DAN (Linda) LINfaculty.missouri.edu/lindan/cv_danlin.pdf · 25. Alex Hindle, Jie Shao, Dan Lin,...

11
DAN (Linda) LIN Associate Professor University of Missouri Columbia, MO, USA Phone: (573) 882-0546 Email: [email protected] Research Interests My current research includes security and privacy in social network, big data process- ing, security and privacy issues in mobile applications, routing and security issues in Vehicular Ad-hoc Networks (VANETs). Achievement Highlights Secured nearly $6M funding and my share is close to $3M More than 80 publications including 30 journals (h-index=30, citations=3274) Graduated 4 PhD students and 5 MS thesis students Currently advising 6 PhD students and 1 MS thesis student Missouri S&T Woman of the Year Award, Faculty Research Award, Outstanding Achievement Award Associate Editor of IEEE TDSC journal Program director of NSA/NSF GenCyber Security Camp for K-12 Teachers in 2015, 2016, 2017 and 2018 Education National University of Singapore Computer Science Ph.D 2007 PhD Advisor: Prof. Beng Chin Ooi Fudan University, Shanghai, China Computer Science B.S. 2002 Professional Experience University of Missouri, Columbia, MO, USA Associate Professor, EECS Aug. 2018 - now Director of I-Privacy Laboratory, EECS Aug. 2018 - now Missouri University of Science and Technology, Rolla, MO, USA Associate Chair for Graduate Studies, Computer Science Jan. 2018 - July 2018 Associate Professor, Computer Science Sep. 2015 - July 2018 Director of Cybersecurity Laboratory Jun. 2015 - July 2018 Assistant Professor, Computer Science Aug. 2008 - Aug. 2015 Purdue University, West Lafayette, USA Post Doctoral Research Associate, Computer Science Nov 2006 - Jul. 2008 Advisor: Prof. Elisa Bertino Research Funding (Total: $5,874,626, Shared credit: $2,768,415) External Grants 1. PI, “Inspire Next Generation of Cyber Stars”, National Security Agency (NSA), 04/15/2018– 04/14/2019, $100,000. (Shared credit: 60%) 2. PI, “iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing ”, National Science Foundation (NSF), 09/1/2016–08/31/2019, $315,000. (Missouri S&T is the lead 1

Transcript of DAN (Linda) LINfaculty.missouri.edu/lindan/cv_danlin.pdf · 25. Alex Hindle, Jie Shao, Dan Lin,...

DAN (Linda) LIN

Associate ProfessorUniversity of MissouriColumbia, MO, USAPhone: (573) 882-0546Email: [email protected]

Research Interests

My current research includes security and privacy in social network, big data process-ing, security and privacy issues in mobile applications, routing and security issues in Vehicular Ad-hocNetworks (VANETs).

Achievement Highlights• Secured nearly $6M funding and my share is close to $3M• More than 80 publications including 30 journals (h-index=30, citations=3274)• Graduated 4 PhD students and 5 MS thesis students• Currently advising 6 PhD students and 1 MS thesis student• Missouri S&T Woman of the Year Award, Faculty Research Award, Outstanding Achievement Award• Associate Editor of IEEE TDSC journal• Program director of NSA/NSF GenCyber Security Camp for K-12 Teachers in 2015, 2016, 2017 and2018

Education

National University of Singapore Computer Science Ph.D 2007PhD Advisor: Prof. Beng Chin Ooi

Fudan University, Shanghai, China Computer Science B.S. 2002

Professional Experience

University of Missouri, Columbia, MO, USA

• Associate Professor, EECS Aug. 2018 - now

• Director of I-Privacy Laboratory, EECS Aug. 2018 - now

Missouri University of Science and Technology, Rolla, MO, USA

• Associate Chair for Graduate Studies, Computer Science Jan. 2018 - July 2018

• Associate Professor, Computer Science Sep. 2015 - July 2018

• Director of Cybersecurity Laboratory Jun. 2015 - July 2018

• Assistant Professor, Computer Science Aug. 2008 - Aug. 2015

Purdue University, West Lafayette, USA

• Post Doctoral Research Associate, Computer Science Nov 2006 - Jul. 2008Advisor: Prof. Elisa Bertino

Research Funding(Total: $5,874,626, Shared credit: $2,768,415)

External Grants

1. PI, “Inspire Next Generation of Cyber Stars”, National Security Agency (NSA), 04/15/2018–04/14/2019, $100,000. (Shared credit: 60%)

2. PI, “iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing ”,National Science Foundation (NSF), 09/1/2016–08/31/2019, $315,000. (Missouri S&T is the lead

1

institution, Shared credit: $159,924)

3. Co-PI, “Building a Privacy-Preserving Social Networking Platform from a Technological andSociological Perspective”, National Science Foundation (NSF), 09/1/2016–08/31/2019, $682,219.(Lead institution, Shared credit: $143,486)

4. PI, “Promoting Cybersecurity and Inspiring Next Generation Cyber Warriors”, National SecurityAgency (NSA), 04/12/2017–04/11/2018, $100,000. (Shared credit: 60%)

5. PI, “MASTER: Missouri Advanced Security Training, Education and Research”, National ScienceFoundation (NSF), 08/15/2014–07/31/2020, $3,319,494. (Shared credit: 60%)

6. PI, “GenCyber: Security Camp for K-12 Teachers”, National Security Agency (NSA), 05/1/2016–04/30/2017, $100,000. (Shared credit: 60%)

7. Co-PI, “Research and Training Experience for Undergraduates in the area of Secure Cloud Com-puting”, National Science Foundation (NSF), 03/01/2015–02/28/2018, $360,000. (shared credit:20%)

8. PI, “Brokerage Services for the Next Generation Cloud”, National Science Foundation (NSF),09/01/2012–08/31/2014, $285,565. (Lead institution, Shared credit: $140,335)

9. PI, National Science Foundation (NSF), REU supplement, 09/01/2013–08/31/2014, $14,400.(Shared credit: 100%)

10. Co-PI, “A Doctoral Program in Security and Privacy in Mobile Social Network Space”, US De-partment of Education (DOE), 08/16/2012–08/15/2017, $544,420. (Shared credit: 16%)

11. Co-PI, “Peer to Peer Infrastructure Security”, National Security Agency (NSA), 09/11/2013–09/10/2014, $2,669. (Shared credit: 10%)

Internal Grants

12. Daniel St. Clair Faculty Fellow Award, Department of Computer Science, Missouri University ofScience and Technology, 07/31/2015-06/30/2017, $10,000. (Shared credit: 100%)

13. PI, “Efficient Processing of Keyword Search in Spatial Databases”, University of Missouri ResearchBoard, 02/2012- 01/2013, $12,000. (Shared credit: 100%)

14. PI, “Preserving Location Privacy in Pervasive Environments”, University of Missouri ResearchBoard, 06/2009- 05/2010, $29,200. (Shared credit: 100%)

Publications (h-index=30, citations=3274)(Students that I advised or co-advised are marked by *)

Refereed Journals

1. Katrina Ward*, Dan Lin, Sanjay Madria, “A Parallel Algorithm For Anonymizing Large-ScaleTrajectory Data”, ACM Transactions on Data Science (TDS), 2019.

2. Adam Bowers*, Cong Liao, Douglas Steiert*, Dan Lin, Anna Squicciarini, Ali Hurson, “DetectingSuspicious File Migration or Replication in the Cloud”, IEEE Transactions on Dependable andSecure Computing (TDSC), 2019. (Impact Factor = 4.41)

3. Pengyang Wang, Yanjie Fu, Jiawei Zhang, Xiaolin Li, Dan Lin, “Learning Urban Commu-nity Structures: A Collective Embedding Perspective with Periodic Spatial-temporal MobilityGraphs”, ACM Transactions on Intelligent Systems and Technology (TIST), 2018. (Impact Fac-tor = 3.19)

4. Jian Kang*, Dan Lin, Wei Jiang, Elisa Bertino, “Highly Efficient Randomized Authentication inVANETs”, Pervasive and Mobile Computing, 2018. (Impact Factor = 2.974)

5. Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, Jianping Fan, “LeveragingContent Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settingsfor Social Image Sharing”, IEEE Transactions on Information Forensics & Security (TIFS), 2018.(Impact Factor = 4.332)

2

6. Dan Lin, Nicholas Hilbert*, Christian Storer, Wei Jiang, Jianping Fan, “UFace: Your UniversalPassword That No One Can See”, Computers & Security, 2017. (Impact Factor = 2.65)

7. Jingwei Li, Adam Bowers*, Dan Lin, Peng Jiang, Wei Jiang, “PAS: Policy-based Assistance inSensor Networks”, Computing, 2017. (Impact Factor= 1.654)

8. Jianping Fan, Zhenzhong Kuang, Baopeng Zhang, Jun Yu, Dan Lin, “iPrivacy: Image PrivacyProtection by Identifying Sensitive Objects via Deep Multi-Task Learning”, IEEE Transactionson Information Forensics and Security (TIFS), 2016. (Impact Factor = 4.332)

9. Dan Lin, Anna Cinzia Squicciarini, Venkata Nagarjuna Dondapati*, Smitha Sundareswaran*,“A Cloud Brokerage Architecture for Efficient Cloud Service Selection”, IEEE Transactions onServices Computing (TSC), 2016. (Impact Factor = 4.418)

10. Dan Lin, Jian Kang*, Anna Squicciarini, Yingjie Wu, Sashi Gurung*, and Ozan Tonguz, “MoZo:A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs”, IEEETransactions on Mobile Computing (TMC), 2016. (Impact Factor = 3.822)

11. Jingwei Li*, Dan Lin, Anna Squicciarini, Jin Li and Chunfu Jia, “Towards Privacy-PreservingStorage and Retrieval in Multiple Clouds”, IEEE Transactions on Cloud Computing (TCC), 2016.(Impact Factor = 7.928)

12. Jingwei Li*, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Chunfu Jia, “MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection”, IEEE Transactions on Depend-able and Secure Computing (TDSC), 2016. (Impact Factor = 4.41)

13. Sushama Karumanchi*, Anna Squicciarini, and Dan Lin, “Attribute-Based Access Control in Ve-hicular Ad-hoc Networks”, Telecommunication Systems Journal, Springer, 2015. (Impact Factor= 1.527)

14. Tao Jiang, Bing Zhang, Dan Lin, Yunjun Gao and Qing Li, “Incremental evaluation of top-kcombinatorial metric skyline query”, Knowledge-Based Systems, volume 74, pages 89-105, 2015.(Impact Factor=4.396)

15. Anna Squicciarini, Dan Lin, Smitha Sundareswaran*, and Josh Wede, “Privacy Policy Inferenceof User-Uploaded Images on Content Sharing Sites”, IEEE Transactions on Knowledge and DataEngineering (TKDE), Volumn PP, Issue 99, Pages 1, April, 2015. (Impact Factor=2.775)

16. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Continuous Predictive Line Queries for On-the-go Traffic Estimation”, Transactions on Large-Scale Data and Knowledge-Centered Systems,Springer, 2015.

17. Sashi Gurung*, Dan Lin, Wei Jiang, Ali Hurson, and Rui Zhang, “Traffic Information Publicationwith Privacy Preservation”, ACM Transactions on Intelligent Systems and Technology (TIST),Volume 5 Issue 3, September 2014. (Impact Factor = 4.332)

18. Tao Jiang, Yunjun Gao, Bin Zhang, Dan Lin, and Qing Li, “Monochromatic and BichromaticMutual Skyline Queries”, Expert Systems with Applications, Pages 1885–1900, 2014. (ImpactFactor = 3.768)

19. Anna Squicciarini, Sushama Karumanchi*, Dan Lin, and Nicole Desisto, “Identifying Hidden So-cial Circles for Advanced Privacy Configuration”, Volume 41, Pages 40–51, Computers & Security,Pages 40–51, 2014. (Impact Factor = 2.65)

20. Dan Lin, Prathima Rao*, Rodolfo Ferrini, Elisa Bertino, and Jorge Lobo, “A Similarity Mea-sure for Comparing XACML Policies”, IEEE Transactions on Knowledge and Data Engineering(TKDE), volume 25(9), pages 1946-1959, 2013. (Impact Factor=2.775)

21. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Predictive Line Queries for Traffic Forecasting”,Transactions on Large-Scale Data and Knowledge-Centered Systems, Volume 6, Pages 106-133,2012.

22. Anna Squicciarini, Smitha Sundareswaran*, and Dan Lin, “Ensuring Distributed Accountabil-ity for Data Sharing in the Cloud”, IEEE Transactions on Dependable and Secure Computing(TDSC), Volume 9(4), pages 556-568, 2012. (Impact Factor = 4.41)

3

23. Rui Zhang, Jiangzhong Qi*, Dan Lin, Wei Wang, and Raymond Wong, “A Highly OptimizedAlgorithm for Continuous Intersection Join Queries over Moving Objects”, The VLDB Journal,Volume 21(4), pages 561-586, 2012. (Impact Factor = 2.689)

24. Prathima Rao*, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo “Fine-Grained Integrationof Access Control Policies”, Computers & Security, Volume 30, Issues 2, Pages 91–107, March,2011. (Impact Factor = 2.65)

25. Alex Hindle, Jie Shao, Dan Lin, Jiaheng Lu, and Rui Zhang. “Clustering Web Video SearchResults based on Integration of Multiple Features”. World Wide Web Journal (WWWJ), Volume14, Number 1, pages: 53-73, 2011. (Impact Factor = 1.15)

26. Dan Lin, Prathima Rao*, Elisa Bertino, Ninghui Li, and Jorge Lobo, “EXAM - A ComprehensiveEnvironment for the Analysis of Access Control Policies”, International Journal of InformationSecurity, Volume 9, Issue 4, August 2010. (Impact Factor = 1.658)

27. Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar, “Location Privacy in Moving-Object Environments”, Transactions on Data Privacy, Volume 2 Issue 1, April 2009. (ImpactFactor = 0.314)

28. Elisa Bertino, Carolyn Brodie, Seraphin Calo, Lorrie Cranor, Clare-Marie Karat, John Karat,Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni*, Prathima Rao*, and Xiping Wang, “Analysis ofPrivacy and Security Policies”, IBM journal, Volume 53, Issue 2, pages: 3:1–3:18, March, 2009.(Impact Factor = 0.962)

29. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Continuous Clustering of Moving Objects”,IEEE Transactions on Knowledge and Data Engineering (TKDE), (19)9:1161-1174, 2007. (ImpactFactor=2.775)

30. Dan Lin, Rui Zhang, and Aoying Zhou, “Indexing Fast Moving Objects for KNN Queries Basedon Nearest Landmarks”, GeoInformatica, (10)4:423-445, 2006. (Impact Factor=2.091)

31. Bin Cui, Dan Lin, and Kian-Lee Tan, “IMPACT: A Twin-index Framework for Efficient MovingObject Query Processing”, Data & Knowledge Engineering (DKE), (59)1:63-85, 2006. (ImpactFactor=1.467)

Refereed Conferences

32. Jian Kang*, Dan Lin, Elisa Bertino, Ozan Tonguz, “From Autonomous Vehicles to VehicularClouds: Challenges of Management, Security and Dependability”, IEEE International Conferenceon Distributed Computing Systems (ICDCS), 2019.

33. Joshua Morris*, Dan Lin, Anna Squicciarini, “FriendGuard: A Friend Search Engine with Guar-anteed Friend Exposure Degree”, ACM symposium on access control models and technologies(SACMAT), 2019.

34. Dakshak Keerthi Chandra*, Weerdhawal Chowgule*, Yanjie Fu, and Dan Lin, “RIPA: Real-time Image Privacy Alert System”, IEEE International Conference on Collaboration and InternetComputing (CIC), 2018. (acceptance rate = 26%)

35. Jian Kang*, Yousef Elmehdwi and Dan Lin, “SLIM: Secure and Lightweight Identity Managementin VANETs with Minimum Infrastructure Reliance”, 13th International Conference on Securityand Privacy in Communication Networks (SecureComm), 2017.

36. Anna Squicciarini, Andrea Novelli, Dan Lin, Haoti Zhong, and Cornelia Caragea “From Tag toProtect: A Tag-Driven Policy Recommender System for Image Sharing”, Privacy, Security andTrust (PST), 2017.

37. Zhenzhong Kuang, Zongmin Li, Dan Lin, Jianping Fan, “Automatic Privacy Prediction to Accel-erate Social Image Sharing”. IEEE International Conference on Multimedia Big Data (BigMM),2017.

4

38. Katrina Ward*, Dan Lin and Sanjay Madria, “MELT: Mapreduce-based Efficient Large-scaleTrajectory Anonymization”, 29th International Conference on Scientific and Statistical DatabaseManagement (SSDBM), 2017.

39. Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, Jianping Fan, “Privacy Setting Recommendationfor Image Sharing”, 16th IEEE International Conference on Machine Learning and Applications(ICMLA), 2017.

40. Douglas Steiert*, Dan Lin, Quincy Conduff, Wei Jiang, “A Location-Privacy Approach for Con-tinuous Queries” (Poster), 22th ACM symposium on access control models and technologies (SAC-MAT), 2017.

41. Adam Bowers*, Dan Lin, Anna Squicciarini, Ali Hurson, “Real-time Detection of Illegal FileTransfers in the Cloud” (Poster), IEEE International Conference on Distributed Computing Sys-tems (ICDCS), 2017.

42. Wei Jiang, Dan Lin, Feng Li*, Elisa Bertino, “No One Can Track You: Randomized Authenti-cation in Vehicular Ad-hoc Networks”, IEEE International Conference on Pervasive Computingand Communications (PerCom), 2017.

43. Cong Liao*, Anna Squicciarini, Dan Lin, “LAST-HDFS: Location-Aware Storage Technique forHadoop Distributed File System”, IEEE International Conference on Cloud Computing (CLOUD),(acceptance rate=16.7%), 2016.

44. Douglas McGeehan*, Dan Lin, Sanjay Madria, “ChitChat: An Effective Message Delivery Methodin Sparse Pocket-Switched Networks”, 36th IEEE International Conference on Distributed Com-puting Systems (ICDCS), 2016.

45. Lasanthi Heendaliya*, Michael Wisely*, Dan Lin, Sahra Sedigh, and Ali Hurson, “Influence-awarePredictive Density Queries Under Road-network Constraints”, 14th International Symposium onSpatial and Temporal Databases (SSTD), 2015.

46. Jingwei Li*, Anna Squicciarini, Dan Lin, Shuang Liang, and Chunfu Jia, “SecLoc: SecuringLocation-Sensitive Storage in the Cloud”, In Proceedings of 20th ACM symposium on accesscontrol models and technologies (SACMAT), 2015.

47. Anna Squicciarini, Dan Lin, Smitha Sundareswaran*, and Jingwei Li*, “Policy Driven Node Se-lection in MapReduce”, 10th International Conference on Security and Privacy in CommunicationNetworks (SecureComm), 2014.

48. Jingwei Li*, Dan Lin, Anna Squicciarini, and Chunfu Jia, “STRE: Privacy-Preserving Storageand Retrieval over Multiple Clouds”, 10th International Conference on Security and Privacy inCommunication Networks (SecureComm), 2014.

49. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Continuous Predictive Line Queries underRoad-network Constraints”, In Proceedings of the 24th International Conference on Databaseand Expert Systems Applications (DEXA), pages 228–242, 2013.

50. Sashi Gurung*, Dan Lin, Anna Squicciarini, and Elisa Bertino, “Information-oriented Trustwor-thiness Evaluation in Vehicular Ad-hoc Networks”, the 7th International Conference on Networkand System Security (NSS), pages 94–108, 2013.

51. Anna Squicciarini, Sushama Karumanchi*, Dan Lin, and Nicole Desisto, “Automatic Social GroupOrganization and Privacy Management”, the 8th IEEE International Conference on CollaborativeComputing: Networking, Applications and Worksharing (CollaborateCom), pages 89–96, 2012.

52. Sushama Karumanchi*, Anna Squicciarini, and Dan Lin, “Selective and Confidential MessageExchange in Vehicular Ad Hoc Networks”, The 6th International Conference on Network andSystem Security (NSS), pages 445–461, 2012.

53. Arej Muhammed*, Dan Lin, and Anna Squicciarini, “Location Privacy Policy Management Sys-tem”, The 14th International Conference on Information and Communications Security (ICICS),pages 427–434, 2012.

5

54. Sashi Gurung*, Dan Lin, Anna Squicciarini, and Ozan Tonguz, “A Moving Zone Based Architec-ture for Message Dissemination in VANETs”, The 8th International Conference on Network andService Management (CNSM), pages: 184-188, 2012.

55. Smitha Sundareswaran*, Anna Squicciarini, and Dan Lin, “A Brokerage-Based Approach forCloud Service Selection”, In Proceedings of IEEE International Conference on Cloud Computing,pages 558–565, 2012.

56. Jianzhong Qi*, Rui Zhang, Lars Kulik, Dan Lin, and Yuan Xue, “The Min-dist Location SelectionQuery”, International Conference on Data Engineering (ICDE), pages 366-377, 2012.

57. Dan Lin, Christian S. Jensen, Rui Zhang, Lu Xiao, and Jiaheng Lu, “A Moving-Object Index forEfficient Query Processing with Peer-Wise Location Privacy”, International Conference on VeryLarge Data Bases (VLDB), pages 37-48, Sep, 2012.

58. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Optimizing Predictive Queries on Moving Ob-jects under Road-network Constraints”, In Proceedings of the 22nd International Conference onDatabase and Expert Systems Applications (DEXA), pages 247–261, 2011.

59. Smitha Sundareswaran*, Anna Squicciarini, Dan Lin, and Shuo Huang, “Promoting DistributedAccountability in the Cloud”, In Proceedings of IEEE International Conference on Cloud Com-puting, pages 113–120, 2011.

60. Anna Squicciarini, Dan Lin, and Alessandro Mancarella, “PAIM: Peer-based Automobile IdentityManagement in Vehicular Ad-hoc Network”, In Proceedings of the 35th IEEE Computer Softwareand Applications Conference (COMPSAC), pages 263–272, 2011.

61. Anna Squicciarini, Smitha Sundareswaran*, Dan Lin, and Josh Wede, “A3P: Adaptive PolicyPrediction for Shared Images on Content Sharing Sites”(best paper award), In Proceedings of22nd ACM Conference on Hypertext and Hypermedia, pages 261–270, 2011.

62. Anna Squicciarini, Smitha Sundareswaran*, and Dan Lin, “Preventing Information Leakage fromIndexing in the Cloud”, In Proceedings of IEEE International Conference on Cloud Computing,pages 188–195, 2010.

63. Dan Lin and Anna Squicciarini, “Data Protection Models for Service Provisioning in the Cloud”,In Proceedings of ACM symposium on access control models and technologies (SACMAT), pages183–192, 2010.

64. Dan Lin, Sashi Gurung*, Wei Jiang, and Ali Hurson, “Privacy-Preserving Location Publishingunder Road-Network Constraints”, In Proceedings of 15th International Conference on DatabaseSystems for Advanced Applications (DASFAA), pages 17–31, 2010.

65. Chenyun Dai*, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, and Bhavani Thu-raisingham, “Query Processing Techniques for Compliance with Data Confidence Policies”, InProceedings of the 6th VLDB Workshop on Secure Data Management, pages 49–67, 2009.

66. Prathima Rao*, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo, “An Algebra for Fine-Grained Integration of XACML Policies”, In Proceedings of ACM symposium on access controlmodels and technologies (SACMAT), pages 63–72, 2009.

67. Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao*, Jorge Lobo, and DanLin, “Access Control Policy Combining: Theory Meets Practice”, In Proceedings of ACM sym-posium on access control models and technologies (SACMAT), pages 135–144, 2009.

68. Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar, “Position Transformation: A Lo-cation Privacy Protection Method for Moving Objects”, In Proceedings of ACM GIS Workshopon Security and Privacy, pages 62–71, 2008.

69. Su Chen, Christain S. Jensen, and Dan Lin, “A Benchmark for Evaluating Moving Object In-dexes”, In Proceedings of International Conference on Very Large Data Bases (VLDB), volume1, number 2, pages: 1574–1585, 2008.

6

70. Chenyun Dai*, Dan Lin, Elisa Bertino, and Murat Kantarcioglu, “An Approach to Evaluate DataTrustworthiness Based on Data Provenance”, In Proceedings of VLDB Workshop on Secure DataManagement (SDM), pages 82-98, 2008.

71. Dan Lin, Prathima Rao*, Elisa Bertino, Ninghui Li, and Jorge Lobo, “Policy Decomposition forCollaborative Access Control”, In Proceedings of ACM Symposium on Access Control Modelsand Technologies (SACMAT), pages 103–112, 2008.

72. Prathima Rao*, Dan Lin, Elisa Bertino, Jorge Lobo, and Ninghui Li, “EXAM- A ComprehensiveEnvironment for XACML Policy Analysis and Management”(Demo), In Proceedings of IEEEWorkshop on Policies for Distributed Systems and Networks, pages 238–240, 2008.

73. Lorenzo D. Martino, Qun Ni*, Dan Lin, and Elisa Bertino, “Multi-domain and Privacy-aware RoleBased Access Control in eHealth”, In Proceedings of the International Conference on PervasiveComputing Technologies for Healthcare, pages 131–134, 2008.

74. Rui Zhang, Dan Lin, Ramamohanarao Kotagiri, and Elisa Bertino, “Continuous IntersectionJoins Over Moving Objects”, In proceedings of the International Conference on Data Engineering(ICDE), pages 863–872, 2008.

75. Qun Ni*, Dan Lin, Elisa Bertino, and Jorge Lobo, “Conditional Privacy-Aware Role Based AccessControl”, In Proceedings of European Symposium on Research In Computer Security (ESORICS),pages 72–89, 2007.

76. Dan Lin, Hicham G. Elmongui, Elisa Bertino, and Beng Chin Ooi, “Data Management in RFIDApplications”, In Proceedings of International Conference on Database and Expert Systems Ap-plications (DEXA), pages 434–444, 2007.

77. Dan Lin, Prathima Rao*, Elisa Bertino, and Jorge Lobo, “An Approach to Evaluate Policy Simi-larity”, In Proceedings of ACM symposium on access control models and technologies (SACMAT),pages 1–10, 2007.

78. Prathima Rao*, Dan Lin, and Elisa Bertino, “ XACML Function Annotations”(best studentposition paper), In Proceedings of the 8th IEEE Workshop on Policies for Distributed Systemsand Networks, pages 178–182, 2007.

79. Dan Lin, Bin Cui, and Dongqing Yang, “Optimizing Moving Queries Over Moving Object DataStreams”, In Proceedings of the International Conference on Database Systems for AdvancedApplications (DASFAA), pages 600–611, 2007.

80. Beng Chin Ooi, Zhiyong Huang, Dan Lin, Hua Lu, and Linhao Xu, “Adapting Relational DatabaseEngine to Accommodate Moving Objects”(Demo), In proceedings of the International Conferenceon Data Engineering (ICDE), page 1505-1506, 2007.

81. Christian S. Jensen, Dan Lin, Beng Chin Ooi, and Rui Zhang, “Effective Density Queries on Con-tinuously Moving Objects”, In Proceedings of the International Conference on Data Engineering(ICDE), article 71, 2006.

82. Dan Lin, Christian S. Jensen, Beng Chin Ooi, and Simonas Saltenis, “Efficient Indexing of theHistorical, Present, and Future Positions of Moving Objects”, In Proceedings of the InternationalConference on Mobile Data Management (MDM), pages 59–66, 2005.

83. Bin Cui, Dan Lin, and Kian-Lee Tan, “Towards Optimal Utilization of Main Memory for Mov-ing Object Indexing”, In Proceedings of the International Conference on Database Systems forAdvanced Applications (DASFAA), pages 600-611, 2005.

84. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Query and Update Efficient B+-Tree BasedIndexing of Moving Objects”, In Proceedings of the International Conference on Very Large DataBases (VLDB), pages 768–779, 2004.

85. Bo Huang, Zhiyong Huang, Hongga Li, Dan Lin, Hua Lu and Yaxiao Song, “ITQS: An IntegratedTransport Query System”(Demo), In Proceedings of the ACM SIGMOD International Conferenceon Management of Data (SIGMOD), pages 951–952, 2004.

7

Book Chapter

86. Lasanthi Heendaliya*, Michael Wisely*, Dan Lin, Sarah Sedigh Sarvestani, and Ali Hurson “In-dexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network”,Advance in Computers, Volume 102, Chapter 4, Pages 111–169, 2016.

87. Elisa Bertino, Chenyun Dai*, Hsu-Sang Lim, and Dan Lin, ”High-Assurance Integrity Techniquesfor Databases”, British National Conference on Database (BNCOD) by Springer in the LectureNotes in Computer Science (LNCS) series, Volume: 5071 LNCS, Pages 244–256, 2008.

88. Elisa Bertino, Dan Lin, and Wei Jiang, “A Survey of Quantification of Privacy Preserving DataMining Algorithms”, in Privacy-Preserving Data Mining (Models and Algorithms), Charu C.Aggarwaland Philip S. Yu (Eds.), Springer-Verlag, Pages 183–205, 2008.

89. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Indexing of Moving Objects”, in Encyclopediaof Geographic Information Science, Shashi Shekha and Hui Xiong (Eds.), Springer-Verlag, pages512–518, 2008.

90. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Maximum Update Interval in Moving ObjectsDatabases”, Encyclopedia of Geographic Information Science, page 651, 2008.

Books

1. Dan Lin, Anna Squicciarini, Daniela Oliveira, “Cloud Computing Security”, CRC Press.

Patent

• Elisa Bertino, Dan Lin, Jorge Lobo, Prathima Rama Rao, “Method and System to DeterminePolicy Similarities”, US8020191B2, 2011.

Courses Taught

1. CS2300 Introduction to Database Systems

2. CS3300 Advanced Database Systems

3. CS3380 Database Applications and Information Systems

4. CS6303 Pervasive Computing

5. CS6304 Cloud Computing and Big Data Analysis

Department and University Services

• Curriculum coordinator, EECS, Mizzou, 2019.

• Member of the hiring committee for cybersecurity faculty, EECS, Mizzou, 2018.

• Member of the graduate committee, EECS, Mizzou, 2018.

• Member of the hiring committee for Dean for Graduate Study, 2018.

• Member of the hiring committee for Associate Dean for Research, 2018.

• Member of Faculty Research Award committee from 2016

• Member of Woman of the Year committee from 2016

• Member of personnel committee in the university from 2016 to 2018

• Member of honorary degree committee in the university 2014

• Member of Student Scholastic Appeals committee 2013

• Member of Peer Teaching Evaluation committee since Spring 2014

• Diversity Committee Chair in the Department since Spring 2011

• Member of Strategic Committee in the Department between Fall 2008 and Fall 2013

8

• Member of Faculty Hiring Committee in the Department in 2011, 2014 and 2015, 2018.

• Founder and Faculty advisor of IEEE-CS student chapter from Fall 2009 to Fall 2013

• Faculty advisor of ACM-W (Women in Computing) student chapter from Fall 2009 to Fall 2014

• Organize workshops for University EYH (Expand Your Horizon) program every year since 2009

Professional Activities

• NSF panelist, 2011, 2014, 2015, 2016, 2018.

• Associate Editor, IEEE Transactions on Dependable and Secure Computing (TDSC), since 2017.

• Associate Editor, Cybersecurity and Privacy, since 2018.

• Special Issue Editor, Cybersecurity Journal by Springer, 2018.

• Program committee member, International Conference on Big Data Computing and Communica-tions (BIGCOM), 2019.

• Program committee member, ACM Symposium on Access Control Models and Technologies (SAC-MAT), 2019.

• Program committee member, International Workshop on Mobile Ubiquitous Systems and Tech-nologies in conjunction with the 20th IEEE International Conference on Mobile Data Management(IEEE MDM), 2019.

• Program Co-Chair, Emerging Advances in Technology & Applications symposium of COMPSAC,2018.

• Program committee member, ACM Conference on Data and Application Security and Privacy(CODASPY), 2019.

• Program Co-Chair, ACM Symposium on Access Control Models and Technologies (SACMAT),2018.

• Program committee member, ACM SIGMOD Conference, 2018.

• Poster Co-Chair, ACM Symposium on Access Control Models and Technologies (SACMAT), 2017.

• Program committee member, Emerging Advances in Technology & Applications (EATA) sympo-sium, 2018

• Program committee member, The 3rd International Conference on Big Data Computing andCommunications (BigCom), 2017.

• Program committee member, The Fifth International Workshop on Security in Cloud Computing,AsiaCCS-SCC, 2017.

• Program committee member, IEEE International Conference on Collaboration and Internet Com-puting (CIC), 2015,2016,2017,2018.

• Program committee member, International Conference on Distributed Computing Systems (ICDCS),2017.

• Program committee member, International Conference on Information Science and Applications(ICISA), 2017.

• Program committee member, International Conference on Cloud Computing, GRIDs, and Virtu-alization (CLOUD COMPUTING), 2017.

• Program committee member, International Conference on Information Science and Security (ICISS),2016.

• Program committee member, International Conference on Web Information System Engineering(WISE), 2016, 2017, 2018.

• Program committee member, The International Workshop on Security in Cloud Computing(SCC), 2016.

9

• Program committee member, International Conference on Smart Systems, Devices and Technolo-gies (SMART), 2012, 2013, 2014, 2016, 2017.

• Program committee member, International symposium on spatial and temporal databases (SSTD),2013, 2015, 2019.

• Program committee member, IEEE International Conference on Mobile Data Management (MDM),2015.

• Program committee member, IEEE International Conference on Cloud Engineering, 2015.

• Program committee member, IEEE Computer Software and Applications Conference (COMP-SAC), 2014,2015, 2017, 2018.

• Program committee member, IEEE International Conference on Engineering (ICDE), 2013, 2014.

• Program Committee member, International Conference on Very Large Data Bases (VLDB), 2008,2014.

• Program committee member, The Second International Conference on Data Analytics, 2013.

• Program committee member, the 4th International Workshop on Security and Privacy in CloudComputing, 2013

• Track co-chair, The 37th IEEE Computer Software and Applications Conference (COMPSAC),2013.

• Program committee member, International Workshop on Collaborative Social Computing, 2012.

• Editorial committee, Journal of Information Processing, 2012.

• International Liaison Co-Chair, The 12th IEEE/IPSJ Symposium on Applications & the Internet(SAINT), 2012.

• Poster program committee member, International World Wide Web Conference (WWW), 2011,2012.

• Program committee member, International Conference on Collaborative Computing: Networking,Applications and Worksharing (CollaborateCom), 2008, 2009, 2011, 2012, 2013, 2014, 2015.

• Program committee member, IEEE Consumer Communications and Networking Conference (CCNC),2011.

• Program committee member, International Congress on Computer Applications and Computa-tional Science (CACS), 2011.

• Fast Abstract Chair, The 35th IEEE Computer Software and Applications Conference (COMP-SAC), 2011.

• Program committee member, The 11th Privacy Enhancing Technologies Symposium (PETSE),2011.

• Program committee member, IEEE International Conference on Data Engineering, 2010.

• Proceeding co-chair, International Conference on Mobile Data Management, 2010.

• Program Committee member, International Conference on Database System for Advanced Appli-cations (DASFAA), 2010.

• Program committee member, ACM GIS Workshop on Security and Privacy in GIS and LBS(SPRINGL), 2008 and 2009.

• Workshop and Tutorial Vice Chair, Joint iTrust and PST Conferences on Privacy, Trust Manage-ment and Security(IFIPTM), 2008.

• Program Committee member, International Conference on Database System for Advanced Appli-cations (DASFAA), 2007.

• Journal Reviewer, Data & Knowledge Engineering (DKE), since 2009.

• Journal Reviewer, ACM Transactions on Database Systems (TODS), since 2009.

10

• Journal Reviewer, Information Systems, since 2008.

• Journal Reviewer, The International Journal on Very Large Data Bases (VLDB journal), since2006.

• Journal Reviewer, IEEE Transactions on Knowledge and Data Engineering (TKDE), since 2004.

Honors and Awards

• IEEE Senior Member, 2018.

• Faculty Research Award, Missouri S&T, 2015.

• Daniel St. Clair Faculty Fellow Award, Missouri S&T, 2015.

• Woman of the Year, Missouri S&T, 2015.

• Outstanding Achievement Award, Missouri S&T, 2014.

• St. Louis Section of IEEE Certificate of Appreciation, 2011, 2012.

• Ted Nelson Newcomer award (best paper award) at the 22nd ACM Conference on Hypertext andHypermedia, 2011.

• IEEE St. Louis Section Outstanding Branch Counselor, 2009, 2010.

• Grace Hopper Scholarship, 2006.

• President Graduate Fellowship, National University of Singapore, 2004, 2005, 2006.

• Dean’s Graduate Award, National University of Singapore, 2004.

• iDA Fellowship, National University of Singapore, 2003/2004.

11