2009 |
180 | EE | Bhavani M. Thuraisingham:
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners.
ASIACCS 2009: 2 |
179 | EE | Li Liu,
Murat Kantarcioglu,
Bhavani M. Thuraisingham:
Privacy Preserving Decision Tree Mining from Perturbed Data.
HICSS 2009: 1-10 |
178 | EE | Bhavani M. Thuraisingham,
Latifur Khan,
Murat Kantarcioglu,
Sonia Chib,
Jiawei Han,
Sang Son:
Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis.
HICSS 2009: 1-12 |
177 | EE | Bhavani M. Thuraisingham,
Murat Kantarcioglu,
Latifur Khan:
Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
PAISI 2009: 1 |
176 | EE | Mohammad M. Masud,
Jing Gao,
Latifur Khan,
Jiawei Han,
Bhavani M. Thuraisingham:
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams.
PAKDD 2009: 363-375 |
175 | EE | Sunitha Ramanujam,
Anubha Gupta,
Latifur Khan,
Steven Seida,
Bhavani M. Thuraisingham:
Relationalizing RDF stores for tools reusability.
WWW 2009: 1059-1060 |
174 | EE | Jack Lindamood,
Raymond Heatherly,
Murat Kantarcioglu,
Bhavani M. Thuraisingham:
Inferring private information using social network data.
WWW 2009: 1145-1146 |
2008 |
173 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
ARES 2008: 237-244 |
172 | EE | Steve Barker,
David Chadwick,
Jason Crampton,
Emil Lupu,
Bhavani M. Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?.
DBSec 2008: 219-221 |
171 | EE | Gregory S. Lee,
Bhavani M. Thuraisingham:
Differences in Fitts' Law Task Performance Based on Environment Scaling.
EuroHaptics 2008: 295-300 |
170 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Financial Cryptography 2008: 323-324 |
169 | EE | Jeffrey Partyka,
Neda Alipanah,
Latifur Khan,
Bhavani M. Thuraisingham,
Shashi Shekhar:
Content-based ontology matching for GIS datasets.
GIS 2008: 51 |
168 | EE | Yunqi Ye,
I-Ling Yen,
Liangliang Xiao,
Bhavani M. Thuraisingham:
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems.
HASE 2008: 383-391 |
167 | EE | Bhavani M. Thuraisingham,
Barbara Carminati:
Message from the SSW'08 organizers.
ICDE Workshops 2008: 445 |
166 | EE | Ashraful Alam,
Latifur Khan,
Bhavani M. Thuraisingham:
Geospatial Resource Description Framework (GRDF) and security constructs.
ICDE Workshops 2008: 475-481 |
165 | EE | Mohammad M. Masud,
Jing Gao,
Latifur Khan,
Jiawei Han,
Bhavani M. Thuraisingham:
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data.
ICDM 2008: 929-934 |
164 | EE | Wei She,
I-Ling Yen,
Bhavani M. Thuraisingham:
Enhancing Security Modeling for Web Services Using Delegation and Pass-On.
ICWS 2008: 545-552 |
163 | EE | Mohammad M. Masud,
Latifur Khan,
Bhavani M. Thuraisingham,
Xinran Wang,
Peng Liu,
Sencun Zhu:
Detecting Remote Exploits Using Data Mining.
IFIP Int. Conf. Digital Forensics 2008: 177-189 |
162 | EE | Bhavani M. Thuraisingham:
Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic.
ISI 2008 |
161 | EE | Ryan Layfield,
Murat Kantarcioglu,
Bhavani M. Thuraisingham:
Simulating bioterrorism through epidemiology approximation.
ISI 2008: 82-87 |
160 | EE | Vana Kalogeraki,
Dimitrios Gunopulos,
Ravi S. Sandhu,
Bhavani M. Thuraisingham:
QoS Aware Dependable Distributed Stream Processing.
ISORC 2008: 69-75 |
159 | EE | Jeffrey Partyka,
Neda Alipanah,
Latifur Khan,
Bhavani M. Thuraisingham,
Shashi Shekhar:
Ontology Alignment Using Multiple Contexts.
International Semantic Web Conference (Posters & Demos) 2008 |
158 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
The SCRUB security data sharing infrastructure.
NOMS 2008: 630-644 |
157 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data.
NOMS 2008: 991-994 |
156 | EE | Timothy W. Finin,
Anupam Joshi,
Lalana Kagal,
Jianwei Niu,
Ravi S. Sandhu,
William H. Winsborough,
Bhavani M. Thuraisingham:
ROWLBAC: representing role based access control in OWL.
SACMAT 2008: 73-82 |
155 | EE | Elisa Bertino,
Bhavani M. Thuraisingham,
Michael Gertz,
Maria Luisa Damiani:
Security and privacy for geospatial data: concepts and research directions.
SPRINGL 2008: 6-19 |
154 | EE | Lei Wang,
Latifur Khan,
Bhavani M. Thuraisingham:
An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification.
Web Intelligence 2008: 797-801 |
153 | EE | Bhavani M. Thuraisingham:
On the Complexity of the Privacy Problem in Databases.
Data Mining: Foundations and Practice 2008: 353-374 |
152 | EE | Bhavani M. Thuraisingham,
Latifur Khan,
Ganesh Subbiah,
Ashraful Alam,
Murat Kantarcioglu:
Geospatial Semantic Web, Definition.
Encyclopedia of GIS 2008: 398 |
151 | EE | Bhavani M. Thuraisingham,
Latifur Khan,
Ganesh Subbiah,
Ashraful Alam,
Murat Kantarcioglu:
Privacy and Security Challenges in GIS.
Encyclopedia of GIS 2008: 898-902 |
150 | EE | Bhavani M. Thuraisingham:
Assured Information Sharing: Technologies, Challenges and Directions.
Intelligence and Security Informatics 2008: 1-15 |
149 | EE | Bhavani M. Thuraisingham,
B. Prabhakaran,
Latifur Khan,
Lei Wang:
Managing and Mining Multimedia Data, Animations and Annotations.
Wiley Encyclopedia of Computer Science and Engineering 2008 |
148 | EE | Li Liu,
Murat Kantarcioglu,
Bhavani M. Thuraisingham:
The applicability of the perturbation based privacy preserving data mining for real-world data.
Data Knowl. Eng. 65(1): 5-21 (2008) |
147 | EE | Pavan Kumar Chitumalla,
Douglas Harris,
Bhavani M. Thuraisingham,
Latifur Khan:
Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing.
IEEE Internet Computing 12(1): 38-44 (2008) |
146 | EE | Mohammad M. Masud,
Latifur Khan,
Bhavani M. Thuraisingham:
A scalable multi-level feature extraction technique to detect malicious executables.
Information Systems Frontiers 10(1): 33-45 (2008) |
145 | EE | Mamoun Awad,
Latifur Khan,
Bhavani M. Thuraisingham:
Predicting WWW surfing using multiple evidence combination.
VLDB J. 17(3): 401-417 (2008) |
2007 |
144 | | Volkmar Lotz,
Bhavani M. Thuraisingham:
SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings
ACM 2007 |
143 | EE | Nathalie Tsybulnik,
Kevin W. Hamlen,
Bhavani M. Thuraisingham:
Centralized Security Labels in Decentralized P2P Networks.
ACSAC 2007: 315-324 |
142 | EE | Abinandhan Chandrasekaran,
Bhavani M. Thuraisingham:
Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances.
ARES 2007: 273-280 |
141 | EE | Bhavani M. Thuraisingham,
Srinivasan Iyer:
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse.
ARES 2007: 821-828 |
140 | EE | Kevin W. Hamlen,
Bhavani M. Thuraisingham:
Secure peer-to-peer networks for trusted collaboration.
CollaborateCom 2007: 58-63 |
139 | EE | Ryan Layfield,
Murat Kantarcioglu,
Bhavani M. Thuraisingham:
Enforcing Honesty in Assured Information Sharing Within a Distributed System.
DBSec 2007: 113-128 |
138 | EE | Ganesh Subbiah,
Ashraful Alam,
Latifur Khan,
Bhavani M. Thuraisingham:
Geospatial data qualities as web services performance metrics.
GIS 2007: 66 |
137 | EE | Ashraful Alam,
Ganesh Subbiah,
Latifur Khan,
Bhavani M. Thuraisingham:
DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework.
GeoS 2007: 268-277 |
136 | EE | Wei She,
Bhavani M. Thuraisingham,
I-Ling Yen:
Delegation-Based Security Model for Web Services.
HASE 2007: 82-91 |
135 | EE | Mohammad M. Masud,
Latifur Khan,
Bhavani M. Thuraisingham:
A Hybrid Model to Detect Malicious Executables.
ICC 2007: 1443-1448 |
134 | EE | Chuanjun Li,
Latifur Khan,
Bhavani M. Thuraisingham,
M. Husain,
Shaofei Chen,
Fang Qiu:
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
ISI 2007: 254-261 |
133 | EE | Jungin Kim,
Bhavani M. Thuraisingham:
Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON.
ISORC 2007: 146-155 |
132 | EE | Bhavani M. Thuraisingham:
Multimedia systems security.
MM&Sec 2007: 1-2 |
131 | EE | Ebru Celikel,
Murat Kantarcioglu,
Bhavani M. Thuraisingham,
Elisa Bertino:
Managing Risks in RBAC Employed Distributed Environments.
OTM Conferences (2) 2007: 1548-1566 |
130 | EE | Mohammad M. Masud,
Latifur Khan,
Bhavani M. Thuraisingham:
Feature Based Techniques for Auto-Detection of Novel Email Worms.
PAKDD 2007: 205-216 |
129 | EE | Bhavani M. Thuraisingham:
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web.
POLICY 2007: 8-11 |
128 | EE | Anna Cinzia Squicciarini,
Elisa Bertino,
Elena Ferrari,
Federica Paci,
Bhavani M. Thuraisingham:
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
127 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR abs/0710.3979: (2007) |
126 | EE | Bhavani M. Thuraisingham,
Murat Kantarcioglu,
Srinivasan Iyer:
Extended RBAC-based design and implementation for a secure data warehouse.
IJBIDM 2(4): 367-382 (2007) |
125 | EE | Wei She,
Bhavani M. Thuraisingham:
Security for Enterprise Resource Planning Systems.
Information Systems Security 16(3): 152-163 (2007) |
124 | EE | Bhavani M. Thuraisingham:
Security and privacy for multimedia database management systems.
Multimedia Tools Appl. 33(1): 13-29 (2007) |
123 | EE | Gal Lavee,
Latifur Khan,
Bhavani M. Thuraisingham:
A framework for a video analysis tool for suspicious event detection.
Multimedia Tools Appl. 35(1): 109-123 (2007) |
122 | EE | Latifur Khan,
Mamoun Awad,
Bhavani M. Thuraisingham:
A new intrusion detection system using support vector machines and hierarchical clustering.
VLDB J. 16(4): 507-521 (2007) |
2006 |
121 | | Sharad Mehrotra,
Daniel Dajun Zeng,
Hsinchun Chen,
Bhavani M. Thuraisingham,
Fei-Yue Wang:
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings
Springer 2006 |
120 | EE | Muhammad Abedin,
Syeda Nessa,
Latifur Khan,
Bhavani M. Thuraisingham:
Detection and Resolution of Anomalies in Firewall Policy Rules.
DBSec 2006: 15-29 |
119 | EE | Li Liu,
Bhavani M. Thuraisingham:
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data.
ICDM Workshops 2006: 507-512 |
118 | EE | Pallabi Parveen,
Bhavani M. Thuraisingham:
Face Recognition Using Multiple Classifiers.
ICTAI 2006: 179-186 |
117 | EE | Jungin Kim,
Bhavani M. Thuraisingham:
Dependable and Secure TMO Scheme.
ISORC 2006: 133-140 |
116 | EE | Bhavani M. Thuraisingham:
Data Mining for Surveillance Applications.
PAKDD 2006: 12-14 |
115 | EE | Bhavani M. Thuraisingham,
Gal Lavee,
Elisa Bertino,
Jianping Fan,
Latifur Khan:
Access control, confidentiality and privacy for video surveillance databases.
SACMAT 2006: 1-10 |
114 | EE | Ernesto Damiani,
Alban Gabillon,
Anne Anderson,
David Staggs,
Bhavani M. Thuraisingham,
Marianne Winslett:
Directions and trends of XML and web service security.
SWS 2006: 1-2 |
113 | EE | Ashraful Alam,
Ganesh Subbiah,
Bhavani M. Thuraisingham,
Latifur Khan:
Reasoning with semantics-aware access control policies for geospatial web services.
SWS 2006: 69-76 |
112 | EE | Bhavani M. Thuraisingham:
Data Mining for Security Applications.
WISI 2006: 1-3 |
111 | | Barbara Carminati,
Elena Ferrari,
Bhavani M. Thuraisingham:
Access control for web data: models and policy languages.
Annales des Télécommunications 61(3-4): 245-266 (2006) |
110 | EE | Elisa Bertino,
L. R. Khan,
Ravi S. Sandhu,
Bhavani M. Thuraisingham:
Secure knowledge management: confidentiality, trust, and privacy.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006) |
109 | EE | Elena Ferrari,
Bhavani M. Thuraisingham:
Guest editorial: special issue on privacy preserving data management.
VLDB J. 15(4): 291-292 (2006) |
2005 |
108 | EE | Bhavani M. Thuraisingham:
Trust Management in a Distributed Environment.
COMPSAC (1) 2005: 561-562 |
107 | EE | Guang-Lei Song,
Kang Zhang,
Bhavani M. Thuraisingham,
Jun Kong:
Secure Model Management Operations for the Web.
DBSec 2005: 237-251 |
106 | EE | Inja Youn,
Csilla Farkas,
Bhavani M. Thuraisingham:
Multilevel Secure Teleconferencing over Public Switched Telephone Network.
DBSec 2005: 99-113 |
105 | EE | Guang-Lei Song,
Kang Zhang,
Bhavani M. Thuraisingham,
Jiannong Cao:
Towards Access Control for Visual Web Model Management.
EEE 2005: 722-727 |
104 | EE | Bhavani M. Thuraisingham,
Latifur Khan,
Chris Clifton,
John A. Maurer,
Marion G. Ceruti:
Dependable Real-Time Data Mining.
ISORC 2005: 158-165 |
103 | EE | Bhavani M. Thuraisingham:
Directions for security and privacy for semantic e-business applications.
Commun. ACM 48(12): 71-73 (2005) |
102 | EE | Bhavani M. Thuraisingham:
Privacy constraint processing in a privacy-enhanced database management system.
Data Knowl. Eng. 55(2): 159-188 (2005) |
101 | EE | Bhavani M. Thuraisingham:
Privacy-Preserving Data Mining: Development and Directions.
J. Database Manag. 16(1): 75-87 (2005) |
2004 |
100 | EE | Barbara Carminati,
Elena Ferrari,
Bhavani M. Thuraisingham:
Using RDF for Policy Specification and Enforcement.
DEXA Workshops 2004: 163-167 |
99 | EE | Elena Ferrari,
Bhavani M. Thuraisingham:
Security and Privacy for Web Databases and Services.
EDBT 2004: 17-28 |
98 | EE | Minos N. Garofalakis,
Ioana Manolescu,
Marco Mesiti,
George A. Mihaila,
Ralf Schenkel,
Bhavani M. Thuraisingham,
Vasilis Vassalos:
What's Next in XML and Databases?
EDBT Workshops 2004: 318-324 |
97 | EE | Elisa Bertino,
Barbara Carminati,
Elena Ferrari,
Bhavani M. Thuraisingham,
Amar Gupta:
Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) |
96 | EE | Bhavani M. Thuraisingham:
Managing and Mining Multimedia Databases.
International Journal on Artificial Intelligence Tools 13(3): 739- (2004) |
95 | EE | Bhavani M. Thuraisingham:
Editorial.
J. Intell. Inf. Syst. 23(3): 207-208 (2004) |
2003 |
94 | EE | Bhavani M. Thuraisingham:
Security Issues for the Semantic Web.
COMPSAC 2003: 632-637 |
93 | | Bhavani M. Thuraisingham:
Data and Applications Security: Past, Present and the Future.
DBSec 2003: 375-390 |
92 | EE | Bhavani M. Thuraisingham:
Dependable Computing for National Security.
ISADS 2003: 333- |
91 | EE | Bhavani M. Thuraisingham:
Data Mining and Cyber Security.
QSIC 2003: 2- |
90 | EE | Bhavani M. Thuraisingham:
Dependable Infrastructures and Data Managers for Sensor Networks.
WORDS Fall 2003: 11- |
2002 |
89 | EE | Bhavani M. Thuraisingham,
Elena Ferrari:
Web and Information Security: Workshop Summary.
COMPSAC 2002: 933 |
88 | EE | Bhavani M. Thuraisingham:
Data and Applications Security: Developments and Directions.
COMPSAC 2002: 963-965 |
87 | | David Chadwick,
Martin S. Olivier,
Pierangela Samarati,
Eleanor Sharpston,
Bhavani M. Thuraisingham:
Privacy and Civil Liberties.
DBSec 2002: 331-346 |
86 | EE | Bhavani M. Thuraisingham:
Building Secure Survivable Semantic Webs.
ICTAI 2002: 395-398 |
85 | EE | Bhavani M. Thuraisingham:
Secure Multimedia Data Management Research Directions.
ISMSE 2002 |
84 | EE | Bhavani M. Thuraisingham,
Eric Hughes,
Dock Allen:
Dependable Semantic Web.
WORDS 2002: 305-310 |
83 | EE | Bhavani M. Thuraisingham,
Reind P. van de Riet:
Data and applications security (Guest editorial).
Data Knowl. Eng. 43(3): 235-236 (2002) |
82 | EE | Bhavani M. Thuraisingham:
Data Mining, National Security, Privacy and Civil Liberties.
SIGKDD Explorations 4(2): 1-5 (2002) |
2001 |
81 | | Bhavani M. Thuraisingham,
Reind P. van de Riet,
Klaus R. Dittrich,
Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000
Kluwer 2001 |
80 | | Sylvia L. Osborn,
Bhavani M. Thuraisingham,
Pierangela Samarati:
Panel on XML and Security.
DBSec 2001: 317-323 |
79 | | Bhavani M. Thuraisingham:
Database Management and the Internet: Developments and Challenges.
High-Performance Web Databases 2001: 549-554 |
78 | | Bhavani M. Thuraisingham,
Eric Hughes:
Data quality: developments and directions.
IICIS 2001: 97-102 |
77 | EE | Bhavani M. Thuraisingham,
Chris Clifton,
John A. Maurer,
Marion G. Ceruti:
Real-Time Data Mining of Multimedia Objects.
ISORC 2001: 360-365 |
76 | EE | Bhavani M. Thuraisingham,
Chris Clifton,
Amar Gupta,
Elisa Bertino,
Elena Ferrari:
Directions for Web and E-Commerce Applications Security.
WETICE 2001: 200-204 |
75 | | Lisa Cingiser DiPippo,
Victor Fay Wolfe,
Levon Esibov,
Gregory Cooper,
Ramachandra Bethmangalkar,
Russell Johnston,
Bhavani M. Thuraisingham,
John A. Maurer:
Scheduling and Priority Mapping for Static Real-Time Middleware.
Real-Time Systems 20(2): 155-182 (2001) |
2000 |
74 | EE | Bhavani M. Thuraisingham:
Network and Web Security and E-Commerce and Other Applications.
COMPSAC 2000: 131 |
73 | EE | Bhavani M. Thuraisingham,
Marion G. Ceruti:
Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments.
COMPSAC 2000: 171-175 |
72 | | Bhavani M. Thuraisingham:
Web Security and Privacy (Panel).
DBSec 2000: 125-126 |
71 | EE | Richard Freedman,
John A. Maurer,
Steven Wohlever,
Bhavani M. Thuraisingham,
Victor Fay Wolfe,
Michael Milligan:
Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications.
ISORC 2000: 202-205 |
70 | EE | Insup Lee,
Mike Jones,
Hermann Kopetz,
K. H. Kim,
Thomas F. Lawrence,
Bhavani M. Thuraisingham:
Fundamental R&D Issues in Real-Time Distributed Computing.
ISORC 2000: 215- |
69 | EE | Victor Fay Wolfe,
Lisa Cingiser DiPippo,
Gregory Cooper,
Russell Johnston,
Peter Kortmann,
Bhavani M. Thuraisingham:
Real-Time CORBA.
IEEE Trans. Parallel Distrib. Syst. 11(10): 1073-1089 (2000) |
1999 |
68 | EE | Bhavani M. Thuraisingham,
John A. Maurer:
Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems.
FTDCS 1999: 242-245 |
67 | EE | John A. Maurer,
Roman Ginis,
Richard Freedman,
Michael Squadrito,
Steven Wohlever,
Bhavani M. Thuraisingham:
Adaptable Real-Time Distributed Object Management for Command and Control Systems.
ISADS 1999: 42- |
66 | EE | Bhavani M. Thuraisingham:
Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems.
ISADS 1999: 89- |
65 | EE | Steven Wohlever,
Victor Fay Wolfe,
Bhavani M. Thuraisingham,
Richard Freedman,
John A. Maurer:
CORBA-based Real-time Trader Service for Adaptable Command and Control Systems.
ISORC 1999: 64- |
64 | EE | Bhavani M. Thuraisingham,
John A. Maurer:
Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems.
IEEE Trans. Knowl. Data Eng. 11(1): 228-238 (1999) |
63 | | Bhavani M. Thuraisingham:
Web Information Management and its Application to Electronic Commerce.
International Journal on Artificial Intelligence Tools 8(2): 107-117 (1999) |
1998 |
62 | EE | Bhavani M. Thuraisingham:
Panel Overview.
COMPSAC 1998: 260-261 |
61 | | Bhavani M. Thuraisingham,
Sushil Jajodia,
Pierangela Samarati,
John E. Dobson,
Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion.
DBSec 1998: 269-284 |
60 | EE | Bhavani M. Thuraisingham,
Sandra Heiler,
Arnon Rosenthal,
Susan Malaika:
Migrating Legacy Databases and Applications (Panel).
ICDE 1998: 314 |
59 | EE | Michael Squadrito,
Levon Esibov,
Lisa Cingiser DiPippo,
Victor Fay Wolfe,
Gregory Cooper,
Bhavani M. Thuraisingham,
Peter C. Krupp,
Michael Milligan,
Russell Johnston:
Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols.
ISORC 1998: 96-105 |
1997 |
58 | | Bhavani M. Thuraisingham,
Linda Schlipper,
Pierangela Samarati,
Tsau Young Lin,
Sushil Jajodia,
Chris Clifton:
Security Issues in Data Warehousing and Data Mining: Panel Discussion.
DBSec 1997: 3-16 |
57 | | Roman Ginis,
Eric Hughes,
Steven Wohlever,
Bhavani M. Thuraisingham,
Peter C. Krupp,
John A. Maurer:
Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems.
RTDB 1997: 77- |
56 | EE | Eric Hughes,
Roman Ginis,
Bhavani M. Thuraisingham,
Peter C. Krupp,
John A. Maurer:
Data Manager for Evolvable Real-time Command and Control Systems.
VLDB 1997: 558-561 |
55 | | Kingsley C. Nwosu,
Bhavani M. Thuraisingham,
P. Bruce Berra:
Multimedia Database Systems - A New Frontier (Guest Editors' Introduction).
IEEE MultiMedia 4(3): 21-23 (1997) |
1996 |
54 | | Bhavani M. Thuraisingham:
Security Issues for Data Warehousing and Data Mining.
DBSec 1996: 11-20 |
53 | EE | Bhavani M. Thuraisingham,
Arkady Kanevsky,
Peter C. Krupp,
Alice Schafer,
Mike Gates,
Thomas Wheeler,
Edward H. Bensley,
Ruth Ann Sigel,
Michael Squadrito:
Evolvable Real-Time C3 Systems-II: Real-Time Infrastructure Requirements.
ICECCS 1996: 473-482 |
52 | EE | Bhavani M. Thuraisingham,
T. C. Ting:
Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology.
IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) |
51 | | Donald G. Marks,
Peter J. Sell,
Bhavani M. Thuraisingham:
MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications.
JOOP 9(4): 22-29 (1996) |
50 | EE | Sang Hyuk Son,
Rasikan David,
Bhavani M. Thuraisingham:
Improving Timeliness in Real-Time Secure Database Systems.
SIGMOD Record 25(1): 29-33 (1996) |
1995 |
49 | EE | Bhavani M. Thuraisingham:
Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems.
ACM Conference on Computer Science 1995: 216-221 |
48 | | Sang Hyuk Son,
Rasikan David,
Bhavani M. Thuraisingham:
An Adaptive Policy for Improved Timeliness in Secure Database Systems.
DBSec 1995: 199-214 |
47 | | Tsau Young Lin,
Thomas H. Hinke,
Donald G. Marks,
Bhavani M. Thuraisingham:
Security and Data Mining.
DBSec 1995: 391-399 |
46 | EE | Edward H. Bensley,
Lawrence Fisher,
Mike Gates,
James Houchens,
Arkady Kanevsky,
Soohee Kim,
Peter C. Krupp,
Alice Schafer,
Bhavani M. Thuraisingham:
Evolvable real-time C3 systems.
ICECCS 1995: 153- |
45 | | Daniel A. Keim,
John Peter Lee,
Bhavani M. Thuraisingham,
Craig M. Wittenbrink:
Database Issues for Data Visualization: Supporting Interactive Database Explorartion.
Workshop on Database Issues for Data Visualization 1995: 12-25 |
44 | | Georges G. Grinstein,
Bhavani M. Thuraisingham:
Data Mining and Data Visualization.
Workshop on Database Issues for Data Visualization 1995: 54-56 |
43 | EE | Bhavani M. Thuraisingham,
William Ford:
Security Constraints in a Multilevel Secure Distributed Database Management System.
IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995) |
42 | | Bhavani M. Thuraisingham:
Towards the Design of a Multilevel Secure Object-Oriented Database Management System.
JOOP 8(3): 42-49 (1995) |
41 | EE | P. Bruce Berra,
Kingsley C. Nwosu,
Bhavani M. Thuraisingham:
ACM Multimedia '94 Conference Workshop on Multimedia Database Management Systems.
SIGMOD Record 24(1): 70-72 (1995) |
40 | EE | Arnon Rosenthal,
Leonard J. Seligman,
Catherine D. McCollum,
Barbara T. Blaustein,
Bhavani M. Thuraisingham,
Edward Lafferty:
Data Management Research at The MITRE Corporation.
SIGMOD Record 24(3): 77-82 (1995) |
1994 |
39 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993
Springer 1994 |
38 | EE | Harvey Rubinovitz,
Bhavani M. Thuraisingham:
Security Constraint Processing in a Distributed Database Environment.
ACM Conference on Computer Science 1994: 356-363 |
37 | | Donald G. Marks,
Leonard J. Binns,
Bhavani M. Thuraisingham:
Hypersemantic Data Modeling for Inference Analysis.
DBSec 1994: 157-180 |
36 | | Arnon Rosenthal,
James Williams,
William R. Herndon,
Bhavani M. Thuraisingham:
A Fine-grained Access Control Model for Object-Oriented DBMSs.
DBSec 1994: 319-334 |
35 | EE | Bhavani M. Thuraisingham:
Security issues for federated database systems.
Computers & Security 13(6): 509-525 (1994) |
34 | | Bhavani M. Thuraisingham,
T. C. Ting,
Peter J. Sell,
Ravi S. Sandhu,
Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel).
OOPS Messenger 5(2): 59-61 (1994) |
33 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for object-oriented systems.
OOPS Messenger 5(2): 77-78 (1994) |
32 | | Shail Arora,
Mamdouh Ibrahim,
Bhavani M. Thuraisingham,
T. C. Ting:
Object-oriented technology for health care and medical information systems.
OOPS Messenger 5(4): 122-126 (1994) |
1993 |
31 | | Bhavani M. Thuraisingham,
Carl E. Landwehr:
Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992
North-Holland 1993 |
30 | EE | Bhavani M. Thuraisingham,
William Ford:
Parallel Processing and Trusted Database Management Systems.
ACM Conference on Computer Science 1993: 162-167 |
29 | | Bhavani M. Thuraisingham:
Workshop Summary.
DBSec 1993: 357-362 |
28 | | Peter J. Sell,
Bhavani M. Thuraisingham:
Applying OMT for Designing Multilevel Database Applications.
DBSec 1993: 41-64 |
27 | | Bhavani M. Thuraisingham:
Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion.
OOPSLA 1993: 304 |
26 | | Bhavani M. Thuraisingham,
Ravi S. Sandhu,
T. C. Ting:
Security for Object-Oriented Systems: An Editorial Overview.
Security for Object-Oriented Systems 1993: 1-7 |
25 | | Bhavani M. Thuraisingham,
William Ford,
M. Collins,
J. O'Keeffe:
Design and Implementation of a Database Inference Controller.
Data Knowl. Eng. 11(3): 271- (1993) |
24 | EE | Harvey Rubinovitz,
Bhavani M. Thuraisingham:
Design and implementation of a query processor for a trusted distributed data base management system.
Journal of Systems and Software 21(1): 49-69 (1993) |
23 | | Bhavani M. Thuraisingham:
System Function Languages.
Math. Log. Q. 39: 357-366 (1993) |
22 | EE | Bhavani M. Thuraisingham,
Hai-Ping Ko:
Concurrency Control in Trusted Database Management Systems: A Survey.
SIGMOD Record 22(4): 52-59 (1993) |
1992 |
21 | | Bhavani M. Thuraisingham:
A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II.
CSFW 1992: 135-146 |
20 | EE | Bhavani M. Thuraisingham,
Harvey H. Rubinovitz:
Multilevel security issues in distributed database management systems - III.
Computers & Security 11(7): 661-674 (1992) |
19 | EE | Bhavani M. Thuraisingham:
Current Status of R&D in Trusted Database Management Systems.
SIGMOD Record 21(3): 44-50 (1992) |
1991 |
18 | | Bhavani M. Thuraisingham:
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems.
CSFW 1991: 127-138 |
17 | | Matthew Morgenstern,
Teresa F. Lunt,
Bhavani M. Thuraisingham,
David L. Spooner:
Security Issues in Federated Database Systems: Panel Contributions.
DBSec 1991: 131-148 |
16 | | Bhavani M. Thuraisingham:
The Use of Conceptual Structures for Handling the Inference Problem.
DBSec 1991: 333-362 |
15 | EE | Bhavani M. Thuraisingham:
Multilevel security issues in distributed database management systems II.
Computers & Security 10(8): 727-747 (1991) |
1990 |
14 | | Bhavani M. Thuraisingham:
Multilevel Security for Multimedia Database Systems.
DBSec 1990: 99-116 |
13 | | Bhavani M. Thuraisingham:
Towards the Design of a Secure Data/Knowledge Base Management System.
Data Knowl. Eng. 5: 59-72 (1990) |
12 | EE | Paul D. Stachour,
Bhavani M. Thuraisingham:
Design of LDV: A Multilevel Secure Relational Database Management System.
IEEE Trans. Knowl. Data Eng. 2(2): 190-209 (1990) |
11 | EE | Bhavani M. Thuraisingham:
Computing Transitive Closures of Multilevel Relations.
SIGMOD Record 19(3): 17-23 (1990) |
1989 |
10 | EE | Hany M. Atchan,
Rob Bell,
Bhavani M. Thuraisingham:
Knowledge-Based Support for the Development of Database-Centered Applications.
ICDE 1989: 394-401 |
9 | | Bhavani M. Thuraisingham:
Mandatory Security in Object-Oriented Database Systems.
OOPSLA 1989: 203-210 |
8 | EE | D. J. Thomsen,
Wei-Tek Tsai,
Bhavani M. Thuraisingham:
Prototyping to explore MLS/DBMS design.
Computers & Security 8(3): 229-245 (1989) |
7 | EE | Thomas F. Keefe,
Wei-Tek Tsai,
Bhavani M. Thuraisingham:
SODA: A secure object-oriented database system.
Computers & Security 8(6): 517-533 (1989) |
6 | EE | Bhavani M. Thuraisingham:
A functional view of multilevel databases.
Computers & Security 8(8): 721-730 (1989) |
5 | | Thomas F. Keefe,
Bhavani M. Thuraisingham,
Wei-Tek Tsai:
Secure Query-Processing Strategies.
IEEE Computer 22(3): 63-70 (1989) |
4 | EE | Shyh-Kwei Chen,
Wei-Tek Tsai,
Bhavani M. Thuraisingham:
Recovery Point Selection on a Reverse Binary Tree Task Model.
IEEE Trans. Software Eng. 15(8): 963-976 (1989) |
1988 |
3 | | D. J. Thomsen,
Wei-Tek Tsai,
Bhavani M. Thuraisingham:
Prototyping as a Research Tool for MLS/DBMS.
DBSec 1988: 63-84 |
1987 |
2 | | P. Dwyer,
George D. Jelatis,
Bhavani M. Thuraisingham:
Multilevel Security in Database Management Systems.
Computers & Security 6(3): 252-260 (1987) |
1982 |
1 | | Bhavani M. Thuraisingham:
Representation of One-One Degrees by Decision Problems for System Functions.
J. Comput. Syst. Sci. 24(3): 373-377 (1982) |