B Thuraisingham
Affiliations: | University of Texas at Dallas, Richardson, TX, United States |
Area:
Computer ScienceGoogle:
"B Thuraisingham"Children
Sign in to add traineeRyan P. Layfield | grad student | 2008 | UT Dallas |
Tyrone Cadenhead | grad student | 2011 | UT Dallas |
Jeffrey Partyka | grad student | 2011 | UT Dallas |
Wei She | grad student | 2011 | UT Dallas |
Neda Alipanah | grad student | 2012 | UT Dallas |
Vaibhav Khadilkar | grad student | 2013 | UT Dallas |
Pallabi Parveen | grad student | 2013 | UT Dallas |
Lidan Fan | grad student | 2014 | UT Dallas |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
She W, Zhu W, Yen I, et al. (2016) Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems Ieee Transactions On Services Computing. 9: 940-953 |
Thuraisingham B. (2016) Keynote speech: Cloud-centric assured information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9650: IX-X |
Thuraisingham B. (2015) Big data security and privacy Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 279-280 |
Moser L, Thuraisingham B, Zhang J. (2015) Services in the Cloud Ieee Transactions On Services Computing. 8: 172-174 |
Thuraisingham B, Cadenhead T, Kantarcioglu M, et al. (2015) Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456 |
Thuraisingham B. (2015) Database Security: Past, Present, and Future Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 772-774 |
Lu Z, Fan L, Wu W, et al. (2014) Efficient influence spread estimation for influence maximization under the linear threshold model Computational Social Networks. 1: 2 |
Fan L, Lu Z, Wu W, et al. (2014) An individual-based model of information diffusion combining friends' influence Journal of Combinatorial Optimization. 28: 529-539 |
She W, Yen I, Thuraisingham B, et al. (2013) Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343 |
Heatherly R, Kantarcioglu M, Thuraisingham B. (2013) Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862 |