孙宇清教授 个人空间

孙宇清   教授

sun_yuqing@sdu.edu.cn
tel:88391810


 2005.9-2005.12 香港大学访问学者
 2007.5-2008.5 美国Purdue大学访问学者

招生意向


2-4

研究方向


研究方向为协同计算与信息系统安全,主要包括访问控制、安全策略、隐私保护、数据完整性保护、Web服务安全、无线网络应用安全等。

讲授课程


数据结构
信息系统安全
电子商务概论

承担项目


近期主持和参与的科研项目:
"集团数据中心建设规划与面向任务的设计向导系统研",国家科技支撑计划子项目  
“社会网络中个性化隐私保护研究”, 国家自然科学基金项目, 2012.1-2015.12
 “面向云计算可信数据管理的安全策略与访问控制研究”, 中国科学院计算机系统结构重点实验室开放基金, 2009.12-2011.12
 “电子商务中的隐私保护关键技术研究”, 山东大学自主创新基金,2009.06-2012.12
 “安全授权分析与保障关键技术研究”,山东省自然科学基金项目(Y2008G28), 2008-2011
 “产权交易电子商务平台的研究与典型示范”,山东省重大科技发展项目,2004-2007
 “高速网络环境下Heavy Hitter的行为测量与分析”,国家自然科学基金项目,2009-2011
 “特殊数字签名及安全协议的设计与分析” ,山东省自然科学基金项目,2007-2010
 “网格安全支撑平台关键技术的研究与实现”, 山东省科技发展项目, 2004-2007
 “空间数据挖掘中若干关键技术的研究”,山东省教育厅科研发展计划项目,2004-2007
 “具有特性的数字签名方案的研究”,国家自然科学基金项目,2004-2006
 “数字签名方案的研究”,山东省自然科学基金,2003-2006

发表论文


三篇代表作:
1.Yuqing SUN, Qihua Wang, Ninghui Li, Elisa Bertino, and Mikhail Atallah, “On the Complexity of Authorization in RBAC under Qualification and Security Constraints”, IEEE Transaction on Dependable and Secure Computing (TDSC) (ISSN 1545-5971, SCI, IF 2.093, 中国计算机学会推荐一区期刊),Vol.8,N0.6,pp.883-897.
2.Yuqing SUN, Bin GONG, Xiangxu MENG, Zongkai LIN, and Elisa Bertino, “Specification and Enforcement of Flexible Security Policy for Active Cooperation”, Elsevier International Journal of Information Sciences (SCI, IF 3.095), Vol.179 (15), 2009,pp.2629-2642
3.Yuqing Sun, Dickson K.W. Chiu, Bin Gong, Xiangxu Meng, Peng Zhang. Scheduling Mobile Collaborating Workforce for Multiple Urgent Events. Journal of Network and Computer Applications. (JNCA) Volume 35, Issue 1, January 2012, Pages 156-163. (ISSN 1084-8045, SCI, IF 1.111).


近期发表论文

 1. (134-C)Yuqing Sun, Haoran Xu, Reynold Cheng. Privacy Preserving Path Recommendation for Moving User on Location Based Service. The 10th IEEE International Conference on Ubiquitous Intelligence and Computing, pp.33-40. December 18-20, 2013 Vietri sul Mare, Italy.
2. (133-C) Haoran Xu and Yuqing Sun. Toward Collective Privacy by Coordinative Path Planning. Pervasive Computing and the Networked World-Joint International Conference. Dec.5-7,2013.
3. (132-J)刘诗海,孙宇清,刘古月.面向业务特征的自适应虚拟机迁移带宽分配算法[J]. 计算机学报,2013年9月,第36卷,第9期,pp:1816-1825
4. (131-C) Zhong Han, Yuqing Sun, Yuan Wang. Audit Recommendation for Privacy Protection in Personal Health Record Systems[C]. The 2013 17th IEEE International Conference on Computer Supported Cooperative Work in Design,June 27-29,2013,pp:533-538.
5. (126-J)Yuqing Sun, Dickson K.W. Chiu, Bin Gong, Xiangxu Meng, Peng Zhang. Scheduling Mobile Collaborating Workforce for Multiple Urgent Events. Journal of Network and Computer Applications. (JNCA) Volume 35, Issue 1, January 2012, Pages 156-163. (ISSN 1084-8045, SCI, IF 1.111).
6. (125-J) Sun Yuqing, Matthias Farwick, Patrick C.K. Hung, Dickson K.W. Chiu, Guangjun Ji. Context-Aware Task Allocation for Quick Collaborative Responses[J]. Chinese Journal of Electronics, July 2012, Vol.21, No.3, pp:395-402. (SCI)
7. (124-C)Haojun Yu, Yuqing Sun, Jinyan Hu. An Ontology Based Privacy Protection Model for Third-Party Platform[C]. AMT 2012, LNCS, vol.7669, pp. 369–376. Springer, Heidelberg(2012).
8. (123-J)姜文广,孙宇清.面向第三方服务平台的隐私保护[J].兰州大学学报:自然科学版,2012年8月,第48卷,第4期,pp:85-90.
9. (122-J)王媛,孙宇清,马乐乐.面向社会网络的个性化隐私策略定义与实施[J].通讯学报,2012年9月,第33卷第Z1期,pp:239-249.
10. (121-J)王媛,孙宇清,高荣瑞.支持动态协作的委托授权意愿协商.系统工程理论与实践,2012年12月,第32卷第12期,pp:2781-2788.
11. (119-J)刘诗海,孙宇清,石维琪,高云伟.面向可扩展集群环境的快速虚拟机迁移方法. 东南大学学报:自然科学版. (ISSN 1001-0505)2011年41卷3期.pp468-472 . Rapid migration
(118-J)Yuqing Sun, Dickson K.W. Chiu, Bin Gong, Xiangxu Meng, Peng Zhang. Scheduling Mobile Collaborating Workforce for Multiple Urgent Events. Journal of Network and Computer Applications. (JNCA) (ISSN 1084-8045, SCI, IF 1.111). To appear. DOI:10.1016/j.jnca.2011.02.008
 (117-J) Yuqing SUN, Qihua Wang, Ninghui Li, Elisa Bertino, and Mikhail Atallah, “On the Complexity of Authorization in RBAC under Qualification and Security Constraints”, IEEE Transaction on Dependable and Secure Computing (TDSC) (ISSN 1545-5971, SCI, IF 2.093),Vol.8,N0.6,pp.883-897, November/December, 2011. (published online 24 Sept. 2010) DOI: 10.1109/TDSC.2010.55.
 (116-C) Yuqing SUN, Ninghui Li and Elisa Bertino. Proactive Defense of Insider Threats through Authorization Management. Proceeding of the 13th ACM International Conference on Ubiquitous Computing workshop on Ubiquitous Affective Awareness and Intelligent Interaction (UbiComp 2011 UAAII), September 17-21, 2011, Beijing, China. Accepted
 (115-C) Yuqing SUN and Chen CHEN. Towards Coequal Authorization for Dynamic Collaboration. Proceeding of International Conferences on Active Media Technology (AMT 2011), September 7-9, 2011, Lanzhou, China. Accepted
 (114-J) Yuqing SUN, Joshua Zhexue HUANG, Xiangxu MENG, “Integrating constraints to support legally flexible business processes”, Springer Information Systems Frontiers, Vol.13, No.2, pp. 171-189. Apr. 2011. ISSN: 1387-3326 (SCI, IF 1.309, 2009), DOI: 10.1007/s10796-009-9190-z. published online 5 May 2009.
 (112-C)Guangjun Ji, Yuqing Sun and Xiaojun Ma. Path Planning for Privacy Preserving in Location Based Service. Proceeding of the 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2011), pp.162-167. Jun.8-10,2011, Lausanne, Switzerland.
 (111-J) Qing Yao, Yuqing Sun and Haiyang Wang. A novel approach to Global Software Development for chartered enterprises. Int. J. Computer Applications in Technology, Vol. 40, No. 3, pp.149-159, 2011
 (103-C) Yuqing SUN and Dickson K.W. CHIU. Context-Aware Scheduling of Workforce for Multiple Urgent Events, The Fourteenth International Conference on Computer Supported Cooperative Work in Design (CSCWD 2010), April 14-16, 2010, Shanghai, China, pp.629-634 (EI源)
 (102-J) 杨勇, 孙宇清, 周丽. “FSP: 一种基于风险的安全策略”(ISSN 1002-8331), 计算机工程与应用. Vol.46(13):82-86, 2010, 刊出日期:2010-5-1
 (101-C) Yuqing Sun and Guangjun Ji. Privacy Preserving in Personalized Mobile Marketing. The 2010 International Conference on Active Media Technology (AMT'10). Lecture Notes in Computer Science, ISSN 0302-9743 Volume 6335/2010, pp.538-545, DOI: 10.1007/978-3-642-15470-6_54, August 28-30, 2010, Toronto, Canada.
 (099-J) Yuqing SUN, Bin GONG, Xiangxu MENG, Zongkai LIN, and Elisa Bertino, “Specification and Enforcement of Flexible Security Policy for Active Cooperation”, Elsevier International Journal of Information Sciences (SCI, IF 3.095), Vol.179 (15), 2009,pp.2629-2642,DOI: 10.1016/j.ins.2009.01.040. http://authors.elsevier.com/TrackPaper.html?trk_article= INS8247&trk_surname=Sun
 (098-C) Yuqing SUN, Matthias FARWICK and Dickson K.W. CHIU. Constraint-based Authorization Management for Mobile Collaboration, The Fourth IEEE Congress on Services (SERVICES 2009), July 6-10, 2009, Los Angeles, CA, USA, pp.22-29. DOI: 10.1109/SERVICES-I.2009.79
 (097-J) Qing YAO, Yuqing SUN and Haiyang WANG. “A New Business Process Model in Web Service Environment”. Journal of Computational Information Systems (EI), Vol.5(1), pp. 379-386, February 2009
 (096-C) Li Zhou and Yuqing Sun, Web Service Provider Selection under QoS and Security Constraints, The Forth International Conference on Pervasive Computing and Applications (ICPCA2009), Taiwan, December 3-5, 2009, IEEE 978-1-4244-5228-6/09. DOI 10.1109/JCPC.2009.5420178
 (095-C) Peng Pan, Yuqing Sun and Qingzhong Li. The Top-k Skyline Query in Pervasive Computing Enviroments, The Forth International Conference on Pervasive Computing and Applications (ICPCA2009), Tamkang University, Taiwan, December 3-5, 2009, IEEE 978-1-4244-5228-6/09
 (094-CJ)周丽, 孙宇清. 面向业务流程执行可靠性的服务选择, 计算机科学,Vol36(9),pp.207-211
 (093-CJ)高荣瑞, 孙宇清. 基于双边意愿的委托授权协商模型, 计算机科学,Vol36(9),pp.171-175
 (092-B) Yong Zhang, Shijun Liu, Yuchang Jiao, Yuqing Sun. A Case Study on Service Oriented Enterprise Interoperability in Automobile Supply Chain. Handbook of Research on Service Intelligence and Service Science: Technologies and Challenges, Book Chapter.
 (091-J) 姚青, 孙宇清,王海洋. 基于过程代数的可变业务流程建模方法的研究. 计算机集成制造系统,
 (084-C) Federica Paci, Rodolfo Ferrini, Yuqing Sun, and Elisa Bertino. “Authorization and User Failure Resiliency for WS-BPEL business processes”. 6th International Conference on Service Oriented Computing (ICSOC'08,acceptance rate 20.4%) December, 1 - 5, 2008, Sydney, Australia. pp116-131. http://www.springerlink.com/content/r1257g7582x03461/
 (083-C) Cheng Chen, Yuqing Sun, and Peng Pan. “Similarity Analysis on Heterogeneous Security Policy”. The Third International Conference on Pervasive Computing and Applications (ICPCA2008), 06-08 October 2008, Alexandria, Egypt. pp.680-685.
 (082-C) Peng Pan, Qingzhong Li, Yuqing Sun, Zhiyong Chen, Zhongmin Yan, and Yongquan Dong “Top-K Query Answering in Probabilistic Data Integration Systems under Pervasive Computing Environment”. The Third International Conference on Pervasive Computing and Applications (ICPCA2008), 06-08 October 2008, Alexandria, Egypt. pp.274-279.
 (081-C) Peng Pan, QingZhong Li and Yuqing Sun. “ Rank Queries in Probabilistic Data Integration Systems for Digital Library Federation”, Proceeding of 2008 IEEE International Symposium on IT in Medicine & Education (ITME 2008), pp.336-342, 2008
 (074-CJ) Yuqing SUN, Peng Pan, Ho-fung Leung, and Bin Shi, “Ontology Based Hybrid Access Control for Automatic Interoperation”, Lecture Notes in Computer Science, volume 4610/2007, The 4th International Conference on Autonomic and Trusted Computing (ATC07), pp.323-332,Hong Kong, China, July 11-13, 2007
 (073-C) Yuqing SUN, Bin GONG, Xiangxu MENG, and Zongkai LIN, “Active Authorization Management for Multi-domain Cooperation”, proceeding of 11th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2007), pp.162-167
 (072-C) Meng Qi, Chenglei Yang, Changhe Tu, Xiangxu Meng, Yuqing Sun: A GPU-Based Algorithm for Building Stochastic Clustered-Dot Screens. International Symposium on Visual Computing (ISVC) 2007, pp.98-105, Lake Tahoe, NV, USA
 (071-C) 刘波, 孙宇清, “一种基于规则的委托约束授权模型”, 中国通信学会第五届学术年会论文集, 2007.11.
 (065-CJ) Yuqing SUN, Xiangxu MENG, Shijun LIU, Peng PAN ,“Flexible Workflow Incorporated with RBAC”. Lecture Notes in Computer Science (3865), pp.525-534, Springer, 2006. (EI 2006279981437)
 (064-CJ) Yuqing Sun, Peng Pan, and Xiangxu Meng, “An Approach for Trusted Interoperation in a Multidomain Environment”. Lecture Notes in Computer Science (4158), Springer, pp.352-361, 2006
 (063-C) Yuqing SUN, Xiangxu MENG, Fang YIN,“A Novel Approach for Role Hierarchies in Flexible RBAC Workflow”,The Tenth IEEE International EDOC Conference (EDOC 2006), Hong Kong, Oct. 2006, pp.488-491.
 (062-C) Fang YIN, Yuqing SUN, Peng PAN, Liang FENG. “Efficient Role Hierarchy Management for Workflow”. The First International Symposium on Pervasive Computing and Applications (ICPCA06), Urumchi, Xinjiang, P.R. China,August 3-5, 2006, pp546-551
 (061-J) 孙宇清,赵锐,姚青,史斌,刘佳,“一种基于网格的障碍约束下空间聚类算法”, 山东大学学报,Vol. 41, No 3, pp86-90, 2006
 (053-C) Yuqing SUN, Peng PAN,“PRES—A Practical Flexible RBAC Workflow System”,proceeding of The 7th International Conference on Electronic Commerce (ICEC2005), Xi'an, China, Aug.15-17, 2005, pp.653-658.
 (052-C) Yuqing SUN, Xiangxu MENG, Shijun LIU, Peng PAN ,“An Approach For Flexible RBAC Workflow System”,proceeding of The 9th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2005),Coventry,UK, May.2005, pp.524-529.
 (051-C) 赵锐,孙宇清,“用空间数据挖掘技术解决选址问题”, 计算机科学, Vol.32,No.8.6,第五届中国Rough集与软计算学术研讨会(CRSSC2005),2005.8,pp221-223

本人研究生从事的工作领域


信息系统安全和隐私保护