Bhavani Thuraisingham
Affiliations: | University of Texas at Dallas, Richardson, TX, United States |
Area:
Computer ScienceGoogle:
"Bhavani Thuraisingham"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
She W, Zhu W, Yen I, et al. (2016) Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems Ieee Transactions On Services Computing. 9: 940-953 |
Thuraisingham B. (2016) Keynote speech: Cloud-centric assured information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9650: IX-X |
Thuraisingham B. (2015) Big data security and privacy Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 279-280 |
Moser L, Thuraisingham B, Zhang J. (2015) Services in the Cloud Ieee Transactions On Services Computing. 8: 172-174 |
Thuraisingham B, Cadenhead T, Kantarcioglu M, et al. (2015) Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456 |
Thuraisingham B. (2015) Database Security: Past, Present, and Future Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 772-774 |
Fan L, Lu Z, Wu W, et al. (2014) An individual-based model of information diffusion combining friends' influence Journal of Combinatorial Optimization. 28: 529-539 |
Zhang C, Bertino E, Thuraisingham B, et al. (2014) Guest editorial: Information reuse, integration, and reusable systems Information Systems Frontiers. 16: 749-752 |
She W, Yen I, Thuraisingham B, et al. (2013) Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343 |
Heatherly R, Kantarcioglu M, Thuraisingham B. (2013) Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862 |