KEVIN RAYMOND BUTLER
|
|
|
- Martina Logan
- 10 years ago
- Views:
Transcription
1 KEVIN RAYMOND BUTLER Associate Professor Office: 454 CSE Building Department of Computer & Information Sciences and Engineering Gainesville, FL University of Florida USA Phone: +1 (352) URL: Fax: +1 (352) Areas of specialization Storage and Systems Security; Network Security. Current Academic Appointment Associate Professor, Department of Computer and Information Science and Engineering, University of Florida, Aug present Educational Background PH.D. in Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August 2010 (Dissertation Title: Leveraging Emerging Storage Functionality for New Security Services; Advisor: Dr. Patrick McDaniel) M.S. in Electrical Engineering, Columbia University, New York, NY, USA, May 2003 (Advisor: Dr. Henning Schulzrinne) B.SC. in Electrical Engineering, Queen s University, Kingston, ON, Canada, May 1999 Honors & Awards Rising to National Preeminence Hire, University of Florida, Best Teacher Award, Dept. of Computer and Information Science, University of Oregon, CAREER Award, National Science Foundation, Alumni Association Dissertation Award, Pennsylvania State University, Winner, Symantec Intern Project Showcase Competition, Symantec Corporation, August Graduate Research Assistant Award, Computer Science and Engineering Department, Pennsylvania State University, Symantec Graduate Fellowship, Symantec Research Labs, University Graduate Fellowship, Pennsylvania State University, C. Norwood Wherry Memorial Graduate Fellowship, Pennsylvania State University, Research Support PI, Developing Research Capability in Cyber-Physical Systems at the University of Florida, Defense University Research Instrumentation Program (DURIP), Army Research Office, $199,919, 09/01/ /31/
2 PI, Securing Storage for Insider Threat Mitigation, Florida Cyber Consortium Seed Grant, $40,000 ($20,000 to UF), PI, NSF CNS , EAGER: Collaborative: Secure and Efficient Data Provenance, National Science Foundation, $205,000 ($110,000 to UF), 10/01/ /31/2016. co-pi, A Cyber-Security Center of Excellence for Oregon, Oregon Engineering, Technology, and Industry Council, $180,000 ($60,000 to UO), 06/01/ /31/2015. co-pi, I3: An Interdisciplinary Approach to Internet Privacy, University of Oregon Research, Innovation and Graduate Education, $50,000, 04/10/ /31/2015. PI, Provenance-Based Enforcment Mechanisms, MIT Lincoln Laboratory, $137,000, 11/01/ /31/2016. PI, NSF CNS , CAREER: Securing Critical Infrastructure with Autonomously Secure Storage, National Science Foundation, $400,000, 04/01/ /31/2018. PI, NSF CNS , Oregon Security Day, National Science Foundation, $8,000, 03/01/ /30/2014. co-pi, Resilience in BGPSec, Battelle, $180,000 $80,000 to UO, 02/01/ /31/2013. Recipient, USB Fingerprinting, Ellisys, equipment donation, $8,000, Recipient, Project HAWAII, Microsoft Research, equipment donation, $1,000, PI, NSF CNS , TC:Small:Protection Mechanisms for Portable Storage, National Science Foundation, $515,530, 09/01/ /31/2015. co-pi, DARPA BAA 10-81, Characterizing and Implementing Efficient Primitives for Privacy- Preserving Computation, AFRL (DARPA), $550,000 ($262,375 to UO), 05/01/ /31/2015. Journal Publications & Book Chapters Acceptance rates given when made available; citations from Google Scholar as of March Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach. Accountable Wiretapping -or- I Know That You Can Hear Me Now. Journal of Computer Security, 23 (2015), pg , Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, and Kevin Butler. On Detecting Co-Resident Cloud Instances Using Network Flow Watermarking Techniques. International Journal of Information Security, 13(2), pg , April Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger. Scalable Web Content Attestation. IEEE Transactions on Computers, 61((5), pg , May Cited by 19. Kevin Butler, Stephen McLaughlin, Thomas Moyer, and Patrick McDaniel. New Security Architectures Based on Emerging Disk Functionality. IEEE Security and Privacy, 8(5), pg , 2
3 Sept./Oct Cited by 5. Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford. A Survey of BGP Security Issues and Solutions. Proceedings of the IEEE, 98(1), pg , January Cited by 204. Patrick Traynor, Kevin Butler, William Enck, Kevin Borders, and Patrick McDaniel. malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points. Journal of Security and Communication Networks (SCN) Cited by 5. Kevin Butler, Sunam Ryu, Patrick Traynor, and Patrick McDaniel. Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Transactions on Parallel and Distributed Systems, 20(12), pg , December Cited by 36. Kevin Butler, William Enck, Patrick Traynor, Jennifer Plasterr, and Patrick McDaniel. Privacy Preserving Web-Based . Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research. World Scientific Computing, November Cited by 5. Patrick McDaniel, William Aiello, Kevin Butler, and John Ioannidis, Origin Authentication in Interdomain Routing. Computer Networks, 50(16), pg , 14 November Cited by 22. Conference Publications Benjamin Mood, Debayan Gupta, Henry Carter, Kevin Butler, and Patrick Traynor. Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. 1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrücken, Germany, March (Acceptance rate=17.3%.) Henry Carter, Benjamin Mood, Patrick Traynor, and Kevin Butler. Outsourcing Secure Two-Party Computation as a Black Box. 14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco, December (Acceptance rate=52.9%.) Dave Tian, Adam Bates, and Kevin Butler. Defending Against Malicious USB Firmware with GoodUSB. 31st Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA, USA, December (Acceptance rate=24.4%.) Adam Bates, Dave Tian, Kevin Butler, and Thomas Moyer. Trustworthy Whole-System Provenance for the Linux Kernel. 24th USENIX Security Symposium (Security 15), Washington, DC, USA, August (Acceptance rate=15.7%) Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, and Kevin Butler. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. 24th USENIX Security Symposium (Security 15), Washington, DC, USA, August (Acceptance rate=15.7%) Ethan Shernan, Henry Carter, Jing (Dave) Tian, Patrick Traynor, and Kevin Butler. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. 12th Conference on Detection of Intrustions and Malware and Vulnerability Assessment (DIMVA 2015), Milano, Italy, July (Acceptance rate=22.7%) Jing (Dave) Tian, Kevin Butler, Patrick McDaniel, and Padma Krishnaswamy. Securing ARP From the Ground Up. 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA, March (Acceptance rate=33.3%) 3
4 Benjamin Mood, Debayan Gupta, Kevin Butler, and Joan Feigenbaum. Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. 21st ACM Conference on Computer and Communications Security (CCS 14), Scottsdale, AZ, USA, November (Acceptance rate=19%) Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Abdulrahman Alkhelaifi, and Kevin Butler. Securing SSL Certificate Verification through Dynamic Linking. 21st ACM Conference on Computer and Communications Security (CCS 14), Scottsdale, AZ, USA, November (Acceptance rate=19%) Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, and Kevin Butler. Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale ACM Internet Measurement Conference (IMC 14), Vancouver, BC, Canada, November (Acceptance rate=22.9%) Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, and Kevin Butler. Leveraging USB to Establish Host Identity Using Commodity Devices. 21st ISOC Network and Distributed System Security Symposium (NDSS 14), San Diego, CA, USA, February (Acceptance rate=18.6%) Henry Carter, Benjamin Mood, Patrick Traynor, and Kevin Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. 22nd USENIX Security Symposium (Security 13), Washington, DC, USA, August (Acceptance rate=16.2%. Cited by 2.) Benjamin Kreuter, ahbi shelat, Benjamin Mood, and Kevin Butler. PCF: A Portable Circuit Format For Scalable Two-Party Secure Computation. 22nd USENIX Security Symposium (Security 13), Washington, DC, USA, August 2013.(Acceptance rate=16.2%. Cited by 4.) Adam Bates, Benjamin Mood, Masoud Valafar, and Kevin Butler. Towards Secure Provenance- Based Access Control in Cloud Environments. 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013), San Antonio, TX, USA, February (Acceptance rate=31.8%. Cited by 3.) Vasant Tendulkar, Joe Pletcher, Ashwin Shashidharan, Ryan Snyder, Kevin Butler, and William Enck. Abusing Cloud-based Browsers for Fun and Profit. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, FL, USA, December (Acceptance rate=19.0%. Cited by 2.) Devin J. Pohly, Stephen McLaughlin, Patrick McDaniel, and Kevin Butler. Hi-Fi: Collecting High-Fidelity Whole-System Provenance. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, FL, USA, December (Acceptance rate=19.0%). Cited by 3. Benjamin Mood, Lara Letaw, and Kevin Butler. Memory-Efficient Garbled Circuit Generation for Mobile Devices. 16th IFCA International Conference on Financial Cryptography and Data Security (FC 12), Bonaire, February (Acceptance rate=26.1%. Cited by 10.) Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach. Accountable Wiretapping -or- I Know That You Can Hear Me Now. 19th ISOC Network and Distributed System Security Symposium (NDSS 12), San Diego, CA, USA. February (Acceptance rate=17.6%) Kevin Butler, Stephen McLaughlin, and Patrick McDaniel, Kells: A Protection Framework for Portable Data. 26th Annual Computer Security Applications Conference (ACSAC 2010), Austin, TX, USA, December (Acceptance rate=16.3%. Cited by 10.) 4
5 Machigar Ongtang, Kevin Butler, and Patrick McDaniel. Porscha: Policy Oriented Secure Content Handling in Android. 26th Annual Computer Security Applications Conference (ACSAC 2010), Austin, TX, USA, December (Acceptance rate=16.3%. Cited by 49.) Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Disk-Enabled Authenticated Encryption (short paper). 26th IEEE Symposium on Massive Storage Systems and Technologies (MSST 2010), Incline Village, NV, USA, May (Acceptance rate=45.5%. Cited by 1.) Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger. Scalable Web Content Attestation. 25th Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, HI, USA. December (Acceptance rate=19.0%. Cited by 19.) William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith. Defending Against Attacks on Main Memory Persistence. 24th Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, USA. December (Acceptance rate=24.3%. Cited by 7.) Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Rootkit Resistant Disks. 15th ACM Conference on Computer and Communications Security (CCS 08), Alexandria, VA, USA. October (Acceptance rate=18.1%. Cited by 36.) Patrick Traynor, Kevin Butler, William Enck, and Patrick McDaniel. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. 15th Annual Network and Distributed System Security Symposium (NDSS 08), San Diego, CA, USA. February (Acceptance rate=17.8%. Cited by 26.) Dhananjay Bapat, Kevin Butler, and Patrick McDaniel. Towards Automatic Privilege Separation. 3rd International Conference on Information Systems Security (ICISS 2007), Delhi, India. December (Acceptance rate=25.0%. Cited by 3.) Lisa Johansen, Kevin Butler, Michael Rowell, and Patrick McDaniel. Communities of Interest. Fourth Conference on and Anti-Spam (CEAS 2007), Mountain View, CA, USA. August (Acceptance rate=19.0%. Cited by 21.) Anusha Sriraman, Kevin Butler, Patrick McDaniel, and Padma Raghavan. Analysis of the IPv4 Address Space Delegation Structure. IEEE Symposium on Computers and Communications (ISCC 07), Aveiro, Portugal, July (Acceptance rate=40%. Cited by 6.) Sunam Ryu, Kevin Butler, Patrick Traynor, and Patrick McDaniel. Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS 07), Niagara Falls, ON, Canada, May (Acceptance rate=40%. Cited by 36.) Kevin Butler, Patrick Traynor, William Enck, Jennifer Plasterr, and Patrick McDaniel. Privacy Preserving Web-Based . 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December (Acceptance rate=30.4%. Cited by 7.) Kevin Butler, William Aiello, and Patrick McDaniel. Optimizing BGP Security by Exploiting Path Stability. 13th ACM Conference on Computer and Communications Security (CCS 06), Alexandria, VA, USA, November (Acceptance rate=14.8%. Cited by 54.) Trent Jaeger, Kevin Butler, David King, Serge Hallyn, Joy Latten, and Xiolan Zhang. Leveraging IPsec for Mandatory Per-Packet Access Control. 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 06), 5
6 42. August Baltimore, MD, USA. (Acceptance rate=25.4%. Cited by 31.) Kevin Butler and Patrick McDaniel, Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. 1st International Conference on Information Systems Security (ICISS 2005), December Kolkata, India. (Invited paper. Cited by 1.) Workshop Publications Adam Bates, Kevin Butler, and Thomas Moyer. Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. 7th Annual Workshop on Theory and Practice of Provenance (TaPP 15), Edinburgh, Scotland, July Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr, and Wenchao Zhou. Let SDN Be Your Eyes: Secure Forensics in Data Center Networks. NDSS Workshop on Security of Emerging Network Technologies (SENT), San Diego, CA, USA, February Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, and Steven Greenspan. Forgive and Forget: Return to Obscurity. New Security Paradigms Workshop (NSPW 2013), Banff, AB, Canada, September Peter McKay, Bryan Clement, Sean Haverty, Elijah Newton, and Kevin Butler. Read My Lips: Towards Use of the Microsoft Kinect as a Visual-Only Automatic Speech Recognizer Workshop on Home Usable Privacy and Security (HUPS), Newcastle, UK, July Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, and Kevin Butler. Detecting Co-Residency with Active Traffic Analysis Techniques. 4th ACM Cloud Computing Security Workshop (CCSW 2012), Raleigh, NC, USA, October (Acceptance rate=12.0% for full papers. Cited by 6.) Lara Letaw, Joe Pletcher, and Kevin Butler. Host Identification via USB Fingerprinting. 6th IEEE International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2011), Oakland, CA, USA, May (Acceptance rate=34.8%. Cited by 2.) Kevin Butler, William Enck, Harri Hursti, Stephen McLaughlin, Patrick Traynor, and Patrick Mc- Daniel. Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST USENIX/ACCURATE Electronic Voting Workshop (EVT 08), July San Jose, CA, USA. (Acceptance rate=44.1%. Cited by 15.) Shiva Chaitanya, Kevin Butler, Anand Sivasubramaniam, Patrick McDaniel and Murali Vilayannur. Design, implementation and evaluation of security in iscsi-based network storage systems. 2nd International Workshop on Storage Security and Survivability (StorageSS 2006), October Alexandria, VA, USA. (Acceptance rate=68%. Cited by 9.) Patrick McDaniel, Kevin Butler, Stephen McLaughlin, Radu Sion, Erez Zadok, and Marianne Winslett. Towards a Secure and Efficient System for End-to-End Provenance. USENIX Workshop on Theory and Practice of Provenance (TaPP), February (Acceptance rate=68.8%. Cited by 10.) Kevin Butler and Petros Efstathopoulos. U Can t Touch This: Block-Level Protection for Portable Storage. International Workshop on Software Support for Portable Storage (IWSSPS 2009), October Grenoble, France. (Cited by 1.) Kevin Butler, Stephen McLaughlin, and Patrick McDaniel. Non-Volatile Memory and Disks: Av- 6
7 enues for Policy Architectures. 1st Computer Security Architectures Workshop (CSAW 2007), November Fairfax, VA, USA. (Acceptance rate=30%. Cited by 10.) Kevin Butler and Patrick McDaniel, Testing Large Scale BGP Security in Replayable Network Environments. DETER Community Workshop on Cyber Security Experimentation and Test, June Arlington, VA, USA. Sophie Qiu, Kevin Butler, and Patrick McDaniel, BGPRV: Retrieving and Processing BGP Data with Efficiency and Convenience. DETER Community Workshop on Cyber Security Experimentation and Test, June Arlington, VA, USA. Technical Reports Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, and Kevin Butler. Towards Usable System-Wide Trust Agility. Technical Report CIS-TR , Department of Computer and Information Science, University of Oregon, Eugene, OR, October Benjamin Mood and Kevin Butler. Optimizing Secure Function Evaluation for Mobile Devices. Technical Report CIS-TR , Department of Computer and Information Science, University of Oregon, Eugene, OR, September Henry Carter, Benjamin Mood, Patrick Traynor, and Kevin Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. Technical Report GT-CS-12-09, College of Computing, Georgia Institute of Technology, Atlanta, GA, December Kevin Butler and Petros Efstathopoulos. U Can t Touch This: Block-Level Protection for Portable Storage. Technical Report Symantec-SRL/MV , Symantec Research Labs, Mountain View, CA, June Kevin Butler, Stephen McLaughlin, Thomas Moyer, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger. Firma: Disk-Based Foundations for Trusted Operating Systems. Technical Report NAS- TR , Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, May Cited by 6. Kevin Butler, Stephen McLaughlin, Thomas Moyer, Patrick McDaniel, and Trent Jaeger. Switch- Blade: Policy-Driven Disk Segmentation. Technical Report NAS-TR , Networking and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, November P. McDaniel, K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, M. Blaze, A. Aviv, P. Cerny, S. Clark, E. Cronin, G. Shah, M. Sherr, G. Vigna, R. Kemmerer, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, F. Valeur, J. Hall, and L. Quilter, EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing. Public Report, Ohio Secretary of State, December Kevin Butler, Stephen McLaughlin, Patrick McDaniel, and Youngjae Kim. Autonomously Secure Disks. Technical Report NAS-TR , Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, May (Updated September 2007.) Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor, and Patrick McDaniel. Grains of 7
8 65. SANs: Building Storage Area Networks from Memory Spots.Technical Report NAS-TR , Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, January Luke St. Clair, Lisa Johansen, Kevin Butler, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDainel, and Trent Jaeger. Password Exhaustion: Predicting the End of Password Usefulness. Technical Report NAS-TR , Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, May (Updated January 2007.) Articles for Media 66. Patrick Traynor and Kevin Butler. Mobile money in developing countries: study reveals security flaws in apps. The Guardian. 24 September global-development-professionals-network/2015/sep/24/mobile-moneyapps-security-flaws-study-reveals?cmp=twt_gu Patents U.S. Patent 8,856,918, Host validation mechanism for preserving integrity of portable storage data. Petros Efstathopulos, Bruce Montague, Dharmesh Shah, Kevin Butler. October 7, Professional Service Editorial Positions, Panels, and Boards Review Panelist, National Science Foundation, 2014 (2), 2013, Steering Committee Member, Annual Computer Security Applications Conference, present. Editorial Board, Journal of Privacy Enchancing Technologies, present. Review Board, IEEE Systems Journal, Special Issues on Security and Privacy in Complex Systems, Conference & Workshop Participation Vice Chair and Registration Chair, 37th IEEE Symposium on Security and Privacy, San Jose, CA, May Program Chair, 30th Annual Computer Security Applications Conference (ACSAC 2014), December Program Co-Chair, 29th Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, LA, December
9 Program Committee Member, 37th IEEE Symposium on Security and Privacy, San Jose, CA, May Program Committee Member, 2016 ISOC Network and Disributed Securit Symposium (NDSS 16), San Diego, CA, USA, February Program Committee Member, 22nd ACM Conference on Computer and Communications Security (CCS 15), Denver, CO, USA, October Program Committee Member, 2015 USENIX Security Symposium (Security 15), Washington, DC, USA, August Program Committee Member, 8th USENIX Workshop on Cyber Security Experimentation and Test (CSET 15), Washington, DC, August Program Committee Member, 8th ACM Conference on Security in Wireless and Mobile Networks (WiSec 15), New York, NY, USA, June Program Committee Member, 2015 IEEE Mobile Security Technologies Workshop (MOST 2015), San Jose, CA, May Program Committee Member, 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 15), Singapore, April Program Committee Member, 2015 Symposium and Bootcamp on the Science of Security (Hot- SoS 15), Urbana-Champaign, IL, USA, April Program Committee Member, 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC 15), San Juan, Puerto Rico, January Program Committee Member, 21st ACM Conference on Computer and Communications Security (CCS 14), Scottsdale, AZ, USA, November Program Committee Member, 6th ACM Cloud Computing Security Workshop (CCSW 2014), Scottsdale, AZ, USA, November Program Committee Member, 2nd Smart Energy Grid Security Workshop (SEGS 2014), Scottsdale, AZ, USA, November Program Committee Member, 19th European Symposium on Research in Computer Security (ESORICS 2014), Wroclaw, Poland, September Program Committee Member, 2014 New Security Paradigms Workshop (NSPW), Victoria, BC, Canada, September Program Committee Member, 2014 USENIX Security Symposium (Security 14), San Diego, CA, USA, August Program Committee Member, 7th USENIX Workshop on Cyber Security Experimentation and Test (CSET 14), San Diego, CA, August Program Committee Member, 12th Annual Conference on Privacy, Security and Trust (PST 2014), Toronto, ON, Canada, July Program Committee Member, 7th ACM Conference on Security in Wireless and Mobile Networks (WiSec 14), Oxford, United Kingdom, July Program Committee Member, 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 14), Kyoto, Japan, June
10 Program Committee Member, 2014 IEEE Mobile Security Technologies Workshop (MOST 2014), San Jose, CA, May Print Publications Chair, 35th IEEE Symposium on Security and Privacy, San Francisco, CA, May Program Commitee Member, 17th IEEE Global Internet Symposium (GI 14), Toronto, ON, Canada, April Program Committee Member, 20th ACM Conference on Computer and Communications Security (CCS 13), Berlin, Germany, November Program Committee Member, 2013 Smart Energy Grid Workshop (SEGS 2013), Berlin, Germany, November Program Committee Member, 2013 IEEE International Conference on Big Data (BigData 13), San Francisco, CA, USA, October Program Committee Member, 8th IEEE LCN Network Security Workshop (WNS 2013), Sydney, Australia, October Program Committee Member, 18th European Symposium on Research in Computer Security (ESORICS 2013), London, UK, September Program Committee Member, 2013 New Security Paradigms Workshop (NSPW), Banff, AB, Canada, September Program Committee Member, 6th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2013), Washington, DC, August Program Committee Member, 11th International Conference on Privacy, Security and Trust (PST 2013), Tarragona, Spain, July Program Committee Member, International Workshop on Security in Information Systems (WOSIS 2013), Loire Valley, France, July Program Committee Member, 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), Banff, AB, Canada, June Publications Chair, 34th IEEE Symposium on Security and Privacy, San Francisco, CA, May Panels Chair and Program Committee Member, 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, FL, December Program Committee Member, 7th International Workshop on Security (IWSEC 2012), Kyushu, Japan, November Publicity Chair, 7th Workshop on Secure Network Protocols (NPSec 2012), Austin, TX, October Program Committee Member, 7th LCN Workshop on Security in Communication Networks (SICK 2012), Clearwater, FL, October Program Committee Member, 17th European Symposium on Research in Computer Security (ESORICS 2012), Pisa, Italy, September Program Committee Member and Session Chair, 7th USENIX Workshop on Hot Topics in Security (HotSec 12), Bellvue, WA, August
11 Program Committee Member, International Workshop on Security in Information Systems (WOSIS 2012), Wroclaw, Poland, June Publications Chair and Program Committee Member, 33rd IEEE Symposium on Security and Privacy, San Francisco, CA, May Panels Chair and Program Committee Member, 27th Annual Computer Security Applications Conference (ACSAC 2011), Orlando, FL, December Program Committee Member, 6th International Workshop on Security (IWSEC 2011), Tokyo, Japan, November Program Committee Member, 7th International Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September Program Committee Member, 7th International Conference on Availability, Reliability and Security (ARES 2011), Vienna, Austria, August Proceedings Chair, 32nd IEEE Symposium on Security and Privacy, Oakland, CA, May Program Committee Member, 6th International Conference on Internet Monitoring and Protection (ICIMP 2011), St. Maarten, Netherlands Antilles, May Program Committee Member, 15th International Conference on Financial Cryptography and Data Security (FC 11), St. Lucia, March Publicity Chair and Guest Speaker Liason, 26th Annual Computer Security Applications Conference (ACSAC 2010), Austin, TX, December Program Committee Member, 5rd International Workshop on Security (IWSEC 2010), Kobe, Japan, November Program Committee Member, 2nd IEEE International Symposium on Data, Privacy, and E- Commerce (ISDPE 2010), Buffalo/Niagara Falls, NY, September Shadow PC Member, ACM SIGMETRICS Conference, New York, NY, USA, June Program Committee Member, 5th International Conference on Internet Monitoring and Protection (ICIMP 2010), Barcelona, Spain, May Program Committee Member, 5th International Conference on Availability, Reliability and Security (ARES 2010), Krakow, Poland, February Program Committee Member, 5th International Conference on Information Systems Security (ICISS 2009), Kolkata, India, December Program Committee Member, 1st IEEE International Workshop on Software Security Process, Vancouver, BC, Canada, August Program Committee Member, 2nd International Conference on International Conference on Information Security and Assurance (ISA 2009), Seoul, Korea, June Program Committee Member, 5th International Workshop on Security in Systems and Networks (SSN 2009), Rome, Italy, May Program Committee Member, 4th International Conference on Availability, Reliability and Security (ARES 2009), Fukuoka, Japan, March Program Committee Member, 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, December
12 Program Committee Member, 2008 Conference on Future Generation Communication and Networking (FGCN 2008), Hainan Island, China, December Program Committee Member, 3rd International Workshop on Security (IWSEC 2008), Kagawa, Japan, November Program Committee Member, 2nd IEEE International Workshop on Security in Software Engineering (IWSSE 2008), Turku, Finland, July Program Committee Member, 38th IEEE/IFIP Conference on Dependable Systems and Networks (DSN 2008), Fast Abstracts Track, Anchorage, AK, June Submissions Chair & Session Chair, 29th IEEE Symposium on Security and Privacy (S&P 08), Oakland, CA, USA, May Program Committee Member, 2nd International Workshop on Secure Software Engineering (SecSE 08), Barcelona, Spain, March Program Committee Member, 3rd International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, March Publicity Co-Chair and Program Committee Member, First International Conference on Information Security and Assurance (ISA 2008), Busan, Korea, March Program Committee Member, 14th ACM Conference on Computer and Communications Security (CCS), Industry and Government Track, Alexandria, VA, November Program Committee Member, 2007 Conference on Future Generation Communication and Networking (FGCN 2007), Jeju Island, Korea, December Submissions & Website Chair and Program Committee Member, 3rd International Conference on Information Systems Security (ICISS 2007), Delhi, India, December Program Committee Member, 2nd International Workshop on Security (IWSEC 2007), Nara, Japan, October Program Committee Member, 1st IEEE International Workshop on Security in Software Engineering (IWSSE 2007), Beijing, China, July Program Committee Member, 2nd International Conference on Availability, Reliability and Security (AReS), Vienna, Austria, April Program Committee Member, 3rd International Workshop on Security in Systems and Networks (SSN 07), Long Beach, CA, March Program Committee Member, 11th ACM Conference on Computer and Communications Security (CCS), Industry Track, Alexandria, VA, November Conference Session Chair: CCS 14, HotSec 12, IEEE SP 12, CCS 09 Journal & Book Reviewing ACM Transactions on Information and System Security (TISSEC), 2014, 2010, 2009, 2008, 2006; IEEE Transactions on Dependable and Secure Computing (TDSC), 2014, 2010; IEEE Transactions on Reliability (TR), 2014; ACM Transactions on Internet Technologies (TOIT), 2013, 2010, 2009; 12
13 ACM Computing Surveys, 2013; IEEE Security and Privacy, 2013, 2010; ACM Transactions on Storage (TOS), 2013, 2011; Elsevier Computers and Security, 2013, 2011; IEEE Transactions on Information Forensics and Security (TIFS), 2013, 2011; IEEE Transactions on Computers (TC), 2012, 2009; International Journal of Computer Mathematics, 2011; IEEE Transactions on Parallel and Distributed Systems (TPDS), 2011, 2008; Wiley and Sons (Book proposal reviewer), 2010; EURASIP Journal on Information Security (JIS), 2011, 2010; Elsevier Journal of Computer Networks, 2010, 2005; International Journal of Software and Informatics (IJSI), 2010; International Journal of Security and Networks (IJSN), 2009, 2007; The Computer Journal (Oxford), 2009; ACM/IEEE Transactions on Networking (TON), 2008; Wireless Personal Communications, 2008; IEEE Communications Surveys and Tutorials, 2007; IEEE Transactions on Software Engineering (TSE), 2007; Software: Practice and Experience, 2007; Handbook of Information Security, Conference & Workshop Reviewing IEEE INFOCOM, 2014, 2007; IEEE Symposium on Security and Privacy (S&P), 2013, 2009, 2008, 2007; ISOC Symposium on Network and Distributed Systems Security (NDSS), 2013, 2012, 2009, 2007; ACM Conference on Data and Application Security and Privacy (CODASPY), 2013; IEEE Computer Security Foundations Symposium (CSF), 2011; ACM Symposium on Computer and Communications Security (CCS), 2010, 2009, 2008, 2006; Annual Computer Security Applications Conference (ACSAC), 2010, 2007, 2006, 2005; USENIX Workshop on Hot Topics in Security (HotSec), 2010, 2007; ACM Symposium on Access Control Models and Technologies (SACMAT), 2010, 2009, 2008, 2006; IFCA International Conference on Financial Cryptography and Data Security (FC), 2010, 2008, 2007; Information Security Conference (ISC), 2009; USENIX Security Symposium, 2009, 2008, 2007, 2006, 2004; IEEE GLOBECOM, 2008; IFIP Conference on Data and Applications Security (DBSEC), 2008, 2006; USENIX Conference on File and Storage Technologies (FAST), 2008; IEEE International Conference on Computer Engineering and Systems (ICCES), 2007; IEEE International Conference on Distributed Computing Systems (ICDCS), 2007; IEEE Sarnoff Symposium, 2007; IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2007; ACM International Workshop on Storage Security and Survivability (StorageSS), 2006; International Workshop on Security (IWSEC), 2006; International Conference on Emerging Trends in Computer Science (ETRICS), 2006; International Conference on Applied Cryptography and Network Security (ACNS), 2006; European Symposium on Research in Computer Security (ESORICS), Other Professional Service Participant, NSF/SRI Study Group on Hard Problems in Cybersecurity Experimentation of the Future (CEF), Arlington, VA, Participant, CSEC CRA Industry Workshop on Hard Problems in Cybersecurity, Scottsdale, AZ,
14 Student Advising Advisees Graduate Advisees: Adam Bates (MS with thesis, Spring 2012, PhD, Spring 2016), Benjamin Mood (MS with thesis, Spring 2012, PhD, Spring 2016), Dave Tian (PhD, Spring 2018), Grant Hernandez (PhD, Spring 2020), Joseph Pletcher (MS, Spring 2013), Masoud Valafar (MS, Fall 2011). Undergraduate Advisees: Hannah Pruse (Honors BS, Oregon, Spring 2013), Ryan Leonard (Honors BS, Oregon, Spring 2013), Peter McKay (Honors BS, Oregon, Spring 2013), Braden Hollembaek (Honors BS, Oregon, Spring 2014), Abdul Alkhelaifi (Honors BS, Oregon Spring 2014), Devan Patel (BS, Florida, Spring 2015). Other Student Advising Committee Member: Ghulam Memon (PhD Oregon, Fall 2013, thesis committee), Reza Motamedi (PhD Oregon, Spring 2015, thesis committee), Henry Carter (PhD Georgia Tech, Fall 2015, thesis committee), Bradley Reaves (PhD Florida, Spring 2017, thesis committee), Ming Liu (PhD Florida, Spring 2016, thesis committee), Jason Gustafson (MS Oregon, Winter 2012), Amir Farzad (MS Oregon, Spring 2013, DRP committee) Presentations & Invited Talks Securing Storage for Insider Threat Mitigation. Florida Cyber Consortium Research Symposium, Tampa, FL, USA, October Vulnerability Analysis of Branchless Banking Apps in the Developing World. ITU Focus Group Meeting on Digital Financial Services, Kuala Lumpur, Malaysia, October New Trends in Cybersecurity: Securing Critical Cyber-Infrastructure. US Department of State/Department of Justice Cybercrime and Cybersecurity Workshop for Lusophone Africa, Maputo, Mozambique, September Trustworthy Collection Architectures for Data Provenance. MIT Lincoln Laboratory, Lexington, MA, USA, August Be Who You Are: Establishing Host Identity in Local and Remote Systems. EURECOM Institute, Sophia Antipolis, France, July Be Who You Are: Establishing Host Identity in Local and Remote Systems. Symantec Research Labs, Mountain View, CA, USA, April Be Who You Are: Challenges of Establishing Host Identity in Local and Remote Systems. Rutgers University, New Brunswick, NJ, USA, March Certificate Validatation and the Future of SSL Security. Gainesville, FL, USA, November Chi Sigma IO, University of Florida, Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale ACM Internet Measurement Conference (IMC 14), Vancouver, BC, Canada, November USB Host Fingerprinting. Lockheed Martin, Orlando, FL, October Improving Security Through Collaborative Frameworks. IEEE CollaborateCom (Invited Panelist), Miami, FL, October
15 Establishing Host Identity in Systems and Storage. University of Florida, Gainesville, FL, April Establishing Host Identity Through Indirect Measurement. Pennsylvania State University, University Park, PA, April Trust No One? Addressing the Challenges of Bottom Up Trust in Systems and Storage. Keynote address, Symantec Cutting Edge, Springfield, OR, March Leveraging Emerging Storage Functionality for New Security Services. Oregon State University, Corvallis, OR, June Protecting Portable Storage with Host Validation. Queen s University, Kingston, ON, Canada, April Protecting Portable Storage with Host Validation. NSERC ISSNet Security Workshop, Kingston, ON, Canada, April Attacks and Defenses Against the Cloud Infrastructure. Oregon Security Day, Eugene, OR, April Leveraging Emerging Storage Functionality for New Security Services. Portland State University, Portland, OR, November Leveraging Emerging Storage Functionality for New Security Services. Galois, Portland, OR, August Securing Homecare Rehabilition Environments. UW/MSR Research Retreat, Cle Elum, WA, August Challenges and Alternatives to the Host Identification Problem. Oregon Security Day, Eugene, OR, April Porscha: Policy Oriented Secure Content Handling in Android. ACSAC 2010, Austin, TX, December Kells: A Protection Framework for Portable Data. ACSAC 2010, Austin, TX, December Protection Mechanisms for Portable Devices. Symantec Research Labs, Mountain View, CA, November Challenges and Alternatives to the Host Identification Problem. 2nd ACM Northeast Forensics Exchange (NeFX2010), Washington, DC, September Disk-Enabled Authenticated Encryption. MSST 2010, Incline Village, NV, May Leveraging Emerging Storage Functionality for New Security Services. Polytechnic Institute of New York University, Brooklyn, NY, March Leveraging Emerging Storage Functionality for New Security Services. Simon Fraser University, Surrey, BC, Canada, March Leveraging Emerging Storage Functionality for New Security Services. Stevens Institute of Technology, Hoboken, NJ, March Leveraging Emerging Storage Functionality for New Security Services. University of Tennessee, Knoxville, TN, March Leveraging Emerging Storage Functionality for New Security Services. University of Oregon, Eu- 15
16 gene, OR, March Leveraging Emerging Storage Functionality for New Security Services. Naval Postgraduate School, Monterey, CA, February Towards a Secure and Efficient System for End-to-End Provenance. TaPP 10, San Jose, CA, February Rootkit-Resistant Disks. Security Reading Group, University of Toronto, Toronto, ON, Canada, November Rootkit-Resistant Disks. Digital Security Seminar, Carleton University, Ottawa, ON, Canada, November U Can t Touch This: Protections for Portable Storage. IWSSPS 2009, Grenoble, France, Oct FlowStor: Preserving Information Flow on Portable Storage Devices. Symantec Corporation, Mountain View, CA, USA, August Leveraging Emerging Disk Functionality for New Security Services. Symantec Research Labs, Mountain View, CA, USA, June Rootkit-Resistant Disks. CCS 08, Alexandria, VA, USA, October Experimenting with BGP Security Mechanisms Using the DETER Framework. Boeing Integrated Defense, Philadelphia, PA, USA, October Terabyte Home Security and Access Control (intern talk). Seagate Research, Pittsburgh, PA, USA, August Towards Automated Privilege Separation. ICISS 2007, Delhi, India, December Non-Volatile Memory and Disks: Avenues for Policy Architectures. CSAW 2007, Fairfax, VA, USA, November Autonomously Secure Disks. Software Reading Group, University of Michigan, Ann Arbor, MI, USA, September Leveraging Non-Volatile Memory for Storage Security USENIX Security Symposium, Works in Progress, Boston, MA, USA, August Analysis of the IPv4 Address Delegation Structure. ISCC 2007, Aveiro, Portugal, July Performance Optimizations of IPsec for Storage SNIA Summer Security Summit, Pittsburgh, PA, June Optimizing BGP Security by Exploiting Path Stability. CCS 06, Alexandria, VA, November Threats and Attacks in Interdomain Routing. P2INGS Quarterly Meeting, Tempe, AZ, February Network Operations in Tier-1 Internet Service Providers. Columbia University, New York, NY, March Network Operations in Tier-1 Internet Service Providers. Telcordia Technologies, Morristown, NJ, August Press Coverage United States and Mozambique Host Cybersecurity and Cybercrime Workshop in Maputo for Lu- 16
17 2. 3. sophone Africa. US Department of State, September prs/ps/2015/09/ htm Researchers Find Security Flaws in Developing-World Money Apps. Jennifer Valentino-Devries. Wall Street Journal, August Hack could let browsers use cloud to carry out big attacks on the cheap. Dan Goodin, Ars Technica, November Industrial Appointments Research Intern, Symantec Research Labs, Mountain View, CA, Jun - Aug Examined host-based validation for portable storage devices, and implemented a prototype using embedded Linux. Research Intern, Seagate Research, Pittsburgh, PA, May - Aug Developed security infrastructures for distributed storage in a home user environment, focussing on distributed access control mechanisms. Research Intern, AT&T Labs - Research, Florham Park, NJ, Dec Aug Investigated security threats in BGP and created an overview of threats and currently deployed solutions. Developed cryptographic constructions allowing efficient security solutions and performed simulations based on trace data. Technical Intern, Flarion Technologies, Bedminster, NJ, Summer 2002 Implemented packet diversion and IP header modification program in BSD for mobile IP packet testing. Research Scientist, Telcordia Technologies, Morristown, NJ, Sep Nov Built and maintained an HFC lab to emulate a cable plant; researched routing and service assurance methodologies for multiple service providers acessing common transport. Technical Specialist, UUNET, Toronto, ON, May Aug Monitored and troubleshot intermediate and backbone connections across the UUNET Canadian network, as well as dealing with network security and web server issues. Summer Intern, Royal Bank of Canada, Toronto, ON, Summer 1997, 1998 Investigated financing opportunities for life science and high tech companies through financial and technical analysis; ported applications from mainframe to client-server environments. 17
18 Previous Academic Appointments Assistant Professor, Department of Computer and Information Science, University of Oregon, Sep Aug Researching and teaching classes in systems security. Founder and leader of the Oregon Systems Infrastructure Research and Information Security Laboratory. Co-director of the Center for Cyber Security. Courses taught: CIS 415: Operating Systems (substantially revised), Spring 2014, Spring 2013, Spring 2012, Spring CIS 607: Seminar on Generating Trustworthy Data (new), Winter CIS 607: Seminar on Embedded Systems and Security (new), Spring CIS 433/533: Computer and Network Security, Winter 2013, Winter CIS 607: Seminar on Computer Security in the Physical World (new), Spring CIS 330: C/C++ and UNIX (substantially revised), Winter CIS 610: Advanced Topics in Systems Security (new), Fall CIS 607: Seminar on Security in Systems, Storage, and Clouds (new), Fall Leadership: Organizer of Computer Security Day at the University of Oregon (2014, 2013, 2012, 2011, recipient of CAS program grant for three years), liason to Oregon Engineering and Technology Council ( ), faculty advisor to UO Security Club (2012-present). Committee Service: University Committee on General Science Major (2014-present), Graduate Education Committee ( , 2013-present), Computing Resources Committee ( ), Industrial Affairs Committee (2012-present), Strategic Planning Committee (2013). Research Assistant, Department of Computer Science, Pennsylvania State University, Jan Aug Senior Personnel, NSF HECURA: Collaborative Research: Secure Provenance in High-End Computing Systems, NSF (CCF), $307,073, Aug present. Funded by NSF HECURA grant from Aug Jul. 2010, investigating security of storage systems. Funded by NSF grant CNS from Aug Aug. 2006, investigating BGP security solutions and large-scale simulation. Lead Graduate Student, Systems and Internet Infrastructure Security (SIIS) Laboratory, Pennsylvania State University, Sep Dec Administrative and logistical lead student in the SIIS lab. Ran weekly lab meetings of 13 members, met with students individually for mentoring and development of leadership and research skills. Responsible for most daily operational activities in the lab. Instructor, Department of Electrical Engineering, Pennsylvania State University, Jun.-Aug Instructor for EE/CSE 458, the senior undergraduate course on computer networking. 18
19 Guest Lecturer, Department of Computer Science, Pennsylvania State University, 2005-present CSE 543 (Computer Security): presented lectures on cryptography and public key infrastructures. CSE 597A (Advanced Topics in System Security): lectured on virtual machine security. CSE 411 (Operating Systems): presented lectures on storage systems. CSE 545 (Advanced Network Security): lectured on BGP security. Teaching Assistant, Stern School of Business, New York University, Fall 2005 Lectured, graded, and provided logistics for Computer and Network Security course offered for MBA students. Teaching Assistant, Department of Computer Science and Engineering, Pennsylvania State University, Fall 2004 Held lab hours and graded for Computer System Architecture course. Graduate Research Assistant, Department of Computer Science, Columbia University, Oct May 2002 Worked on SIP security, implementing authentication into the Panasonic PINTL JAIN SIP stack. Teaching Assistant, Department of Computer Science, Queen s University, Fall 1998 Held office hours and graded for Introduction to Computer Science course. 19
ADAM MACNEIL BATES. Areas of specialization. Current Academic Appointment. Education. Honors & Awards
ADAM MACNEIL BATES Ph.D. Candidate Office: E451 CSE Building Department of Computer & Information Sciences & Engineering Gainesville, FL 32653 University of Florida USA email: [email protected] Phone:
Stephen E. McLaughlin
Education Stephen E. McLaughlin Computer Science and Engineering Pennsylvania State University Office : 344 IST Building University Park, PA 16802 (814) 867-1773 email: [email protected] The Pennsylvania
email: [email protected] Phone: +1 (405) 564-3624 URL: http://adambates.org Research Interests
Adam MacNeil Bates Ph.D. Candidate Office: 206 MAE Building Department of Computer & Information Science & Engineering Gainesville, FL 32653 University of Florida email: [email protected] Phone: +1 (405)
Fengwei Zhang. Research Interest. Education. Employment History
Fengwei Zhang Wayne State University 5057 Woodward Avenue, Suite 3010 Detroit, Michigan 48202 [email protected] http://fengwei.me Research Interest My primary research interests are in the areas of systems
M.S. in Computer Science 2009-2011
Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 [email protected] http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
ADAM L. DOUPÉ. University of California, Santa Barbara. Advisor: Giovanni Vigna Topic: Black-Box Web Vulnerability Scanners
ADAM L. DOUPÉ P.O. Box 878809 Tempe, AZ 85287-8809 [email protected] 480-727-5471 EDUCATION 2010 2014 PhD in Computer Science University of California, Santa Barbara Advisor: Giovanni Vigna and Christopher
XIAOKUI SHU. PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060
XIAOKUI SHU PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060 [email protected] RESEARCH INTERESTS Anomaly detection in systems and networks e.g., program execution modeling, event
Kevin L. James, PhD, CPA 1601 East Market Street 224 Merrick Hall Greensboro, NC 27411 336-334-7581 [email protected]
Kevin L. James, PhD, CPA 1601 East Market Street 224 Merrick Hall Greensboro, NC 27411 336-334-7581 [email protected] Academic Background and Certification Ph.D. University of Tennessee, Knoxville, TN,
SUSANNA GALLANI. Harvard Business School 369 Morgan Hall, Soldiers Field, Boston, MA 02163 Phone: (617) 496-8613 Email: sgallani@hbs.
SUSANNA GALLANI 369 Morgan Hall, Soldiers Field, Boston, MA 02163 Phone: (617) 496-8613 Email: [email protected] ACADEMIC POSITIONS Assistant Professor of Business Administration July 2015 Present Department
SRABANA GUPTA. B.Sc. in Economics (With First Class Honors), 1986 St. Xavier's College, Calcutta University, Calcutta, India.
SRABANA GUPTA OFFICE ADDRESS: PERMANENT ADDRESS: School of Business 4401King Palm Drive St. Thomas University Fort Lauderdale, FL-33319 16401 NW 37 th Avenue Phone: (954)-495-4401 Miami Gardens, FL-33054
EDUCATION: EXPERIENCE: Ph.D. Iowa State University, Fall 1998 Fields: Public Economics, Environmental Economics, Microeconomic Theory
Kevin Siqueira University of Texas at Dallas School of Economic, Political and Policy Sciences 800 W Campbell Rd, GR 31 Richardson, TX 75080-3021 (972) 883-6480 [email protected] EDUCATION: Ph.D. Iowa
Appendix D. Petersens Guide Listings for PhD in Public Policy
Appendix D Petersens Guide Listings for PhD in Public Policy Brandeis University Waltham, MA Program in Social Justice and Social Policy Claremont Graduate University Claremont, CA Department of Economics
Adam J. Greiner, Ph.D., CPA
Adam J. Greiner, Ph.D., CPA School of Accountancy Daniels College of Business University of Denver 2101 S. University Blvd. Denver, CO 80208 Phone: 303-871-2040 email: [email protected] June 2016 Education
5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems
Hila Etzion Assistant Professor of Technology and Operations Stephen M. Ross School of Business University of Michigan 701 Tappan St. Ann Arbor, MI 48109-1234 (734)-358-1854 E-mail: [email protected] EDUCATION
YONGSEOK JANG 133J Bryan Hall PO Box 117168 Gainesville, FL 32611-7168 (352) 273-0325 [email protected] June 2015
EDUCATION YONGSEOK JANG 133J Bryan Hall PO Box 117168 Gainesville, FL 32611-7168 (352) 273-0325 [email protected] June 2015 Post-Doctoral Bridge Program, University of Florida, Gainesville, FL, AACSB, Jul,
Additional details >>> HERE <<<
Additional details >>> HERE http://pdfo.org/eventplan3/pdx/hous1351/
Accredited TOGAF 9, ArchiMate 2 and IT4IT Training Course Calendar June 2016 onwards
Course Start Date Training Provider Training Course Name Type Course Location Duration Exam Status URL Contact Email Contact Telephone 2016-07-01 2016-07-01 Conexiam TOGAF 9 Training Course TOGAF 9 Combined
RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
Curriculum Vitae Beyza Çalışkan Aslan
Curriculum Vitae Beyza Çalışkan Aslan Department of Mathematics & Statistics, University of North Florida 1 UNF Drive, Building 14/2731, Jacksonville, FL 32224 Phone: (904) 620-3713 Fax: (904) 620-2818
Curriculum Vitae Jennifer Merluzzi
Curriculum Vitae Jennifer Merluzzi Personal Data Business Address: Office 610, GW1 A.B. Freeman School of Business Tulane University New Orleans, LA 70118-5669 Telephone: (504)-862-8006 Fax: (504)-865-6751
ARPITA JOARDAR Graduate School of Management Clark University 950 Main Street, Worcester, MA 01610 Phone: (508) 793 7688 E-mail: ajoardar@clarku.
ARPITA JOARDAR Graduate School of Management Clark University 950 Main Street, Worcester, MA 01610 Phone: (508) 793 7688 E-mail: [email protected] Education Ph.D., M.B.A., B.Sc. (Hons.) Work Experience
Duke University, Fuqua School of Business Durham, North Carolina Associate Professor of Operations Management, Jul. 2013 Present
Robert P. Swinney Duke University Fuqua School of Business [email protected] people.duke.edu/~rps23 100 Fuqua Drive Box 90120 Durham, NC 27708 919-660- 7635 Academic Positions Duke University, Fuqua
Jan 2015 - Dec 2016 Training Schedule
Alabama Birmingham, AL Aug 31Sep 1 '15 Sep 23 '15 Aug 31Sep 3 '15 Sep 2122 '15 Sep 2324 '15 Arc Flash Electrical Safety NFPA 70E Sep 2325 '15 Dec 1415 '15 Dec 78 '15 Nov 1819 '15 Nov 1617 '15 Dec 910 '15
USA IN-PERSON VOTING OPPORTUNITIES 2010 SWEDISH ELECTION
USA IN-PERSON VOTING OPPORTUNITIES 2010 SWEDISH ELECTION Anchorage, konsulat Wells Fargo Bank, 301 301 W. Northern Lights Blvd, 5th floor Anchorage, AK 99503 Telefon: +1 907 265 2926 Fax: +1 907 265 2068
JEFF SHOCKLEY. Department of Supply Chain & Information Management,
JEFF SHOCKLEY Department of Supply Chain & Information Management School of Business, College of Charleston 66 George Street, Beatty 415 Charleston, SC 29424 [email protected] Office Phone: 843-953-7070;
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
Big Impact. BUILDING BUSINESS ONE DEAL AT A TIME
Done Deal. 2014 Big Impact. BUILDING BUSINESS ONE DEAL AT A TIME PNC BUSINESS CREDIT UK BY THE NUMBERS 70+ 1B+ 30+ 0.5B+ Number of deals in 4 years Commitments under management Private equity relationships
The Geography of Foreign Students in U.S. Higher Education: Origins and Destinations. Neil G. Ruiz, The Brookings Institution, February 11, 2015
The Geography of Foreign Students in U.S. Higher Education: Origins and Destinations Neil G. Ruiz, The Brookings Institution, February 11, 2015 The U.S. is the global hub for higher education, receiving
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
BHARATENDU SRIVASTAVA
BHARATENDU SRIVASTAVA Department of Management College of Business Administration Marquette University P.O. Box 1881, Milwaukee, WI 53201-1881 (414) 288-3408 [email protected] EDUCATION Ph.
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION A. Present University Department or Unit: Information Systems Technologies School of Information Systems and
Juan (Jenn) Du. Homepage: www4.ncsu.edu/ jdu/ Co-advisors: Dr. Xiaohui (Helen) Gu and Dr. Douglas Reeves
Juan (Jenn) Du CONTACT INFORMATION Juan (Jenn) Du Cell: (919) 645-7772 1015 Katie Ln E-mail: [email protected] Cary, NC 27519 Homepage: www4.ncsu.edu/ jdu/ RESEARCH INTERESTS EDUCATION My general research
Washington University, Olin Business School
ADINA D. STERLING Olin Business School, Washington University in St. Louis, Campus Box 1133, St. Louis, MO 63130 Email: [email protected], Web: www.adinadsterling.com, Phone: (314) 935-4198, Fax: (314)
University of Kuwait Faculty of Allied Health Sciences Occupational Therapy Department
University of Kuwait Faculty of Allied Health Sciences Occupational Therapy Department List of Approved Occupational Therapy Graduate Programs for Kuwait University Scholarship United States of America
WWW.IMMIGRANTJUSTICE.ORG/KIDS
On the following pages you will find addresses for: Dept. of Justice Immigration Courts AND Dept. of Homeland Security Offices of Chief Counsel (OCC) DISCLAIMER: The most current addresses for DOJ Immigration
EVA ASCARZA. 2009 Ph.D. in Marketing, London Business School, UK Dissertation: Modelling Customer Behaviour in Contractual Settings
EVA ASCARZA Columbia Business School 3022 Broadway Uris Hall, room 524 New York, NY 10027-6902 Phone: +1 (212) 851-4120 Fax: +1 (212) 854-7647 e-mail: [email protected] Web: www.evaascarza.com ACADEMIC
Marcus Kirk LUCIANO PRIDA, SR. TERM ASSISTANT PROFESSOR, ACCOUNTING
LUCIANO PRIDA, SR. TERM ASSISTANT PROFESSOR, ACCOUNTING Fisher School of Accounting 210 Gerson Hall, Gainesville, FL, 32611 Warrington College of Business Phone: 352.273.0222 Fax: 352.392.7962 University
Gregory J. Gerard. M.B.A. Management Information Systems, 1991 University of Pittsburgh, Pittsburgh, PA
Gregory J. Gerard Department of Accounting Phone: (850) 644-9115 College of Business Fax: (850) 644-8234 Florida State University e-mail: [email protected] Tallahassee, FL 32306-1110 EDUCATION Ph.D. Business
How To Write A Book
Gopesh Anand Department of Business Administration College of Business, University of Illinois 350 Wohlers Hall, MC-706, Champaign IL 61822 E-mail: [email protected] Phone: 217-244-8051 Education 2006
Aurore José Kamssu. 08/00-2005: Assistant Professor of Business Information Systems, Tennessee State University
Aurore José Kamssu Department of Business Information Systems Tennessee State University 330 10 th Avenue North, AWC Suite K. 411 Nashville, TN 37203 Tel: (615) 963-7205 [email protected] EDUCATION:
Accredited TOGAF 9 and ArchiMate 2 Training Course Calendar February 2016 onwards
Course Start Date Training Provider Training Course Name Type Course Location Duration Exam Status URL Contact Email Contact Telephone 2016-02-01 2016-02-01 EA Principals, Inc. TOGAF 9 Foundation and Certified
9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin
Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: [email protected] 9700 South
DRAFT - Duke Alumni Association - DRAFT Support for and Expectation of Regional Alumni Groups
DRAFT - Duke Alumni Association - DRAFT Support for and Expectation of Regional Alumni Groups Group A Co- Chairs and executive Hold at least four board meetings per Hold at least one open board meeting
Jacqueline Amber Scherer, M.A.
Jacqueline Amber Scherer, M.A. Education Doctorate of Philosophy in Criminology, Law, and Society George Mason University, Fairfax, VA Fall 2013 Present (Expected 2018) Masters of Arts, Forensic Psychology
VITA Charles David SKIPTON. 10810 Kempton Court Dept of Economics / Sykes COB
VITA Charles David SKIPTON Personal Information Home Address Office Address 10810 Kempton Court Dept of Economics / Sykes COB Tampa, FL 33626 University of Tampa TEL: (813) 541-5637 401 W. Kennedy Blvd.
Sarah E. Stein Virginia Polytechnic Institute and State University Pamplin College of Business 3102 Pamplin Hall Blacksburg, VA 24061 sestein@vt.
Sarah E. Stein Virginia Polytechnic Institute and State University Pamplin College of Business 3102 Pamplin Hall Blacksburg, VA 24061 [email protected] ACADEMIC EMPLOYMENT Virginia Polytechnic Institute and
EVA ASCARZA (Updated September 2015)
EVA ASCARZA (Updated September 2015) Columbia Business School 3022 Broadway Uris Hall, room 524 New York, NY 10027-6902 Phone: +1 (212) 851-4120 Fax: +1 (212) 854-7647 e-mail: [email protected] Web:
Physical Therapy Marketing Success :: physical therapy assistant schools usa
Physical Therapy Marketing Success :: physical therapy assistant schools usa Physical Therapy Marketing Success :: physical therapy assistant schools usa Downloading From Original Website --> http://f-ebook.esy.es/ptsuccess/pdx/fph1
Atlanta Rankings 2014
Atlanta Rankings Major National Magazine and Study Rankings BUSINESS FACILITIES Metro Business Rankings Lowest Cost of Doing Business 2. Orlando, FL 3. Charlotte, NC 4. San Antonio, TX 5. Tampa, FL 6.
R. Joseph Waddington Curriculum Vitae
R. Joseph Waddington Curriculum Vitae 131 Taylor Education Building Office: (859) 257-8666 579 S. Upper St. Fax: (859) 257-4243 Lexington, KY 40506-0001 E-mail: [email protected] ACADEMIC POSITIONS
Additional information >>> HERE <<< Getting Free Instant Access freight broker training and job placement - Review
Additional information >>> HERE
PhD in Strategic Management, College of Management, Georgia Institute of Technology, 2008
Andrew M. Hess Curriculum Vitae Williams School of Commerce, Economics, and Politics Washington & Lee University, Lexington VA, 24450 Work: 540.458.8346; Fax: 540.458.8639 Email: [email protected]; Web: http://www.wlu.edu/williams-school/business-administration/faculty-and-staff/profile?id=x2975
Marsha B. Keune June 2015
Marsha B. Keune June 2015 University of Dayton 937-229-4639 School of Business Administration [email protected] Miriam Hall 410 300 College Park Dayton, OH 45469 EDUCATION Wisconsin School of Business,
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
Jay F. Coughenour February 2013
Jay F. Coughenour February 2013 Department of Finance, University of Delaware, Newark, DE 19716 [email protected]; (302) 831-1766; www.buec.udel.edu/coughenj/ Education Ph.D., Finance, May 1995, Arizona
State Annual Report Due Dates for Business Entities page 1 of 10
State Annual Report Due Dates for Business Entities page 1 of 10 If you form a formal business entity with the state, you may be required to file periodic reports on the status of your entity to preserve
Paul E. Lingenfelter President, State Higher Education Executive Officers
Paul E. Lingenfelter President, State Higher Education Executive Officers Western Interstate Commission on Higher Education Monday, November 5, 2007 Forces Flattening the Global Playing Field Fall of Berlin
Nordica A. MacCarty, Ph.D.
Nordica A. MacCarty, Ph.D. Assistant Professor of Mechanical Engineering School of Mechanical, Industrial, and Manufacturing Engineering Oregon State University 204 Rogers Hall Corvallis, OR 97331 [email protected]
Recipient Demographics
ZINN EDUCATION PROJECT Recipient Demographics The following graphs profile the demographic of the people who ordered the Zinn Education Project packets and how they heard about the project. The packet
Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
Post-Graduation Survey Results 2014 College of Engineering Civil Engineering Bachelor of Science
Civil Engineering Bachelor of Science AECOM Traffic Engineer Clark Construction (3) Office Engineer (2) Washington (2) DC (2) Crown Castle Tower Structural Analyst Denver Public Schools Denver Math Fellow
WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model
WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 [email protected] www.mrweichen.info RESEARCH
BEIBEI (BACY) DONG EDUCATION EMPLOYMENT EDITORIAL POSITIONS PUBLICATIONS. Updated 05/25/2015 Beibei (Bacy) Dong
BEIBEI (BACY) DONG Updated 05/25/2015 Lehigh University College of Business & Economics Department of Marketing Tel : (610) 758-3439 621 Taylor Street Bethlehem, PA 18015-3117 E-mail: [email protected]
National Bureau for Academic Accreditation And Education Quality Assurance PUBLIC HEALTH
1 GEORGE WASHINGTON UNIVERSITY WASHINGTON DC B Athletic Training 1 MA B 1 BROWN UNIVERSITY PROVIDENCE RI B EAST TENNESSEE STATE UNIVERSITY JOHNSON CITY TN B 3 HUNTER COLLEGE NEW YORK NY B 4 UNIVERSITY
Adam J. Fleischhacker
Adam J. Fleischhacker University of Delaware 222 Alfred Lerner Hall Newark, DE 19716 (302) 831-6966 [email protected] Current Position 9/2009 - Present Assistant Professor of Operations Management University
Jeffery L. Guyse. L. Robin Keller (Chair), R. Duncan Luce and Imran Currim. Decision Analysis and Decision Support Systems Behavioral Decision Making
Jeffery L. Guyse Technology and Operations Management College of Business Administration California State Polytechnic University, Pomona Pomona, CA 91768 Office: (909) 869-5357 E-mail: [email protected]
M. Tolga Akçura E-mail: [email protected]
M. Tolga Akçura E-mail: [email protected] Academic Positions 2009- Associate Professor of Marketing, School of Economics and Administrative Sciences Özyeğin University, Istanbul, Turkey 2007-2010
DARIUS P. MILLER. 1309 East Tenth Street Bloomington, IN 47405
DARIUS P. MILLER Kelley School of Business Indiana University Department of Finance 1309 East Tenth Street Bloomington, IN 47405 (812) 855.3395 (school) (812) 855.5875 (fax) Email: [email protected]
Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA 19104 [email protected].
Education Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA 19104 [email protected] PhD-Computer Science, May 2010 Columbia
ANUJA GUPTA Assistant Professor [email protected] Tel: (856) 225 6227 July 2014
ANUJA GUPTA Assistant Professor [email protected] Tel: (856) 225 6227 July 2014 EDUCATION University of Pennsylvania, The Wharton School, Philadelphia, PA PhD in Management, May 2010 Master of Science,
NAAB-Accredited Architecture Programs in the United States
NAAB-Accredited Architecture Programs in the United States ALABAMA Auburn University College of Architecture, Design & Construction Auburn University, AL www.cadc.auburn.edu/soa/ Tuskegee University College
Jane A. LeClair, Ed.D. 1031 Chapelhill Drive Victor, NY 14564 [email protected] 315-440-2827
Jane A. LeClair, Ed.D. 1031 Chapelhill Drive Victor, NY 14564 [email protected] 315-440-2827 OBJECTIVE - To provide dedicated leadership to the educational community. EDUCATION SUMMARY Syracuse University,
Professional CV EDUCATION
Professional CV EDUCATION Doctor of Dental Surgery Baltimore College of Dental Surgery University of Maryland Dental School - 1983 Bachelor of Science Degree: Psychology University of Maryland, College
MICHAEL ROACH. April 2014
MICHAEL ROACH April 2014 ADDRESS Cornell University Charles H. Dyson School of Applied Economics and Management Ithaca, NY 14853 [email protected] ACADEMIC POSITIONS J. Thomas and Nancy W. Clark
CURRICULUM VITA BYUNGCHAE JIN
CURRICULUM VITA BYUNGCHAE JIN University of Maryland 3330J Van Munching Hall College Park, 20742 USA Phone: 240-994-0216 E-mail: [email protected] EDUCATION 2006~2011 (expected) University of Maryland,
HACU National Internship Program
HACU National Internship Program Celebrating 23 Years of Opening Doors of Opportunity Pictured above Summer 2012 HACU Interns at the U.S. Department of Agriculture in Washington, DC Introduction What is
SURENDRA SARNIKAR. 820 N Washington Ave, EH7 Email: [email protected] Madison, SD 57042 Phone: 605-256-7341
SURENDRA SARNIKAR 820 N Washington Ave, EH7 Email: [email protected] Madison, SD 57042 Phone: 605-256-7341 EDUCATION PhD in Management Information Systems May 2007 University of Arizona, Tucson, AZ MS in
E D I T H G A L Y. UNIVERSITY OF TEXAS at BROWNSVILLE, Brownsville, TX, Spring 1997-Summer 1998. Master of Business Administration - GPA 4.
E D I T H G A L Y University of Texas at Brownsville Associate Professor 80 Fort Brown, EDBC #2.504G, Brownsville, Tx, 78520 (956) 882-7301 [email protected] EDUCATION UNIVERSITY OF TEXAS-PAN AMERICAN
Office Space FOR LEASE. Humber Green Medical Centre Toronto. 100 Humber College Blvd. Toronto, Ontario M9V 5G4. For more information, please contact:
Humber Green Medical Centre Toronto Office Space FOR LEASE 100 Humber College Blvd. Toronto, Ontario M9V 5G4 For more information, please contact: Binswanger Hectare, Brokerage 1279 Matheson Boulevard
Department of Veterans Affairs Quarterly Notice to Congress on Data Breaches Third Quarter of Fiscal Year 2015 April 1, 2015 through June 30, 2015
VHA 4/1/15 VISN 01 Boston, MA 1 0 4/15/15 VISN 01 Boston, MA 1 0 4/22/15 VISN 01 Boston, MA 10 0 4/24/15 VISN 01 Boston, MA 1 0 4/27/15 VISN 01 Boston, MA 0 1 4/29/15 VISN 01 Boston, MA 0 1 4/30/15 VISN
DALIDA KADYRZHANOVA Curriculum Vitae (Last updated: 12/2014)
DALIDA KADYRZHANOVA Curriculum Vitae (Last updated: 12/2014) Address and Contacts: J. Mack Robinson School of Business Telephone: (404) 413-7347 Georgia State University E-mail: [email protected] 35
FACULTY AND PROFESSIONAL EXPERIENCE Associate Professor, Georgia Institute of Technology
JEFFREY HALES 800 West Peachtree Street, NW Georgia Institute of Technology [email protected] Atlanta, Georgia 30308 College of Management (404) 894-3897 FACULTY AND PROFESSIONAL EXPERIENCE
Jennifer M. Logg. 425 Student Services Building #1900 Website: http://www.jennlogg.com Berkeley, CA 94720-1900
Logg CV 1 Jennifer M. Logg Haas School of Business Phone: 908.217.9531 Email: [email protected] 425 Student Services Building #1900 Website: http://www.jennlogg.com Berkeley, CA 94720-1900 EDUCATION
How To Teach Economics
YONG CHAO College of Business Phone: (626) 230-5198 University of Louisville E-mail: [email protected] Louisville, Kentucky 40292 Web: http://yongchao.us ACADEMIA APPOINTMENT 2010 ~ Present Assistant
Physical Therapy Marketing Success :: physical therapy assistant schools usa
Physical Therapy Marketing Success :: physical therapy assistant schools usa Physical Therapy Marketing Success :: physical therapy assistant schools usa Downloading From Original Website --> http://f-ebook.esy.es/ptsuccess/pdx/fph1
CURRICULUM VITAE INGO HOLZINGER
CURRICULUM VITAE INGO HOLZINGER N203F Schulich School of Business York University 4700 Keele Street Tel: (416) 736-2100, ext. 77870 Toronto, Ontario Fax: (416) 736-5687 Canada, M3J 1P3 E-mail: [email protected]
CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 [email protected]. Adjunct Professor, Taxation New York University School of Law
CURRICULUM VITAE BRYAN C. SKARLATOS 212-808-8100 [email protected] PROFESSIONAL POSITIONS: Partner, Kostelanetz & Fink, LLP 7 World Trade Center New York, New York 10007 Adjunct Professor, Taxation
