Data and Applications Security

  1. Interoperability of Heterogeneous Database Systems: Developments and Challenges, keynote address given at the Plenary session at the AFCEA Database Colloquium, San Diego, CA, August 29, 1994 (followed keynote presentation by General Edmonds, Director DISA - abstract published in proceedings).
  2. Application of Object Technology in Data Management, keynote address given at the Plenary session at the AFCEA Database Colloquium, San Diego, CA, August 28, 1995 (following keynote presentation by Ms Diane McCoy, Deputy Director, DISA - abstract published in proceedings).
  3. Application of Object Technology in Data Management, version also given at FEDOOTS, Washington DC, October 1995 (abstract, charts in proceedings).
  4. Data Warehousing, Data Mining, and Security, keynote address given at the 10th IFIP 11.3 Database Security Conference, Como, Italy, July 1996. (Paper in Chapman and Hall book 1997).
  5. Data Warehousing, Data Mining, and Security, also keynote address at PAKDD Data Mining Conference, Australia, April 1998.
  6. Data Warehousing, Data Mining, and Security, featured address at WITI (Women in Technology International), Carey, North Carolina, September 1999.
  7. Implementing Real-time Object-Oriented Applications, featured presentation at Object World East, Hynes Convention Center, Boston, MA, May 1996.
  8. Implementing Real-time Object-Oriented Applications, Object World West, San Jose, CA, August 1996 (briefing in proceedings).
  9. Implementing Real-time Object-Oriented Applications, Object World East March 1997.
  10. Implementing Real-time Object-Oriented Applications, Object World West July 1997 (charts in proceedings).
  11. Data Mining and Data Warehousing: Developments and Challenge, keynote address given at AFCEA DOD Database Colloquium, San Diego, CA, August 27, 1996 (abstract in proceedings).
  12. Data Mining and Data Warehousing: Developments and Challenges, featured address at IEEE Engineering Solutions: From Desktop to Internet Conference and Exposition, Hynes Convention Center, Boston, September 1996 (charts in proceedings).
  13. Data Mining Developments and Challenges, keynote address at ACM SAC Conference, February 1997.
  14. Data Mining Developments and Challenges, also keynote address at IEEE Artificial Neural Networks, 1999.
  15. Data Mining Developments and Challenges, featured address at the Data Warehousing and Year 2000 Symposium, November 1999.
  16. Data Mining Developments and Challenges, June 1997 (charts in proceedings).
  17. Data Management Systems Evolution and Interoperation, featured address at DoD Database Colloquium, September 1997. (based on book by CRC Press, 1997).
  18. Web Database Management, featured address at DoD Database Colloquium, September 1998 (abstract in proceedings).
  19. Evolvable Interoperable Real-time Command and Control Systems, featured address at DoD Database Colloquium, September 1999 (following keynote address by Dr. Marv Langston), (abstract in proceedings).
  20. Multimedia Data Management and Mining, keynote address at SAS Institute Conference, 1999 (preceded keynote by Dr. Jim Goodnight).
  21. Multimedia Data Management and Mining, also keynote at IEEE ICTAI, 1999; also IASTED AI Conference, February 2002) (presentation in proceedings).
  22. Data Management for the 21st Century, AFCEA Database Colloquium, 2000 (abstract in proceedings, enhanced paper presented at another conference).
  23. Data Management for Biotechnology Applications, AFCEA Database Colloquium, August 2001 (abstract in proceedings).
  24. Secure Semantic Web, keynote address at IEEE SRDS Conference Workshop on Data Warehouse and Security, New Orleans, October 2001.
  25. Secure Semantic Web, also version presented at NSF/EU workshop on semantic web.
  26. Data Quality: Developments and Directions, IFIP 11.5 Conference, Brussels, November 2001 (paper in Kluwer Book).
  27. XML security (with E. Bertino et al), keynote address at NSF PI Conference, Fort Worth, TX, April 2001.
  28. Semantic Web and Dependable Computing, WORDS 2002, San Diego. (paper in proceedings).
  29. Data Mining for National Security and Counter-terrorism, keynote address at the White House, Office of Science and Technology Policy, February 2002.
  30. Data Mining for National Security and Counter-terrorism, luncheon address at IEEE COMPSAC Conference, Oxford University, August 2002.
  31. Data Mining for National Security and Counter-terrorism, featured address at United Nations, September 2002.
  32. Web Data Mining and Applications in Counter-terrorism, keynote address at SIAM Data Mining Conference Workshop on Web Mining, April 2002.
  33. Web Data Mining and Applications in Counter-terrorism, keynote address at IEEE ICTAI 2002.
  34. Sensor Web and Sensor Data Management, keynote address at ISE, San Diego, July 2002. (Received SCSC award for this keynote, abstract in proceedings).
  35. Federated Databases for Bioinformatics, 4th Annual Bioinformatics Conference, September 2002.
  36. Security for Multimedia Database Management, IEEE Multimedia Conference, December 2002 (a version given as keynote address at Distributed Multimedia Conference, Miami, Florida, September 2003).
  37. Secure Semantic Web, XML Security and Privacy, keynote address at Conference on Applied Informatics, Innsbruck, Austria , February 2003.
  38. Secure Semantic Web, XML Security and Privacy, featured address at Knowledge Management Conference, Washington DC, March 2003.
  39. Secure Semantic Web, XML Security and Privacy, keynote address at ICCS Las Vegas, April 2003.
  40. Dependable Sensor Information Management, featured address IEEE WORDS, Capri Island, Italy, October 2003.
  41. Data Mining and Cyber Security, keynote address at Quality Software Conference, Dallas Texas, November 2003. (abstract in proceedings).
  42. Data Mining and Cyber Security, keynote at 3rd Applied Technology Conference, University of Arkansas, Little Rock, February 2004.
  43. Data Mining for Biometrics, featured address at Society for Women Engineers Conference, Baltimore, MD, March 2004.
  44. Security and Privacy for Web Databases and Services, keynote address, EDBT Conference, Crete, March 2004 (complete paper in EDBT Proceedings Springer, co-author: E. Ferrari).
  45. Access Control in Databases: Developments and Directions, keynote address at ACM SACMAT, New York, June 2004.
  46. Secure Knowledge Management, NSF Workshop on Secure Knowledge Management, SUNY Buffalo, September 2004.
  47. Data Mining for Security Applications, keynote address, International Conference on Machine Learning, Louisville, Kentucky, December 2004.
  48. Sensor Information Management, featured address, MITRE Community Workshop, Tyson’s Corner, October 2005.
  49. Voice Over IP Security, IASTED Conference on Communications, Phoenix, AZ, November 2005.
  50. Data Mining for Counter-terrorism Applications, featured address, SAS Data Mining Conference, Las Vegas, October 2005.
  51. Data Mining for Malicious Code Detection, keynote address, ASTRNET Workshop, Kings College, London, April 2006.
  52. Data Mining for National Security Applications, keynote address, Pacific Asia Data Mining Conference Workshop, Singapore, April 2006 (proceedings abstract).
  53. Identity Management and RFID Technologies, keynote address, Identity Solutions Conference, Jonesboro, Arkansas, February 2007.
  54. Data Mining for Cyber Security Applications, ARES Conference, Vienna, Austria, April 2007.
  55. CPT for the Semantic Web, IEEE Policy, Bologna, Italy, June 2007. (proceedings paper).
  56. Multimedia Systems Security, ACM Multimedia Systems Security Workshop, Dallas, TX, September 2007 (proceedings abstract).
  57. Privacy Preserving Data Mining, ICDM Workshop, Nebraska, October 2007.
  58. Information Security, Priv acy and Governance for Assured Information Sharing, featured address, ISIG 1st International Conference on Global Information Governance, Pisa Italy, March 2008.
  59. Data Mining for Cyber Security Applications, Invited Plenary Talk, Cyber Security Symposium, Arizona State U, April 2008.
  60. Data Analytics for Security Applications, Intelligence and Security Informatics, Taipei, 2008.
  61. Confidentiality, Privacy and Trust for Data Mining, ACM KDD Workshop on Privacy and Data Mining, Las Vegas, NV, August 2008 (proceedings published by Springer Verlag).
  62. Data Mining for Malicious Code Detection and Security Applications, TRUST, Shanghai, December 2008.
  63. Building Trustworthy Semantic Webs, TSP, Shanghai, December 2008.
  64. Data Mining for Security Applications, Cyber Security Symposium, Arizona State University, April 2008.
  65. Assured Information Sharing, ASIA-CCS, March 2009 (Leading Conference).
  66. Assured Information Sharing for Trustworthy, Untrustworthy and Semi-trustworthy Partners, DoE Cyber Security Conference, Knoxville, April 2009.
  67. Geosocial Semantic Web for Military Stabilization and Reconstruction, Pacific Asia Intelligence and Security Informatics, April 2009.
  68. Secure Systems Engineering, IEEE Reliability Symposium, Shanghai, July 2009.
  69. Data Mining for Security Applications, WI/IAT Conference, Milan, September 2009.
  70. Trustworthy Semantic Webs, IEEE Conference on Information Reuse and Integration, August 2009.
  71. Data Security and Integrity: Developments and Directions, SIGKDD workshop on Intelligence and Security Informatics, Paris France, June 2009.
  72. Building a Geospatial Semantic Web, 4th International Conference on Frontier of Computer Science and Technology, Shanghai, December 2009.
  73. Secure Semantic Sensor Web and Pervasive Computing, keynote address, SUTC, Newport Beach, CA, June 2010.
  74. Data Analytics for Security Applications, luncheon keynote address, Invited by MetroCon, Arlington, TX, September 2010.
  75. Building Trustworthy Semantic Web, IEEE Semantic Computing Conference, Pittsburgh, September 2010.
  76. Secure Cloud Computing, IEEE SRDS, November 2010, New Delhi.
  77. Secure Cloud Data Management, CloudCom Security Workshop, November 2010, Indianapolis, IN.
  78. Assured Cloud Computing, Keynote address given at IEEE COMPSAC Conference Workshop on Security and Privacy, Seoul, South Korea, July 2010.
  79. Building Trustworthy Semantic Web, IEEE Semantic Computing Conference, Pittsburgh, PA, September 2010 (Mini-keynote: special session with Profs. Tom Mitchell and Manuela M. Veloso)
  80. Cloud Computing, NIT Warangal, India. Technozion 2010, Video Keynote given from Dallas TX, September 2010.
  81. Data Mining for Malware Detection, SDPS Annual Conference, Jeju Island, S. Korea, June 2011.
  82. Data Mining for Malware Detection, European Intelligence and Security Informatics, Athens, Greece, September 2011.
  83. Data Mining for Malware Detection, DFW MetroCon, Arlington, TX, October 2011.
  84. Assured Cloud-based Information Sharing, IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), December 2011, Sydney, Australia.