Control Data Corporation
CDCNET, 1983 – 1986 Transport, Session and Network Layers as well as Memory Management Algorithms and Command Processors for CDCNET. Release 1 December 1985
Approx 60 members in the CDCNET Team
Honeywell Inc.
1. Lock Data Views 1986 – 1988
Paul Stachour, Bhavani Thuraisingham, Pat Dwyer, Emmanuel Onuegbe, Tom Haigh, Dick O’Brien
Designed a Multilevel Secure Relational Database System Design Contract from RADC (implementation contract was awarded to Honeywell using Oracle in 1989, but I did not work on this).
2. Distributed Data Dictionary System, 1986 – 1987
Krishna Mikkilineni, Hongjun Lu, Bhavani Thuraisingham, Cho-Li Ho
Designed and implemented a system for Honeywell Divisions using NIST IRDS System.
3. Network Operating System, 1987
Bhavani Thuraisingham, Tammy Chan, Pat Gonia
Designed a Network Operating System as part of MCNIU network for NASA (implementation contract was also awarded, but I did not work on this).
4. XIMKON, 1987 – 1989
Ferit Konar, Paul Felix, Bhavani Thuraisingham
Designed and implemented a expert process control system.
The MITRE Corporation
Secure Data Management
1. Multilevel Secure Data Management System, 1989
Amiel Kamon, Bhavani Thuraisingjam
Prototype system developed using Sybase for the backend system and SUN Unix for front-end. Security at the front-end was simulated.
2. Inference Control during Query Processing, 1989 – 1990
William Ford, Bhavani Thuraisingham, Jonathan O’Keeffe
Secure Sybase running on Ultrix for MLS/DBMS and built inference controller for query processing as an application.
3. Inference Control during Update Processing, 1990 Marie Collins, Bhavani Thuraisingham
Secure Sybase running on Ultrix for MLS/DBMS and built inference controller for update processing was built as an application.
4. Inference Control during Database Design, 1993 – 1994
Marie Collins, Bhavani Thuraisingham
Used CLIPS expert system and implemented in COOL.
5. Secure Distributed Query Processing, 1989 – 1991
Harvey Rubinovitz, Bhavani Thuraisingham
Built Secure Distributed Processor DQP that connected multiple Secure Sybase Server running on Ultrix operating system.
6. Simulation of Secure Transaction processing, 1990 – 1992
Harvey Rubinovitz and Bhavani Thuraisingham
Simulation tool was developed to simulate multiple secure concurrency control algorithms and compare performance.
7. Multilevel Secure Multimedia System, 1990 – 1991
Marie Collins, Harvey Rubinovitz and Bhavani Thuraisingham
Implemented a multilevel multimedia system on the MAC environment. Simulated security features for text image, audio, animation and video.
8. Multilevel Secure Object System, 1991
Harvey Rubinovitz and Bhavani Thuraisingham
Simulated security features for Object Store Object DBMS. Implementation in C++.
9. Distributed Secure Query Constraint Processor, 1991 – 1993
Harvey Rubinovitz, Bhavani Thuraisingham, David Foti
Utilized the DQP and built a distributed inference controller for query processing. Utilized Secure Sybase Server on Ultrix.
10. Distributed Secure Update Constraint processor, 1992 – 1993
Harvey Urbanity and Bhavani Thuraisingham
Utilized the Distributed Update Processor and built an Inference Controller for processing updates, 1991 – 1993.
11. Secure Distributed Processor for Army Applications, 1994 – 1996
Harvey Rubinovitz, Marie Collins and Bhavani Thuraisingham,
Implemented a system with Army MCS application utilizing the distributed constraint processor .
Real-time Infrastructure and Data Manager
12. Active Real-time Data Manager, 1994
Gary Gengo, Bhavani Thuraisingham
Using ZIP-RTDBMS, built a rule processor for processing rules in real-time.
13. Infrastructure for Real-time Applications, 1994 – 1996
Peter Krupp, Bhavani Thuraisingham, John Maurer, Mike Squadrito
Developed an ORB-based infrastructure on Lynx operating system for command and control applications with AWACS as an example.
14. Real-time Main Memory Data Manager, 1995 – 1996
Mike Squadrito, Victor Wolfe, Bhavani Thuraisingham, Peter Krupp
Developed a main memory data manager and concurrency control algorithms for real-time applications hosted on the infrastructure.
15. Adaptive Real-time Infrastructure, 1997 – 1999
Mike Squadrito, Roman Ginis, Peter Krupp, Bhavani Thuraisingham
Designed and implemented an adaptive component based infrastructure for real-time applications.
Consultant to the following prototypes developed by members of my department in Data Mining. Distributed Objects and Multimedia Information Management
16. Text Data Mining Tool
PI: C. Clifton
17. Image Mining Tool
PI: C. Clifton
18. Broadcast News Navigation System
PI: A. Merlino
19. Distributed Object Management for Legacy System Migration
PI: E. Hughes
The University of Texas at Dallas (2004-Present)
Data Mining Tools
1. Suspicious Event Detection and Surveillance 2004 – 2005
Gal Lavee, Bhavani Thuraisingham, Latifur Khan
Developed a system for detecting suspicious events. Developed a distance matrix to identify events that are similar.
2. Data Mining Toolkit for Malware Detection 2005 – 2009
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
Developed data mining algorithms using WEKA and other tools to detect buffer overflow, and malicious code.
3. Stream Mining Tools, 2008 – 2009
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham with Jiawei Han et al
Developed a stream mining algorithm for novel class detection. The tool will be distributed for external users.
Information Sharing, Privacy, and Policy Management
4. Assured Information Sharing Prototype, 2007 – 2008
Yashaswini Harshakumar, Bhavani Thuraisingham, Latifur Khan
Using Oracle database systems and XACML policies implemented assured information sharing prototype.
5. Assured Information Sharing Simulation and Experimentation, 2005 – 2006
Mamoun Awad, Latifur Khan, Bhavani Thuraisingham
Simulated policy management in information sharing algorithms and determined the amount of information that would be lost by enforcing policies. This would give guidance to the decision makers of the policies that need to be enforced.
6. Trust Management in Information Sharing, Simulation, 2006 – 2007
R. Srinivasan and B. Thuraisingham
Computes trust and shares information based on trust values
7. Game Theory-based Algorithms for Biosecurity, 2005 – 2008
Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham
Simulated algorithms for information sharing using game theory concepts for bioterrorism and in security.
8. Privacy Preserving Decision Tree, 2005 – 2007
Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham
Developed a tool based on decision tree for privacy preserving data mining.
9. Security for Motion Capture and Animation, 2008
R. Natarajan, B. Thuraisingham, L. Khan, and B. Prabhakaran
Prototype system that builds a front-end to perform query rewriting for motion capture data
Geospatial Information Management
10. Geospatial Policy Interoperability, 2006 – 2007
Alam Ashraful, Farhan Husain, Latifur Khan, Bhavani Thuraisingham
Develop a prototype for implementing security policies in heterogeneous geospatial data management systems.
11. Police Blotter Prototype, 2006
Farhan Husain, Latifur Khan, A. Ashraful, Bhavani Thuraisingham, Steven Seida
This system, jointly developed with Raytheon, essentially is an advisory tool for police to locate where the criminals are. The system was demonstrated at GEOINT.
12. Geospatial Data Mining, 2006 – 2007
Chuan Li, Latifur Khan, Bhavani Thuraisingham
Developed tool for classifying geospatial data.
13. Ontology Alignment in Geospatial Data, 2007 – 2009
Jeff Partyka, Latifur Khan, Bhavani Thuraisingham
Developed ontology alignment algorithms for integrating heterogeneous geospatial database systems. The algorithms were integrated into Intelligence Community’s Blackbook.
Semantic Web, Web Services and Security
14. Translators and Mappings from Relational to RDF Data and Vice Versa, 2007 – 2009
Sunitha Sriram, Latifur Khan, Bhavani Thuraisingham
Developed a tool for use by relational database users and RDF users to carry put translations. Tool will be distributed to external users.
15. Inference Controller for Semantic Web, 2009-2011
Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham
Prototype developed for Policy Management using descriptive logic base inference controlee.
16. Geospatial Semantic Web, 2006 – 2007
Ganesh Subbiah, Latifur Khan, Bhavani Thuraisingham, Alam Ashraful
Developed a system called DAGIS to answer geospatial semantic queries. Implemented an access control module for DAGIS.
17. Secure Web Services, 2007 – 2010
Wei-She, I-Ling Yen, Bhavani Thuraisingham
Implemented a delegation model for secure web services.
Biometrics
18. Implementation of Fingerprinting Algorithms, 2006 – 2007
Abinanthan, Bhavani Thuraisingham
Implemented a novel fingerprinting matching algorithm and associated system.
19. Face Detection Algorithms, 2006 – 2007
Parveen Pallabi and Bhavani Thuraisingham
Developed a system that detects facial features using neural networks. The algorithm combines SVM and ANN and uses Dempster-Shafer theory for fusing the results.
Social Networks and Security
20. Design and Implementation of a Secure Social Network System, 2005 – 2006
Ryan Layfield, Bhavani Thuraisingham, Latifur Khan
Developed a prototype secure social network system and analyzed the properties using the Enron data set.
21. Access Control Model for Social Networks, 2009 – 2010
Raymond Weatherly, Murat Kantarcioglu, Barbara Carminati, Elena Ferrari
Prototype being developed for a system of a secure social network using a novel access control model.
22. TweetHood, 2010 – Present
S. Abrol, L. Khan, B. Thuraisingham
Location aware tweet mining
Cloud Data Management and Security
23. Federated Query Processing in Clouds, 2008 – 2011
Farhan Husain, Pankil Doshi, Latifur Khan, Bhavani Thuraisingham
Develop a cloud computing platform with Hadoop and MapReduce and implement secure federated query processing and optimization algorithms on top of this platform.
24. Secure Query Processing in Cloud with HIVE, 2009 – 2010
Vaibhav Khadlikar, Murat Kantarcioglu, Bhavani Thuraisingham
This system is a query rewriting system that will examine the XACML policies and implement query processing in a cloud using Hadoop/MapReduce framework.
25. SPARQL Query Optimizer, 2009 – 2010
Farhan Husain, Latifur Khan, Bhavani Thuraisingham
This system is developing a SPARQL query optimizer for the Hadoop/MapReduce framework.
26. Secure Query Processing in Cloud with Semantic Web Data, 2009 – 2010
Farhan Husain, Latifur Khan, Bhavani Thuraisingham
This system is a query rewriting system that will examine the XACML policies and implement query processing in a cloud with SPARQL, Hadoop/MapReduce framework. It uses the framework we have built in the system discussed under the previous project. Two versions of the prototype have been developed.
27. Secure XACML Implementation with Hadoop, 2009 – Present
In progress. This system essentially explores the Hadoop software and incorporates XACML policy- based access control. It will be offered as open source.
Blackbook Enhancements and GOTS (Government Off the Shelf)
1. Geospatial Proximity Algorithm, 2008 – 2009
Sonia Chib, Bhavani Thuraisingham, Jyothsna Rachapalli, Latifur Khan
Implemented geospatial proximity algorithms using Google maps for Blackbook users.
2. REST Interface and Integration of Amazon.com Web Services into Blackbook, 2008 – 2009
Pranav Parikh, Murat Kantarcioglu, Bhavani Thuraisingham
Implemented the REST Interface to Blackbook. Then using this interface integrated Blackbook with Amazon.com webs services for query processing.
3. MALLET/Blackbook Integration, 2009 – 2010
Pranav Pralik, Bhavani Thuraisingham
Developed a professionalization service for the MALLET Machine learning algorithms and integrated into Blackbook.
4. NIST NVD Ontology Management, 2009
Jyothsna Rachapalli, Vaibhav Khadilkar, Bhavani Thuraisingham, NIST
Developed an ontology based system for specifying the data in the NIST NVD Databases
Open Source Software at the University of Texas at Dallas
1. SCRUB tool
http://scrub-tcpdump.sourceforge.net/index.php
http://sourceforge.net/projects/scrub-tcpdump/
2. JENA Contributions, Very Large RDF Graphs
http://jena.sourceforge.net/contrib/contributions.html
http://cs.utdallas.edu/semanticweb/jenaextension.html
Tool Repositories developed and hosted at UTD
Data Mining Tools http://dml.utdallas.edu/Mehedy/
Anonymization Tools
http://cs.utdallas.edu/dspl/cgi-bin/toolbox/index.php
Semantic Web Tools
http://cs.utdallas.edu/semanticweb/index.html
Secure Cloud Repository
http://cs.utdallas.edu/secure-cloud-repository/
|