Hu, Jianbin
Associate Professor
Research Interests: Information security
Office Phone:
Email: hujianbin@pku.edu.cn
HU, Jianbin is an associate professor in the School of Computer Science, and has served as the Vice-Director of Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education since 2009. He obtained the Ph.D. degree in Computer Software and Theory from Peking University in 2002. His research interests include cryptography, network and information security, security management in enterprise information system, big data management and mining etc.
Dr. Hu has published more than 60 research papers, and most of them are published in top-tier conferences and journals, such as ICICS, ICC, ACSAC, TKDE, SAC, and ICWS. He is serving as a senior member of Professional Committee of Computer Security of China Computer Federation (CCF). This achievement has won the National Science and Technology Progress Award (2010), and six Military science and technology progress Awards (2001-2017).
Dr. Hu has more than twenty research projects including NSFC, 863 project, and Weapon Equipment Pre Research Projects for PLA. His research achievements are summarized as follows:
1) Data security in pervasive computing environment: According to the characteristic of open data in pervasive computing environment, key technologies such as dynamic construction of security domain, automatic generation and distribution of security policy, autonomous access control, combined public key and application virtualization are studied. A security model is proposed to support the data life cycle of generation, transmission, application and destruction. The basic system of data isolation, exchange and application is constructed. The system solves the data security problems of authorization management, access control, and application in pervasive computing environment.
2) Wireless sensor network security techniques: For low power and self-organizing wireless sensor network, one major research topic is the security architecture and key technology in resource constrained environment. He proposed a comprehensive security protection system for sensor data generation, transmission and decision-making stage. The proposed system can efficiently support the safe and reliable data service for terminals.
3) Cloud computing security services: according to the separation of data storage and application in cloud computing, study on the identification data of user centered model. He proposed a core security service framework based on SOA, established a trusted service scheduling framework based on QoS decomposition, which ensure users acquire high quality security services.