bhavani Thuraisingham. © 2010. 18 pages.
Sharing data among organizations plays an important role in security and data mining. In this paper, the authors describe a Data Sharing Miner and Analyzer (DASMA) system that...
Homeland Security Data Mining and Link Analysis
Bhavani Thuraisingham. © 2009. 5 pages.
Data mining is the process of posing queries to large quantities of data and extracting information often previously unknown using mathematical, statistical, and machine-learning...
Email Worm Detection Using Data Mining
Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham. © 2009. 15 pages.
This chapter applies data mining techniques to detect email worms. Email messages contain a number of different features such as the total number of words in message...
Administering the Semantic Web: Confidentiality, Privacy and Trust Management
Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam. © 2009. 16 pages.
The Semantic Web is essentially a collection of technologies to support machine understandable Web pages as well as Information Interoperability. There has been much progress...
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries
Bhavani Thuraisingham, Yashaswini Harsha Kumar, Latifur Khan. © 2008. 24 pages.
In this article we have designed and developed a framework for sharing data in an assured manner in case of emergencies. We focus especially on a need to share environment. It is...
Privacy-Preserving Data Mining: Development and Directions
Bhavani Thuraisingham. © 2008. 12 pages.
This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In...
E-Mail Worm Detection Using Data Mining
Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham. © 2008. 15 pages.
This work applies data mining techniques to detect e-mail worms. E-mail messages contain a number of different features such as the total number of words in message body/subject...
Homeland Security Data Mining and Link Analysis
Bhavani Thuraisingham. © 2008. 6 pages.
Data mining is the process of posing queries to large quantities of data and extracting information often previously unknown using mathematical, statistical, and machine-learning...
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management
Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam. © 2008. 17 pages.
The Semantic Web is essentially a collection of technologies to support machine-understandable Web pages as well as Information Interoperability. There has been much progress...
Privacy-Preserving Data Mining: Development and Directions
Bhavani Thuraisingham. © 2008. 12 pages.
This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In...
Secure Semantic Grids
Bhavani Thuraisingham, Latifur Khan. © 2008. 13 pages.
This chapter first describes the developments in semantic grids and then discusses the security aspects. Semantic grids integrate Semantic Web and grid technologies. They also...
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management
Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam. © 2007. 17 pages.
The Semantic Web is essentially a collection of technologies to support machine-understandable Web pages as well as Information Interoperability. There has been much progress...
E-Mail Worm Detection Using Data Mining
Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham. © 2007. 15 pages.
This work applies data mining techniques to detect e-mail worms. E-mail messages contain a number of different features such as the total number of words in message body/subject...
Web and Information Security
Elena Ferrari, Bhavani Thuraisingham. © 2006. 318 pages.
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information...
Secure Semantic Grids
Bhavani Thuraisingham. © 2006. 21 pages.
This chapter first describes the developments in semantic grids and then discusses the security aspects. Semantic grids integrate Semantic Web and grid technologies. They also...
Privacy-Preserving Data Mining: Development and Directions
Bhavani Thuraisingham. © 2005. 13 pages.
This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In...
Homeland Security Data Mining and Link Analysis
Bhavani Thuraisingham. © 2005. 4 pages.
Data mining is the process of posing queries to large quantities of data and extracting information often previously unknown using mathematical, statistical, and machine-learning...