![]() | 2009 | |
---|---|---|
205 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. ASIACCS 2009: 2 |
204 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Hao, I-Ling Yen, Bhavani M. Thuraisingham: Dynamic Service and Data Migration in the Clouds. COMPSAC (2) 2009: 134-139 |
203 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad Farhan Husain, Pankil Doshi, Latifur Khan, Bhavani M. Thuraisingham: Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce. CloudCom 2009: 680-686 |
202 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham: Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams. ECML/PKDD (2) 2009: 79-94 |
201 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Partyka, Latifur Khan, Bhavani M. Thuraisingham: Geographically-typed semantic schema matching. GIS 2009: 456-459 |
200 | ![]() ![]() ![]() ![]() ![]() ![]() | Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingham: Privacy Preserving Decision Tree Mining from Perturbed Data. HICSS 2009: 1-10 |
199 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Latifur Khan, Murat Kantarcioglu, Sonia Chib, Jiawei Han, Sang Hyuk Son: Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis. HICSS 2009: 1-12 |
198 | ![]() ![]() ![]() ![]() ![]() ![]() | Sancho C. Sebastine, Bhavani M. Thuraisingham, Balakrishnan Prabhakaran: Semantic Web for Content Based Video Retrieval. ICSC 2009: 103-108 |
197 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Partyka, Latifur Khan, Bhavani M. Thuraisingham: Semantic Schema Matching without Shared Instances. ICSC 2009: 297-302 |
196 | ![]() ![]() ![]() ![]() ![]() ![]() | Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani M. Thuraisingham: R2D: A Bridge between the Semantic Web and Relational Visualization Tools. ICSC 2009: 303-311 |
195 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8 |
194 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data security and integrity: developments and directions. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 43 |
193 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Latifur Khan, Murat Kantarcioglu, Vaibhav Khadilkar: Design of a temporal geosocial semantic web for military stabilization and reconstruction operations. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 63-74 |
192 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Murat Kantarcioglu, Latifur Khan: Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. PAISI 2009: 1 |
191 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham: A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. PAKDD 2009: 363-375 |
190 | ![]() ![]() ![]() ![]() ![]() ![]() | Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009: 177-186 |
189 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani M. Thuraisingham: Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 |
188 | ![]() ![]() ![]() ![]() ![]() ![]() | Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani M. Thuraisingham: Relationalizing RDF stores for tools reusability. WWW 2009: 1059-1060 |
187 | ![]() ![]() ![]() ![]() ![]() ![]() | Jack Lindamood, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: Inferring private information using social network data. WWW 2009: 1145-1146 |
186 | ![]() ![]() ![]() ![]() ![]() ![]() | Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida, Bhavani M. Thuraisingham: R2D: Extracting Relational Structure from RDF Stores. Web Intelligence 2009: 361-366 |
185 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data Mining for Malicious Code Detection and Security Applications. Web Intelligence 2009: 6-7 |
184 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Mandatory Access Control. Encyclopedia of Database Systems 2009: 1684-1685 |
183 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Multilevel Secure Database Management System. Encyclopedia of Database Systems 2009: 1789-1792 |
182 | ![]() ![]() ![]() ![]() ![]() ![]() | Na Li, Nan Zhang, Sajal K. Das, Bhavani M. Thuraisingham: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8): 1501-1514 (2009) |
181 | ![]() ![]() ![]() ![]() ![]() ![]() | Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: Exploiting an antivirus interface. Computer Standards & Interfaces 31(6): 1182-1189 (2009) |
180 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiang Wu, D. Manivannan, Bhavani M. Thuraisingham: Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system. Inf. Sci. 179(20): 3659-3672 (2009) |
2008 | ||
179 | ![]() ![]() ![]() ![]() ![]() ![]() | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ARES 2008: 237-244 |
178 | ![]() ![]() ![]() ![]() ![]() ![]() | Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham: Incentive and Trust Issues in Assured Information Sharing. CollaborateCom 2008: 113-125 |
177 | ![]() ![]() ![]() ![]() ![]() ![]() | Steve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani M. Thuraisingham: Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 |
176 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Pranav Parikh: Trustworthy Semantic Web Technologies for Secure Knowledge Management. EUC (2) 2008: 186-193 |
175 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen: Data Mining for Security Applications. EUC (2) 2008: 585-589 |
174 | ![]() ![]() ![]() ![]() ![]() ![]() | Gregory S. Lee, Bhavani M. Thuraisingham: Differences in Fitts' Law Task Performance Based on Environment Scaling. EuroHaptics 2008: 295-300 |
173 | ![]() ![]() ![]() ![]() ![]() ![]() | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. Financial Cryptography 2008: 323-324 |
172 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Partyka, Neda Alipanah, Latifur Khan, Bhavani M. Thuraisingham, Shashi Shekhar: Content-based ontology matching for GIS datasets. GIS 2008: 51 |
171 | ![]() ![]() ![]() ![]() ![]() ![]() | Yunqi Ye, I-Ling Yen, Liangliang Xiao, Bhavani M. Thuraisingham: Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. HASE 2008: 383-391 |
170 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Barbara Carminati: Message from the SSW'08 organizers. ICDE Workshops 2008: 445 |
169 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashraful Alam, Latifur Khan, Bhavani M. Thuraisingham: Geospatial Resource Description Framework (GRDF) and security constructs. ICDE Workshops 2008: 475-481 |
168 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham: A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data. ICDM 2008: 929-934 |
167 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei She, I-Ling Yen, Bhavani M. Thuraisingham: Enhancing Security Modeling for Web Services Using Delegation and Pass-On. ICWS 2008: 545-552 |
166 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 |
165 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. ISI 2008 |
164 | ![]() ![]() ![]() ![]() ![]() ![]() | Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham: Simulating bioterrorism through epidemiology approximation. ISI 2008: 82-87 |
163 | ![]() ![]() ![]() ![]() ![]() ![]() | Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sandhu, Bhavani M. Thuraisingham: QoS Aware Dependable Distributed Stream Processing. ISORC 2008: 69-75 |
162 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Partyka, Neda Alipanah, Latifur Khan, Bhavani M. Thuraisingham, Shashi Shekhar: Ontology Alignment Using Multiple Contexts. International Semantic Web Conference (Posters & Demos) 2008 |
161 | ![]() ![]() ![]() ![]() ![]() ![]() | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: The SCRUB security data sharing infrastructure. NOMS 2008: 630-644 |
160 | ![]() ![]() ![]() ![]() ![]() ![]() | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. NOMS 2008: 991-994 |
159 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data Mining for Security Applications and Its Privacy Implications. PinKDD 2008: 1-6 |
158 | ![]() ![]() ![]() ![]() ![]() ![]() | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 |
157 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 |
156 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Wang, Latifur Khan, Bhavani M. Thuraisingham: An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification. Web Intelligence 2008: 797-801 |
155 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: On the Complexity of the Privacy Problem in Databases. Data Mining: Foundations and Practice 2008: 353-374 |
154 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Latifur Khan, Ganesh Subbiah, Ashraful Alam, Murat Kantarcioglu: Geospatial Semantic Web, Definition. Encyclopedia of GIS 2008: 398 |
153 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Latifur Khan, Ganesh Subbiah, Ashraful Alam, Murat Kantarcioglu: Privacy and Security Challenges in GIS. Encyclopedia of GIS 2008: 898-902 |
152 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Assured Information Sharing: Technologies, Challenges and Directions. Intelligence and Security Informatics 2008: 1-15 |
151 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, B. Prabhakaran, Latifur Khan, Lei Wang: Managing and Mining Multimedia Data, Animations and Annotations. Wiley Encyclopedia of Computer Science and Engineering 2008 |
150 | ![]() ![]() ![]() ![]() ![]() ![]() | Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingham: The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65(1): 5-21 (2008) |
149 | ![]() ![]() ![]() ![]() ![]() ![]() | Pavan Kumar Chitumalla, Douglas Harris, Bhavani M. Thuraisingham, Latifur Khan: Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing. IEEE Internet Computing 12(1): 38-44 (2008) |
148 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: A scalable multi-level feature extraction technique to detect malicious executables. Information Systems Frontiers 10(1): 33-45 (2008) |
147 | ![]() ![]() ![]() ![]() ![]() ![]() | Mamoun Awad, Latifur Khan, Bhavani M. Thuraisingham: Predicting WWW surfing using multiple evidence combination. VLDB J. 17(3): 401-417 (2008) |
2007 | ||
146 | ![]() ![]() ![]() ![]() ![]() ![]() | Volkmar Lotz, Bhavani M. Thuraisingham: SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings ACM 2007 |
145 | ![]() ![]() ![]() ![]() ![]() ![]() | Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Thuraisingham: Centralized Security Labels in Decentralized P2P Networks. ACSAC 2007: 315-324 |
144 | ![]() ![]() ![]() ![]() ![]() ![]() | Abinandhan Chandrasekaran, Bhavani M. Thuraisingham: Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. ARES 2007: 273-280 |
143 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Srinivasan Iyer: Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. ARES 2007: 821-828 |
142 | ![]() ![]() ![]() ![]() ![]() ![]() | Kevin W. Hamlen, Bhavani M. Thuraisingham: Secure peer-to-peer networks for trusted collaboration. CollaborateCom 2007: 58-63 |
141 | ![]() ![]() ![]() ![]() ![]() ![]() | Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham: Enforcing Honesty in Assured Information Sharing Within a Distributed System. DBSec 2007: 113-128 |
140 | ![]() ![]() ![]() ![]() ![]() ![]() | Ganesh Subbiah, Ashraful Alam, Latifur Khan, Bhavani M. Thuraisingham: Geospatial data qualities as web services performance metrics. GIS 2007: 66 |
139 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashraful Alam, Ganesh Subbiah, Latifur Khan, Bhavani M. Thuraisingham: DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework. GeoS 2007: 268-277 |
138 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei She, Bhavani M. Thuraisingham, I-Ling Yen: Delegation-Based Security Model for Web Services. HASE 2007: 82-91 |
137 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: A Hybrid Model to Detect Malicious Executables. ICC 2007: 1443-1448 |
136 | ![]() ![]() ![]() ![]() ![]() ![]() | Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu: Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. ISI 2007: 254-261 |
135 | ![]() ![]() ![]() ![]() ![]() ![]() | Jungin Kim, Bhavani M. Thuraisingham: Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. ISORC 2007: 146-155 |
134 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Multimedia systems security. MM&Sec 2007: 1-2 |
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino: Managing Risks in RBAC Employed Distributed Environments. OTM Conferences (2) 2007: 1548-1566 |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: Feature Based Techniques for Auto-Detection of Novel Email Worms. PAKDD 2007: 205-216 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. POLICY 2007: 8-11 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham: PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs CoRR abs/0710.3979: (2007) |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Douglas Harris, Latifur Khan, Raymond Paul, Bhavani M. Thuraisingham: Standards for secure data sharing across organizations. Computer Standards & Interfaces 29(1): 86-96 (2007) |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Murat Kantarcioglu, Srinivasan Iyer: Extended RBAC-based design and implementation for a secure data warehouse. IJBIDM 2(4): 367-382 (2007) |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei She, Bhavani M. Thuraisingham: Security for Enterprise Resource Planning Systems. Information Systems Security 16(3): 152-163 (2007) |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Security and privacy for multimedia database management systems. Multimedia Tools Appl. 33(1): 13-29 (2007) |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Gal Lavee, Latifur Khan, Bhavani M. Thuraisingham: A framework for a video analysis tool for suspicious event detection. Multimedia Tools Appl. 35(1): 109-123 (2007) |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingham: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16(4): 507-521 (2007) |
2006 | ||
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani M. Thuraisingham, Fei-Yue Wang: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings Springer 2006 |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham: Detection and Resolution of Anomalies in Firewall Policy Rules. DBSec 2006: 15-29 |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Li Liu, Bhavani M. Thuraisingham: The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. ICDM Workshops 2006: 507-512 |
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Pallabi Parveen, Bhavani M. Thuraisingham: Face Recognition Using Multiple Classifiers. ICTAI 2006: 179-186 |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Jungin Kim, Bhavani M. Thuraisingham: Dependable and Secure TMO Scheme. ISORC 2006: 133-140 |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data Mining for Surveillance Applications. PAKDD 2006: 12-14 |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan: Access control, confidentiality and privacy for video surveillance databases. SACMAT 2006: 1-10 |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Ernesto Damiani, Alban Gabillon, Anne Anderson, David Staggs, Bhavani M. Thuraisingham, Marianne Winslett: Directions and trends of XML and web service security. SWS 2006: 1-2 |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashraful Alam, Ganesh Subbiah, Bhavani M. Thuraisingham, Latifur Khan: Reasoning with semantics-aware access control policies for geospatial web services. SWS 2006: 69-76 |
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data Mining for Security Applications. WISI 2006: 1-3 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham: Access control for web data: models and policy languages. Annales des Télécommunications 61(3-4): 245-266 (2006) |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham: Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006) |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Elena Ferrari, Bhavani M. Thuraisingham: Guest editorial: special issue on privacy preserving data management. VLDB J. 15(4): 291-292 (2006) |
2005 | ||
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Trust Management in a Distributed Environment. COMPSAC (1) 2005: 561-562 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jun Kong: Secure Model Management Operations for the Web. DBSec 2005: 237-251 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Inja Youn, Csilla Farkas, Bhavani M. Thuraisingham: Multilevel Secure Teleconferencing over Public Switched Telephone Network. DBSec 2005: 99-113 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jiannong Cao: Towards Access Control for Visual Web Model Management. EEE 2005: 722-727 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Latifur Khan, Chris Clifton, John A. Maurer, Marion G. Ceruti: Dependable Real-Time Data Mining. ISORC 2005: 158-165 |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Directions for security and privacy for semantic e-business applications. Commun. ACM 48(12): 71-73 (2005) |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Security standards for the semantic web. Computer Standards & Interfaces 27(3): 257-268 (2005) |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Privacy constraint processing in a privacy-enhanced database management system. Data Knowl. Eng. 55(2): 159-188 (2005) |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Privacy-Preserving Data Mining: Development and Directions. J. Database Manag. 16(1): 75-87 (2005) |
2004 | ||
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham: Using RDF for Policy Specification and Enforcement. DEXA Workshops 2004: 163-167 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Elena Ferrari, Bhavani M. Thuraisingham: Security and Privacy for Web Databases and Services. EDBT 2004: 17-28 |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Minos N. Garofalakis, Ioana Manolescu, Marco Mesiti, George A. Mihaila, Ralf Schenkel, Bhavani M. Thuraisingham, Vasilis Vassalos: What's Next in XML and Databases? EDBT Workshops 2004: 318-324 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, Amar Gupta: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Managing and Mining Multimedia Databases. International Journal on Artificial Intelligence Tools 13(3): 739- (2004) |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Editorial. J. Intell. Inf. Syst. 23(3): 207-208 (2004) |
2003 | ||
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Security Issues for the Semantic Web. COMPSAC 2003: 632-637 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data and Applications Security: Past, Present and the Future. DBSec 2003: 375-390 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Dependable Computing for National Security. ISADS 2003: 333- |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data Mining and Cyber Security. QSIC 2003: 2- |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Dependable Infrastructures and Data Managers for Sensor Networks. WORDS Fall 2003: 11- |
2002 | ||
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Elena Ferrari: Web and Information Security: Workshop Summary. COMPSAC 2002: 933 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data and Applications Security: Developments and Directions. COMPSAC 2002: 963-965 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham: Privacy and Civil Liberties. DBSec 2002: 331-346 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Building Secure Survivable Semantic Webs. ICTAI 2002: 395-398 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Secure Multimedia Data Management Research Directions. ISMSE 2002 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Eric Hughes, Dock Allen: Dependable Semantic Web. WORDS 2002: 305-310 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Reind P. van de Riet: Data and applications security (Guest editorial). Data Knowl. Eng. 43(3): 235-236 (2002) |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Data Mining, National Security, Privacy and Civil Liberties. SIGKDD Explorations 4(2): 1-5 (2002) |
2001 | ||
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari: Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 Kluwer 2001 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati: Panel on XML and Security. DBSec 2001: 317-323 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Database Management and the Internet: Developments and Challenges. High-Performance Web Databases 2001: 549-554 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Eric Hughes: Data quality: developments and directions. IICIS 2001: 97-102 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Chris Clifton, John A. Maurer, Marion G. Ceruti: Real-Time Data Mining of Multimedia Objects. ISORC 2001: 360-365 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari: Directions for Web and E-Commerce Applications Security. WETICE 2001: 200-204 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Lisa Cingiser DiPippo, Victor Fay Wolfe, Levon Esibov, Gregory Cooper, Ramachandra Bethmangalkar, Russell Johnston, Bhavani M. Thuraisingham, John A. Maurer: Scheduling and Priority Mapping for Static Real-Time Middleware. Real-Time Systems 20(2): 155-182 (2001) |
2000 | ||
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Network and Web Security and E-Commerce and Other Applications. COMPSAC 2000: 131 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Marion G. Ceruti: Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments. COMPSAC 2000: 171-175 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Web Security and Privacy (Panel). DBSec 2000: 125-126 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Richard Freedman, John A. Maurer, Steven Wohlever, Bhavani M. Thuraisingham, Victor Fay Wolfe, Michael Milligan: Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications. ISORC 2000: 202-205 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Insup Lee, Mike Jones, Hermann Kopetz, K. H. Kim, Thomas F. Lawrence, Bhavani M. Thuraisingham: Fundamental R&D Issues in Real-Time Distributed Computing. ISORC 2000: 215- |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Victor Fay Wolfe, Lisa Cingiser DiPippo, Gregory Cooper, Russell Johnston, Peter Kortmann, Bhavani M. Thuraisingham: Real-Time CORBA. IEEE Trans. Parallel Distrib. Syst. 11(10): 1073-1089 (2000) |
1999 | ||
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, John A. Maurer: Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems. FTDCS 1999: 242-245 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | John A. Maurer, Roman Ginis, Richard Freedman, Michael Squadrito, Steven Wohlever, Bhavani M. Thuraisingham: Adaptable Real-Time Distributed Object Management for Command and Control Systems. ISADS 1999: 42- |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems. ISADS 1999: 89- |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Steven Wohlever, Victor Fay Wolfe, Bhavani M. Thuraisingham, Richard Freedman, John A. Maurer: CORBA-based Real-time Trader Service for Adaptable Command and Control Systems. ISORC 1999: 64- |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, John A. Maurer: Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems. IEEE Trans. Knowl. Data Eng. 11(1): 228-238 (1999) |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Web Information Management and its Application to Electronic Commerce. International Journal on Artificial Intelligence Tools 8(2): 107-117 (1999) |
1998 | ||
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Panel Overview. COMPSAC 1998: 260-261 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier: Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Sandra Heiler, Arnon Rosenthal, Susan Malaika: Migrating Legacy Databases and Applications (Panel). ICDE 1998: 314 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Squadrito, Levon Esibov, Lisa Cingiser DiPippo, Victor Fay Wolfe, Gregory Cooper, Bhavani M. Thuraisingham, Peter C. Krupp, Michael Milligan, Russell Johnston: Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols. ISORC 1998: 96-105 |
1997 | ||
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton: Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Roman Ginis, Eric Hughes, Steven Wohlever, Bhavani M. Thuraisingham, Peter C. Krupp, John A. Maurer: Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems. RTDB 1997: 77- |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Eric Hughes, Roman Ginis, Bhavani M. Thuraisingham, Peter C. Krupp, John A. Maurer: Data Manager for Evolvable Real-time Command and Control Systems. VLDB 1997: 558-561 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Kingsley C. Nwosu, Bhavani M. Thuraisingham, P. Bruce Berra: Multimedia Database Systems - A New Frontier (Guest Editors' Introduction). IEEE MultiMedia 4(3): 21-23 (1997) |
1996 | ||
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Security Issues for Data Warehousing and Data Mining. DBSec 1996: 11-20 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Arkady Kanevsky, Peter C. Krupp, Alice Schafer, Mike Gates, Thomas Wheeler, Edward H. Bensley, Ruth Ann Sigel, Michael Squadrito: Evolvable Real-Time C3 Systems-II: Real-Time Infrastructure Requirements. ICECCS 1996: 473-482 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, T. C. Ting: Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. IEEE Trans. Knowl. Data Eng. 8(1): 1-2 (1996) |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Donald G. Marks, Peter J. Sell, Bhavani M. Thuraisingham: MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications. JOOP 9(4): 22-29 (1996) |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Sang Hyuk Son, Rasikan David, Bhavani M. Thuraisingham: Improving Timeliness in Real-Time Secure Database Systems. SIGMOD Record 25(1): 29-33 (1996) |
1995 | ||
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems. ACM Conference on Computer Science 1995: 216-221 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Sang Hyuk Son, Rasikan David, Bhavani M. Thuraisingham: An Adaptive Policy for Improved Timeliness in Secure Database Systems. DBSec 1995: 199-214 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham: Security and Data Mining. DBSec 1995: 391-399 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Edward H. Bensley, Lawrence Fisher, Mike Gates, James Houchens, Arkady Kanevsky, Soohee Kim, Peter C. Krupp, Alice Schafer, Bhavani M. Thuraisingham: Evolvable real-time C3 systems. ICECCS 1995: 153- |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel A. Keim, John Peter Lee, Bhavani M. Thuraisingham, Craig M. Wittenbrink: Database Issues for Data Visualization: Supporting Interactive Database Explorartion. Workshop on Database Issues for Data Visualization 1995: 12-25 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Georges G. Grinstein, Bhavani M. Thuraisingham: Data Mining and Data Visualization. Workshop on Database Issues for Data Visualization 1995: 54-56 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, William Ford: Security Constraints in a Multilevel Secure Distributed Database Management System. IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995) |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Towards the Design of a Multilevel Secure Object-Oriented Database Management System. JOOP 8(3): 42-49 (1995) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | P. Bruce Berra, Kingsley C. Nwosu, Bhavani M. Thuraisingham: ACM Multimedia '94 Conference Workshop on Multimedia Database Management Systems. SIGMOD Record 24(1): 70-72 (1995) |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Arnon Rosenthal, Leonard J. Seligman, Catherine D. McCollum, Barbara T. Blaustein, Bhavani M. Thuraisingham, Edward Lafferty: Data Management Research at The MITRE Corporation. SIGMOD Record 24(3): 77-82 (1995) |
1994 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993 Springer 1994 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Harvey Rubinovitz, Bhavani M. Thuraisingham: Security Constraint Processing in a Distributed Database Environment. ACM Conference on Computer Science 1994: 356-363 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Donald G. Marks, Leonard J. Binns, Bhavani M. Thuraisingham: Hypersemantic Data Modeling for Inference Analysis. DBSec 1994: 157-180 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Arnon Rosenthal, James Williams, William R. Herndon, Bhavani M. Thuraisingham: A Fine-grained Access Control Model for Object-Oriented DBMSs. DBSec 1994: 319-334 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Security issues for federated database systems. Computers & Security 13(6): 509-525 (1994) |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe: Integrating security technology and object-oriented technology (panel). OOPS Messenger 5(2): 59-61 (1994) |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for object-oriented systems. OOPS Messenger 5(2): 77-78 (1994) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Shail Arora, Mamdouh Ibrahim, Bhavani M. Thuraisingham, T. C. Ting: Object-oriented technology for health care and medical information systems. OOPS Messenger 5(4): 122-126 (1994) |
1993 | ||
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Carl E. Landwehr: Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992 North-Holland 1993 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, William Ford: Parallel Processing and Trusted Database Management Systems. ACM Conference on Computer Science 1993: 162-167 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Workshop Summary. DBSec 1993: 357-362 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Peter J. Sell, Bhavani M. Thuraisingham: Applying OMT for Designing Multilevel Database Applications. DBSec 1993: 41-64 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion. OOPSLA 1993: 304 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting: Security for Object-Oriented Systems: An Editorial Overview. Security for Object-Oriented Systems 1993: 1-7 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, William Ford, M. Collins, J. O'Keeffe: Design and Implementation of a Database Inference Controller. Data Knowl. Eng. 11(3): 271- (1993) |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Harvey Rubinovitz, Bhavani M. Thuraisingham: Design and implementation of a query processor for a trusted distributed data base management system. Journal of Systems and Software 21(1): 49-69 (1993) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: System Function Languages. Math. Log. Q. 39: 357-366 (1993) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Hai-Ping Ko: Concurrency Control in Trusted Database Management Systems: A Survey. SIGMOD Record 22(4): 52-59 (1993) |
1992 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. CSFW 1992: 135-146 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham, Harvey H. Rubinovitz: Multilevel security issues in distributed database management systems - III. Computers & Security 11(7): 661-674 (1992) |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Current Status of R&D in Trusted Database Management Systems. SIGMOD Record 21(3): 44-50 (1992) |
1991 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. CSFW 1991: 127-138 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Matthew Morgenstern, Teresa F. Lunt, Bhavani M. Thuraisingham, David L. Spooner: Security Issues in Federated Database Systems: Panel Contributions. DBSec 1991: 131-148 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: The Use of Conceptual Structures for Handling the Inference Problem. DBSec 1991: 333-362 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Multilevel security issues in distributed database management systems II. Computers & Security 10(8): 727-747 (1991) |
1990 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Multilevel Security for Multimedia Database Systems. DBSec 1990: 99-116 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Towards the Design of a Secure Data/Knowledge Base Management System. Data Knowl. Eng. 5: 59-72 (1990) |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Paul D. Stachour, Bhavani M. Thuraisingham: Design of LDV: A Multilevel Secure Relational Database Management System. IEEE Trans. Knowl. Data Eng. 2(2): 190-209 (1990) |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Computing Transitive Closures of Multilevel Relations. SIGMOD Record 19(3): 17-23 (1990) |
1989 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Hany M. Atchan, Rob Bell, Bhavani M. Thuraisingham: Knowledge-Based Support for the Development of Database-Centered Applications. ICDE 1989: 394-401 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: Mandatory Security in Object-Oriented Database Systems. OOPSLA 1989: 203-210 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham: Prototyping to explore MLS/DBMS design. Computers & Security 8(3): 229-245 (1989) |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham: SODA: A secure object-oriented database system. Computers & Security 8(6): 517-533 (1989) |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Bhavani M. Thuraisingham: A functional view of multilevel databases. Computers & Security 8(8): 721-730 (1989) |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas F. Keefe, Bhavani M. Thuraisingham, Wei-Tek Tsai: Secure Query-Processing Strategies. IEEE Computer 22(3): 63-70 (1989) |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Shyh-Kwei Chen, Wei-Tek Tsai, Bhavani M. Thura |