Invited Talks etc.


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

    2023: 1

  1. A Perspective on AI and Security (pptx) (pdf)
    Lecture at Cisco Research Generative AI and Security Summit, October 3, 2023 (virtual).

    2022: 3

  2. A Perspective on IoT Security (pptx) (pdf)
    Keynote Lecture at ESORICS, Copenhagen, Denmark, September 26-30, 2022 (in person).
  3. Security and Privacy for Emerging IoT and CPS Domains: CODASPY 22 Panel Opening Statement (pptx) (pdf)
    Opening statement at ACM CODASPY Panel, Baltimore (yes, in person), April 25, 2022.
  4. Doctoral Research in Cyber Security: A Personal Perspective (pptx) (pdf)
    Presentation at CS 7123 Doctoral Research Seminar, UTSA, April 6 2022.

    2021: 4

  5. Access Control Convergence: Challenges and Opportunities (narrated pptx) (pptx) (pdf)
    Keynote Lecture at Ubisec21, December 29, 2021 (virtual)
  6. Access Control Convergence: Challenges and Opportunities (pptx) (pdf)
    Keynote Lecture at Secrypt21, July 7, 2021 (virtual)
  7. What Technologists Should Learn from the History of Cyber Security (pptx) (pdf)
    Inaugural Seminar at RMIT Center for Cyber Security Research and Innovation, Mebourne, Australia, March 29, 2021 (virtual)
  8. Access Control Convergence: Challenges and Opportunities (pptx) (pdf)
    Lecture at Ontario Tech University, Canada, March 11, 2021 (virtual)

    2020: 5

  9. Access Control Convergence: Challenges and Opportunities (pptx) (pdf)
    Keynote lecture at 16th International Conference on Information Systems Security (ICISS), December 16-19 2020, Indian Institute of Technology Jammu, India (Virtual event)
  10. Three Slide Profile (pptx) (pdf)
    Presented at UTSA's NSCC Computer Science Day Virtual Meeting, November 10, 2020.
  11. One Slide Profile (pptx) (pdf)
    Presented at TUD-UTSA Virtual Meeting, November 5, 2020.
  12. Institute for Cyber Security (pptx) (pdf)
    Briefing at Idaho National Laboratory Visit, UTSA Campus, January 28, 2020.
  13. Outputs, Outcomes and Impact (pptx) (pdf)
    Briefing at Engineering Research Center for Sustainable Urban Communities Stakeholders Workshop, UTSA Campus, January 24, 2020.

    2019: 8

  14. Access Control Evolution and Prospects (pptx) (pdf)
    Keynote lecture at Third International Conference on Computing and Network Communications (CoCoNet'19), Trivandrum, Kerala, India, December 18-21, 2019
  15. Access Control Evolution and Prospects (pptx) (pdf)
    Invited lecture at New Mexico State University, Las Cruces, New Mexico, October 24, 2019
  16. Institute for Cyber Security Overview (pptx) (pdf)
    Briefing for Collaboration Day, NSCC, UTSA Campus, October 2019.
  17. Access Control Evolution and Prospects (pptx) (pdf)
    Invited/keynote lecture at (i) Cybersecurity and Privacy (CySeP) Summer School, June 13, 2019, Stockholm, Sweden, (ii) IFIP International Information Security and Privacy Conference (IFIP SEC), June 25, 2019, Lisbon, Portugal, and (iii) International Conference on Privacy, Security and Trust (PST), August 27, 2019, Fredericton, NB, Canada.
  18. Cyber Security R&D:A Personal Perspective (pptx) (pdf)
    Invited lecture at Sichuan Changhong Electric Co., Ltd., Mianyang, Sichuan, China, May 24, 2019.
  19. Institute for Cyber Security Overview (pptx) (pdf)
    Briefing for NSCC leadership, UTSA Campus, April 2019.
  20. UTSA's NSF CREST Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) (pptx) (pdf)
    Briefing at ASEE-CREST-CEaS Workshop on The Role of NSF Research Centers in Broadening Participation and Closing the Gap in Science and Engineering, Cal State Los Angeles Campus, April 5, 2019.
  21. Cyber Security Trends and Challenges (pptx) (pdf)
    Lecture at Financial Executives International, San Antonio Chapter, March 19, 2019.

    2018: 5

  22. UTSA Cyber Security Ecosystem (pptx) (pdf)
    iArpa briefing, UTSA Campus, Dec 11, 2018.
  23. An Access Control Perspective on the Science of Security (pptx) (pdf)
    Statement at Panel on Access Control, ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 15, 2018.
  24. An Access Control Perspective on the Science of Security (pptx) (pdf) (abstract)
    Keynote lecture at Symposium and Boot Camp on the Science of Security (HotSoS), Raleigh, North Carolina, April 10-11, 2018.
  25. Attribute-Based Access Control: Insights and Challenges v4 (pptx) (pdf) (abstract)
    Keynote lecture at Florida Center for Cybersecurity Research Symposium, University of South Florida, Tampa, Florida, April 3-4, 2018.
  26. Attribute-Based Access Control: Insights and Challenges v4 (pptx) (pdf) (abstract)
    Lecture at Baylor University, Waco, Texas, February 9, 2018.

    2017: 9

  27. Institute for Cyber Security: Research Vision (pptx) (pdf)
    NSA-UTSA partnership meeting, UTSA Campus, October 27, 2017.
    Generic Version 171128 (pptx) (pdf)
  28. UTSA's New CenterCenter for Security and Privacy Enhanced Cloud Computing (C-SPECC) (pptx) (pdf)
    Lecture at UTSA College of Science Research Conference, UTSA Campus, San Antonio, Oct 6, 2017.
  29. ICS and C-SPECC (pptx) (pdf)
    UTSA-NSA briefing, UTSA Campus, September 28, 2017.
  30. Attribute-Based Access Control: Insights and Challenges v3 (pptx) (pdf)
    Keynote lecture at the final event of the German Research Foundation (DFG) funded national research priority program on Reliably Secure Software Systems (RS3), Darmstadt, Germany, September 4-6, 2017.
  31. Attribute-Based Access Control: Insights and Challenges v2 (pptx) (pdf)
    Keynote lecture at IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 8, 2017.
  32. Attribute-Based Access Control: Insights and Challenges v1 (pptx) (pdf)
    Keynote lecture at 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, Pennsylvania, July 19, 2017.
  33. Towards ABAC in Hadoop Ecosystem (pptx) (pdf)
    Lecture at Ford EEIT & GDIA Big Data Access Control Symposium, Dearborn, Michigan, May 2, 2017
  34. ABAC (pptx) (pdf)
    Statement at Panel on ABAC, ACM Workshop on Attribute-Based Access Control, March 24, 2017, Scottsdale, AZ.
  35. Cyber Security Research: Applied and Basic Combined (pptx) (pdf)
    NSA/CSS briefing, UTSA Campus, Jan 27, 2017.
    Cyber Security Research: Applied and Basic Combined (pptx) (pdf). Revised 2/14/17.

    2016: 11

  36. Big Data and Privacy (pptx) (pdf)
    Statement at Panel on Big Data and Privacy, IEEE International Conference on Big Data, December 5-8, 2016, Washington DC.
  37. Cyber Security Research: Applied and Basic Combined (pptx) (pdf)
    NSA briefing, UTSA Campus, Nov 28, 2016.
  38. Cyber Security Research: A Personal Perspective (pptx) (pdf)
    Lecture in CS 7123 Research Methods class, UTSA Campus, Nov 9, 2016.
  39. Identity and Access Control in the Physical and Virtual Internet of Things (pptx) (pdf)
    Project Final Briefing Telecon, Mitre Corporation, October 5, 2016.
  40. What can Technologists learn from the History of the Internet? (pptx) (pdf)
    Internet and Society Lecture Series, Munich Center for Internet Research, September 22, 2016. Video archive.
  41. Identity and Access Control in the Physical and Virtual Internet of Things (pptx) (pdf)
    Project Status Briefing Telecon, Mitre Corporation, July 7, 2016.
  42. Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On-Going Management Of Security Systems (pptx) (pdf)
    American Business Conferences, Cyber Security for Process Control: Remote Oil and Gas Assets 2016, Houston, Texas, June 22-23, 2016.
  43. Security and Privacy in the Age of the Internet of Things: Opportunities and Challenges (pptx) (pdf)
    Statement at Panel on Security and Privacy in the Age of the Internet of Things: Opportunities and Challenges, at the 21st ACM Symposium on Access Control Models and Technologies (SACMAT), Shanghai, China, June 6-8, 2016.
  44. Intersection of Data, Policy and Privacy (pptx) (pdf)
    Texas Fresh Air, Big Data and Data Analytics Conference, Intersection of Data, Policy and Privacy Roundtable, UTSA Campus, San Antonio, TX, March 31, 2016
  45. Secure Cloud Computing: A Research Perspective (pptx) (pdf)
    Texas Fresh Air, Big Data and Data Analytics Conference, Cloud and Cyber Security Panel, UTSA Campus, San Antonio, TX, March 30, 2016
  46. Cyber Security and Privacy: An Optimist's Perspective (pptx) (pdf) (abstract)
    Trinity University Computer Science Colloquium, No-Boundary Thinking, San Antonio, TX, March 22, 2016

    2015: 9

  47. Attribute Based Access Control Models and Beyond v2.0(pptx) (pdf)
    Keynote Lecture, 1st IEEE International Conference on Collaboration and Internet Computing, October 29, 2015, Hangzhou, China.
  48. Attribute Based Access Control Models and Beyond v2.0(pptx) (pdf)
    Cybersecurity lecture series, AIT Austrian Institute of Technology and TU Vienna, Austria, June 3, 2015. Video archive.
  49. Privacy and Access Control: How are These Two Concepts Related? (pptx) (pdf)
    Statement at Panel on Privacy and Access Control: How are These Two Concepts Related?, at the 20th ACM Symposium on Access Control Models and Technologies (SACMAT), Vienna, Austria, June 1-3, 2015.
  50. Attribute Based Access Control Models and Beyond v2.0 (pptx) (pdf)
    Keynote Lecture, 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), April 16, 2015, Singapore.
  51. Attribute Based Access Control Models and Beyond (pptx) (pdf)
    Invited lecture, Singapore Management University, Singapore, April 10, 2015.
  52. Big Data Applications in Cloud and Cyber Security (pptx) (pdf)
    Statement at Panel on Big Data Applications in Cloud and Cyber Security, at the UTSA College of Business Symposium on Big Data, Big Challenges, March 17, 2015, San Antonio, Texas.
  53. Attribute Based Access Control Models and Beyond (pptx) (pdf)
    Invited lecture, 3rd Security and Privacy Symposium, February 14, 2015, Indraprastha Institute of Technology (IIIT), Delhi.
  54. Attribute Based Access Control Models and Beyond (pptx) (pdf)
    Invited lecture, Indian Institute of Technology, Delhi, February 11, 2015.
  55. Institute for Cyber Security at UTSA (pptx) (pdf)
    Presentation at kick-off meeting of the Academic Advisory Council of the NIST Cybersecurity FFRDC, Mitre, McLean, VA, February 4, 2015.

    2014: 11

  56. Attribute Based Access Control Models and Beyond (pptx) (pdf)
    Invited lecture, Future of Identity Workshop, November 13-14 2014, City University London.
  57. Attribute Based Access Control Models and Beyond (pptx) (pdf)
    Invited lecture, Cybersecurity and Privacy (CySeP) Winter School, KTH Royal Institute of Technology, Stockholm, Sweden, 29 October 2014.
  58. Secure Information Sharing for Cyber Response Teams (pptx) (pdf)
    Final presentation at LMI, McLean, Virginia, October 6, 2014. Presented by Ram Krishnan.
  59. Security and Trust Convergence: Attributes, Relations and Provenance (pptx) (pdf) (abstract)
    Keynote lecture, International Conference on Advances in Computing, Communications and Informatics, Galgotias College of Engineering and Technology, Greater Noida, September 25, 2014.
  60. Attribute Based Access Control Models (pptx) (pdf) (abstract) (series)
    Special seminar, Computer Science Department and Electrical and Computer Engineering Department, Colorado State University, Fort Collins, September 16, 2014.
  61. Security and Trust Convergence: Attributes, Relations and Provenance (pptx) (pdf) (abstract) (series)
    Distinguished lecture, Information Science & Technology Center, Colorado State University, Fort Collins, September 15, 2014.
  62. OpenStack at UTSA/ICS (pptx) (pdf)
    Lecture at Open BigCloud Symposium and OCP Workshop, May 7-8, 2014, University of Texas at San Antonio.
  63. Secure Cyber Incident Information Sharing (pptx) (pdf)
    Telecon presentation to Idaho National Laboratories, April 30, 2014. Presented by Ram Krishnan.
  64. Secure Cyber Incident Information Sharing (pptx) (pdf)
    Presentation to 24th Air Force, Lackland Air Force Base, San Antonio, Texas, April 9, 2014. Presented by Ram Krishnan.
  65. The Science, Engineering, and Business of Cyber Security (pptx) (pdf)
    Keynote Lecture at IIT Roorkie, Cognizance 2014, March 21, 2014.
  66. Panel on Security and Privacy in the Networked World (pptx) (pdf)
    Statement at Panel on Security and Privacy in the Networked World, at 4th ACM Conference on Data and Applications Security (CODASPY), March 3-5, 2014, San Antonio, Texas.
  67. 2013: 11

  68. The Science, Engineering, and Business of Cyber Security (pptx) (pdf)
    Keynote Lecture at PSG College of Technology, ICC3 Conference, Coimbatore, Tamilnadu, India, December 19, 2013.
  69. The Science, Engineering, and Business of Cyber Security (pptx) (pdf)
    Keynote Lecture at ACM CCS Conference, Berlin, Germany, November 6 2013.
  70. The Science, Engineering, and Business of Cyber Security (pptx) (pdf)
    Keynote Lecture at UTSA College of Science Research Conference, San Antonio, Oct 18, 2013.
  71. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf) (abstract)
    Keynote Lecture at 14th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, Aug 14-16, 2013.
  72. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf) (abstract)
    Keynote Lecture at 7th IEEE Conference on Software Security and Reliability (SERE), June 18-20, 2013, Gaithersburg, Maryland.
  73. Institute for Cyber Security (pptx) (pdf)
    Private presentation, June 18, 2013, Arlington, Virginia.
  74. Program Chairs' Opening Statement (pptx) (pdf)
    Program Chairs' Opening Statement at 7th International Conference on Network and System Security (NSS 2013), June 3-4, 2013, Madrid, Spain.
  75. Authorization and Trust in the Cloud (pptx) (pdf) (abstract)
    Invited Lecture at NSF-STDF US-Egypt Cyber Security Workshop, May 27-30, 2013, Cairo, Egypt.
  76. Panel on Data Usage Management: Technology or Regulation? (pptx) (pdf)
    Statement at Panel on Data Usage Management: Technology or Regulation?, at 4th International Workshop on Data Usage Management, San Francisco, California, May 23, 2013 (colocated with IEEE Symposium on Security and Privacy).
  77. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf)
    Invited Lecture at Security and Privacy Symposium, IIT Kanpur, Kanpur, India, Feb 28-Mar 2, 2013.
  78. Panel on Security and Privacy in Human-Centric Computing and Big Data Management (pptx) (pdf)
    Statement at Panel on Security and Privacy in Human-Centric Computing and Big Data Management, at 3rd ACM Conference on Data and Applications Security (CODASPY), February 18-20, 2013, San Antonio, Texas.
  79. 2012: 14

  80. The Future of Access Control: Attributes, Automation and Adaptation (pptx) (pdf) (abstract)
    Keynote Lecture at 6th international Conference on Network and System Security, Wuyishan, China, Nov 21-23, 2012.
  81. Challenges of Cyber Security Education at the Graduate Level (pptx) (pdf)
    Presentation at Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure, November 8-9, 2012, Lubbock, Texas.
  82. Group-Centric Secure Information Sharing: A Lattice Interpretation (pptx) (pdf)
    Presentation at MURI PI's AISL-Presidio joint meeting, Sept. 14, 2012, Stanford University, Palo Alto, California.
  83. ICS Research Projects (pptx) (pdf)
    Lecture at IIIT, Delhi, India, August 30, 2012.
  84. The Authorization Leap from Rights to Attributes: Maturation or Chaos? (pptx) (pdf)
    Invited Lecture at 1st International Conference on Security of Internet of Things, Amrita University, Amritapuri, Kerala, India, August 17-19, 2012.
  85. IRI Principles to Address The Big Data Problem (pptx) (pdf)
    Statement at Panel on Using Information Re-Use and Integration Principles in Big Data at 13th IEEE Conference on Information Reuse and Integration (IRI), Las Vegas, Nevada, August 8-10, 2012.
  86. The Authorization Leap from Rights to Attributes: Maturation or Chaos? (pptx) (pdf)
    Keynote Lecture at 10th IEEE Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012.
  87. The Authorization Leap from Rights to Attributes: Maturation or Chaos? (pptx) (pdf) (abstract)
    Keynote Lecture at 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, June 20-22, 2012.
  88. Cyber Security Major R&D Challenges (pptx) (pdf)
    Statement at Cyber Security Research Institute (CSRI), Cyber Security R&D Workshop, Arlington, Virginia, April 19-20, 2012. Presented by Ram Krishnan.
  89. Open Discussion PSOSM12 (pptx) (pdf)
    Statement at Open Discussion Session at the Workshop on Privacy and Security in Online Social Networks (PSOSM), held in conjunction with WWW 2012, Lyon, France, April 17th, 2012.
  90. Grand Challenges in Data Usage Control (pptx) (pdf)
    Keynote Lecture at the Workshop on Data Usage Management on the Web (DUMW), held in conjunction with WWW 2012, Lyon, France, April 16th, 2012.
  91. The Future of Cyber Security (pptx) (pdf)
    Lecture in UTSA ECE Seminar Series, San Antonio, TX, April 6, 2012.
  92. Group-Centric Secure Information Sharing (pptx) (pdf)
    Keynote Lecture at 1st Greater Kansas Area Security Workshop (KanSec), Kansas State University (KSU), Manhattan, KS, March 30, 2012.
  93. The Data and Application Security and Privacy (DASPY) Challenge (pptx) (pdf)
    Lecture at Kansas State University (KSU), Manhattan, KS, March 29, 2012.

    2011: 9

  94. Grand Challenges in Authorization Systems (pptx) (pdf)
    Lecture at Texas A&M University (TAMU), College Station, TX, November 14, 2011.
  95. The Data and Application Security and Privacy (DASPY) Challenge (pptx) (pdf)
    Lecture at Texas A&M International University (TAMIU), Laredo, TX, November 11, 2011.
  96. The Data and Application Security and Privacy (DASPY) Challenge (pptx) (pdf)
    Triangle Computer Science Distinguished Lecturer Series, Raleigh, NC, October 31, 2011.
  97. Cyber Security Grand Challenges and Prognosis (pptx) (pdf)
    Lecture at UTSA College of Science Research Conference, UTSA, San Antonio, TX, September 30, 2011.
  98. Challenges of Cyber Security Education at the Graduate Level (pptx) (pdf)
    Lecture at University Partners Cyber Open House and Workshop, Sandia National Laboratories, Albuquerque, NM, July 25-27, 2011.
  99. The Future of Cyber Security (pptx) (pdf)
    Keynote Lecture at 6th IEEE International Conference on Systems of Systems Engineering (SOSE), Albuquerque, NM, June 27-30, 2011.
  100. Swimming with Sharks: Security Roundtable (youtube)
    IEEE Computer Society, uploaded May 25, 2011. Ravi Sandhu, Jon Viega, and Carl Landwehr on whether it's possible to build truly secure applications or simply necessary to adapt to the world as it is.
  101. The Future of Cyber Security (ppt) (pdf)
    Lecture at Tsinghua University, Beijing, China, May 10, 2011.
  102. The Challenge of Data and Application Security and Privacy (DASPY) (ppt) (pdf)
    Lecture at Chinese University of Hong Kong (CUHK), Department of Information Engineering, Hong Kong, March 23, 2011.
  103. What is the Game in Cyber Security? (pptx) (pdf)
    Lecture at Government-University-Industry Research Roundtable (GUIRR) Meeting on Cybersecurity in the Coming Decade: Using Security to Support the Value of Intellectual Property, Washington, DC, February 9, 2011. Meeting Summary

    2010: 12

  104. Panel on Cloud Security and Privacy: What is new and What needs to be done? (pptx) (pdf)
    Lecture at 2nd IEEE International Conference on Cloud Computing (CloudCom 2010), Plenary Panel, Dec. 3, 2010, University Place Hotel and Conference Center, IUPUI, Indianapolis.
  105. Group-Centric Models for Secure and Agile Information Sharing (ppt) (pdf)
    Presentation at MURI PI's AISL-Presidio joint meeting, Oct. 15, 2010, University of Maryland Baltimore County.
  106. Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use (ppt) (pdf)
    Presentation at NSF, Arlington, VA, October 14, 2010.
  107. Laws of Cyber Security (ppt) (pdf)
    Lecture at First International Workshop on Scientific Analysis and Policy Support for Cyber Security (SA&PS4CS'10), St. Petersburg, Russia, September 11, 2010.
  108. New Trends and Challenges in Computer Network Security (ppt) (pdf)
    Panel at 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 10, 2010.
  109. Security Models: Past, Present and Future (ppt) (pdf)
    Guest lecture at UTSA in Prof. Shouhuai Xu's CS 6393 AT: Cyber Security course, August 31, 2010.
  110. Security Models: Past, Present and Future (ppt) (pdf)
    Invited lecture at Information Security Summer School (ISSS), July 12-23, 2010, National Chiao Tung University, Hsinchu, Taiwan, (this lecture half day on July 20th).
  111. Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together (ppt) (pdf)
    Lecture at SACMAT 2010 Panel, Pittsburg, Pennsylvania, June 9-11, 2010.
  112. Trust Evidence in Heterogeneous Environments: Towards a Research Agenda (ppt) (pdf)
    Lecture at Intel Trust Workshop, Santa Clara, California, May 19-20, 2010.
  113. Group-Centric Models for Secure and Agile Information Sharing (ppt)
    Lecture at Dagstuhl Seminar on Distributed Usage Control, Schloss Dagstuhl, Germany, April 7-9, 2010.
  114. The Future of Cyber Security (ppt) (pdf)
    Invited Lecture at inauguration of Accenture's new Cyber Security Center, San Antonio, Texas, February 23, 2010.
  115. Speculations on the Future of Cyber Security in 2025 (ppt) (pdf)
    Invited Lecture at San Antonio Defense Technology Cluster Luncheon, San Antonio, Texas, January 7, 2010.
  116. 2009: 14

  117. Speculations on the Future of Cyber Security in 2025 (ppt) (pdf)
    Invited Lecture at AFCEA ArkLaTex Chapter General Membership Luncheon, Shreveport, Louisiana, November 17, 2009. Announcement.
  118. Cyber Security: What You Need to Know (ppt) (pdf)
    UTSA's Computer Security Awareness Month Lectures, UTSA Main Campus, San Antonio, Texas, October 30, 2009.
  119. Purpose-Centric Secure Information Sharing (ppt) (pdf)
    TIUPAM: A Framework for Trustworthiness-centric Information Sharing (ppt) (pdf)
    Presentations at MURI PI's AISL-Presidio joint meeting, Sept. 17-18, 2009, Stanford University.
  120. Application-Centric Security: UCON, PEI and g-SIS (ppt) (pdf)
    Presentation at NSF/Microsoft Workshop on Confidential Data Collection for Innovation Analysis, Seattle, Washington, September 9-10, 2009.
  121. Security and the Cloud: Cloud Trust Brokers (ppt) (pdf)
    Invited lecture at IN-Q-TEL Technology Focus Day: Cloud and Distributed Computing, Arlington, Virginia, August 27, 2009. Agenda.
  122. Cyber Security: Past, Present and Future (ppt) (pdf)
    Presentation at UTSA College of Science Research Conference, August 7, 2009.
  123. Application-Centric Security Models (ppt) (pdf)
    Invited lecture at Shanghai Jiao Tong University, Shanghai, China, July 18, 2009.
    Invited lecture at East China Normal University, Shanghai, China, July 17, 2009.
  124. Security Models: Past, Present and Future (ppt) (pdf)
    Invited lecture at Summer School on Parallel and Distributed Computing at Huazhong University of Science and Technology (HUST), Wuhan, China, July 1-21, 2009 (this lecture all day on July 15).
  125. Application-Centric Security Models (ppt) (pdf)
    Webinar Lecture for BAE Systems, June 16, 2009.
  126. The PEI Framework for Application-Centric Security
    Invited lecture at 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009.
  127. Access Control
    Tutorial at the 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009.
  128. The PEI + UCON Framework for Application Security
    Presentation at the NSF Workshop on Data and Application Security, February 19-20, 2009, Arlington, Virginia.
  129. A Perspective on Usage Control and its Future
    Invited lecture at Norwegian University of Science and Technology, January 28, 2009, Trondheim, Norway.
  130. Industry-Academia Research Synergy: Fantasy or Reality?
    Invited lecture at Intuit-eBay Security Confabulation, January 21, 2009, San Jose, California.

    2008: 13

  131. Group-Centric Information Sharing
    Keynote at 4th ICST-Create-Net International Conference on Collaborative Computing: Networking, Applications and Worksharing, Orlando, Florida, Nov. 14, 2008.
    Abstract
  132. Research Opportunities at the Institute for Cyber Security
    Guest lecture at CS 7123 Research Seminar for Doctoral Students, UTSA, Nov. 5, 2008.
  133. Formal Models for Assured Information Sharing
    Presentation at MURI kick-off meeting, Sept. 12, 2008, University of Maryland at Baltimore County.
  134. The ASCAA Principles Applied to Usage Control OR A Perspective on Usage Control and its Future
    Invited lecture at Zurich Information Security Center (ZISC) Workshop on Advanced Concepts of Access and Usage Control, Sept. 4-5, 2008, Zurich, Switzerland.
  135. Trusted Computing Models
    Keynote lecture at 2nd IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), June 11-13, 2008, Taichung, Taiwan.
  136. The ASCAA Principles for Next-Generation Role-Based Access Control
    Invited lecture at National Chiao Tung University, Hsinchu, Taiwan, June 11, 2008.
  137. The ASCAA Principles for Access Control Interpreted for Collaboration Systems
    Invited lecture at Workshop on Collaboration and Security (COLSEC) held at the 2008 International Symposium on Collaborative Technologies and Systems (CTS), Irvine, California, May 19-23, 2008.
  138. Access Control and Semantic Web Technologies
    Invited lecture at Secure Semantic Web Workshop held at the 24th International Conference on Data Engineering (ICDE), Cancun, México, April 7-12, 2008.
  139. The ASCAA Principles for Next-Generation Role-Based Access Control
    Keynote lecture at 3rd IEEE International Conference on Availability, Reliability and Security (ARES), Barcelona, Spain, March 4-7, 2008.
  140. The Secure Information Sharing Problem and Solution Approaches
    Invited lecture, University of Nebraska at Omaha, Department of Computer Science, Omaha, Nebraska, Feb. 15, 2008.
  141. Authentication: The Problem That Will Not Go Away
    Invited lecture at Office of Comptroller of the Currency, Western District, Examiners Conference, Denver, Colorado, Feb. 13, 2008.
  142. The Secure Information Sharing Problem and Solution Approaches
    Invited lecture, IIT Delhi, Department of Computer Science, New Delhi, India, Feb. 5, 2008.
  143. The Future: Evolution of the Technology
    Invited lecture at TriCipher Customer Appreciation Forum, Los Gatos, California, Jan. 17-18, 2008.
  144. 2007: 2

  145. The Institute for Cyber Security and its Research Agenda and Sandhu's Laws of Cyber Security
    Guest lecture at CS 7123 Research Seminar for Doctoral Students, UTSA, Nov. 21, 2007.
  146. Sandhu's Laws of Cyber Security
    Invited lecture at TriCipher Customer Appreciation Forum, St. Helena, California, Jan. 18-19, 2007.
  147. 2006: 5

  148. Information Assurance:A Personal Perspective (ppt) (pdf)
    Invited lecture at University of Texas at San Antonio, Texas, Oct. 30, 2006.
  149. The Secure Information Sharing Problem and Solution Approaches
    Distinguished lecture at University of Illinois at Chicago, Oct. 12, 2006.
  150. The Secure Information Sharing Problem and Solution Approaches (youtube)
    Invited seminar at Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, Sept. 27, 2006.
  151. Digital Signature Usability
    Panel on Digital Signatures at 5th Annual PKI Research and Development Workshop, NIST, Gaithersburg, MD, April 4-6, 2006.
  152. Secure Information Sharing Enabled by Trusted Computing and PEI Models
    Keynote lecture at 1st ACM Symposium on Information, Computer, and Communication Security (AsiaCCS), Taipei, Taiwan, March 21-24, 2006.
  153. 2005: 1

  154. Securing Cyberspace: The OM-AM, RBAC and PKI Roadmap
    Invited lecture State University of New York, Stony Brook, May 5, 2005.
  155. 2004: 10

  156. Cyber-Identity, Authority and Trust in an Uncertain World
    Keynote lecture at 6th Brazilian Symposium on Computer and Information Security (SSI), November 9-12, 2004.
  157. Role-Based Access Control
    Tutorial at 6th Brazilian Symposium on Computer and Information Security (SSI), November 9-12, 2004.
  158. Cyber-Identity, Authority and Trust in an Uncertain World
    Distinguished lecture at Arizona State University, Tempe, Arizona, Oct. 22, 2004.
  159. A Perspective on Graphs and Access Control Models
    Keynote lecture at 2nd International Conference on Graph Transformation (ICGT), Rome, Italy, September 28-October 2, 2004.
  160. Cyber-Identity, Authority and Trust in an Uncertain World
    Invited plenary lecture at 1st Secure Knowledge Management Workshop, Buffalo, New York, September 23-24, 2004.
  161. Cyber-Identity, Authority and Trust in an Uncertain World
    Invited lecture at Intel Corporation, Hillsboro, Oregon, August 24, 2004.
  162. Managing Cyber-Identity, Authorization and Trust
    Panel at NSF Cybertrust PIs Meeting, Pittsburg, PA, August 18-20, 2004.
  163. Usage Control (UCON):A Vision for Next Generation Access Control
    Breakout at NSF Cybertrust PIs Meeting, Pittsburg, PA, August 18-20, 2004.
  164. Cyber-Identity and Authorization in an Uncertain World
    Lecture at George Mason University Symposium on IT for Homeland Security, Fairfax, Virginia, May 18, 2004.
  165. A Role-Based Approach to Federated Identity
    Presentation at RSA Conference, San Francisco, California, Feb. 23-28, 2004.
  166. 2003: 2

  167. Role-Based Access Control
    Tutorial at 8th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2-3, 2003, Villa Gallia, Como, Italy.
  168. Rethinking Password Strategies
    Presentation at NACHA 03 meeting, 2003.
  169. 2002: 1

  170. Making Access Control More Usable
    Panel at 7th ACM Symposium on Access Control Models and Technologies (SACMAT), June 3-4, 2002, Monterey, CA.
  171. 2001: 1

  172. Future Directions in Role-Based Access Control Models
    Keynote lecture at 1st International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, Saint Petersburg, Russia, May 21-23, 2001.
  173. 1999: 1

  174. Engineering Authority and Trust in Cyberspace: A Role-Based Approach
    Keynote lecture at International Conference on Information Security (INFOSECU99), Shanghai, China, October 11-13, 1999.
  175. 1996: 2

  176. Access Control: The Neglected Frontier
    Keynote lecture at 1st Australasian Conference on Information Security and Privacy (ACISP), Wollongong, NSW, Australia, June 23-26, 1996.
  177. Leader, People-to-People Information Security Delegation to China
    Beijing, Guangzhou, Shanghai, Hong Kong, May 17–June 1, 1996.
  178. 1995: 1

  179. Pacific Rim Information Security Seminars
    Professional seminars in Sydney, Canberra (Australia), Singapore, Kuala Lumpur (Malaysia), Wellington (New Zealand), May 25–June 10 and November 2-18, 1995.

    1993: 2

  180. Lattice-Based Access Control Models
    Invited lecture at University of Milan, December 1993, Milan, Italy.
  181. Evolving Criteria for Information Security Products
    Keynote lecture at National Bankers Conference, December 1993, Rome, Italy.
  182.