Bhavani Thuraisingham

Affiliations: 
University of Texas at Dallas, Richardson, TX, United States 
Area:
Computer Science
Google:
"Bhavani Thuraisingham"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

She W, Zhu W, Yen I, et al. (2016) Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems Ieee Transactions On Services Computing. 9: 940-953
Thuraisingham B. (2016) Keynote speech: Cloud-centric assured information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9650: IX-X
Thuraisingham B. (2015) Big data security and privacy Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 279-280
Moser L, Thuraisingham B, Zhang J. (2015) Services in the Cloud Ieee Transactions On Services Computing. 8: 172-174
Thuraisingham B, Cadenhead T, Kantarcioglu M, et al. (2015) Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456
Thuraisingham B. (2015) Database Security: Past, Present, and Future Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 772-774
Fan L, Lu Z, Wu W, et al. (2014) An individual-based model of information diffusion combining friends' influence Journal of Combinatorial Optimization. 28: 529-539
Zhang C, Bertino E, Thuraisingham B, et al. (2014) Guest editorial: Information reuse, integration, and reusable systems Information Systems Frontiers. 16: 749-752
She W, Yen I, Thuraisingham B, et al. (2013) Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343
Heatherly R, Kantarcioglu M, Thuraisingham B. (2013) Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862
See more...