Software Systems Developed

Commercial Products
GOTS Tools
Open Source Tools

Control Data Corporation

CDCNET, 1983 1986
Transport, Session and Network Layers as well as Memory Management Algorithms and Command Processors for CDCNET. Release 1 December 1985

Approx 60 members in the CDCNET Team


Honeywell Inc.


1.      Lock Data Views 1986 1988

Paul Stachour, Bhavani Thuraisingham, Pat Dwyer, Emmanuel Onuegbe, Tom Haigh, Dick O’Brien

Designed a Multilevel Secure Relational Database System Design Contract from RADC (implementation contract was awarded to Honeywell using Oracle in 1989, but I did not work on this).


2.      Distributed Data Dictionary  System, 1986 1987

Krishna Mikkilineni, Hongjun Lu, Bhavani Thuraisingham, Cho-Li Ho

Designed and implemented a system for Honeywell Divisions using NIST IRDS System.


3.      Network Operating System, 1987

Bhavani Thuraisingham, Tammy Chan, Pat Gonia

Designed a Network Operating System as part of MCNIU network for NASA (implementation contract was also awarded, but I did not work on this).  


4.      XIMKON, 1987 1989

Ferit Konar, Paul Felix, Bhavani Thuraisingham

Designed and implemented a expert process control system.


The MITRE Corporation


Secure Data Management


1.      Multilevel Secure Data Management System, 1989

Amiel Kamon, Bhavani Thuraisingjam

Prototype system developed using Sybase for the backend system and SUN Unix for front-end. Security at the front-end was simulated.


2.      Inference Control during Query Processing, 1989 1990

William Ford, Bhavani Thuraisingham, Jonathan O’Keeffe

Secure Sybase running on Ultrix for MLS/DBMS and built inference controller for query processing as an application.


3.      Inference Control during Update Processing, 1990
Marie Collins, Bhavani Thuraisingham

Secure Sybase running on Ultrix for MLS/DBMS and built inference controller for update processing was built as an application.


4.      Inference Control during Database Design, 1993 1994

Marie Collins, Bhavani Thuraisingham

Used CLIPS expert system and implemented in COOL.

5.      Secure Distributed Query Processing, 1989 1991

Harvey Rubinovitz, Bhavani Thuraisingham

Built Secure Distributed Processor DQP that connected multiple Secure Sybase Server running on Ultrix operating system.


6.      Simulation of Secure Transaction processing, 1990 1992

Harvey Rubinovitz and Bhavani Thuraisingham

Simulation tool was developed to simulate multiple secure concurrency control algorithms and compare performance.


7.      Multilevel Secure Multimedia System, 1990 1991

Marie Collins, Harvey Rubinovitz and Bhavani Thuraisingham

Implemented a multilevel multimedia system on the MAC environment. Simulated security features for text image, audio, animation and video.


8.      Multilevel Secure Object System, 1991

Harvey Rubinovitz and Bhavani Thuraisingham

Simulated security features for Object Store Object DBMS. Implementation in C++.


9.      Distributed Secure Query Constraint Processor, 1991 1993

Harvey Rubinovitz, Bhavani Thuraisingham, David Foti

Utilized the DQP and built a distributed inference controller for query processing. Utilized Secure Sybase Server on Ultrix.


10.  Distributed Secure Update Constraint processor, 1992 1993

      Harvey Urbanity and Bhavani Thuraisingham

Utilized the Distributed Update Processor and built an Inference Controller for processing updates, 1991 – 1993.


11.  Secure Distributed Processor for Army Applications, 1994 1996

Harvey Rubinovitz, Marie Collins and Bhavani Thuraisingham,

Implemented a system with Army MCS application utilizing the distributed constraint processor .


Real-time Infrastructure and Data Manager


12.  Active Real-time Data Manager, 1994

Gary Gengo, Bhavani Thuraisingham

Using ZIP-RTDBMS, built a rule processor for processing rules in real-time.


13.  Infrastructure for Real-time Applications, 1994 1996

Peter Krupp, Bhavani Thuraisingham, John Maurer, Mike Squadrito

Developed an ORB-based infrastructure on Lynx operating system for command and control applications with AWACS as an example.


14.  Real-time Main Memory Data Manager, 1995 1996

Mike Squadrito, Victor Wolfe, Bhavani Thuraisingham, Peter Krupp

Developed a main memory data manager and concurrency control algorithms for real-time applications hosted on the infrastructure.


15.  Adaptive Real-time Infrastructure, 1997 1999

Mike Squadrito, Roman Ginis, Peter Krupp, Bhavani Thuraisingham

Designed and implemented an adaptive component based infrastructure for real-time applications.


Consultant to the following prototypes developed by members of my department in Data Mining. Distributed Objects and Multimedia Information Management


16.  Text Data Mining Tool

      PI: C. Clifton


17.  Image Mining Tool

      PI: C. Clifton


18.  Broadcast News Navigation System

      PI: A. Merlino


19.  Distributed Object Management for Legacy System Migration

      PI: E. Hughes


The University of Texas at Dallas  (2004-Present)

Data Mining Tools


1.      Suspicious Event Detection and Surveillance 2004 2005

Gal Lavee, Bhavani Thuraisingham, Latifur Khan

Developed a system for detecting suspicious events. Developed a distance matrix to identify events that are similar.


2.      Data Mining Toolkit for Malware Detection 2005 2009

Mehedy Masud, Latifur Khan, Bhavani Thuraisingham

Developed data mining algorithms using WEKA and other tools to detect buffer overflow, and malicious code.


3.      Stream Mining Tools, 2008 2009

Mehedy Masud, Latifur Khan, Bhavani Thuraisingham with Jiawei Han et al

Developed a stream mining algorithm for novel class detection. The tool will be distributed for external users.


Information Sharing, Privacy, and Policy Management


4.      Assured Information Sharing Prototype, 2007 2008

Yashaswini Harshakumar, Bhavani Thuraisingham, Latifur Khan

Using Oracle database systems and XACML policies implemented assured information sharing prototype.


5.      Assured Information Sharing Simulation and Experimentation, 2005 2006

Mamoun Awad, Latifur Khan, Bhavani Thuraisingham

Simulated policy management in information sharing algorithms and determined the amount of information that would be lost by enforcing policies. This would give guidance to the decision makers of the policies that need to be enforced.


6.      Trust Management in Information Sharing, Simulation, 2006 2007

      R. Srinivasan and B. Thuraisingham

      Computes trust and shares information based on trust values


7.      Game Theory-based Algorithms for Biosecurity, 2005 2008

Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham

Simulated algorithms for information sharing using game theory concepts for bioterrorism and in security.


8.      Privacy Preserving Decision Tree, 2005 2007

Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham

Developed a tool based on decision tree for privacy preserving data mining.


9.      Security for Motion Capture and Animation, 2008

R. Natarajan, B. Thuraisingham, L. Khan, and B. Prabhakaran

Prototype system that builds a front-end to perform query rewriting for motion capture data


Geospatial Information Management


10.  Geospatial Policy Interoperability, 2006 2007

Alam Ashraful, Farhan Husain, Latifur Khan, Bhavani Thuraisingham

Develop a prototype for implementing security policies in heterogeneous geospatial data management systems.


11.  Police Blotter Prototype, 2006

Farhan Husain, Latifur Khan, A. Ashraful, Bhavani Thuraisingham, Steven Seida

   This system, jointly developed with Raytheon, essentially is an advisory tool for police to locate where the criminals are.  The system was demonstrated at GEOINT.


12.  Geospatial Data Mining, 2006 2007

Chuan Li, Latifur Khan, Bhavani Thuraisingham

Developed tool for classifying geospatial data.


13.  Ontology Alignment in Geospatial Data, 2007 2009

Jeff Partyka, Latifur Khan, Bhavani Thuraisingham

Developed ontology alignment algorithms for integrating heterogeneous geospatial database systems. The algorithms were integrated into Intelligence Community’s Blackbook.

Semantic Web, Web Services and Security

Translators and Mappings from Relational to RDF Data and Vice Versa, 2007 2009

Sunitha Sriram, Latifur Khan, Bhavani Thuraisingham

Developed a tool for use by relational database users and RDF users to carry put translations. Tool will be distributed to external users.


15.  Inference Controller for Semantic Web, 2009-2011

Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham

Prototype developed for Policy Management using descriptive logic base inference controlee.


16.  Geospatial Semantic Web, 2006 2007

Ganesh Subbiah, Latifur Khan, Bhavani Thuraisingham, Alam Ashraful

Developed a system called DAGIS to answer geospatial semantic queries. Implemented an access control module for DAGIS.


17.  Secure Web Services, 2007 2010

Wei-She, I-Ling Yen, Bhavani Thuraisingham

Implemented a delegation model for secure web services.




18.  Implementation of Fingerprinting Algorithms, 2006 2007

Abinanthan, Bhavani Thuraisingham

Implemented a novel fingerprinting matching algorithm and associated system.


19.  Face Detection Algorithms, 2006 2007

Parveen Pallabi and Bhavani Thuraisingham

Developed a system that detects facial features using neural networks. The algorithm combines SVM and ANN and uses Dempster-Shafer theory for fusing the results.


Social Networks and Security


20.  Design and Implementation of a Secure Social Network System, 2005 2006

Ryan Layfield, Bhavani Thuraisingham, Latifur Khan

Developed a prototype secure social network system and analyzed the properties using the Enron data set.


21.  Access Control Model for Social Networks, 2009 2010

Raymond Weatherly, Murat Kantarcioglu, Barbara Carminati, Elena Ferrari

Prototype being developed for a system of a secure social network using a novel access control model.


22.  TweetHood, 2010 Present

S. Abrol, L. Khan, B. Thuraisingham

      Location aware tweet mining


Cloud Data Management and Security

23.  Federated Query Processing in Clouds, 2008 2011

Farhan Husain, Pankil Doshi, Latifur Khan, Bhavani Thuraisingham

Develop a cloud computing platform with Hadoop and MapReduce and implement secure federated query processing and optimization algorithms on top of this platform.


24.  Secure Query Processing in Cloud with HIVE, 2009 2010

      Vaibhav Khadlikar, Murat Kantarcioglu, Bhavani Thuraisingham

This system is a query rewriting system that will examine the XACML policies and implement query processing in a cloud using Hadoop/MapReduce framework.


25.  SPARQL Query Optimizer, 2009 2010

      Farhan Husain, Latifur Khan, Bhavani Thuraisingham

      This system is developing a SPARQL query optimizer for the Hadoop/MapReduce framework.


26.  Secure Query Processing in Cloud with Semantic Web Data, 2009 2010

      Farhan Husain, Latifur Khan, Bhavani Thuraisingham

This system is a query rewriting system that will examine the XACML policies and implement query processing in a cloud with SPARQL, Hadoop/MapReduce framework. It uses the framework we have built in the system discussed under the previous project. Two versions of the prototype have been developed.


27.  Secure XACML Implementation with Hadoop, 2009 Present

In progress. This system essentially explores the Hadoop software and incorporates XACML policy- based access control. It will be offered as open source.

Blackbook Enhancements and GOTS (Government Off the Shelf)


1.      Geospatial Proximity Algorithm, 2008 2009

      Sonia Chib, Bhavani Thuraisingham, Jyothsna Rachapalli, Latifur Khan

      Implemented geospatial proximity algorithms using Google maps for Blackbook users.


2.      REST Interface and Integration of Amazon.com Web Services into Blackbook, 2008 2009

      Pranav Parikh, Murat Kantarcioglu, Bhavani Thuraisingham

      Implemented the REST Interface to Blackbook. Then using this interface integrated Blackbook with Amazon.com webs services for query processing.


3.      MALLET/Blackbook Integration, 2009 2010

Pranav Pralik, Bhavani Thuraisingham

      Developed a professionalization service for the MALLET Machine learning algorithms and integrated into Blackbook.


4.      NIST NVD Ontology Management, 2009

      Jyothsna Rachapalli, Vaibhav Khadilkar, Bhavani Thuraisingham, NIST

      Developed an ontology based system for specifying the data in the NIST NVD Databases



Open Source Software at the University of Texas at Dallas


1.      SCRUB tool




2.      JENA Contributions, Very Large RDF Graphs





Tool Repositories developed and hosted at UTD


Data Mining Tools


Anonymization Tools



Semantic Web Tools



Secure Cloud Repository