Search the dblp DataBase
Bhavani M. Thuraisingham :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Bhavani M. Thuraisingham Mandatory Security in Object-Oriented Database Systems. [Citation Graph (5, 0)][DBLP ] OOPSLA, 1989, pp:203-210 [Conf ] Paul D. Stachour , Bhavani M. Thuraisingham Design of LDV: A Multilevel Secure Relational Database Management System. [Citation Graph (3, 5)][DBLP ] IEEE Trans. Knowl. Data Eng., 1990, v:2, n:2, pp:190-209 [Journal ] Matthew Morgenstern , Teresa F. Lunt , Bhavani M. Thuraisingham , David L. Spooner Security Issues in Federated Database Systems: Panel Contributions. [Citation Graph (2, 0)][DBLP ] DBSec, 1991, pp:131-148 [Conf ] Bhavani M. Thuraisingham The Use of Conceptual Structures for Handling the Inference Problem. [Citation Graph (2, 0)][DBLP ] DBSec, 1991, pp:333-362 [Conf ] Thomas F. Keefe , Bhavani M. Thuraisingham , Wei-Tek Tsai Secure Query-Processing Strategies. [Citation Graph (2, 0)][DBLP ] IEEE Computer, 1989, v:22, n:3, pp:63-70 [Journal ] Bhavani M. Thuraisingham Towards the Design of a Secure Data/Knowledge Base Management System. [Citation Graph (2, 0)][DBLP ] Data Knowl. Eng., 1990, v:5, n:, pp:59-72 [Journal ] Sang Hyuk Son , Rasikan David , Bhavani M. Thuraisingham An Adaptive Policy for Improved Timeliness in Secure Database Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1995, pp:199-214 [Conf ] Bhavani M. Thuraisingham Multilevel Security for Multimedia Database Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1990, pp:99-116 [Conf ] P. Dwyer , George D. Jelatis , Bhavani M. Thuraisingham Multilevel Security in Database Management Systems. [Citation Graph (1, 0)][DBLP ] Computers & Security, 1987, v:6, n:3, pp:252-260 [Journal ] Bhavani M. Thuraisingham , William Ford , M. Collins , J. O'Keeffe Design and Implementation of a Database Inference Controller. [Citation Graph (1, 0)][DBLP ] Data Knowl. Eng., 1993, v:11, n:3, pp:271-0 [Journal ] Kingsley C. Nwosu , Bhavani M. Thuraisingham , P. Bruce Berra Multimedia Database Systems - A New Frontier (Guest Editors' Introduction). [Citation Graph (1, 0)][DBLP ] IEEE MultiMedia, 1997, v:4, n:3, pp:21-23 [Journal ] Sang Hyuk Son , Rasikan David , Bhavani M. Thuraisingham Improving Timeliness in Real-Time Secure Database Systems. [Citation Graph (1, 0)][DBLP ] SIGMOD Record, 1996, v:25, n:1, pp:29-33 [Journal ] Bhavani M. Thuraisingham Current Status of R&D in Trusted Database Management Systems. [Citation Graph (1, 0)][DBLP ] SIGMOD Record, 1992, v:21, n:3, pp:44-50 [Journal ] Bhavani M. Thuraisingham , Hai-Ping Ko Concurrency Control in Trusted Database Management Systems: A Survey. [Citation Graph (1, 0)][DBLP ] SIGMOD Record, 1993, v:22, n:4, pp:52-59 [Journal ] Bhavani M. Thuraisingham , William Ford Security Constraints in a Multilevel Secure Distributed Database Management System. [Citation Graph (1, 5)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:2, pp:274-293 [Journal ] Harvey Rubinovitz , Bhavani M. Thuraisingham Security Constraint Processing in a Distributed Database Environment. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1994, pp:356-363 [Conf ] Bhavani M. Thuraisingham Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1995, pp:216-221 [Conf ] Bhavani M. Thuraisingham , William Ford Parallel Processing and Trusted Database Management Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1993, pp:162-167 [Conf ] Bhavani M. Thuraisingham Network and Web Security and E-Commerce and Other Applications. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:131- [Conf ] Bhavani M. Thuraisingham Data and Applications Security: Developments and Directions. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:963-965 [Conf ] Bhavani M. Thuraisingham Security Issues for the Semantic Web. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2003, pp:632-637 [Conf ] Bhavani M. Thuraisingham Trust Management in a Distributed Environment. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:561-562 [Conf ] Bhavani M. Thuraisingham Panel Overview. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1998, pp:260-261 [Conf ] Bhavani M. Thuraisingham , Marion G. Ceruti Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:171-175 [Conf ] Bhavani M. Thuraisingham , Elena Ferrari Web and Information Security: Workshop Summary. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:933- [Conf ] Bhavani M. Thuraisingham A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:127-138 [Conf ] Bhavani M. Thuraisingham A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:135-146 [Conf ] Muhammad Abedin , Syeda Nessa , Latifur Khan , Bhavani M. Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:15-29 [Conf ] David Chadwick , Martin S. Olivier , Pierangela Samarati , Eleanor Sharpston , Bhavani M. Thuraisingham Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:331-346 [Conf ] Tsau Young Lin , Thomas H. Hinke , Donald G. Marks , Bhavani M. Thuraisingham Security and Data Mining. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:391-399 [Conf ] Donald G. Marks , Leonard J. Binns , Bhavani M. Thuraisingham Hypersemantic Data Modeling for Inference Analysis. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:157-180 [Conf ] Sylvia L. Osborn , Bhavani M. Thuraisingham , Pierangela Samarati Panel on XML and Security. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:317-323 [Conf ] Guang-Lei Song , Kang Zhang , Bhavani M. Thuraisingham , Jun Kong Secure Model Management Operations for the Web. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:237-251 [Conf ] Peter J. Sell , Bhavani M. Thuraisingham Applying OMT for Designing Multilevel Database Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:41-64 [Conf ] Arnon Rosenthal , James Williams , William R. Herndon , Bhavani M. Thuraisingham A Fine-grained Access Control Model for Object-Oriented DBMSs. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:319-334 [Conf ] D. J. Thomsen , W. T. Tsai , Bhavani M. Thuraisingham Prototyping as a Research Tool for MLS/DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:63-84 [Conf ] Bhavani M. Thuraisingham Web Security and Privacy (Panel). [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:125-126 [Conf ] Bhavani M. Thuraisingham Data and Applications Security: Past, Present and the Future. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:375-390 [Conf ] Bhavani M. Thuraisingham Workshop Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:357-362 [Conf ] Bhavani M. Thuraisingham Security Issues for Data Warehousing and Data Mining. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:11-20 [Conf ] Bhavani M. Thuraisingham , Sushil Jajodia , Pierangela Samarati , John E. Dobson , Martin S. Olivier Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:269-284 [Conf ] Bhavani M. Thuraisingham , Linda Schlipper , Pierangela Samarati , Tsau Young Lin , Sushil Jajodia , Chris Clifton Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:3-16 [Conf ] Inja Youn , Csilla Farkas , Bhavani M. Thuraisingham Multilevel Secure Teleconferencing over Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:99-113 [Conf ] Georges G. Grinstein , Bhavani M. Thuraisingham Data Mining and Data Visualization. [Citation Graph (0, 0)][DBLP ] Workshop on Database Issues for Data Visualization, 1995, pp:54-56 [Conf ] Daniel A. Keim , John Peter Lee , Bhavani M. Thuraisingham , Craig M. Wittenbrink Database Issues for Data Visualization: Supporting Interactive Database Explorartion. [Citation Graph (0, 0)][DBLP ] Workshop on Database Issues for Data Visualization, 1995, pp:12-25 [Conf ] Barbara Carminati , Elena Ferrari , Bhavani M. Thuraisingham Using RDF for Policy Specification and Enforcement. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2004, pp:163-167 [Conf ] Elena Ferrari , Bhavani M. Thuraisingham Security and Privacy for Web Databases and Services. [Citation Graph (0, 0)][DBLP ] EDBT, 2004, pp:17-28 [Conf ] Minos N. Garofalakis , Ioana Manolescu , Marco Mesiti , George A. Mihaila , Ralf Schenkel , Bhavani M. Thuraisingham , Vasilis Vassalos What's Next in XML and Databases? [Citation Graph (0, 0)][DBLP ] EDBT Workshops, 2004, pp:318-324 [Conf ] Guang-Lei Song , Kang Zhang , Bhavani M. Thuraisingham , Jiannong Cao Towards Access Control for Visual Web Model Management. [Citation Graph (0, 0)][DBLP ] EEE, 2005, pp:722-727 [Conf ] Bhavani M. Thuraisingham , John A. Maurer Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems. [Citation Graph (0, 0)][DBLP ] FTDCS, 1999, pp:242-245 [Conf ] Bhavani M. Thuraisingham Database Management and the Internet: Developments and Challenges. [Citation Graph (0, 0)][DBLP ] High-Performance Web Databases, 2001, pp:549-554 [Conf ] Hany M. Atchan , Rob Bell , Bhavani M. Thuraisingham Knowledge-Based Support for the Development of Database-Centered Applications. [Citation Graph (0, 7)][DBLP ] ICDE, 1989, pp:394-401 [Conf ] Bhavani M. Thuraisingham , Sandra Heiler , Arnon Rosenthal , Susan Malaika Migrating Legacy Databases and Applications (Panel). [Citation Graph (0, 0)][DBLP ] ICDE, 1998, pp:314- [Conf ] Li Liu , Bhavani M. Thuraisingham The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. [Citation Graph (0, 0)][DBLP ] ICDM Workshops, 2006, pp:507-512 [Conf ] Edward H. Bensley , Lawrence Fisher , Mike Gates , James Houchens , Arkady Kanevsky , SooHee Kim , Peter C. Krupp , Alice Schafer , Bhavani M. Thuraisingham Evolvable real-time C3 systems. [Citation Graph (0, 0)][DBLP ] ICECCS, 1995, pp:153-0 [Conf ] Bhavani M. Thuraisingham , Arkady Kanevsky , Peter C. Krupp , Alice Schafer , Mike Gates , Thomas Wheeler , Edward H. Bensley , Ruth Ann Sigel , Michael Squadrito Evolvable Real-Time C3 Systems-II: Real-Time Infrastructure Requirements. [Citation Graph (0, 0)][DBLP ] ICECCS, 1996, pp:473-482 [Conf ] Bhavani M. Thuraisingham Building Secure Survivable Semantic Webs. [Citation Graph (0, 0)][DBLP ] ICTAI, 2002, pp:395-398 [Conf ] Pallabi Parveen , Bhavani M. Thuraisingham Face Recognition Using Multiple Classifiers. [Citation Graph (0, 0)][DBLP ] ICTAI, 2006, pp:179-186 [Conf ] John A. Maurer , Roman Ginis , Richard Freedman , Michael Squadrito , Steven Wohlever , Bhavani M. Thuraisingham Adaptable Real-Time Distributed Object Management for Command and Control Systems. [Citation Graph (0, 0)][DBLP ] ISADS, 1999, pp:42-0 [Conf ] Bhavani M. Thuraisingham Dependable Computing for National Security. [Citation Graph (0, 0)][DBLP ] ISADS, 2003, pp:333-0 [Conf ] Bhavani M. Thuraisingham Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems. [Citation Graph (0, 0)][DBLP ] ISADS, 1999, pp:89-0 [Conf ] Richard Freedman , John A. Maurer , Steven Wohlever , Bhavani M. Thuraisingham , Victor Fay Wolfe , Michael Milligan Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications. [Citation Graph (0, 0)][DBLP ] ISORC, 2000, pp:202-205 [Conf ] Insup Lee , Mike Jones , Hermann Kopetz , K. H. Kim , Thomas F. Lawrence , Bhavani M. Thuraisingham Fundamental R&D Issues in Real-Time Distributed Computing. [Citation Graph (0, 0)][DBLP ] ISORC, 2000, pp:215-0 [Conf ] Jungin Kim , Bhavani M. Thuraisingham Dependable and Secure TMO Scheme. [Citation Graph (0, 0)][DBLP ] ISORC, 2006, pp:133-140 [Conf ] Michael Squadrito , Levon Esibov , Lisa Cingiser DiPippo , Victor Fay Wolfe , Gregory Cooper , Bhavani M. Thuraisingham , Peter C. Krupp , Michael Milligan , Russell Johnston Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols. [Citation Graph (0, 0)][DBLP ] ISORC, 1998, pp:96-105 [Conf ] Bhavani M. Thuraisingham , Chris Clifton , John A. Maurer , Marion G. Ceruti Real-Time Data Mining of Multimedia Objects. [Citation Graph (0, 0)][DBLP ] ISORC, 2001, pp:360-365 [Conf ] Bhavani M. Thuraisingham , Latifur Khan , Chris Clifton , John A. Maurer , Marion G. Ceruti Dependable Real-Time Data Mining. [Citation Graph (0, 0)][DBLP ] ISORC, 2005, pp:158-165 [Conf ] Steven Wohlever , Victor Fay Wolfe , Bhavani M. Thuraisingham , Richard Freedman , John A. Maurer CORBA-based Real-time Trader Service for Adaptable Command and Control Systems. [Citation Graph (0, 0)][DBLP ] ISORC, 1999, pp:64-0 [Conf ] Bhavani M. Thuraisingham Secure Multimedia Data Management Research Directions. [Citation Graph (0, 0)][DBLP ] ISMSE, 2002, pp:- [Conf ] Bhavani M. Thuraisingham Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1993, pp:304- [Conf ] Bhavani M. Thuraisingham , Ravi S. Sandhu , T. C. Ting Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:1-7 [Conf ] Bhavani M. Thuraisingham Data Mining for Surveillance Applications. [Citation Graph (0, 0)][DBLP ] PAKDD, 2006, pp:12-14 [Conf ] Bhavani M. Thuraisingham Data Mining and Cyber Security. [Citation Graph (0, 0)][DBLP ] QSIC, 2003, pp:2-0 [Conf ] Roman Ginis , Eric Hughes , Steven Wohlever , Bhavani M. Thuraisingham , Peter C. Krupp , John A. Maurer Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems. [Citation Graph (0, 0)][DBLP ] RTDB, 1997, pp:77-0 [Conf ] Bhavani M. Thuraisingham , Gal Lavee , Elisa Bertino , Jianping Fan , Latifur Khan Access control, confidentiality and privacy for video surveillance databases. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:1-10 [Conf ] Bhavani M. Thuraisingham , Eric Hughes Data quality: developments and directions. [Citation Graph (0, 0)][DBLP ] IICIS, 2001, pp:97-102 [Conf ] Eric Hughes , Roman Ginis , Bhavani M. Thuraisingham , Peter C. Krupp , John A. Maurer Data Manager for Evolvable Real-time Command and Control Systems. [Citation Graph (0, 1)][DBLP ] VLDB, 1997, pp:558-561 [Conf ] Bhavani M. Thuraisingham , Chris Clifton , Amar Gupta , Elisa Bertino , Elena Ferrari Directions for Web and E-Commerce Applications Security. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:200-204 [Conf ] Bhavani M. Thuraisingham Data Mining for Security Applications. [Citation Graph (0, 0)][DBLP ] WISI, 2006, pp:1-3 [Conf ] Bhavani M. Thuraisingham Dependable Infrastructures and Data Managers for Sensor Networks. [Citation Graph (0, 0)][DBLP ] WORDS Fall, 2003, pp:11-0 [Conf ] Bhavani M. Thuraisingham , Eric Hughes , Dock Allen Dependable Semantic Web. [Citation Graph (0, 0)][DBLP ] WORDS, 2002, pp:305-310 [Conf ] Barbara Carminati , Elena Ferrari , Bhavani M. Thuraisingham Access control for web data: models and policy languages. [Citation Graph (0, 0)][DBLP ] Annales des Télécommunications, 2006, v:61, n:3-4, pp:245-266 [Journal ] Bhavani M. Thuraisingham Directions for security and privacy for semantic e-business applications. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:12, pp:71-73 [Journal ] Bhavani M. Thuraisingham Multilevel security issues in distributed database management systems II. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:8, pp:727-747 [Journal ] Bhavani M. Thuraisingham Security issues for federated database systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:6, pp:509-525 [Journal ] Bhavani M. Thuraisingham , Harvey H. Rubinovitz Multilevel security issues in distributed database management systems - III. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:7, pp:661-674 [Journal ] Bhavani M. Thuraisingham Privacy constraint processing in a privacy-enhanced database management system. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2005, v:55, n:2, pp:159-188 [Journal ] Bhavani M. Thuraisingham , Reind P. van de Riet Data and applications security (Guest editorial). [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:235-236 [Journal ] Bhavani M. Thuraisingham Managing and Mining Multimedia Databases. [Citation Graph (0, 0)][DBLP ] International Journal on Artificial Intelligence Tools, 2004, v:13, n:3, pp:739-0 [Journal ] Bhavani M. Thuraisingham Web Information Management and its Application to Electronic Commerce. [Citation Graph (0, 0)][DBLP ] International Journal on Artificial Intelligence Tools, 1999, v:8, n:2, pp:107-117 [Journal ] Bhavani M. Thuraisingham Representation of One-One Degrees by Decision Problems for System Functions. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1982, v:24, n:3, pp:373-377 [Journal ] Bhavani M. Thuraisingham Editorial. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2004, v:23, n:3, pp:207-208 [Journal ] Donald G. Marks , Peter J. Sell , Bhavani M. Thuraisingham MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications. [Citation Graph (0, 0)][DBLP ] JOOP, 1996, v:9, n:4, pp:22-29 [Journal ] Bhavani M. Thuraisingham Towards the Design of a Multilevel Secure Object-Oriented Database Management System. [Citation Graph (0, 0)][DBLP ] JOOP, 1995, v:8, n:3, pp:42-49 [Journal ] Harvey Rubinovitz , Bhavani M. Thuraisingham Design and implementation of a query processor for a trusted distributed data base management system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1993, v:21, n:1, pp:49-69 [Journal ] Bhavani M. Thuraisingham System Function Languages. [Citation Graph (0, 0)][DBLP ] Math. Log. Q., 1993, v:39, n:, pp:357-366 [Journal ] Bhavani M. Thuraisingham Security and privacy for multimedia database management systems. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2007, v:33, n:1, pp:13-29 [Journal ] Shail Arora , Mamdouh Ibrahim , Bhavani M. Thuraisingham , T. C. Ting Object-oriented technology for health care and medical information systems. [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:4, pp:122-126 [Journal ] Bhavani M. Thuraisingham , Ravi S. Sandhu , T. C. Ting Security for object-oriented systems. [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:2, pp:77-78 [Journal ] Bhavani M. Thuraisingham , T. C. Ting , Peter J. Sell , Ravi S. Sandhu , Thomas F. Keefe Integrating security technology and object-oriented technology (panel). [Citation Graph (0, 0)][DBLP ] OOPS Messenger, 1994, v:5, n:2, pp:59-61 [Journal ] Lisa Cingiser DiPippo , Victor Fay Wolfe , Levon Esibov , Gregory Cooper , Ramachandra Bethmangalkar , Russell Johnston , Bhavani M. Thuraisingham , John Mauer Scheduling and Priority Mapping for Static Real-Time Middleware. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 2001, v:20, n:2, pp:155-182 [Journal ] Bhavani M. Thuraisingham Data Mining, National Security, Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:1-5 [Journal ] P. Bruce Berra , Kingsley C. Nwosu , Bhavani M. Thuraisingham ACM Multimedia '94 Conference Workshop on Multimedia Database Management Systems. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1995, v:24, n:1, pp:70-72 [Journal ] Arnon Rosenthal , Leonard J. Seligman , Catherine D. McCollum , Barbara T. Blaustein , Bhavani M. Thuraisingham , Edward Lafferty Data Management Research at The MITRE Corporation. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1995, v:24, n:3, pp:77-82 [Journal ] Bhavani M. Thuraisingham Computing Transitive Closures of Multilevel Relations. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1990, v:19, n:3, pp:17-23 [Journal ] Elisa Bertino , Barbara Carminati , Elena Ferrari , Bhavani M. Thuraisingham , Amar Gupta Selective and Authentic Third-Party Distribution of XML Documents. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1263-1278 [Journal ] Bhavani M. Thuraisingham , John A. Maurer Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 1999, v:11, n:1, pp:228-238 [Journal ] Bhavani M. Thuraisingham , T. C. Ting Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. [Citation Graph (0, 1)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:1-2 [Journal ] Victor Fay Wolfe , Lisa Cingiser DiPippo , Gregory Cooper , Russell Johnston , Peter Kortmann , Bhavani M. Thuraisingham Real-Time CORBA. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:10, pp:1073-1089 [Journal ] Shyh-Kwei Chen , Wei-Tek Tsai , Bhavani M. Thuraisingham Recovery Point Selection on a Reverse Binary Tree Task Model. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:8, pp:963-976 [Journal ] Elisa Bertino , L. R. Khan , Ravi S. Sandhu , Bhavani M. Thuraisingham Secure knowledge management: confidentiality, trust, and privacy. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:429-438 [Journal ] Elena Ferrari , Bhavani M. Thuraisingham Guest editorial: special issue on privacy preserving data management. [Citation Graph (0, 0)][DBLP ] VLDB J., 2006, v:15, n:4, pp:291-292 [Journal ] Ryan Layfield , Murat Kantarcioglu , Bhavani M. Thuraisingham Enforcing Honesty in Assured Information Sharing Within a Distributed System. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:113-128 [Conf ] Ashraful Alam , Ganesh Subbiah , Latifur Khan , Bhavani M. Thuraisingham DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework. [Citation Graph (0, 0)][DBLP ] GeoS, 2007, pp:268-277 [Conf ] Chuanjun Li , Latifur Khan , Bhavani M. Thuraisingham , M. Husain , Shaofei Chen , Fang Qiu Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:254-261 [Conf ] Ebru Celikel , Murat Kantarcioglu , Bhavani M. Thuraisingham , Elisa Bertino Managing Risks in RBAC Employed Distributed Environments. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1548-1566 [Conf ] Mohammad M. Masud , Latifur Khan , Bhavani M. Thuraisingham Feature Based Techniques for Auto-Detection of Novel Email Worms. [Citation Graph (0, 0)][DBLP ] PAKDD, 2007, pp:205-216 [Conf ] Bhavani M. Thuraisingham Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:8-11 [Conf ] Bhavani M. Thuraisingham Multimedia systems security. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:1-2 [Conf ] William Yurcik , Clay Woolam , Greg Hellings , Latifur Khan , Bhavani M. Thuraisingham Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Bhavani M. Thuraisingham Privacy-Preserving Data Mining: Development and Directions. [Citation Graph (0, 0)][DBLP ] J. Database Manag., 2005, v:16, n:1, pp:75-87 [Journal ] Gal Lavee , Latifur Khan , Bhavani M. Thuraisingham A framework for a video analysis tool for suspicious event detection. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2007, v:35, n:1, pp:109-123 [Journal ] Anna Cinzia Squicciarini , Elisa Bertino , Elena Ferrari , Federica Paci , Bhavani M. Thuraisingham PP-trust-X: A system for privacy preserving trust negotiations. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal ] Latifur Khan , Mamoun Awad , Bhavani M. Thuraisingham A new intrusion detection system using support vector machines and hierarchical clustering. [Citation Graph (0, 0)][DBLP ] VLDB J., 2007, v:16, n:4, pp:507-521 [Journal ] Mamoun Awad , Latifur Khan , Bhavani M. Thuraisingham Predicting WWW surfing using multiple evidence combination. [Citation Graph (0, 0)][DBLP ] VLDB J., 2008, v:0, n:, pp:- [Journal ] Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. [Citation Graph (, )][DBLP ] Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. [Citation Graph (, )][DBLP ] Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. [Citation Graph (, )][DBLP ] Centralized Security Labels in Decentralized P2P Networks. [Citation Graph (, )][DBLP ] Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. [Citation Graph (, )][DBLP ] Dynamic Service and Data Migration in the Clouds. [Citation Graph (, )][DBLP ] Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP ] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. [Citation Graph (, )][DBLP ] Data Mining for Security Applications. [Citation Graph (, )][DBLP ] Trustworthy Semantic Web Technologies for Secure Knowledge Management. [Citation Graph (, )][DBLP ] Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. [Citation Graph (, )][DBLP ] Geospatial data qualities as web services performance metrics. [Citation Graph (, )][DBLP ] Content-based ontology matching for GIS datasets. [Citation Graph (, )][DBLP ] Security and privacy for geospatial data: concepts and research directions. [Citation Graph (, )][DBLP ] Geographically-typed semantic schema matching. [Citation Graph (, )][DBLP ] Differences in Fitts' Law Task Performance Based on Environment Scaling. [Citation Graph (, )][DBLP ] Delegation-Based Security Model for Web Services. [Citation Graph (, )][DBLP ] Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. [Citation Graph (, )][DBLP ] Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis. [Citation Graph (, )][DBLP ] Privacy Preserving Decision Tree Mining from Perturbed Data. [Citation Graph (, )][DBLP ] A Hybrid Model to Detect Malicious Executables. [Citation Graph (, )][DBLP ] Message from the SSW'08 organizers. [Citation Graph (, )][DBLP ] Geospatial Resource Description Framework (GRDF) and security constructs. [Citation Graph (, )][DBLP ] A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data. [Citation Graph (, )][DBLP ] Data mining for security applications. [Citation Graph (, )][DBLP ] Enhancing Security Modeling for Web Services Using Delegation and Pass-On. [Citation Graph (, )][DBLP ] The SCIFC Model for Information Flow Control in Web Service Composition. [Citation Graph (, )][DBLP ] Policy-Driven Service Composition with Information Flow Control. [Citation Graph (, )][DBLP ] Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP ] Building Trustworthy Semantic Webs. [Citation Graph (, )][DBLP ] Simulating bioterrorism through epidemiology approximation. [Citation Graph (, )][DBLP ] Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. [Citation Graph (, )][DBLP ] Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. [Citation Graph (, )][DBLP ] QoS Aware Dependable Distributed Stream Processing. [Citation Graph (, )][DBLP ] Data Mining for Security Applications and Its Privacy Implications. [Citation Graph (, )][DBLP ] Data security and integrity: developments and directions. [Citation Graph (, )][DBLP ] Design of a temporal geosocial semantic web for military stabilization and reconstruction operations. [Citation Graph (, )][DBLP ] A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. [Citation Graph (, )][DBLP ] Classification and Novel Class Detection in Data Streams with Active Mining. [Citation Graph (, )][DBLP ] Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams. [Citation Graph (, )][DBLP ] Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space. [Citation Graph (, )][DBLP ] ROWL BAC: representing role based access control in OWL . [Citation Graph (, )][DBLP ] A semantic web based framework for social network access control. [Citation Graph (, )][DBLP ] Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP ] Ontology Alignment Using Multiple Contexts. [Citation Graph (, )][DBLP ] Secure Semantic Sensor Web and Pervasive Computing. [Citation Graph (, )][DBLP ] An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification. [Citation Graph (, )][DBLP ] R2D: Extracting Relational Structure from RDF Stores. [Citation Graph (, )][DBLP ] Data Mining for Malicious Code Detection and Security Applications. [Citation Graph (, )][DBLP ] Inferring private information using social network data. [Citation Graph (, )][DBLP ] Relationalizing RDF stores for tools reusability. [Citation Graph (, )][DBLP ] Secure peer-to-peer networks for trusted collaboration. [Citation Graph (, )][DBLP ] Incentive and Trust Issues in Assured Information Sharing. [Citation Graph (, )][DBLP ] Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. [Citation Graph (, )][DBLP ] Directions and trends of XML and web service security. [Citation Graph (, )][DBLP ] Reasoning with semantics-aware access control policies for geospatial web services. [Citation Graph (, )][DBLP ] R2D: A Bridge between the Semantic Web and Relational Visualization Tools. [Citation Graph (, )][DBLP ] Semantic Web for Content Based Video Retrieval. [Citation Graph (, )][DBLP ] Semantic Schema Matching without Shared Instances. [Citation Graph (, )][DBLP ] The SCRUB security data sharing infrastructure. [Citation Graph (, )][DBLP ] Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. [Citation Graph (, )][DBLP ] Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce. [Citation Graph (, )][DBLP ] Security Engineering: Developments and Directions. [Citation Graph (, )][DBLP ] Privacy preservation in wireless sensor networks: A state-of-the-art survey. [Citation Graph (, )][DBLP ] SODA: A secure object-oriented database system. [Citation Graph (, )][DBLP ] A functional view of multilevel databases. [Citation Graph (, )][DBLP ] Prototyping to explore MLS/DBMS design. [Citation Graph (, )][DBLP ] The applicability of the perturbation based privacy preserving data mining for real-world data. [Citation Graph (, )][DBLP ] Search in 0.058secs, Finished in 0.071secs