Travis D. Breaux Carnegie Mellon University Travis D. Breaux
Assistant Professor of Computer Science
Institute for Software Research
School of Computer Science
5000 Forbes Avenue, Pittsburgh, PA 15213
Office:
Tel:
Fax:
E-mail:
5103 Wean Hall
412-268-7334
412-268-3455

Links: Home | Research | Teaching | Publications | Biography | Vitae

Education (Download PDF)

NORTH CAROLINA STATE UNIVERSITY
Doctor of Philosophy in Computer Science, May 2009
Advisor: Annie I. Antón

UNIVERSITY OF OREGON
Bachelors of Science in Computer and Information Science with Honors, December 2003

UNIVERSITY OF HOUSTON
Bachelors of Arts in Anthropology, May 1999


Research and Teaching Experience

CARNEGIE MELLON UNIVERSITY
Institute for Software Research
Pittsburgh, Pennsylvannia, USA

  • (08/2010-Present) Assistant Professor: Conducting research and teaching on requirements and software-engineering topics

INSTITUTE FOR DEFENSE ANALYSES
Information Technology and Systems Division
Alexandria, Virginia, USA

  • (06/2009-08/2010) Research Staff Member: Multiple projects funded under the Office of the Secretary of Defense, including Defense Research and Engineering (DDR&E)

NORTH CAROLINA STATE UNIVERSITY
Department of Computer Science
Raleigh, North Carolina, USA

  • (01/2005-05/2009) Research Assistant to Dr. Annie Antón: Multiple projects funded by the IBM PhD Fellowship award by the IBM Center for Advanced Studies, Research Triangle Park, NC; NSF#032-5269; and NSF#043-0166

PURDUE UNIVERSITY
Center for Education and Research in Information Assurance and Security (CERIAS)
West Lafayette, Indiana, USA

  • (05/2006-08/2006) Research Assistant to Dr. Annie Antón and Dr. Eugene Spafford: Project funded by NSF ITR CyberTrust Policy-Driven Framework for Online Privacy Protection (NSF #043-0166);

IBM TJ WATSON RESEARCH CENTER
Privacy Enabling Technology Group
Hawthorne, New York, USA

  • (05/2005-08/2005) Research Assistant to Drs. Clare-Marie Karat and John Karat: Analyzed three organizational security policies from finance, government and technology to identify elements for formal modeling;

OAK RIDGE NATIONAL LABORATORY
Applied Software Engineering Research Group
Oak Ridge, Tennessee, USA

  • (04/2004-08/2004) Research Assistant to Dr. Robert Patton: Preliminary research on terrorist attack scenario prediction from sparse intelligence; Identified and formalized methods for reducing polysemy in place name geo-location.

  • (05/2003-08/2003): Research Assistant to Dr. Thomas E. Potok: Applied computational ontology to hierarchical clustering on semi-structured data.

UNIVERSITY OF OREGON
Department of Computer Science
Eugene, Oregon, USA

  • (04/2004-08/2004) Teaching Assistant to Mr. Michael Hennessy: Led discussion sessions for Information Architecture and Intranets (CIT 382)

UNITED STATES PEACE CORPS
Bayanhongor, Mongolia

  • (06/2000-07/2001) Peace Corp Volunteer assisting Ch. Battogtokh: Provided computer training to local teachers, students, and business professionals; Designed and implemented project plans with community and business leaders; Established the first Internet dial-up service in Bayan-Khongor, Mongolia.

Professional Memberships
  • Council Member (at-large) of the U.S. Public Policy Committee of the ACM (USACM), Jan.-Dec. 2013
  • Member of the International Association of Privacy Professionals (IAPP), since Sep. 2010
  • Member of the Association for Computing Machinery (ACM), since Aug. 2003
  • Member of the ACM Special Interest Group on Software Engineering (ACM SIGSOFT), since Aug. 2006
  • Member of the Institute for Electrical and Electronics Engineers (IEEE), since Jan. 2004
  • Member of the IEEE Computer Society (IEEE Computer), since Jan. 2006
  • Member of the U.S. Public Policy Committee of the ACM (USACM), since 2006.
  • Member of the IBM Data Governance Council, from Feb. 2005-2006
  • Member of The Privacy Place (TPP), a CERIAS Affiliate, since Sep. 2004

Program Committees
  • 36th ACM/IEEE Int'l Conference on Software Engineering (ICSE'14), 2014 Program Committee.
  • 21st IEEE Int'l Requirements Engineering Conference (RE'13), 2013 Program Board.
  • 20th IEEE Int'l Requirements Engineering Conference (RE'12), 2012 Program Board.
  • IEEE Int'l Conference on Technologies for Homeland Security (HST'11), 2011.
  • ACM Foundations on Software Engineering, New Ideas (ESEC/FSE 2011), 2011.
  • 19th IEEE Int'l Requirements Engineering Conference (RE'11), 2011.
  • 18th IEEE Int'l Requirements Engineering Conference (RE'10), 2010.
  • 6th Int'l Conference on Trust, Privacy and Security in Digital Business (TrustBus'09), 2009.
  • Symposium on Requirements Engineering for Information Security (SREIS'08), co-located with ARES'08, 2008.
Program Committee Chair
  • SEI/CERT Security and Privacy Requirements Engineering Workshop, Pittsburgh, Pennsylvania, 2011.
  • 3rd Int'l Workshop on Requirements Engineering and Law (RELAW'10), co-located with RE'10, Sydney, Australia, 2010.
  • 2nd Int'l Workshop on Requirements Engineering and Law (RELAW'09), co-located with RE'09, Atlanta, Georgia, 2009.
  • 1st Int'l Workshop on Requirements Engineering and Law (RELAW'08), co-located with RE'08, Barcelona, Spain, 2008.
Organizing Committees
  • Organizing Co-Chair, 6th Int'l Workshop on Requirements Engineering and Law (RELAW'13); served as co-chair for RELAW 2012, 2011.
  • Publicity Chair, 20th Int'l Requirements Engineering Conference (RE'12), 2012.
  • Tutorials Chair, 19th Int'l Requirements Engineering Conference (RE'11), 2011.
  • Publications Chair, 18th Int'l Requirements Engineering Conference (RE'10), 2010.
  • Guest Editor, Requirements Engineering Journal (REJ), Special Issue on Digital Privacy: Theories, Policies and Technologies, Springer, Fall 2010.
  • Organizer, Preparing the Faculty Candidate: Recruiter and New Faculty Perspectives, NCSU, 2007.
  • Steering Committee, Land Grant University Research Ethics (LANGURE) Program, NCSU, 2006-2007.

Referee and Reviewer Participation
  • ACM Transactions on Software Engineering and Methodology (TOSEM), since 2011
  • ACM Transactions on the Web (TWEB), since 2010
  • Automated Software Engineering (ASE), since 2011
  • Communications of the ACM (CACM), since 2008
  • Computers and Security (C&S), since 2007
  • Grace Hopper Celebration of Women in Computing Conference, 2006
  • IEEE Security and Privacy (S&P), since 2009
  • IEEE Transactions on Knowledge and Data Engineering (TKDE), since 2007
  • IEEE Transactions on Software Engineering (TSE), since 2005
  • Requirements Engineering Journal (REJ), since 2008

Publications

See the separate publications page.


Invited Presentations

Privacy and Security Requirements in the Cloud
(6 Dec 2011) Secure Architectures in the Cloud, Dagstuhl Seminar Series
Wadern, Germany

Due Diligence for Trustworthy Systems: A Methodology for Legal Requirements Acquisition
(20 April 2010) Department of Computer Science, George Washington University
Washington, D.C., USA

Exercising Due Diligence: Legal Requirements Acquisition and Formalization
(26 May 2009) School of Computer Science, Carnegie Mellon University
Pittsburgh, Pennsylvania, USA

Exercising Due Diligence: Legal Requirements Acquisition and Formalization
(15 April 2009) Studies and Analyses Center, Institute for Defense Analyses
Alexandria, Virginia, USA

Aligning Information Systems with Policies and Laws
(9 April 2009) Science and Technology Policy Institute
Washington, District of Columbia

Exercising Due Diligence: Legal Requirements Acquisition and Formalization
(23 March 2009) RAND Corporation
Arlington, Virginia, USA

Requirements Acquisition for Legal Compliance
(6 March 2009) Department of Computer Science, University of Texas at San Antonio
San Antonio, Texas, USA

Requirements Acquisition for Legal Compliance
(2 March 2009) School of Computing and Digital Media, DePaul University
Chicago, Illinois, USA

Legal Requirements: Theory and Practice for Specifying Legally Compliant Information Systems
(26 February 2009) Department of Computer Science, University of Nebraska
Lincoln, Nebraska, USA

Legal Requirements: From Theory to Practice PDF ]
(29 February 2008) IFIP WG 2.9 on Requirements Engineering
Salvador, Bahia, Brazil

Beliefs, Determinations and Agreements: Contextualizing Privacy in Practice PDF ]
(29 January 2008) Carolina Privacy Official's Network
Raleigh, NC, USA

Ethics in Computer Science: Technologists and Value-free Technology PDF ]
(8 December 2006) Annual Fall NCSU Computer Science Seminar Series
Raleigh, NC, USA

What Do Organizational Security Policies Say About Security? PDF ]
(28 July 2005) IBM TJ Watson Research Center (TJW)
Hawthorne, New York, USA

Information Analysis Techniques Using Upper Ontology Languages HTML ]
(6 August 2003) Oak Ridge National Laboratory (ORNL)
Oak Ridge, Tennessee


Academic Paper Presentations

A Systematic Method for Acquiring Regulatory Requirements: A Frame-Based Approach PDF ]
(15 October 2007) 6th Int'l Workshop on Requirements for High Assurance Systems (RHAS-6)
Delhi, India

The Frame-Based Requirements Analysis Methodology (FBRAM)
(17 August 2007) Doctoral Thesis Proposal
Raleigh, NC, USA

Compliance Engineering: Aligning Software Requirements with Policies and Regulations
(6 November 2006) ACM/SIGSOFT 14th Symp. on Foundations of Soft. Engr. (FSE-14), Doctoral Symposium
Portland, OR, USA

Towards Compliance: Extracting Rights and Obligations to Align Requirements with Regulations PDF ]
(13 September 2006) IEEE 14th Int'l Conf. on Requirements Engineering (RE'06)
Minneapolis, Minnesota, USA

Enforceability vs. Accountability in Electronic Policies
(8 June 2006) IEEE 7th Int'l Workshop on Policies for Distributed Systems and Networks (POLICY'06)
London, Ontario, Canada

Mining Rule Semantics to Understand Legislative Compliance PDF ]
(7 November 2005) 2005 ACM Workshop on Privacy In Electronic Society (WPES'05)
Alexandria, Virginia, USA

Analyzing Goal Semantics for Rights, Permissions and Obligations PDF ]
(1 September 2005) IEEE 13th Int'l Conf. on Requirements Engineering (RE'05)
Paris, France

Deriving Semantic Models from Privacy Policies PDF ]
(6 June 2005) IEEE 6th Int'l Workshop on Policies for Distributed Systems and Networks (POLICY'05)
Stockholm, Sweden

Rights, Obligations and Suggestions: Encoding Rules from Privacy Law PDF ]
(14 March 2004) The Privacy Place Spring 2005 Workshop (TTP-S05)
Raleigh, North Carolina, USA

Semantic Parameterization of Privacy Goals PDF ]
(19 October 2004) The Privacy Place Fall 2004 Workshop (TTP-F04)
Raleigh, North Carolina, USA


Academic Poster Presentations

The Effect of Ambiguity on Legal Conformance in Information Systems
(19 March 2008) NCSU 3rd Annual Graduate Student Research Symposium, Raleigh, NC, USA

IT Governance, Risk and Compliance: Aligning Software Systems with Regulatory Models
(27 October 2006) IBM University Day, Research Triangle Park, NC, USA

Open Seminar: Open Courseware in Privacy and Security
(23 March 2005) CERIAS 6th Annual Information Security Symposium, Purdue University, West Lafayette, IN, USA