Research
 

SIS Research Area - Information Security & Trust

Research Theme
Data Applications Security

Central Concerns and Questions

The major concern of our research is to specify the security requirements for certain applications, design, build, and implement information systems that satisfy the specified security requirements, and assure that the systems meet their requirements in actual operations .

Emerging Ideas and Initiatives

In the applications of public key infrastructure, we prove that a certificate authority should adopt different strategies to release certificate revocation information for different types of certificates so as to minimise its operational cost.

To protect individuals' privacy in many applications, ranging from census data release through statistical database management to data warehousing, we provide exact solutions on how to efficiently derive the most accurate information about individuals from the aggregated information that is released or published.

To protect valuable data (e.g., parametric specifications, surveys, and life sciences data) against pirated copies, we design a variety of data watermarking techniques, including robust watermark, fragile watermark, public watermark, and collusion resistant fingerprint for data distribution or publication applications.

Selected Publications

[1] Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao. Shifting inference control to user side: Architecture and Protocol. Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC) , 2009.

[2] Yingjiu Li, Haibing Lu. Disclosure analysis and control in statistical databases . 13th European Symposium on Research in Computer Security (ESORICS) , pages 146-160, LNCS 5283, Malaga , Spain , October 6-8, 2008.

[3] Yingjiu Li, Haibing Lu, Robert H. Deng. Practical inference control for data cubes (Extended Abstract). IEEE Symposium on Security and Privacy (S&P'06) , pages 115-120, Oakland , USA , May 21-24, 2006.

[4] Chengyu Ma, Nan Hu, Yingjiu Li. On the release of CRLs in public key infrastructure. In 15th USENIX Security Symposium (Security), pages 17-28, Canada , August 2006.

[5] Yingjiu Li, Robert H. Deng: Publicly verifiable ownership protection for relational databases. In ACM Symposium on InformAtion, Computer, and Communication Security (ASIACCS), pages 78-89, Taiwan , March 2006.

Projects, Presentations and Posters

  1. LI Yingjiu, Recent Advancement in Inference Control (presentation)
  2. LI Yingjiu, Database Watermarking: A Systematic View (presentation)

 

 



Last updated on 25 September, 2009 by School of Information Systems.