Bhavani Thuraisingham - Publications

Affiliations: 
University of Texas at Dallas, Richardson, TX, United States 
Area:
Computer Science

94 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 She W, Zhu W, Yen I, Bastani F, Thuraisingham B. Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems Ieee Transactions On Services Computing. 9: 940-953. DOI: 10.1109/Tsc.2015.2432795  0.411
2016 Thuraisingham B. Keynote speech: Cloud-centric assured information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9650: IX-X.  0.395
2015 Thuraisingham B. Big data security and privacy Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 279-280. DOI: 10.1145/2699026.2699136  0.377
2015 Moser L, Thuraisingham B, Zhang J. Services in the Cloud Ieee Transactions On Services Computing. 8: 172-174. DOI: 10.1109/Tsc.2015.2410351  0.318
2015 Thuraisingham B, Cadenhead T, Kantarcioglu M, Khadilkar V. Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456. DOI: 10.1109/IRI.2015.75  0.31
2015 Thuraisingham B. Database Security: Past, Present, and Future Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 772-774. DOI: 10.1109/BigDataCongress.2015.128  0.415
2014 Fan L, Lu Z, Wu W, Bi Y, Wang A, Thuraisingham B. An individual-based model of information diffusion combining friends' influence Journal of Combinatorial Optimization. 28: 529-539. DOI: 10.1007/S10878-013-9677-X  0.311
2014 Zhang C, Bertino E, Thuraisingham B, Joshi J. Guest editorial: Information reuse, integration, and reusable systems Information Systems Frontiers. 16: 749-752. DOI: 10.1007/S10796-014-9534-1  0.309
2013 She W, Yen I, Thuraisingham B, Bertino E. Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343. DOI: 10.1109/Tsc.2012.3  0.355
2013 Heatherly R, Kantarcioglu M, Thuraisingham B. Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862. DOI: 10.1109/Tkde.2012.120  0.348
2013 Kallberg J, Thuraisingham B. State actors' offensive cyberoperations: The disruptive power of systematic cyberattacks It Professional. 15: 32-35. DOI: 10.1109/Mitp.2013.20  0.346
2013 Hamlen KW, Thuraisingham B. Data security services, solutions and standards for outsourcing Computer Standards and Interfaces. 35: 1-5. DOI: 10.1016/J.Csi.2012.02.001  0.463
2013 Tozal ME, Wang Y, Al-Shaer E, Sarac K, Thuraisingham B, Chu BT. Adaptive information coding for secure and reliable wireless telesurgery communications Mobile Networks and Applications. 18: 697-711. DOI: 10.1007/S11036-011-0333-3  0.423
2012 Ferrari E, Thuraisingham B. Guest editors' introduction: Special section on data and applications security and privacy Ieee Transactions On Dependable and Secure Computing. 9: 625-626. DOI: 10.1109/Tdsc.2012.58  0.449
2012 Parikh P, Kantarcioglu M, Khadilkar V, Thuraisingham B, Khan L. Secure information integration with a semantic web-based framework Proceedings of the 2012 Ieee 13th International Conference On Information Reuse and Integration, Iri 2012. 659-663. DOI: 10.1109/IRI.2012.6303072  0.346
2012 Hand S, Lin Z, Gu G, Thuraisingham B. Bin-Carver: Automatic recovery of binary executable files Digital Investigation. 9. DOI: 10.1016/J.Diin.2012.05.014  0.33
2012 Lee GS, Thuraisingham B. Cyberphysical systems security applied to telesurgical robotics Computer Standards and Interfaces. 34: 225-229. DOI: 10.1016/J.Csi.2011.09.001  0.388
2012 Cadenhead T, Kantarcioglu M, Khadilkar V, Thuraisingham B. Design and implementation of a cloud-based assured information sharing system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7531: 36-50. DOI: 10.1007/978-3-642-33704-8-4  0.33
2011 Carminati B, Thuraisingham B. Introduction to secure semantic web Computer Standards and Interfaces. 33: 1. DOI: 10.1016/J.Csi.2010.07.003  0.439
2011 Alam A, Khan L, Thuraisingham B. Geospatial Resource Description Framework (GRDF) and security constructs Computer Standards & Interfaces. 33: 35-41. DOI: 10.1016/J.Csi.2010.01.002  0.422
2011 Carminati B, Ferrari E, Heatherly R, Kantarcioglu M, Thuraisingham B. Semantic web-based social network access control Computers and Security. 30: 108-115. DOI: 10.1016/J.Cose.2010.08.003  0.358
2010 She W, Yen IL, Thuraisingham B. Enhancing security modeling for web services using delegation and pass-on International Journal of Web Services Research. 7: 1-21. DOI: 10.4018/Jwsr.2010010101  0.424
2010 Awad M, Khan L, Thuraisingham B. Policy enforcement system for inter-organizational data sharing International Journal of Information Security and Privacy. 4: 22-39. DOI: 10.4018/Jisp.2010070102  0.35
2010 Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security issues for cloud computing International Journal of Information Security and Privacy. 4: 36-48. DOI: 10.4018/Jisp.2010040103  0.42
2010 Thuraisingham B, Hamlen KW. Challenges and future directions of software technology: Secure software development Proceedings - International Computer Software and Applications Conference. 17-20. DOI: 10.1109/COMPSAC.2010.88  0.357
2010 Thuraisingham B, Gritzalis S. Information and communications security, privacy and trust: Standards and regulations Computer Standards and Interfaces. 32: 229. DOI: 10.1016/J.Csi.2010.04.001  0.39
2010 Ramanujam S, Gupta A, Khan L, Seida S, Thuraisingham B. Relationalization of provenance data in complex RDF reification nodes Electronic Commerce Research. 10: 389-421. DOI: 10.1007/S10660-010-9061-1  0.408
2010 Cadenhead T, Kantarcioglu M, Thuraisingham B. Scalable and efficient reasoning for enforcing role-based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 209-224. DOI: 10.1007/978-3-642-13739-6_14  0.328
2010 Thuraisingham B, Khan L, Kantarcioglu M. Semantic Web, data mining, and security Ieee Intelligent Systems. 25: 86-88.  0.35
2009 Thuraisingham B, Tsybulnik N, Alam A. Administering the semantic web: Confidentiality, privacy and trust management Techniques and Applications For Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. 262-277. DOI: 10.4018/978-1-60566-210-7.ch017  0.33
2009 Thuraisingham B, Khan L, Kantarcioglu M, Hamlen K. Assured information sharing for security and intelligence applications Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558617  0.356
2009 Wu J, Manivannan D, Thuraisingham B. Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system Information Sciences. 179: 3659-3672. DOI: 10.1016/J.Ins.2009.06.016  0.35
2009 Hamlen KW, Mohan V, Masud MM, Khan L, Thuraisingham B. Exploiting an antivirus interface Computer Standards and Interfaces. 31: 1182-1189. DOI: 10.1016/J.Csi.2009.04.004  0.333
2009 Thuraisingham B. Data mining for security applications and its privacy implications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5456: 1-6. DOI: 10.1007/978-3-642-01718-6_1  0.334
2008 Yurcik W, Woolam C, Hellings G, Khan L, Thuraisingham B. The SCRUB* Security data sharing infrastructure Noms 2008 - Ieee/Ifip Network Operations and Management Symposium: Pervasive Management For Ubiquitous Networks and Services. 630-644. DOI: 10.1109/NOMS.2008.4575183  0.336
2008 Thuraisingham B. Dependable computing for national security: A position paper Proceedings - Isads 2003: 6th International Symposium On Autonomous Decentralized Systems. 333-334. DOI: 10.1109/ISADS.2003.1193967  0.332
2008 Alam A, Khan L, Thuraisingham B. Geospatial Resource Description Framework (GRDF) and security constructs Proceedings - International Conference On Data Engineering. 475-481. DOI: 10.1109/ICDEW.2008.4498363  0.327
2008 Thuraisingham B, Parikh P. Trustworthy semantic web technologies for secure knowledge management Proceedings of the 5th International Conference On Embedded and Ubiquitous Computing, Euc 2008. 2: 186-193. DOI: 10.1109/EUC.2008.174  0.325
2008 Thuraisingham B. Assured information sharing: Technologies, challenges and directions Studies in Computational Intelligence. 135: 1-15. DOI: 10.1007/978-3-540-69209-6_1  0.397
2007 Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse International Journal of Business Intelligence and Data Mining. 2: 367-382. DOI: 10.1504/Ijbidm.2007.016379  0.457
2007 Thuraisingham B. Multimedia systems security Mm and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 1-2. DOI: 10.1145/1288869.1288870  0.408
2007 Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B. PP-trust-X: A system for privacy preserving trust negotiations Acm Transactions On Information and System Security. 10: 12. DOI: 10.1145/1266977.1266981  0.442
2007 Thuraisingham B. Confidentiality, privacy and trust policy enforcement for the semantic web Proceedings - Eighth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2007. 8-11. DOI: 10.1109/POLICY.2007.12  0.384
2007 Kim J, Thuraisingham B. Design of secure CAMIN application system based on dependable and secure TMO and RT-UCON Proceedings - 10th Ieee International Symposium On Object and Component-Oriented Real-Time Distributed Computing, Isorc 2007. 146-154. DOI: 10.1109/ISORC.2007.28  0.373
2007 Hamlen KW, Thuraisingham B. Secure peer-to-peer networks for trusted collaboration Proceedings of the 3rd International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2007. 58-63. DOI: 10.1109/COLCOM.2007.4553810  0.398
2007 Thuraisingham B, Iyer S. Extended RBAC - Based design and implementation for a secure data warehouse Proceedings - Second International Conference On Availability, Reliability and Security, Ares 2007. 821-828. DOI: 10.1109/ARES.2007.86  0.368
2007 She W, Thuraisingham B. Security for Enterprise Resource Planning Systems Information Systems Security. 16: 152-163. DOI: 10.1080/10658980701401959  0.438
2007 Harris D, Khan L, Paul R, Thuraisingham B. Standards for secure data sharing across organizations Computer Standards and Interfaces. 29: 86-96. DOI: 10.1016/J.Csi.2006.01.004  0.408
2007 Lavee G, Khan L, Thuraisingham B. A framework for a video analysis tool for suspicious event detection Multimedia Tools and Applications. 35: 109-123. DOI: 10.1007/S11042-007-0117-8  0.305
2007 Thuraisingham B. Security and privacy for multimedia database management systems Multimedia Tools and Applications. 33: 13-29. DOI: 10.1007/S11042-006-0096-1  0.471
2006 Abedin M, Nessa S, Khan L, Thuraisingham B. Detection and resolution of anomalies in firewall policy rules Lecture Notes in Computer Science. 15-29. DOI: 10.1007/11805588_2  0.34
2006 Agarwal P, Prabhakaran B, Thuraisingham B. Uncertainty: An extra layer of security for unauthorized traffic based web services Proceedings: Dms 2006 - 12th International Conference On Distributed Multimedia Systems. 53-58.  0.326
2005 Thuraisingham B, Khan L. Secure semantic grids Web and Information Security. 91-110. DOI: 10.4018/978-1-59140-588-7.ch005  0.31
2005 Thuraisingham B. Directions for security and privacy for Semantic e-business applications Communications of the Acm. 48: 71-73. DOI: 10.1145/1101779.1101812  0.482
2005 Yau SS, Bonatti PA, Feng D, Thuraisingham B. Plenary panel session security and privacy in collaborative distributed systems Proceedings - International Computer Software and Applications Conference. 1: 267. DOI: 10.1109/COMPSAC.2005.137  0.376
2005 Thuraisingham B. Security standards for the semantic web Computer Standards and Interfaces. 27: 257-268. DOI: 10.1016/J.Csi.2004.07.002  0.472
2005 Youn I, Farkas C, Thuraisingham B. Multilevel secure teleconferencing over public switched telephone network Lecture Notes in Computer Science. 99-113. DOI: 10.1007/11535706_8  0.431
2005 Song G, Zhang K, Thuraisingham B, Kong J. Secure model management operations for the web Lecture Notes in Computer Science. 237-251. DOI: 10.1007/11535706_18  0.45
2005 Thuraisingham B. Privacy-preserving data mining: Developments and directions Journal of Database Management. 16: 75-87.  0.304
2005 Youn I, Farkas C, Thuraisingham B. Multilevel secure teleconferencing over public switched telephone network Lecture Notes in Computer Science. 3654: 99-113.  0.349
2004 Thuraisingham B. Security and privacy issues for sensor databases Sensor Letters. 2: 37-47. DOI: 10.1166/Sl.2004.022  0.362
2004 Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents Ieee Transactions On Knowledge and Data Engineering. 16: 1263-1278. DOI: 10.1109/Tkde.2004.63  0.477
2004 Thuraisingham B. Journal of Intelligent Information Systems: Editorial Journal of Intelligent Information Systems. 23: 207-208. DOI: 10.1023/B:Jiis.0000047391.45782.5A  0.318
2004 Thuraisingham B. Data and applications security: Past, present and the future Ifip Advances in Information and Communication Technology. 142: 375-390. DOI: 10.1016/S0169-023X(02)00125-8  0.425
2004 Thuraisingham B. Data mining for security applications Proceedings of the 2004 International Conference On Machine Learning and Applications, Icmla '04. 3-4. DOI: 10.1007/11734628_1  0.359
2004 Carminati B, Ferrari E, Thuraisingham B. Using RDF for policy specification and enforcement International Conference On Database and Expert Systems Applications - Dexa. 15: 163-167.  0.317
2004 Thuraisingham B. Data mining for security applications Proceedings of the 2004 International Conference On Machine Learning and Applications, Icmla '04. 3-4.  0.359
2004 Ferrari E, Thuraisingham B. Security and privacy for web databases and services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2992: 17-28.  0.36
2003 Thuraisingham B. Security Issues for the Semantic Web Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 633-638.  0.382
2002 Thuraisingham B. Data mining, national security, privacy and civil liberties Sigkdd Explorations. 4: 1-5. DOI: 10.1145/772862.772863  0.395
2002 Thuraisingham B. Data and applications security: Developments and directions Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 963-965. DOI: 10.1109/CMPSAC.2002.1045130  0.404
2002 Thuraisingham B, Ferrari E. Web and information security: Workshop summary Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 933. DOI: 10.1109/CMPSAC.2002.1045124  0.391
2002 Thuraisingham B. Building secure survivable semantic webs Proceedings of the International Conference On Tools With Artificial Intelligence. 395-398.  0.306
2001 Dipippo LC, Wolfe VF, Esibov L, Cooper G, Bethmangalkar R, Johnston R, Thuraisingham B, Mauer J. Scheduling and priority mapping for static real-time middleware Real-Time Systems. 20: 155-182. DOI: 10.1023/A:1008189804392  0.325
2001 Thuraisingham B. Security for Distributed Databases Information Security Technical Report. 6: 95-102. DOI: 10.1016/S1363-4127(01)00210-2  0.301
2001 Clifton C, Thuraisingham B. Emerging standards for data mining Computer Standards and Interfaces. 23: 187-193. DOI: 10.1016/S0920-5489(01)00072-1  0.325
2001 Thuraisingham B. Web security and privacy Ifip Advances in Information and Communication Technology. 73: 125-126.  0.383
2000 Fay-Wolfe V, DiPippo LC, Cooper G, Johnston R, Kortmann P, Thuraisingham B. Real-time CORBA Ieee Transactions On Parallel and Distributed Systems. 11: 1073-1089. DOI: 10.1109/71.888646  0.303
1999 Thuraisingham B. Towards developing a standard multilevel relational data model for representing a multilevel universe Computer Standards and Interfaces. 20: 307-321. DOI: 10.1016/S0920-5489(98)00067-1  0.378
1996 Thuraisingham B, Ting TC. Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology Ieee Transactions On Knowledge and Data Engineering. 8: 1-2. DOI: 10.1109/Tkde.1996.485624  0.501
1996 Son SH, David R, Thuraisingham B. Improving Timeliness in Real-Time Secure Database Systems Sigmod Record (Acm Special Interest Group On Management of Data). 25: 29-33.  0.364
1995 Thuraisingham B, Ford W. Security Constraint Processing in a Multilevel Secure Distributed Database Management System Ieee Transactions On Knowledge and Data Engineering. 7: 274-293. DOI: 10.1109/69.382297  0.492
1995 Thuraisingham B, Williams J. Introduction to the special issue on Computer security and standards: Overview of security-standards activities Computer Standards and Interfaces. 17: 313. DOI: 10.1016/0920-5489(95)00010-R  0.421
1995 Thuraisingham B. Multilevel security for information retrieval systems - II Information and Management. 28: 49-61. DOI: 10.1016/0378-7206(94)00028-H  0.469
1994 Thuraisingham B. Security issues for federated database systems Computers and Security. 13: 509-525. DOI: 10.1016/0167-4048(91)90139-5  0.475
1993 Thuraisingham B, Rubinovitz H. Object-oriented approach to interconnecting trusted database management systems Acm Sigsac Review. 11: 2-10. DOI: 10.1145/153949.153951  0.303
1993 Thuraisingham B, Ford W, Collins M, O'Keeffe J. Design and implementation of a database inference controller Data and Knowledge Engineering. 11: 271-297. DOI: 10.1016/0169-023X(93)90025-K  0.36
1993 Rubinovitz H, Thuraisingham B. Design and implementation of a query processor for a trusted distributed data base management system The Journal of Systems and Software. 21: 49-69. DOI: 10.1016/0164-1212(93)90017-R  0.478
1992 Thuraisingham B. Secure interoperability of trusted database management systems Acm Sigsac Review. 10: 8-11. DOI: 10.1145/147092.147094  0.411
1992 Thuraisingham B, Rubinovitz HH. Multilevel security issues in distributed database management systems-III Computers and Security. 11: 661-674. DOI: 10.1016/0167-4048(92)90146-I  0.336
1991 Thuraisingham B. Multilevel security issues in distributed database management systems II Computers and Security. 10: 727-747. DOI: 10.1016/0167-4048(91)90093-S  0.491
1990 Thuraisingham B. Computing Transitive Closures of Multilevel Relations Acm Sigmod Record. 19: 17-23. DOI: 10.1145/101077.101081  0.337
1990 Stachour PD, Thuraisingham B. Design of LDV: A Multilevel Secure Relational Database Management System Ieee Transactions On Knowledge and Data Engineering. 2: 190-209. DOI: 10.1109/69.54719  0.482
1990 Stachour P, Thuraisingham B. SQL extensions for security assertions Computer Standards and Interfaces. 11: 5-14. DOI: 10.1016/0920-5489(90)90067-P  0.44
Show low-probability matches.